Search Results

Results (32)

Search Parameters:

Keyword: Verification
Order results
Results per page
Open AccessArticle
10 Pages, 865 KB Download PDF

Secured Multi-Layer Blockchain Framework for IoT Aggregate Verification

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 106–115, 2022; DOI: 10.25046/aj070312
Abstract:

Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,792 KB Download PDF

Wireless Sensor Networks Simulation Model to Compute Verification Time in Terms of Groups for Massive Crowd

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1229–1240, 2021; DOI: 10.25046/aj0601140
Abstract:

Everyone needs fast response or output against its request or need. Therefore, technologies are used to make the processing fast and accurate according to our needs. But in some situations, still we need to do more. Especially, when we need to process a massive or huge crowd of people in limited time frame such as…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,424 KB Download PDF

Offline Signature Recognition and Verification Using ORB Key Point Matching Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 01–07, 2020; DOI: 10.25046/aj050401
Abstract:

An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,341 KB Download PDF

Verification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 369–374, 2019; DOI: 10.25046/aj040548
Abstract:

With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 1,062 KB Download PDF

Framework for the Formal Specification and Verification of Security Guidelines

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 38–48, 2018; DOI: 10.25046/aj030106
Abstract:

Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 757 KB Download PDF

An Efficient Authentication Method For Smart Card Verification In Online

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 133–138, 2017; DOI: 10.25046/aj020418
Abstract:

The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 981 KB Download PDF

Hybrid Neural Network Method for Predicting the SOH and RUL of Lithium-Ion Batteries

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 5, Page # 193–198, 2022; DOI: 10.25046/aj070520
Abstract:

The use of a battery to power an electrical or electronic system is accompanied by battery management, i.e. a set of measures intended to preserve it for preventative maintenance, thus the cost reduction. This management is generally based on two key parameters, the (remaining useful life) RUL and the (State-of-health) SOH, which relate respectively to…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 1,840 KB Download PDF

A Study on Novel Hand Hygiene Evaluation System using pix2pix

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 112–118, 2022; DOI: 10.25046/aj070210
Abstract:

The novel coronavirus infection (COVID-19), which appeared at the end of 2019 has developed into a global pandemic with numerous deaths, and has also become a serious social concern. The most important and basic measure for preventing infection is hand hygiene. In this study, by photographing palm images of nursing students after hand-washing, using fluorescent…

Read More
(This article belongs to Section Biomedical Engineering (EBI))
Open AccessArticle
18 Pages, 574 KB Download PDF

Efficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 1, Page # 107–124, 2022; DOI: 10.25046/aj070111
Abstract:

Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 449 KB Download PDF

The Influence of Online Learning on Learning Interest and Motivation and Their Impact on Student Achievement at Educational Technology Study Program – Ibn Khaldun University Bogor

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 82–87, 2021; DOI: 10.25046/aj060612
Abstract:

The aim of this research was to prove the effect of online learning on interest and motivation to learn and its effect on student achievement in the Educational Technology Study Program – Ibnu Khaldun University, Bogor. This research method uses descriptive analysis and verification with a quantitative approach. The source of this research uses primary…

Read More
(This article belongs to Section Education (EDU))
Open AccessArticle
6 Pages, 392 KB Download PDF

Modelling and Testing Services with Continuous Time SRML

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 60–65, 2021; DOI: 10.25046/aj060609
Abstract:

The SENSORIA Reference Modeling Language (SRML) aims at modelling composite services at a high level. Continuous time SRML extends SRML so that it can model services whose components can perform both discrete processes and continuous processes. In order to show how continuous time SRML is applied, in this paper, we systematically introduce our study on…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
8 Pages, 1,173 KB Download PDF

Using Formal Methods to Model a Smart School System via TLA+ and its TLC Model Checker for Validation

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 821–828, 2021; DOI: 10.25046/aj060295
Abstract:

Formal methods are one of the efficient tools to verify and validate designs for different kinds of systems. Smart systems are attracting researchers’ attention due to the rapid spread of new technologies all over the world. Modeling a smart system requires connecting heterogeneous subsystems together to build it. Our contribution to this work is in…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 681 KB Download PDF

An Operational Responsibility and Task Monitoring Method: A Data Breach Case Study

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1157–1163, 2021; DOI: 10.25046/aj0601130
Abstract:

As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,156 KB Download PDF

Formal Proof of Properties of a Syntax-Oriented Editor of Robotic Missions Plans

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1049–1057, 2021; DOI: 10.25046/aj0601116
Abstract:

This article copes with the formal verification of properties of the missions building module of PILOT’s software. PILOT is a language dedicated to remote control of robots. An incremental syntax-oriented editor was built in order to increase the dependability of PILOT’s missions and we showed that, under a maximum size of plan, this editor allows…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 2,226 KB Download PDF

Cyclic Evaluation of Capacity of Recovered Traction Battery after Short-Circuit Damage

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 879–885, 2021; DOI: 10.25046/aj060197
Abstract:

Presented paper discusses possibilities related to the recovery of the damaged lithium batteries after the short-circuit. The recovery procedure was applied on the selected traction LiFePO4 40Ah cell which was initially short-circuited. After the short-circuit, the damaged cell has visible damage of the electro-mechanical properties. For the recovery of damaged traction cell as much as…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Electrical Engineering (ELE))
Open AccessArticle
12 Pages, 546 KB Download PDF

Modified Blockchain based Hardware Paradigm for Data Provenance in Academia

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 66–77, 2021; DOI: 10.25046/aj060108
Abstract:

Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 1,046 KB Download PDF

Design and Implementation of DFT Technique to Verify LBIST at RTL Level

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 937–943, 2020; DOI: 10.25046/aj0506111
Abstract:

According to IEC 61805 and ISO 26262 standards requirement inclusion of LBIST (Logic Built in Self-Test) became mandatory to achieve safety critical application such as automotive field. In such systems, once device is switched ON LBIST (Logic Built in Self-Test) is activated and testing of digital logic is performed. After safety subsystem says that the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Electronic Engineering (EEE))
Open AccessArticle
11 Pages, 2,906 KB Download PDF

Prediction of Vessel Dynamic Model Parameters using Computational Fluid Dynamics Simulation

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 926–936, 2020; DOI: 10.25046/aj0506110
Abstract:

Dynamic positioning, a system to maintain vessel position and heading, is a technology that is used in many vessels and being intensively used as research topic in marine engineering. In order to make this system work properly, an accurate parameters value is needed. This research focuses on finding several parameters needed in this control system,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Behavioral Sciences (BHS))
Open AccessArticle
12 Pages, 924 KB Download PDF

Blockchain Application in Higher Education Diploma Management and Results Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 871–882, 2020; DOI: 10.25046/aj0506104
Abstract:

Academic certifications are achievements desired by people, because they have a direct impact, positively, on their social lives. Such an important document, still widely issued in paper format, may be subject to forgery or impossibility of verification due to the unavailability of the issuing entity. This work consists of identifying, analyzing and testing some of…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 906 KB Download PDF

Hand-Based Biometric Recognition Technique – Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 689–698, 2020; DOI: 10.25046/aj050683
Abstract:

In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,108 KB Download PDF

SharpniZer: A C# Static Code Analysis Tool for Mission Critical Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 561–570, 2020; DOI: 10.25046/aj050668
Abstract:

Until recent years, code quality was not given due significance, as long as the system produced accurate results. Taking into account the implications and recent losses in critical systems, developers have started making use of static code analysis tools, to assess the eminence of source code in terms of quality. Static code analysis is conducted…

Read More
(This article belongs to Section Ceramics in Materials Science (MCR))
Open AccessArticle
8 Pages, 1,398 KB Download PDF

Combination of Salient Object Detection and Image Matching for Object Instance Recognition

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 584–591, 2020; DOI: 10.25046/aj050273
Abstract:

Object Instance Recognition aims to classify objects specifically and usually use a single reference image. It is possible to be used in many applications such as visual search, information retrieval and augmented reality. However, various things affect the appearance of the objects, which makes the recognition process harder, especially if a single reference image is…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
24 Pages, 5,041 KB Download PDF

Multi Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 67–90, 2019; DOI: 10.25046/aj040609
Abstract:

Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 737 KB Download PDF

Event Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 256–264, 2019; DOI: 10.25046/aj040432
Abstract:

With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026