Search Results

Results (19)

Search Parameters:

Section: cha
Order results
Results per page
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 1,858 KB Download PDF

True Random Number Generator Implemented in ReRAM Crossbar Based on Static Stochasticity of ReRAMs

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 5, Page # 30–36, 2024; DOI: 10.25046/aj090504
Abstract:

True Random Number Generators (TRNG) find applications in various fields, especially hardware security. We suggest a TRNG that exploits the intrinsic static stochasticity of Resistive Switching Random Access Memories (ReRAMs) to generate random bits. Other suggested designs use stochasticity in the switching mechanism, which requires high precision over input voltage and time. In the proposed…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
14 Pages, 1,599 KB Download PDF

GPT-Enhanced Hierarchical Deep Learning Model for Automated ICD Coding

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 21–34, 2024; DOI: 10.25046/aj090404
Abstract:

In healthcare, accurate communication is critical, and medical coding, especially coding using the ICD (International Classification of Diseases) standards, plays a vital role in achieving this accuracy. Traditionally, ICD coding has been a time-consuming manual process performed by trained professionals, involving the assignment of codes to patient records, such as doctor’s notes. In this paper,…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 1,851 KB Download PDF

From Sensors to Data: Model and Architecture of an IoT Public Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 14–20, 2024; DOI: 10.25046/aj090403
Abstract:

RetePAIoT of Emilia-Romagna region is an IoT Public Network, financed by Emilia-Romagna Region and developed by Lepida Scpa, where citizens, private companies and Public Administrations can integrate free of charge their own sensors of any type and anywhere in the region. The main objective of the project is to provide a facility to implement the…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
11 Pages, 405 KB Download PDF

Meta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 01–11, 2023; DOI: 10.25046/aj080101
Abstract:

The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 2,406 KB Download PDF

Indoor Position and Movement Direction Estimation System Using DNN on BLE Beacon RSSI Fingerprints

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 129–138, 2022; DOI: 10.25046/aj070315
Abstract:

In this paper, we propose a highly accurate indoor position and direction estimation system using a simple fully connected deep neural network (DNN) model on Bluetooth Low Energy (BLE) Received Signal Strength Indicators (RSSIs). Since the system’s ultimate goal is to function as an indoor navigation system, the system estimates the indoor position simultaneously as…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 1,800 KB Download PDF

Enhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 18–24, 2022; DOI: 10.25046/aj070202
Abstract:

Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
20 Pages, 3,025 KB Download PDF

Driving Behaviour Identification based on OBD Speed and GPS Data Analysis

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 550–569, 2021; DOI: 10.25046/aj060160
Abstract:

Vehicle accidents, particularly in small and large urban areas, are rising tremendously day by day worldwide. As a recent research subject in automaton transportation, the subsequent collision has become a vital issue and emergency. Internet of things (IoT) and the Internet of Vehicles (IoV) have become very popular these days because of their versatility, and…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
6 Pages, 733 KB Download PDF

Optimized use of RFID at XYZ University Library in Doing Auto Borrowing Book by Utilizing NFC Technology on Smartphone

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 532–537, 2021; DOI: 10.25046/aj060158
Abstract:

NFC (Near Field Communication) is a contactless communication technology based on a radio frequency (RF) field using a base frequency of 13.56 MHz. NFC technology is perfectly designed to exchange data between two devices via simple touch gestures. RFID is the process of identifying an object directly by radio frequency. There are two important components…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
12 Pages, 885 KB Download PDF

Enterprise Architecture Institutionalization for Health Information Exchange (HIE) Cloud Migration

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 680–691, 2020; DOI: 10.25046/aj050584
Abstract:

The functional priority of Health Information Exchanges (HIEs) is to ensure a timely transference of health data. Because of the frequency at which health records are transferred and the variety of health data HIEs receive, there are major challenges in efficiently accomplishing this. Cloud technology has become a generally accepted solution to remediate data transference…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
6 Pages, 846 KB Download PDF

Multi-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 674–679, 2020; DOI: 10.25046/aj050583
Abstract:

Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 1,032 KB Download PDF

Issues in File Caching and Virtual Memory Paging with Fast SCM Storage

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 660–668, 2020; DOI: 10.25046/aj050581
Abstract:

Storage-Class Memory (SCM) like OptaneTM has advanced as a fast storage medium, and conventional memory management systems designed for the hard disk storage need to be reconsidered. In this article, we revisit the memory management system that adopts SCM as the underlying storage medium and discuss the issues in two layers: file caching and virtual…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 1,272 KB Download PDF

Arduino-Compatible Modular Kit Design and Implementation for Programming Education

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 295–301, 2020; DOI: 10.25046/aj050537
Abstract:

To cultivate creative talent, ways to learn creative problem-solving skills is needed, and one of them is programming. Arduino is a well-known tool used for programming education and the usefulness has been demonstrated in various case studies. However, there are several problems in existing Arduino-compatible kits as education tools, including the need for understanding hardware…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
6 Pages, 936 KB Download PDF

Minimizing the Cleaning Cost in Flash Based Storage Sub-Systems by Proliferating the Valid Data Copying Process

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 561–566, 2020; DOI: 10.25046/aj050270
Abstract:

Flash memory reliability and the performance have been confirmed as an improvement in the storage subsystem technological advancement, especially in supporting an embedded system solution. Conversely, the main constraint of the storage device is the erase-before-write characteristic in handling both write and re-write I/O operations. More attention must be taken into consideration to handle both…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
5 Pages, 1,060 KB Download PDF

A Wi-Fi based Architecture of a Smart Home Controlled by Smartphone and Wall Display IoT Device

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 180–184, 2018; DOI: 10.25046/aj030623
Abstract:

In this age of smart devices, many people are carrying a smartphone with them all the time. When they are at home, most of them are connected with the home Wi-Fi network. In this paper, a Wi-Fi network based architecture is proposed to control home appliances using a smartphone and also with a touchscreen-based wall…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 345 KB Download PDF

Power-Energy Simulation for Multi-Core Processors in Bench-marking

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 255–262, 2017; DOI: 10.25046/aj020131
Abstract:

At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Hardware & Architecture in Computer Science (CHA))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026