Search

Journal Menu

Journal Browser

Results (22)

Search Parameters:

Keyword: PHI
Order results
Results per page
Open AccessArticle
8 Pages, 1,306 KB Download PDF
Device Authentication using Homomorphic Encryption

by Supriya Yadav and Gareth Howells
Journal of Engineering Research and Sciences, Volume 2, Issue 10, Page # 1-8, 2023; DOI: 10.55708/js0210001
Abstract: In the digital era, data security in files, databases, accounts, and networks is of utmost importance. Due to the sensitive, private, or protected information they contain, databases are a common target for cyber attacks. To assess threats to data and lower the risk involved with data processing and storage, data security is crucial. Therefore, it… Read More

(This article belongs to the Special Issue on SP3 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2023) and the Section Software Engineering – Computer Science (SEC))

Open AccessArticle
7 Pages, 2,573 KB Download PDF
Applied Salt Technique to Secure Steganographic Algorithm

by Bo Bo Oo
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Abstract: Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered… Read More

(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
10 Pages, 497 KB Download PDF
Humankind and Ubiquitous Autonomous AI: A Symbiotic or Dystopian Interaction? A Socio-Philosophical Inquiry

by Michael A. Vidalis and Antonios S. Andreatos
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 109-118, 2022; DOI: 10.55708/js0105012
Abstract: The technological revolution in Artificial Intelligence (AI) and Autonomous Robotics is expected to transform societies in ways we cannot even imagine. The way we live, interact, work, and fight wars, will not be like anything witnessed before in human history. This qualitative research paper endeavors to examine the effect of said technological advancements on multiple… Read More

(This article belongs to the Section Ethics (ETH))

Open AccessArticle
6 Pages, 1,489 KB Download PDF
AI-Enhanced Endpoint Compliance and Automated Vulnerability Management Framework for Essential Government Infrastructure

by Harshavardhan Malla
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 18-23, 2025; DOI: 10.55708/js0408002
Abstract: Public sector IT infrastructures that underpin essential services, such as transportation and law enforcement, are becoming progressively susceptible to advanced cyber attacks and encounter heightened regulatory demands, especially in accordance with CJIS and NIST standards. Regrettably, existing methods for compliance enforcement and patch management are primarily manual or only slightly automated, thereby constraining their scalability,… Read More

(This article belongs to the Section Information Systems – Computer Science (ISC))

Open AccessArticle
7 Pages, 468 KB Download PDF
Secure Anonymous Acknowledgments in a Delay-Tolerant Network

by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
7 Pages, 1,803 KB Download PDF
Enhancing Mental Health Support in Engineering Education with Machine Learning and Eye-Tracking

by Yuexin Liu, Amir Tofighi Zavareh and Ben Zoghi
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 69-75, 2024; DOI: 10.55708/js0310007
Abstract: Mental health concerns are increasingly prevalent among university students, particularly in engineering programs where academic demands are high. This study builds upon previous work aimed at improving mental health support for engineering students through the use of machine learning (ML) and eye-tracking technology. A framework was developed to monitor mental health by analyzing eye movements… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Artificial Intelligence – Computer Science (AIC))

Open AccessArticle
7 Pages, 318 KB Download PDF
On a Kernel k-Means Algorithm

by Bernd-Jürgen Falkowski*
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 37-43, 2024; DOI: 10.55708/js0310004
Abstract: This is the extended version of a paper presented at CISP-BMEI 2023. After a general introduction kernels are described by showing how they arise from considerations concerning elementary geometrical properties. They appear as generalizations of the scalarproduct that in turn is the algebraic version of length and angle. By introducing the Reproducing Kernel Hilbert Space… Read More

(This article belongs to the Section Artificial Intelligence – Computer Science (AIC))

Open AccessArticle
35 Pages, 3,100 KB Download PDF
Fingerprint Bio-metric: Confronting Challenges, Embracing Evolution, and Extending Utility – A Review

by Diptadip Maiti, Madhuchhanda Basak and Debashis Das
Journal of Engineering Research and Sciences, Volume 3, Issue 9, Page # 26-60, 2024; DOI: 10.55708/js0309003
Abstract: As documented in recent research, this review offers a thorough examination of the intricate subject of fingerprint authentication, including a wide range of issues and applications. Addressing problems like non-linear deformations and enhancing picture quality, which are frequently reduced by sophisticated improvement and alignment techniques are important components of fingerprint image authentication. Countering security concerns… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
9 Pages, 3,377 KB Download PDF
Browser-in-the-Browser (BitB) Attack: Case Study

by Khalid Alissa, Bushra Alhetela, Ghadeer Alazman, Asma Bader, Noor Alhomeed, Layan Almubarak and Fajer Almulla
Journal of Engineering Research and Sciences, Volume 3, Issue 5, Page # 14-22, 2024; DOI: 10.55708/js0305002
Abstract: Phishing attacks are becoming more sophisticated daily, taking advantage of victims' lack of awareness to steal sensitive information. The browser-in-the-browser (BitB) attack is a novel and sophisticated phishing technique that uses a single sign-on (SSO) popup window that mimics a legitimate browser login to steal a user's credentials. In addition, an attacker can customize the… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
9 Pages, 2,321 KB Download PDF
Estimation of Elbow Joint Movement Using ANN-Based Softmax Classifier

by Abdullah Y. Al-Maliki, Kamran Iqbal and Gannon White
Journal of Engineering Research and Sciences, Volume 3, Issue 4, Page # 1-9, 2024; DOI: 10.55708/js0304001
Abstract: Estimating the natural voluntary movement of human joints in its entirety is a challenging problem especially when high accuracy is desired. In this paper, we build a modular estimator to estimate the elbow joint motion including angular displacement and direction. Being modular, this estimator can be scaled for application to other joints. We collected surface… Read More

(This article belongs to the Special Issue on SP4 (Special Issue on Computing, Engineering and Sciences 2023-24) and the Section Health Care Sciences and Services (HCS))

Open AccessArticle
11 Pages, 2,283 KB Download PDF
Quantum Machine Learning on Remote Sensing Data Classification

by Yi Liu, Wendy Wang, Haibo Wang and Bahram Alidaee
Journal of Engineering Research and Sciences, Volume 2, Issue 12, Page # 23-33, 2023; DOI: 10.55708/js0212004
Abstract: Information extracted from remote sensing data can be applied to monitor the business and natural environments of a geographic area. Although a wide range of classical machine learning techniques have been utilized to obtain such information, their performance differs greatly in classification accuracy. In this study, we aim to examine whether quantum-enhanced machine learning can… Read More

(This article belongs to the Section Remote Sensing (RMS))

Open AccessArticle
4 Pages, 648 KB Download PDF
Reservations - as a Step of Social Democracy: Review of Dr. Ambedkar’s Principles

by Mange Karan Ratanbhai
Journal of Engineering Research and Sciences, Volume 1, Issue 10, Page # 1-4, 2022; DOI: 10.55708/js0110001
Abstract: The paper aims to highlight the key frameworks of Dr. B.R. Ambedkar, his thoughts, philosophies, and goals behind the framing of the Indian constitution. Based on different theories and philosophies, the concept of the reservation system adopted by the Indian Constitution, and its relevance in today’s scenario is being portrayed. Dr. Ambedkar’s idea of a… Read More

(This article belongs to the Section Law (LAW))

Open AccessArticle
18 Pages, 2,465 KB Download PDF
The Future of Work after COVID-19 from the Office to the Edge: Using the IT Industry as an Example

by Ya-Ning Chang and Chui-Yu Chiu
Journal of Engineering Research and Sciences, Volume 1, Issue 9, Page # 15-32, 2022; DOI: 10.55708/js0109003
Abstract: The spread of the epidemic caused many people to believe the traditional office model is no longer appropriate for modern business, nor is it compatible with the efficiency and innovation demanded by modern business. Individual accomplishment is not measured by where one works, but by achieving a balance between work and life and establishing a… Read More

(This article belongs to the Section Telecommunications (TEL))

Open AccessArticle
10 Pages Download PDF
Blockchain Based Framework for Securing Students’ Records

by Omega Sarjiyus and Israel Isaiah
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 45-54, 2022; DOI: 10.55708/js0106006
Abstract: Right now, colleges, as focuses of exploration and development, coordinate in their cycles different advances that permit further developing administrations and cycles for their individuals. Among the inventive innovations is the Web of Things that permits getting information from the climate and individuals through various gadgets. Security of information on college grounds is expected to… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
9 Pages, 3,285 KB Download PDF
Identification of Basic Respiratory Patterns for Disease-related Symptoms Through a Microphone Device

by Amol M Khatkhate, Varad Raut, Madhura Jadhav, Shreya Alva, Kalpesh Vichare and Ameya Nadkarni
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 36-44, 2022; DOI: 10.55708/js0106005
Abstract: The research in this paper focuses on the capture of respiratory patterns in real-time through a minor modification of an anti-snoring device that is readily available off the shelf or can be bought online and attaching a microphone to it. The audio pattern is recorded for the various lung conditions at different stages. The data… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Biochemical Research Methods (BRM))

Open AccessArticle
15 Pages, 6,313 KB Download PDF
Machine-Learning based Decoding of Surface Code Syndromes in Quantum Error Correction

by Debasmita Bhoumik, Pinaki Sen, Ritajit Majumdar, Susmita Sur-Kolay, Latesh Kumar KJ and Sundaraja Sitharama Iyengar
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 21-35, 2022; DOI: 10.55708/js0106004
Abstract: Errors in surface code have typically been decoded by Minimum Weight Perfect Matching (MWPM) bas -based Machine Learning (ML) techniques have been employed for this purpose, although how an ML decoder will behave in a more realistic asymmetric noise model has not been studied. In this article we (i) establish a methodology to formulate the… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Applied Mathematics (APM))

Open AccessArticle
6 Pages, 1,555 KB Download PDF
Factorial Analysis to Categories Spread and Effect of Ebola Virus from Various Countries

by Venu Paritala and Harsha Thummala
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 1-6, 2022; DOI: 10.55708/js0106001
Abstract: The main objective of this research analyze and correlates the number of cases and death rates reported on the Ebola virus in many countries. Ebola virus is one of the most lethal diseases to infect humans. This approach Proceeding uses the Factorial analysis technique in the Ebola Virus dataset. This method takes the largest common… Read More

(This article belongs to the Section Statistics & Probability (STP))

Open AccessArticle
15 Pages, 2,245 KB Download PDF
Evaluating Project Complexity in Construction Sector in India

by Amit Moza, Virendra Kumar Paul and Sushil Kumar Solanki
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 198-212, 2022; DOI: 10.55708/js0105021
Abstract: Evaluating complexity, in order to manage it effectively, has been stressed by many researchers as one of the key areas of project management. This, as literature shows, has been done using different methodologies and assessing it from different perspectives resulting in measures that differ in their characteristics, their application, and their relevance with respect to… Read More

(This article belongs to the Section Construction and Building Technology (CBT))

Open AccessArticle
16 Pages, 2,191 KB Download PDF
Ideas at the Basis of Development of Software for Specific Nuclear Reactor Safety and Design

by Viacheslav Sergeevich Okunev
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 01-16, 2022; DOI: 10.55708/js0105001
Abstract: The main goal of the work was the development of software and codes for the design of new generation nuclear reactors. The problem is solved by the example of fast reactors with a liquid metal coolant. The problem is solved within the framework of system analysis methods and operations drawing methods. Three groups of methods… Read More

(This article belongs to the Section Nuclear Science and Technology (NST))

Open AccessArticle
7 Pages, 1,792 KB Download PDF
Length-Weight Relationships (LWRs) and Condition Factor of Seven Fish Species in River Nyangweta Tributary, Kenya

by Fredrick Mang’era Ondemo, Albert Getabu, Zipporah Gichana and Job Ombiro Omweno
Journal of Engineering Research and Sciences, Volume 1, Issue 3, Page # 193-199, 2022; DOI: 10.55708/js0103020
Abstract: Length-weight relationships (LWRs) and condition factors are important for effective management of riverine fisheries. This study investigated the LWRs and condition factors of the dominant fish species from Nyangweta tributary of River Kuja, in Lake Victoria Catchment, Kenya. A total of 615 fish of seven dominant species were analyzed: Enteromius altianalis, Enteromius neumeyeri, Clarias theodorae,… Read More

(This article belongs to the Section Fisheries (FIS))

Open AccessArticle
5 Pages, 1,242 KB Download PDF
Experimental Methodology to Find the Center of Gravity of a Solid

by Joohoon Je and Eunsung Jekal
Journal of Engineering Research and Sciences, Volume 1, Issue 3, Page # 148-152, 2022; DOI: 10.55708/js0103015
Abstract: The center of gravity of a three-dimensional object found through an experimental method can be made easier and faster than calculating the movement manually to make it look more natural in graphic computer images. In addition, in various sports such as skating, the score can be increased by appropriately moving the position of the center… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Multidisciplinary – Materials Science (MLM))

Open AccessArticle
15 Pages, 2,561 KB Download PDF
Detailed Overview on POLYMATH Software for Chemical Engineering Analysis

by Abdulhalim Musa Abubakar, Bello Iliyasu and Zakiyyu Muhammad Sarkinbaka
Journal of Engineering Research and Sciences, Volume 1, Issue 3, Page # 133-147, 2022; DOI: 10.55708/js0103014
Abstract: It is pertinent to highlight areas POLYMATH software is useful for chemical engineering analysis. Its applications had been demonstrated in this paper using 10 Problem Set, in areas that includes transport phenomena, heat transfer, reaction, and bioreaction kinetics to solve differential equations, nonlinear equations, simultaneous linear equations, graphical representation and regression problems arising in these… Read More

(This article belongs to the Section Chemical Engineering (CHE))

Share Link