Search

Journal Menu

Journal Browser

Results (5)

Search Parameters:

Keyword: Policy
Order results
Results per page
Open AccessArticle
11 Pages, 1,249 KB Download PDF
CAPEF: Context-Aware Policy Enforcement Framework for Android Applications

by Saad Inshi, Mahdi Elarbi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Journal of Engineering Research and Sciences, Volume 2, Issue 1, Page # 13-23, 2023; DOI: 10.55708/js0201002
Abstract: The notion of Context-Awareness of mobile applications is drawing more attention, where many applications need to adapt to physical environments of users and devices, such as location, time, connectivity, resources, etc. While these adaptive features can facilitate better communication and help users to access their information anywhere at any time, this however bring risks caused… Read More

(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Electrical Engineering (ELE))

Open AccessArticle
8 Pages, 433 KB Download PDF
Connecting Mobile Devices Transparently with the Customer Network in a User-Friendly Manner

by Dirk Henrici and Andreas Boose
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 1-8, 2025; DOI: 10.55708/js0410001
Abstract: The mobile data service in cellular networks can be more than just providing Internet access: it can connect mobile devices seamlessly and transparently to private networks like company intranets and home networks. Such a service is nowadays provided to usually larger customers based on customer-specific access point names and connecting the private data path via… Read More

(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Telecommunications (TEL))

Open AccessArticle
10 Pages, 5,213 KB Download PDF
Magnetic AI Explainability: Retrofit Agents for Post-Hoc Transparency in Deployed Machine-Learning Systems

by Maikel Leon
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 31-40, 2025; DOI: 10.55708/js0408004
Abstract: Artificial intelligence already influences credit allocation, medical diagnosis, and staff recruitment, yet most deployed models remain opaque to decision makers, regulators, and the citizens they affect. A new wave of transparency mandates across multiple jurisdictions will soon require organizations to justify automated decisions without disrupting tightly coupled production pipelines that have evolved over the years.… Read More

(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Artificial Intelligence – Computer Science (AIC))

Open AccessArticle
9 Pages, 3,212 KB Download PDF
A Deep Reinforcement Learning Approach to Eco-driving of Autonomous Vehicles Crossing a Signalized Intersection

by Joshua Ogbebor, Xiangyu Meng and Xihai Zhang
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 25-33, 2022; DOI: 10.55708/js0105003
Abstract: This paper outlines a method for obtaining the optimal control policy for an autonomous vehicle appro med that traffic signal phase and timing information can be made available to the autonomous vehicle as the vehicle approaches the traffic signal. Constraints on the vehicle’s speed and acceleration are considered and a microscopic fuel consumption model is… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Automation and Control Systems (ACS))

Open AccessReview
13 Pages, 428 KB Download PDF
An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review

by Roberto Mazzolin and Asad Madni
Journal of Engineering Research and Sciences, Volume 1, Issue 4, Page # 09-21, 2022; DOI: 10.55708/js0104002
Abstract: Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need… Read More

(This article belongs to the Section Electronic Engineering (EEE))

Share Link