Results (94)
Search Parameters:
Keyword: PTOFault Tolerant Control Based on PID-type Fuzzy Logic Controller for Switched Discrete-time Systems: An Electronic Throttle Valve Application
This paper deals with the problem of Fault Tolerant Control (FTC) using PID-type Fuzzy Logic Controller (FLC) for an Electronic Throttle Valve (ETV) described by a switched discrete-time system with input disturbances and actuator faults. In order to detect the faults, Unknown Input Observers (UIOs) are designed and formulated in terms of Lyapunov theory and…
Read MoreDiscovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data
The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read MorePixel-Based Unsupervised Classification Approach for Information Detection on Optical Markup Recognition Sheet
This paper proposed an Optical Markup Recognition (OMR) system to be used to detect shaded options of students after MCQ-type examinations. The designed system employed the pixel-based unsupervised classification approach with image pre-processing strategies and compared its efficiencies, in terms of speed and accuracy, with object-based supervised or unsupervised classification OMR systems. Speed and accuracy…
Read MoreA Secure Communication Framework for ECUs
Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…
Read MoreComparative Study of Adaptive Consensus Control of Euler-Lagrange Systems on Directed Network Graph
A comparative study between adaptive consensus control of multi-agent systems composed of fully actuated mobile robots which are described as a class of Euler-Lagrange systems on directed network graphs based on the notion of inverse optimal H∞ control criterion (Controller I), and the similar control strategy without H∞ control criterion (Controller II), is given in this paper.…
Read MoreSystem Control Device Electronics Smart Home Using Neural Networks
The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…
Read MoreCollaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma
Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MoreHomemade array of surface coils implementation for small animal magnetic resonance imaging
Small animal modeling is an exciting research field where human pathogenic frameworks can be replicated in a controlled environment. Accurate Imaging is in high demand when modeling abnormalities and, magnetic resonance imaging plays a vital role due to its demonstrated lowest intrusion when compared with other imaging methods. However, the required high-resolution yields low-quality images…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreAdaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems
In this paper, we propose an adaptive discrete-time fuzzy sliding mode control for a class of chaotic systems. For this aim, a discrete sliding mode controller and a fuzzy system are combined to achieve an adequate control. The Laypunov stability theorem is used to testify the asymptotic stability of the whole system and the consequence…
Read MoreMatrix Encryption Scheme
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…
Read MoreChikungunya virus; Review of Epidemiology and Outbreak in Pakistan
Chikungunya virus (CHIKV) is mosquito-borne, alpha virus. It causes acute fever and acute and chronic musculoskeletal pain in humans. CHIKV has spread to 22 countries including Pakistan resulting in hundreds of thousands of death across the world. International travel stands out as one of the major risk factors for rapid global spread of the disease.…
Read MoreClassifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks
Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…
Read MoreA Clinical Review of Zika Virus (ZIKAV)
Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreMobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks
The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy…
Read More
