Search Results

Results (94)

Search Parameters:

Keyword: PTO
Order results
Results per page
Open AccessArticle
8 Pages, 743 KB Download PDF

Fault Tolerant Control Based on PID-type Fuzzy Logic Controller for Switched Discrete-time Systems: An Electronic Throttle Valve Application

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 186–193, 2017; DOI: 10.25046/aj020623
Abstract:

This paper deals with the problem of Fault Tolerant Control (FTC) using PID-type Fuzzy Logic Controller (FLC) for an Electronic Throttle Valve (ETV) described by a switched discrete-time system with input disturbances and actuator faults. In order to detect the faults, Unknown Input Observers (UIOs) are designed and formulated in terms of Lyapunov theory and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Automation & Control Systems (ACS))
Open AccessArticle
7 Pages, 870 KB Download PDF

Discovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 87–93, 2017; DOI: 10.25046/aj020611
Abstract:

The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Biochemistry & Molecular Biology (BMB))
Open AccessArticle
8 Pages, 1,409 KB Download PDF

Smartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1815–1822, 2017; DOI: 10.25046/aj0203221
Abstract:

Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,284 KB Download PDF

Pixel-Based Unsupervised Classification Approach for Information Detection on Optical Markup Recognition Sheet

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 121–132, 2017; DOI: 10.25046/aj020417
Abstract:

This paper proposed an Optical Markup Recognition (OMR) system to be used to detect shaded options of students after MCQ-type examinations. The designed system employed the pixel-based unsupervised classification approach with image pre-processing strategies and compared its efficiencies, in terms of speed and accuracy, with object-based supervised or unsupervised classification OMR systems. Speed and accuracy…

Read More
(This article belongs to Section Imaging Science & Photographic Technology (IPT))
Open AccessArticle
7 Pages, 484 KB Download PDF

A Secure Communication Framework for ECUs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1307–1313, 2017; DOI: 10.25046/aj0203165
Abstract:

Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 442 KB Download PDF

Comparative Study of Adaptive Consensus Control of Euler-Lagrange Systems on Directed Network Graph

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1165–1171, 2017; DOI: 10.25046/aj0203147
Abstract:

A  comparative  study  between  adaptive  consensus  control  of multi-agent systems composed of fully actuated mobile robots which are described as a class of Euler-Lagrange systems on directed network graphs based on the notion of inverse optimal H∞ control criterion (Controller I), and the similar control strategy without H∞ control criterion (Controller II), is given in this paper.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
3 Pages, 580 KB Download PDF

System Control Device Electronics Smart Home Using Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 35–37, 2017; DOI: 10.25046/aj020507
Abstract:

The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
9 Pages, 1,303 KB Download PDF

Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 13–21, 2017; DOI: 10.25046/aj020503
Abstract:

Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 7,176 KB Download PDF

Homemade array of surface coils implementation for small animal magnetic resonance imaging

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 532–539, 2017; DOI: 10.25046/aj020368
Abstract:

Small animal modeling is an exciting research field where human pathogenic frameworks can be replicated in a controlled environment. Accurate Imaging is in high demand when modeling abnormalities and, magnetic resonance imaging plays a vital role due to its demonstrated lowest intrusion when compared with other imaging methods. However, the required high-resolution yields low-quality images…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 438 KB Download PDF

Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 395–400, 2017; DOI: 10.25046/aj020351
Abstract:

In this paper, we propose an adaptive discrete-time fuzzy sliding mode control for a class of chaotic systems. For this aim, a discrete sliding mode controller and a fuzzy system are combined to achieve an adequate control. The Laypunov stability theorem is used to testify the asymptotic stability of the whole system and the consequence…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Electronic Engineering (EEE))
Open AccessArticle
3 Pages, 491 KB Download PDF

Matrix Encryption Scheme

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 56–58, 2017; DOI: 10.25046/aj020408
Abstract:

In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…

Read More
(This article belongs to Section Mathematics (MAT))
Open AccessArticle
5 Pages, 583 KB Download PDF

Chikungunya virus; Review of Epidemiology and Outbreak in Pakistan

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 51–55, 2017; DOI: 10.25046/aj020407
Abstract:

Chikungunya virus (CHIKV) is mosquito-borne, alpha virus. It causes acute fever and acute and chronic musculoskeletal pain in humans. CHIKV has spread to 22 countries including Pakistan resulting in hundreds of thousands of death across the world. International travel stands out as one of the major risk factors for rapid global spread of the disease.…

Read More
(This article belongs to Section Virology (VIR))
Open AccessArticle
8 Pages, 2,236 KB Download PDF

Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 233–240, 2017; DOI: 10.25046/aj020332
Abstract:

Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
4 Pages, 655 KB Download PDF

A Clinical Review of Zika Virus (ZIKAV)

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 2, Page # 7–10, 2017; DOI: 10.25046/aj020202
Abstract:

Zika virus (ZIKAV) is a flavi-virus, first isolated in 1947 in the Zika Forest of Uganda. ZIKAV is a positive-sense single-stranded RNA virus. ZIKAV is made up of two noncoding regions (5′ and 3′ ) that verge an open reading frame, which put into code a polyprotein smote into the capsid, precursor of membrane, envelope,…

Read More
(This article belongs to Section Virology (VIR))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
13 Pages, 887 KB Download PDF

Mobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 108–120, 2017; DOI: 10.25046/aj020113
Abstract:

The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026