scispace - formally typeset
Search or ask a question
JournalISSN: 2088-5334

International Journal on Advanced Science, Engineering and Information Technology 

Insight Society
About: International Journal on Advanced Science, Engineering and Information Technology is an academic journal published by Insight Society. The journal publishes majorly in the area(s): Computer science & Biology. It has an ISSN identifier of 2088-5334. Over the lifetime, 2565 publications have been published receiving 12000 citations. The journal is also known as: IJASEIT.


Papers
More filters
Journal ArticleDOI
TL;DR: The results show the advantage of the PID tuning using PSO-based optimization approach, compared to the conventional gain tuning using Ziegler-Nichols method.
Abstract: The aim of this research is to design a PID Controller using PSO algorithm. The model of a DC motor is used as a plant in this paper. The conventional gain tuning of PID controller (such as Ziegler-Nichols (ZN) method) usually produces a big overshoot, and therefore modern heuristics approach such as genetic algorithm (GA) and particle swarm optimization (PSO) are employed to enhance the capability of traditional techniques. However, due to the computational efficiency, only PSO will be used in this paper. The comparison between PSO-based PID (PSO-PID) performance and the ZN-PID is presented. The results show the advantage of the PID tuning using PSO-based optimization approach.

202 citations

Journal ArticleDOI
TL;DR: This paper intends to investigate the Smart Environment pillar, and in particular the aspect related to the implementation of Smart Energy Grid for citizens in the urban context, using the Blockchain technology to join the Grid, exchanging information, and buy/sell energy between the involved nodes (energy providers and private citizens), using the blockchain granting ledger.
Abstract: The improvement of the Quality of Life (QoL) and the enhancement of the Quality of Services (QoS) represent the main goal of every city evolutionary process. It is possible making cities smarter promoting innovative solutions by use of Information and Communication Technology (ICT) for collecting and analysing large amounts of data generated by several sources, such as sensor networks, wearable devices, and IoT devices spread among the city. The integration of different technologies and different IT systems, needed to build smart city applications and services, remains the most challenge to overcome. In the Smart City context, this paper intends to investigate the Smart Environment pillar, and in particular the aspect related to the implementation of Smart Energy Grid for citizens in the urban context. The innovative characteristic of the proposed solution consists of using the Blockchain technology to join the Grid, exchanging information, and buy/sell energy between the involved nodes (energy providers and private citizens), using the Blockchain granting ledger.

165 citations

Journal ArticleDOI
TL;DR: In this paper, the effects of operating temperature on monocrystalline PV panel at Perlis, Malaysia were investigated using PVSYST software in order to evaluate its output performance.
Abstract: The main limit of PV systems is the low conversion efficiency of PV panels, which is strongly influenced by their operating temperature Lack of accuracy in consideration through PV panel temperature increases the financial risk of system installation This present study investigates the effects of operating temperature on monocrystalline PV panel at Perlis, Malaysia A selected model of PV panel firstly was simulated using PVSYST software in order to evaluate its output performance Meanwhile, PROVA 200 used to measure and record all electrical data for outdoor experimental during the sunniest day Besides, the thermal distribution was analysed through PV panel temperatures and thermal imaging Simulation results implied that the output power of PV panel decreases with increasing of its working temperature followed by the efficiency The experimental results obviously show that the STC parameters do not represent the real operating conditions of PV panel for outdoor conditions Less output power was produced affected by the atmospheric factors such as solar irradiance and ambient temperature These both factors strongly affected the PV panel temperature distribution In short, the elevating of PV panel temperature contributed to the negative impact on output performance of the panel

128 citations

Journal ArticleDOI
TL;DR: A semantic and detailed survey of methods used for malware detection like signature-based and heuristic-based, and the importance of memory-based analysis in malware detection is discussed.
Abstract: Now a day the threat of malware is increasing rapidly. A software that sneaks to your computer system without your knowledge with a harmful intent to disrupt your computer operations. Due to the vast number of malware, it is impossible to handle malware by human engineers. Therefore, security researchers are taking great efforts to develop accurate and effective techniques to detect malware. This paper presents a semantic and detailed survey of methods used for malware detection like signature-based and heuristic-based. The Signature-based technique is largely used today by anti-virus software to detect malware, is fast and capable to detect known malware. However, it is not effective in detecting zero-day malware and it is easily defeated by malware that use obfuscation techniques. Likewise, a considerable false positive rate and high amount of scanning time are the main limitations of heuristic-based techniques. Alternatively, memory analysis is a promising technique that gives a comprehensive view of malware and it is expected to become more popular in malware analysis. The main contributions of this paper are: (1) providing an overview of malware types and malware detection approaches, (2) discussing the current malware analysis techniques, their findings and limitations, (3) studying the malware obfuscation, attacking and anti-analysis techniques, and (4) exploring the structure of memory-based analysis in malware detection. The detection approaches have been compared with each other according to their techniques, selected features, accuracy rates, and their advantages and disadvantages. This paper aims to help the researchers to have a general view of malware detection field and to discuss the importance of memory-based analysis in malware detection.

110 citations

Journal ArticleDOI
TL;DR: The discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform and the open issues, main challenges and directions highlighted for future work in this area.
Abstract: The Internet today lacks an identity protocol for identifying people and organizations. As a result, service providers needed to build and maintain their own databases of user information. This solution is costly to the service providers, inefficient as much of the information is duplicated across different providers, difficult to secure as evidenced by recent large-scale personal data breaches around the world, and cumbersome to the users who need to remember different sets of credentials for different services. Furthermore, personal information could be collected for data mining, profiling and exploitation without users' knowledge or consent. The ideal solution would be self-sovereign identity, a new form of identity management that is owned and controlled entirely by each individual user. This solution would include the individual's consolidated digital identity as well as their set of verified attributes that have been cryptographically signed by various trusted issuers. The individual provides proof of identity and membership by sharing relevant parts of their identity with the service providers. Consent for access may also be revoked hence giving the individual full control over its own data. This survey critically investigates different blockchain based identity management and authentication frameworks. A summary of the state-of-the-art blockchain based identity management and authentication solutions from year 2014 to 2018 is presented. The paper concludes with the open issues, main challenges and directions highlighted for future work in this area. In a nutshell, the discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform.

109 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023150
2022331
2021109
2020330
2019287
2018358