The role of energy management technologies for cyber resilient smart homes in sustainable urban development DOI Creative Commons

Um-e-Habiba,

Ijaz Ahmed, Mohammed Alqahtani

и другие.

Energy Strategy Reviews, Год журнала: 2024, Номер 56, С. 101602 - 101602

Опубликована: Ноя. 1, 2024

Язык: Английский

AI-enabled frequency synchronization control considering FDI attack using metaheuristic algorithm DOI
Hamad Ahmad, Muhammad Majid Gulzar, Ghulam Mustafa

и другие.

Neural Computing and Applications, Год журнала: 2025, Номер unknown

Опубликована: Янв. 7, 2025

Язык: Английский

Процитировано

0

AI-based approach for detecting FDI attacks in load frequency control for centralized multi-area power systems DOI
Hamad Ahmad, Muhammad Majid Gulzar, Ghulam Mustafa

и другие.

Computers & Electrical Engineering, Год журнала: 2025, Номер 123, С. 110060 - 110060

Опубликована: Фев. 5, 2025

Язык: Английский

Процитировано

0

Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems DOI Creative Commons
Ijaz Ahmed, Ali M. El‐Rifaie,

F. Akhtar

и другие.

Energy Strategy Reviews, Год журнала: 2025, Номер 58, С. 101654 - 101654

Опубликована: Фев. 5, 2025

Язык: Английский

Процитировано

0

Trajectory planning and tracking control in autonomous driving system: Leveraging machine learning and advanced control algorithms DOI
Md Hafizur Rahman, Muhammad Majid Gulzar, Tansu Sila Haque

и другие.

Engineering Science and Technology an International Journal, Год журнала: 2025, Номер 64, С. 101950 - 101950

Опубликована: Фев. 18, 2025

Язык: Английский

Процитировано

0

Verification of SPI Protocol Using Universal Verification Methodology for Modern IoT and Wearable Devices DOI Open Access
Chin-Wen Liao,

Hsiu-Chou Yu,

Yu-Cheng Liao

и другие.

Electronics, Год журнала: 2025, Номер 14(5), С. 837 - 837

Опубликована: Фев. 20, 2025

The Serial Peripheral Interface (SPI) protocol plays a crucial role in wearable and IoT devices, enabling high-speed communication between microcontrollers peripherals such as sensors, displays, connectivity modules. With the increasing complexity of modern devices system-on-chip (SoC) designs, robust verification methods are essential to ensure functionality reliability. This paper utilizes Universal Verification Methodology (UVM) develop scalable reusable testbench for SPI verification. process encompasses test planning, simulation, emulation, top-level validate multi-slave coordination error-handling scenarios. results demonstrate critical importance UVM ensuring performance dependability advanced electronics, contributing reliable integration future devices. demonstrated functional coverage 83.33% 100% assertion coverage, confirming our approach’s robustness. Analysis uncovered bins revealed that specific edge cases, timing violations arbitration conflicts, require additional scenarios full Furthermore, successfully identified handled fault conditions, clock jitter, bus contention, framing errors, operation real-world deployments. These findings highlight effectiveness UVM-based improving reliability robustness low-power, resource-constrained embedded systems.

Язык: Английский

Процитировано

0

Detecting and Mitigating SQL Injection in .NET Applications Using AI-Based Anomaly Detection DOI

Sohan Singh Chinthalapudi

Опубликована: Апрель 11, 2025

SQL Injection (SQLi) persists as a major threat to .NET applications since attackers can inject harmful code into databases for database manipulation purposes. The presence of this vulnerability leads hackers gaining access unauthorized data and causing system integrity failure while resulting in lost which threatens organizations utilizing these applications. Signature-based detection systems demonstrate limited effectiveness when it comes detecting contemporary or innovative SQLi attacks that create new patterns. Artificial Intelligence through anomaly technology provides capable defensive solution overcome particular challenge. normal behavior patterns queries inside become manageable AI machine learning algorithms detect abnormal signal attack vulnerabilities. research introduces specific AI-based designed application environments. Our method begins with collecting query logs then performing preprocessing before extracting important features are used train model between valid hostile queries. process relies on an RNN autoencoder understands sequences thus identifying anomalous related injection. Experimental testing shows the proposed reaches high precision alongside minimal false alarms recognized well unrecognized attacks. security position becomes more robust implementation protecting against current future

Язык: Английский

Процитировано

0

Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches DOI
Ijaz Ahmed, Miswar Akhtar Syed, Muhammad Maaruf

и другие.

Computing, Год журнала: 2024, Номер 107(1)

Опубликована: Ноя. 19, 2024

Язык: Английский

Процитировано

3

Demand side management through energy efficiency measures for the sustainable energy future of Pakistan DOI Creative Commons
Arshad Chughtai, Mohammad Aslam Uqaili, Nayyar Hussain Mirjat

и другие.

Heliyon, Год журнала: 2024, Номер 10(15), С. e34798 - e34798

Опубликована: Июль 21, 2024

Pakistan is facing energy crises due to localized shortages, market manipulation, infrastructure disruption, rising demand, governance issues, climate and geopolitical events. In this situation Demand Side Management (DSM) a promising solution overcome the problem of crises. DSM strategy helps manage consumer demand through conservation rather than addition new power capacity. study, Low Emissions Analysis Platform (LEAP) develops an model for period 2022-2050. Three scenarios has been constructed namely Baseline (BAS), Green Energy Policy (GEP), Efficiency (ENE) predict future production, carbon emissions investment cost which covers capital, operational maintenance costs. The results suggest that targets should be achieved implementation ENE scenario. Predicted production consumption under scenario are substantially less those BAS country can meet its 635.83,000 GWh with 747.15,000 production. Non-renewable sources produce 171.27,000 GWh, whilst renewable 575.88,000 GWh. According scenario, by 2050, CO

Язык: Английский

Процитировано

2

Electric Mobility Challenges and Approaches for Sustainable Green Power Synergy in Smart Cities DOI
Ijaz Ahmed, Abdul Basit, Muhammad Ahmad

и другие.

Arabian Journal for Science and Engineering, Год журнала: 2024, Номер unknown

Опубликована: Дек. 10, 2024

Язык: Английский

Процитировано

2

Load frequency control progress: A comprehensive review on recent development and challenges of modern power systems DOI Creative Commons
Muhammad Majid Gulzar, Daud Sibtain, Mohammed H. Alqahtani

и другие.

Energy Strategy Reviews, Год журнала: 2024, Номер 57, С. 101604 - 101604

Опубликована: Дек. 19, 2024

Язык: Английский

Процитировано

2