Ayaz Hassan Moon | Islamic University Of Science and Technology (original) (raw)
Papers by Ayaz Hassan Moon
Research Square (Research Square), Apr 2, 2024
Multimedia tools and applications, Feb 27, 2024
International Journal of Information Technology
Wireless communication in autonomous mobile agents has an inhibitive barrier to entry, especially... more Wireless communication in autonomous mobile agents has an inhibitive barrier to entry, especially in unmanned areal vehicles (UAV). This paper presents DroNS-3, a comprehensive library that aims to significantly lower the barrier to entry into the field of UAV research, reduce the risk of expensive mistakes, and make interfacing with leading flight and networking simulators simpler. DroNS-3 integrates the Ardupilot drone simulator with the NS-3 network simulator and provides an easy platform for quickly designing autonomous missions both in simulation and on physical drone platforms. The DroNS-3 autopilot library has already been successfully utilized during test flights and simulations for our published research and has been made open-source with supporting documentation on GitHub, making it a useful tool for the research community. CCS CONCEPTS • Computer systems organization → Robotics; • Networks → Mobile ad hoc networks.
Autopilot systems have been vital to flight control for several years and have been making flight... more Autopilot systems have been vital to flight control for several years and have been making flight easier and more effective. Nevertheless, these autopilot systems are complex devices that demand exact control and stability. In this paper, design PID controller to control pitch angle in longitudinal dynamic of the autopilot system for jet transport using MATLAB/SIMULINK. In this paper designed on automatic pilot with Multi Input Multi Output (MIMO) system. Also, we studied the effect of atmospheric disturbances when a PID controller has been applied the results shown how this controller with good tuning reducing the effect of atmospheric disturbance on the consistency of the autopilot.
European Journal of Pharmacology, 2012
Obesity is a major health problem worldwide and can increase the risk for several chronic disease... more Obesity is a major health problem worldwide and can increase the risk for several chronic diseases, including diabetes and cardiovascular disease. In this study, we screened small compounds isolated from natural products for the development of an anti-obesity drug. Among them, idesolide, a spiro compound isolated from the fruits of Idesia polycarpa Maxim, showed a significant suppression of the adipogenic differentiation in mesenchymal cells, as indicated by the decrease in fat droplets and expression of adipogenic marker genes such as aP2 and adiponectin. Idesolide inhibits the PPARγ-mediated gene transcription in a dose-dependent manner, revealed by luciferase reporter gene assay. During adipogenic differentiation, idesolide inhibits nitric oxide production through the suppression of iNOS expression, and the increased adipogenic differentiation by arginine, the substrate for NOS, is significantly inhibited by idesolide, suggesting that the inhibition of nitric oxide production plays a major role in idesolide-induced adipogenic suppression. Taken together, the results reveal that idesolide has anti-adipogenic activity and highlight its potential in the prevention and treatment of obesity.
European Journal of Pharmacology, 2013
Obesity causes several metabolic diseases, including diabetes. Adipogenic differentiation is an i... more Obesity causes several metabolic diseases, including diabetes. Adipogenic differentiation is an important event for fat formation in obesity. Natural compounds that inhibit adipogenic differentiation are frequently screened to develop therapeutic drugs for treating obesity. Here we investigated the effects of phorbaketal A, a natural marine compound, on adipogenic differentiation of mesenchymal stem cells. Phorbaketal A significantly inhibited adipogenic differentiation as indicated by less fat droplets and decreased expression of adipogenic marker genes. The expression of TAZ (transcriptional coactivator with PDZ-binding motif), an inhibitor of adipogenic differentiation, significantly increased during adipogenic differentiation in the presence of phorbaketal A. Phorbaketal A increased the interaction of TAZ and PPARγ to suppress PPARγ (peroxisome proliferator-activated receptor γ) target gene expression. TAZ-depleted cells showed higher adipogenic potential than that of control cells even in the presence of phorbaketal A. During cellular signaling induced by phorbaketal A, ERK (extracellular signal-regulated kinase) played an important role in adipogenic suppression; an inhibitor of ERK blocked phorbaketal Ainduced adipogenic suppression. Thus, the results show that phorbaketal A inhibits adipocyte differentiation through TAZ. & 2013 Elsevier B.V. All rights reserved. formation, while ectopic overexpression of PPAR γ induces adipocyte differentiation in fibroblasts (Rosen et al.
Lecture notes in networks and systems, 2023
Lecture notes in networks and systems, 2023
Communications in Computer and Information Science, 2021
2013 International Conference on Machine Intelligence and Research Advancement, 2013
WSN technology holds lot of promise in developing sensing and monitoring applications for both te... more WSN technology holds lot of promise in developing sensing and monitoring applications for both terrestrial as well as underground environment. The data thus acquired could be transmitted wirelessly even to remote locations for processing and further analysis thereby helping the decision makers to take appropriate measures. This paper discusses the experimentations done to develop a WSN based Data Acquisition System to monitor water quality parameters like pH, Conductivity, ORP/Redox etc. in real time. The System has VPN based connectivity to external network through appropriate gateways, so that enterprise applications can interact with WSN Mesh Networks. A generic prototype model has been developed which could be deployed for monitoring the water quality of any water body. A custom application in Matlab has been developed for online and offline sensor data visualization and analysis.
2006 IEEE International Conference on Industrial Technology, 2006
This paper aims on the development of a non-contact method for measurement of straightness of the... more This paper aims on the development of a non-contact method for measurement of straightness of the rods. The straightness of rod is a major concern in many industrial applications, especially, where rods are forcefully inserted in pipes by machines. If the rod is bent it may cause damage to the channel and the rod, which results in additional cost due to damage. This technique is based on transmitting the laser light from a laser source and the same is detected on the other end using quadrant laser sensor. If the rod is straight the transmitted beam travels along the surface of the rod and is detected by the receiving unit. If the rod is bent the transmitted beam may not reach the receiver or the receiver detects a change pattern of light. The change in detected light is calculated in terms of bend. Laser diode (wavelength 670 nm) is used as source and photo diode as receiver. The signal, thus received is processed and acquired by a data acquisition cum analog to digital converter card PCL-207. The acquired signal is computed and displayed in graphical form on monitor. This method is very accurate and non-contact in nature as no direct apparatus or implantable sensor is used for measuring the bend.
International Journal of Sensors, Wireless Communications and Control
Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-... more Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-to-machine communication, the Internet of Things (IoT) has become a constantly growing concept. The IoT is a new paradigm that interconnects all smart physical devices to provide smart services to users. It effectively delivers user-required services by utilising internet connectivity, sensors, and various technologies and protocols for the analysis and collection of data. IoT is predicted to permeate practically every facet of daily life, from smart cities to health care, smart agriculture, logistics and retail, and even smart living and smart ecosystems. Since IoT systems are comprised of heterogeneous hardware and networking technologies, integrating them to the software/application level to extract information from massive amounts of data is a difficult task. Methods: In this survey, the definitions, elements, working, architecture, fundamental technologies, key challenges, and poten...
Expert Systems with Applications
A number of image encryption schemes based upon chaotic systems proposed in the past, have been f... more A number of image encryption schemes based upon chaotic systems proposed in the past, have been found to be vulnerable to known-plaintext attack due to the usage of simple linear mapping functions, predictable trajectories etc. In this paper, we propose a hybrid scheme based upon Logistic-Cosine-Sine chaos system and Elliptic Curve Cryptography. The complex chaos mapping function shall result in uniformly distributed pseudo-random outputs and a wider dynamic range while as the Elliptic Curve based cryptography shall be used to leverage the computationally secure encryption of the image pixels. Simulation of the proposed algorithm has been carried using 512-bit standard Elliptic curve given by ECC Brainpool. Results, security analysis reveal that the proposed encryption technique is both computationally efficient as well as resilient against different types of attacks. Comparative analysis shows that the proposed scheme uses lesser number of point multiplications for encryption, and ...
2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2020
The evolvement of social networking generates the term social synchrony and its investigation for... more The evolvement of social networking generates the term social synchrony and its investigation for knowledge processing tasks as a challenge. This paper provides an attempt to contemplate the contemporary social networking analysis tools and techniques with regard to social synchrony has been performed. This paper summarizes some of the potential techniques and approaches, which play an important role in analyses of social synchrony in different OSN and discusses numerous challenges faced by each technique that hinders their usage and seeks attention of research community.
WSN is comprised of large number of resource constrained sensor nodes. A reliable transmission of... more WSN is comprised of large number of resource constrained sensor nodes. A reliable transmission of sensor data, with low latency and high energy-efficiency is mandatory for wireless sensor networks. Routing protocols are key ingredients in the protocol stack of a sensor node and determine the efficency of the WSN. Hence, careful selection of the routing protocol to achieve maximum efficiency is required. This paper compares and analyzes AODV, DSR and Bellman-Ford on QoS parameters like throughput, delay, energy consumption, packet drop etc. The results discussed can be helpful while choosing a particular routing protocol for WSN. The simulations have been carried out in Qualnet simulator. Keywords-Wireless Sensor Network (WSN), Routing Protocols , AODV Protocol, Bellman-Ford Protocol
Authentication is an important Security primitive in any class of network both at the entity leve... more Authentication is an important Security primitive in any class of network both at the entity level as well as at the message level. All the network entities comprising of WSN including nodes, cluster heads and base station need to be authenticated before sending or receiving any kind of communication within them. Public Key Cryptography offers broad based solutions to address all the security concerns. However such solutions are far too expensive to be applied directly to WSN owing to its resource constraints. ECC and its variant Tiny- ECC offers the scope and the potential to build light weight solutions for WSN based networks. In this paper, light weight authentication protocols for Base to Node, Node to Base and Node to Node have been presented. These protocols are based on Elliptical Curve Cryptography and Hidden Generator Concepts. Hash Chains which are computationally light have been also used. The protocols have been developed in TinyOS, the defacto operating system for WSN a...
Research Square (Research Square), Apr 2, 2024
Multimedia tools and applications, Feb 27, 2024
International Journal of Information Technology
Wireless communication in autonomous mobile agents has an inhibitive barrier to entry, especially... more Wireless communication in autonomous mobile agents has an inhibitive barrier to entry, especially in unmanned areal vehicles (UAV). This paper presents DroNS-3, a comprehensive library that aims to significantly lower the barrier to entry into the field of UAV research, reduce the risk of expensive mistakes, and make interfacing with leading flight and networking simulators simpler. DroNS-3 integrates the Ardupilot drone simulator with the NS-3 network simulator and provides an easy platform for quickly designing autonomous missions both in simulation and on physical drone platforms. The DroNS-3 autopilot library has already been successfully utilized during test flights and simulations for our published research and has been made open-source with supporting documentation on GitHub, making it a useful tool for the research community. CCS CONCEPTS • Computer systems organization → Robotics; • Networks → Mobile ad hoc networks.
Autopilot systems have been vital to flight control for several years and have been making flight... more Autopilot systems have been vital to flight control for several years and have been making flight easier and more effective. Nevertheless, these autopilot systems are complex devices that demand exact control and stability. In this paper, design PID controller to control pitch angle in longitudinal dynamic of the autopilot system for jet transport using MATLAB/SIMULINK. In this paper designed on automatic pilot with Multi Input Multi Output (MIMO) system. Also, we studied the effect of atmospheric disturbances when a PID controller has been applied the results shown how this controller with good tuning reducing the effect of atmospheric disturbance on the consistency of the autopilot.
European Journal of Pharmacology, 2012
Obesity is a major health problem worldwide and can increase the risk for several chronic disease... more Obesity is a major health problem worldwide and can increase the risk for several chronic diseases, including diabetes and cardiovascular disease. In this study, we screened small compounds isolated from natural products for the development of an anti-obesity drug. Among them, idesolide, a spiro compound isolated from the fruits of Idesia polycarpa Maxim, showed a significant suppression of the adipogenic differentiation in mesenchymal cells, as indicated by the decrease in fat droplets and expression of adipogenic marker genes such as aP2 and adiponectin. Idesolide inhibits the PPARγ-mediated gene transcription in a dose-dependent manner, revealed by luciferase reporter gene assay. During adipogenic differentiation, idesolide inhibits nitric oxide production through the suppression of iNOS expression, and the increased adipogenic differentiation by arginine, the substrate for NOS, is significantly inhibited by idesolide, suggesting that the inhibition of nitric oxide production plays a major role in idesolide-induced adipogenic suppression. Taken together, the results reveal that idesolide has anti-adipogenic activity and highlight its potential in the prevention and treatment of obesity.
European Journal of Pharmacology, 2013
Obesity causes several metabolic diseases, including diabetes. Adipogenic differentiation is an i... more Obesity causes several metabolic diseases, including diabetes. Adipogenic differentiation is an important event for fat formation in obesity. Natural compounds that inhibit adipogenic differentiation are frequently screened to develop therapeutic drugs for treating obesity. Here we investigated the effects of phorbaketal A, a natural marine compound, on adipogenic differentiation of mesenchymal stem cells. Phorbaketal A significantly inhibited adipogenic differentiation as indicated by less fat droplets and decreased expression of adipogenic marker genes. The expression of TAZ (transcriptional coactivator with PDZ-binding motif), an inhibitor of adipogenic differentiation, significantly increased during adipogenic differentiation in the presence of phorbaketal A. Phorbaketal A increased the interaction of TAZ and PPARγ to suppress PPARγ (peroxisome proliferator-activated receptor γ) target gene expression. TAZ-depleted cells showed higher adipogenic potential than that of control cells even in the presence of phorbaketal A. During cellular signaling induced by phorbaketal A, ERK (extracellular signal-regulated kinase) played an important role in adipogenic suppression; an inhibitor of ERK blocked phorbaketal Ainduced adipogenic suppression. Thus, the results show that phorbaketal A inhibits adipocyte differentiation through TAZ. & 2013 Elsevier B.V. All rights reserved. formation, while ectopic overexpression of PPAR γ induces adipocyte differentiation in fibroblasts (Rosen et al.
Lecture notes in networks and systems, 2023
Lecture notes in networks and systems, 2023
Communications in Computer and Information Science, 2021
2013 International Conference on Machine Intelligence and Research Advancement, 2013
WSN technology holds lot of promise in developing sensing and monitoring applications for both te... more WSN technology holds lot of promise in developing sensing and monitoring applications for both terrestrial as well as underground environment. The data thus acquired could be transmitted wirelessly even to remote locations for processing and further analysis thereby helping the decision makers to take appropriate measures. This paper discusses the experimentations done to develop a WSN based Data Acquisition System to monitor water quality parameters like pH, Conductivity, ORP/Redox etc. in real time. The System has VPN based connectivity to external network through appropriate gateways, so that enterprise applications can interact with WSN Mesh Networks. A generic prototype model has been developed which could be deployed for monitoring the water quality of any water body. A custom application in Matlab has been developed for online and offline sensor data visualization and analysis.
2006 IEEE International Conference on Industrial Technology, 2006
This paper aims on the development of a non-contact method for measurement of straightness of the... more This paper aims on the development of a non-contact method for measurement of straightness of the rods. The straightness of rod is a major concern in many industrial applications, especially, where rods are forcefully inserted in pipes by machines. If the rod is bent it may cause damage to the channel and the rod, which results in additional cost due to damage. This technique is based on transmitting the laser light from a laser source and the same is detected on the other end using quadrant laser sensor. If the rod is straight the transmitted beam travels along the surface of the rod and is detected by the receiving unit. If the rod is bent the transmitted beam may not reach the receiver or the receiver detects a change pattern of light. The change in detected light is calculated in terms of bend. Laser diode (wavelength 670 nm) is used as source and photo diode as receiver. The signal, thus received is processed and acquired by a data acquisition cum analog to digital converter card PCL-207. The acquired signal is computed and displayed in graphical form on monitor. This method is very accurate and non-contact in nature as no direct apparatus or implantable sensor is used for measuring the bend.
International Journal of Sensors, Wireless Communications and Control
Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-... more Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-to-machine communication, the Internet of Things (IoT) has become a constantly growing concept. The IoT is a new paradigm that interconnects all smart physical devices to provide smart services to users. It effectively delivers user-required services by utilising internet connectivity, sensors, and various technologies and protocols for the analysis and collection of data. IoT is predicted to permeate practically every facet of daily life, from smart cities to health care, smart agriculture, logistics and retail, and even smart living and smart ecosystems. Since IoT systems are comprised of heterogeneous hardware and networking technologies, integrating them to the software/application level to extract information from massive amounts of data is a difficult task. Methods: In this survey, the definitions, elements, working, architecture, fundamental technologies, key challenges, and poten...
Expert Systems with Applications
A number of image encryption schemes based upon chaotic systems proposed in the past, have been f... more A number of image encryption schemes based upon chaotic systems proposed in the past, have been found to be vulnerable to known-plaintext attack due to the usage of simple linear mapping functions, predictable trajectories etc. In this paper, we propose a hybrid scheme based upon Logistic-Cosine-Sine chaos system and Elliptic Curve Cryptography. The complex chaos mapping function shall result in uniformly distributed pseudo-random outputs and a wider dynamic range while as the Elliptic Curve based cryptography shall be used to leverage the computationally secure encryption of the image pixels. Simulation of the proposed algorithm has been carried using 512-bit standard Elliptic curve given by ECC Brainpool. Results, security analysis reveal that the proposed encryption technique is both computationally efficient as well as resilient against different types of attacks. Comparative analysis shows that the proposed scheme uses lesser number of point multiplications for encryption, and ...
2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2020
The evolvement of social networking generates the term social synchrony and its investigation for... more The evolvement of social networking generates the term social synchrony and its investigation for knowledge processing tasks as a challenge. This paper provides an attempt to contemplate the contemporary social networking analysis tools and techniques with regard to social synchrony has been performed. This paper summarizes some of the potential techniques and approaches, which play an important role in analyses of social synchrony in different OSN and discusses numerous challenges faced by each technique that hinders their usage and seeks attention of research community.
WSN is comprised of large number of resource constrained sensor nodes. A reliable transmission of... more WSN is comprised of large number of resource constrained sensor nodes. A reliable transmission of sensor data, with low latency and high energy-efficiency is mandatory for wireless sensor networks. Routing protocols are key ingredients in the protocol stack of a sensor node and determine the efficency of the WSN. Hence, careful selection of the routing protocol to achieve maximum efficiency is required. This paper compares and analyzes AODV, DSR and Bellman-Ford on QoS parameters like throughput, delay, energy consumption, packet drop etc. The results discussed can be helpful while choosing a particular routing protocol for WSN. The simulations have been carried out in Qualnet simulator. Keywords-Wireless Sensor Network (WSN), Routing Protocols , AODV Protocol, Bellman-Ford Protocol
Authentication is an important Security primitive in any class of network both at the entity leve... more Authentication is an important Security primitive in any class of network both at the entity level as well as at the message level. All the network entities comprising of WSN including nodes, cluster heads and base station need to be authenticated before sending or receiving any kind of communication within them. Public Key Cryptography offers broad based solutions to address all the security concerns. However such solutions are far too expensive to be applied directly to WSN owing to its resource constraints. ECC and its variant Tiny- ECC offers the scope and the potential to build light weight solutions for WSN based networks. In this paper, light weight authentication protocols for Base to Node, Node to Base and Node to Node have been presented. These protocols are based on Elliptical Curve Cryptography and Hidden Generator Concepts. Hash Chains which are computationally light have been also used. The protocols have been developed in TinyOS, the defacto operating system for WSN a...