Skip to main content

Showing 1–9 of 9 results for author: Tanveer, A

.
  1. arXiv:2310.14339  [pdf

    cs.RO eess.SY

    Motion Planning for Autonomous Ground Vehicles Using Artificial Potential Fields: A Review

    Authors: Aziz ur Rehman, Ahsan Tanveer, M. Touseef Ashraf, Umer Khan

    Abstract: Autonomous ground vehicle systems have found extensive potential and practical applications in the modern world. The development of an autonomous ground vehicle poses a significant challenge, particularly in identifying the best path plan, based on defined performance metrics such as safety margin, shortest time, and energy consumption. Various techniques for motion planning have been proposed by… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Journal ref: 1st International Conference on Women Development in Engineering Science & Technology, Jamshoro, Pakistan, October 2023

  2. arXiv:2308.10268  [pdf, other

    cs.CR eess.SP

    False Data Injection Attacks in Smart Grids: State of the Art and Way Forward

    Authors: Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri

    Abstract: In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad D… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

  3. Genetic-Algorithm-Based Proportional Integral Controller (GAPI) for ROV Steering Control

    Authors: Ahsan Tanveer, Sarvat Mushtaq Ahmad

    Abstract: This article presents the design and real-time implementation of an optimal controller for precise steering control of a remotely operated underwater vehicle (ROV). A PI controller is investigated to achieve the desired steering performance. The gain parameters of the controller are tuned using the genetic algorithm (GA). The experimental response corresponding to the step waveform for the GA is o… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: 6 pages, 3 figures, presented at the 2nd International Conference on Emerging Trends in Electronic and Telecommunication Engineering (INTERACT), published in Engineering Proceedings 32

    Journal ref: Engineering Proceedings 32, no. 1: 4, 2023

  4. arXiv:2303.13064  [pdf

    eess.SY

    Unmanned Surface Vehicle: Yaw Modeling and Identification

    Authors: Ahsan Tanveer, Sarvat Mushtaq Ahmad

    Abstract: In this article, a simplified modeling and system identification procedure for yaw motion of an unmanned surface vehicle (USV) is presented. Two thrusters that allow for both speed and direction control propel the USV. The outputs of the vehicle under inquiry include parameters that define the mobility of the USV in horizontal plane, such as yaw angle and yaw rate. A linear second order model is f… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: 4 pages, 5 figures, submitted to: 2nd International Conference on Engineering and Applied Natural Sciences

  5. arXiv:2303.13063  [pdf

    eess.SY

    Design of a Low-Cost Prototype Underwater Vehicle

    Authors: Ahsan Tanveer, Sarvat Mushtaq Ahmad

    Abstract: In this study, a small, inexpensive remotely driven underwater vehicle that can navigate in shallow water for the purpose of monitoring water quality and demonstrating vehicle control algorithms is presented. The vehicle is operated by an onboard micro-controller, and the sensor payload comprises a turbidity sensor for determining the quality of the water, a depth sensor, and a 9-axis inertial mea… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: 4 pages, 2 figures, submitted to: 5th Pak-Turk International Conference on Emerging Technologies in the field of Sciences and Engineering

  6. arXiv:2207.11917  [pdf, other

    cs.LG cs.AI cs.IR

    Boolean and $\mathbb{F}_p$-Matrix Factorization: From Theory to Practice

    Authors: Fedor Fomin, Fahad Panolan, Anurag Patil, Adil Tanveer

    Abstract: Boolean Matrix Factorization (BMF) aims to find an approximation of a given binary matrix as the Boolean product of two low-rank binary matrices. Binary data is ubiquitous in many fields, and representing data by binary matrices is common in medicine, natural language processing, bioinformatics, computer graphics, among many others. Unfortunately, BMF is computationally hard and heuristic algorith… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: Appeared in IJCNN 2022

  7. Secure Links: Secure-by-Design Communications in IEC 61499 Industrial Control Applications

    Authors: Awais Tanveer, Roopak Sinha, Matthew M. Y. Kuo

    Abstract: Increasing automation and external connectivity in industrial control systems (ICS) demand a greater emphasis on software-level communication security. In this article, we propose a secure-by-design development method for building ICS applications, where requirements from security standards like ISA/IEC 62443 are fulfilled by design-time abstractions called secure links. Proposed as an extension t… ▽ More

    Submitted 24 July, 2021; originally announced July 2021.

    Comments: Journal paper, 11 pages, 10 figures, 3 tables

    Journal ref: IEEE Transactions on Industrial Informatics 17(6)(2021), pp.3992-4002

  8. On Design-time Security in IEC 61499 Systems: Conceptualisation, Implementation, and Feasibility

    Authors: Awais Tanveer, Roopak Sinha, Stephen G. MacDonell

    Abstract: Cyber-attacks on Industrial Automation and Control Systems (IACS) are rising in numbers and sophistication. Embedded controller devices such as Programmable Logic Controllers (PLCs), which are central to controlling physical processes, must be secured against attacks on confidentiality, integrity and availability. The focus of this paper is to add design-level support for security in IACS applicat… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: Conference paper, 8 pages, 11 figures, 1 table

    Journal ref: Proceedings of the 16th International Conference on Industrial Informatics (INDIN2018). Porto, Portugal, IEEE Computer Society Press, pp.778-785

  9. Designing Actively Secure, Highly Available Industrial Automation Applications

    Authors: Awais Tanveer, Roopak Sinha, Stephen G. MacDonell, Paulo Leitao, Valeriy Vyatkin

    Abstract: Programmable Logic Controllers (PLCs) execute critical control software that drives Industrial Automation and Control Systems (IACS). PLCs can become easy targets for cyber-adversaries as they are resource-constrained and are usually built using legacy, less-capable security measures. Security attacks can significantly affect system availability, which is an essential requirement for IACS. We prop… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: Conference, 7 pages, 9 figures

    Journal ref: Proceedings of the 17th International Conference on Industrial Informatics (INDIN2019). Helsinki-Espoo, Finland, IEEE Computer Society Press, pp.374-379