期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
1
作者 Syeda Wajiha Zahra muhammad nadeem +6 位作者 Ali Arshad Saman Riaz muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
在线阅读 下载PDF
A Holistic Approach to Enhance FRCS General Surgery Examination Training Using Adult Learning Model: A Non-Profit Initiative
2
作者 Rahul Winayak Sanjay V. Joshi +8 位作者 Goran Ahmed Anne O’Neill Ishy Gurung muhammad nadeem Muhammed Alwahid Sudeendra Doddi Manas Kumar Dube Ahmad Mirza Rishabha D. Sharma 《Surgical Science》 2023年第8期565-574,共10页
Objectives: To evaluate the impact of adult learning and simulation-based learning (SBL) on surgical trainees’ learning experiences and Fellowship of the Royal College of Surgeons (FRCS) Section 2 General Surgery exa... Objectives: To evaluate the impact of adult learning and simulation-based learning (SBL) on surgical trainees’ learning experiences and Fellowship of the Royal College of Surgeons (FRCS) Section 2 General Surgery examination pass rate. Methods: This was a cross-sequential study involving 148 surgical candidates (72 UK trainees, 75 non-UK trainees) who had attended our revision course (Phoenix FRCS Course) from June 2017 until 2023. Each course comprised a two-day weekend preparation with dedicated sections for clinical, viva, and academic reading, incorporating SBL as its key learning style. We maintained a prospective database of candidate and course details, examination results, and feedback since the course inception. Results: We found that 97% of candidates passed the FRCS examination after their first attempt. The course was attended once by 89% of candidates, and only 3 of the 148 candidates exhausted all four attempts at the examination. Candidate feedback for the course and its style of learning was positive, with simulation-based table viva sessions and virtual clinical sessions proving the most popular learning sessions (95% and 80% of candidates attending courses run in December 2017, April 2018, and May 2021 rated them “Excellent” respectively). Conclusions: The course is centered around shared adult learning and mindfulness tools to encourage candidates to learn from each other and develop confidence and mastery in all domains of surgical practice. These methods have been shown to be effective in achieving high success rates in the Intercollegiate and International FRCS examinations for UK and overseas surgeons. 展开更多
关键词 Simulation-Based Learning (SBL) Adult Learning Mindfulness Tools FRCS Examination INTERLEAVING
在线阅读 下载PDF
Identification of a novel seed size associated locus SW9-1 in soybean 被引量:6
3
作者 Jiajia Li Jinghui Zhao +8 位作者 Yinghui Li Yali Gao Sunan Hua muhammad nadeem Genlou Sun Wenming Zhang Jinfeng Hou Xiaobo Wang Lijuan Qiu 《The Crop Journal》 SCIE CAS CSCD 2019年第4期548-559,共12页
Seed size is one of the vital traits determining seed appearance, quality, and yield. Untangling the genetic mechanisms regulating soybean 100-seed weight (100-SW), seed length and seed width across environments may p... Seed size is one of the vital traits determining seed appearance, quality, and yield. Untangling the genetic mechanisms regulating soybean 100-seed weight (100-SW), seed length and seed width across environments may provide a theoretical basis for improving seed yield. However, there are few reports related to QTL mapping of 100-SW across multiple ecological regions. In this study, 21 loci associated with seed size traits were identified using a genome-wide association of 5361 single nucleotide polymorphisms (SNPs) across three ecoregions in China, which could explain 8.12%–14.25% of the phenotypic variance respectively. A new locus, named as SW9-1 on chromosome 9 that explained 10.05%–10.93% of the seed weight variance was found significantly related to seed size traits, and was not previously reported. The selection effect analysis showed that SW9-1 locus has a relatively high phenotypic effect (13.67) on 100-SW, with a greater contribution by the accessions with bigger seeds (3.69) than the accessions with small seeds (1.66). Increases in seed weight were accompanied by increases in the frequency of SW9-1T allele, with >90% of the bred varieties with a 100-SW >30 g carrying SW9-1T. Analysis of SW9-1 allelic variation in additional soybean accessions showed that SW9-1T allele accounting for 13.83% of the wild accessions, while in 46.55% and 51.57% of the landraces and bred accessions, respectively, this results indicating that the SW9-1 locus has been subjected to artificial selection during the early stages of soybean breeding, especially the utilization of SW9-1T in edamame for big seed. These results suggest that SW9-1 is a novel and reliable locus associated with seed size traits, and might have an important implication for increasing soybean seed weight in molecular design breeding. Cloning this locus in future may provide new insights into the genetic mechanisms underlying soybean seed size traits. 展开更多
关键词 SOYBEAN [Glycine max (L.) Merr.] SEED size/weight SW9-1 Molecular BREEDING
在线阅读 下载PDF
Photokilling of waterborne-resistant pathogenic bacteria using cobalt-doped zinc oxide doped on reduced graphene oxide nanoparticles 被引量:2
4
作者 Ameer muhammad Khan Laiba Pervez +7 位作者 Jonathan Celli Mutiullah Khattak Maqdad Ullah ZiaUllah Shah muhammad Mustafa Khan muhammad nadeem Sulaiman Faisal Akhtar Nadhman 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2022年第4期1-10,共10页
This study is aimed at the chemical synthesis of light-activated cobalt-doped zinc oxide and its further doping on reduced graphene oxide(RGO)and assessment of its antibacterial activity on antibiotic-resistant waterb... This study is aimed at the chemical synthesis of light-activated cobalt-doped zinc oxide and its further doping on reduced graphene oxide(RGO)and assessment of its antibacterial activity on antibiotic-resistant waterborne pathogens including Enterococcus faecalis,Staphylococcus aureus,Klebsiella pneumonia,and Pseudomonas aeruginosa.The synthesized nanoparticles were characterized via UV–vis spectroscopy,scanning electron microscopy(SEM),and energy-dispersive X-ray spectroscopy(EDS).The minimal inhibitory concentration(MIC)of nanoparticles portrayed a significant killing of both Gram-positive and Gram-negative bacteria.The synthesized nanoparticles were further found as active killers of bacteria in drinking water.Further,these nanoparticles were found photothermally active alongside ROS generators.The photokilling activity makes them ideal replacement candidates for traditional water filters. 展开更多
关键词 MDR BACTERIA graphene oxide doping photokilling ZnO.
原文传递
Physico-chemical analysis and antimicrobial potential of Apis dorsata,Apis mellifera and Ziziphus jujube honey samples from Pakistan 被引量:1
5
作者 Hira Fahim Javid Iqbal Dasti +2 位作者 Ihsan Ali Safia Ahmed muhammad nadeem 《Asian Pacific Journal of Tropical Biomedicine》 SCIE CAS 2014年第8期633-641,共9页
Objective:To evaluale physico-chemical properties and antimicrobial potential of indigenous honey samples against different reference strains including Escherichia coli ATCC 8739.Enterobacter aerogenes ATCC 13048.Pseu... Objective:To evaluale physico-chemical properties and antimicrobial potential of indigenous honey samples against different reference strains including Escherichia coli ATCC 8739.Enterobacter aerogenes ATCC 13048.Pseudomonas aeruginosa ATCC 9027.Bacillus subtilis ATCC6633.Staphylococcus aureus ATCC 25923.Salmonella typhi ATCC 14028,Klebsiella pneumonia ATCC 13883.Aspergillus niger ATCC 16404.Rhizopus oligasparus PCSIR1.Candida albicans ATCC14053 and Candida utilis ATCC 9950.Methods:By using standard methods samples were evaluated for their antimicrobial properties including additive effect of starch and non—peroxidase activity,antioxidative properties(phenol contents,flavonoid contents,1,1-diphenyl-2-pierylhydrazyl radical scavenging activity).Prior to this evaluation,complete physico-chemical properties including pH,color,ash contents,protein contents,moisture contents,hydroxymethyl furfural contents,total sugar contents,reducing sugar and non-reducing sugar contents were analyzed.Results:Relatively higher ash contents were found in the Siddar honey i.e.(0.5900±0.0336)%and small honey showed relatively higher protein contents i.e.(777.598±9.880) mg/kg.The moisture contents of tested honey samples ranged between 13.8%—16,6%,total sugar contents foam 61.672%-72.420%and non-reducing sugar contents from 1.95%—3.93%.Presences of phenolic contents indicate higher antioxidant potential of these honey samples.All bacteria showed clear inhibition zones in response to tested honey samples whereas fungi and yeast showed inhibition at higher concentrations of these honey samples.For Escherichia coli.Bacillus subtilis.Salmonella typhi.Pseudomonas aeruginosa and Aspergillus niger,overall the small honey showed the higher activity than other honey samples.Conclusion:Physico-chemical analysis of honey samples confirmed good quality of honey according to the standards set by European Union Commission and Codex Alimcntarius Commission.Evaluation of these honey samples confirms antimicrobial potential of particular types of honeys indigenous to Pakistan. 展开更多
关键词 ZIZIPHUS JUJUBE HONEY ANTIMICROBIAL PROPERTIES Non-peroxidase activity ANTIOXIDATIVE PROPERTIES
暂未订购
Novel Analysis of Two Kinds Hybrid Models in Ferro Martial Inserting Variable Lorentz Force Past a Heated Disk:An Implementation of Finite Element Method 被引量:1
6
作者 Enran Hou Umar Nazir +5 位作者 Samaira Naz muhammad Sohail muhammad nadeem Jung Rye Lee Choonkil Park Ahmed MGalal 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1393-1411,共19页
In this article,the rheology of Ferro-fluid over an axisymmetric heated disc with a variable magnetic field by considering the dispersion of hybrid nanoparticles is considered.The flow is assumed to be produced by the... In this article,the rheology of Ferro-fluid over an axisymmetric heated disc with a variable magnetic field by considering the dispersion of hybrid nanoparticles is considered.The flow is assumed to be produced by the stretching of a rotating heated disc.The contribution of variable thermophysical properties is taken to explore themomentum,mass and thermal transportation.The concept of boundary layermechanismis engaged to reduce the complex problem into a simpler one in the form of coupled partial differential equations system.The complex coupled PDEs are converted into highly nonlinear coupled ordinary differential equations system(ODEs)and the resulting nonlinear flow problem is handled numerically.The solution is obtained via finite element procedure(FEP)and convergence is established by conducting the grid-independent survey.The solution of converted dimensionless problem containing fluid velocity,temperature and concentration field is plotted against numerous involved emerging parameters and their impact is noted.From the obtained solution,it is monitored that higher values of magnetic parameter retard the fluid flow and escalating values of Eckert number results in to enhance temperature profile.Ferro-fluid flow and heat energy for the case of the Yamada Ota hybrid model are higher than for the case of the Hamilton Crosser hybrid model.Developing a model is applicable to the printing process,electronic devices,temperature measurements,engineering process and food-making process.The amount of mass species is reduced vs.incline impacts of chemical reaction and Schmidt parameter. 展开更多
关键词 Ferro-fluid non-constant magnetic field heated disc thermal properties of nanoparticles hybrid correlations among nanoparticles
在线阅读 下载PDF
Identification of stable quantitative trait loci underlying waterlogging tolerance post-anthesis in common wheat(Triticum aestivum) 被引量:1
7
作者 Fugong Ding Jingyang Tong +9 位作者 Rui Xu Jing Chen Xiaoting Xu muhammad nadeem Shuping Wang Yingxin Zhang Zhanwang Zhu Fengju Wang Zhengwu Fang Yuanfeng Hao 《The Crop Journal》 SCIE CSCD 2023年第4期1163-1170,共8页
Waterlogging is a growing threat to wheat production in high-rainfall areas.In this study,a doubled haploid(DH) population developed from a cross between Yangmai 16(waterlogging-tolerant) and Zhongmai895(waterlogging-... Waterlogging is a growing threat to wheat production in high-rainfall areas.In this study,a doubled haploid(DH) population developed from a cross between Yangmai 16(waterlogging-tolerant) and Zhongmai895(waterlogging-sensitive) was used to map quantitative trait loci(QTL) for waterlogging tolerance using a high-density 660K single-nucleotide polymorphism(SNP) array.Two experimental designs,waterlogging concrete tank(CT) and waterlogging plastic tank(PT),were used to simulate waterlogging during anthesis in five environments across three growing seasons.Waterlogging significantly decreased thousand-kernel weight(TKW) relative to non-waterlogged controls,although the degree varied across lines.Three QTL for waterlogging tolerance were identified on chromosomes 4AL,5AS,and 7DL in at least two environments.All favorable alleles were contributed by the waterlogging-tolerant parent Yangmai16.QWTC.caas-4AL exhibited pleiotropic effects on both enhancing waterlogging tolerance and decreasing plant height.Six high-confidence genes were annotated within the QTL interval.The combined effects of QWTC.caas-4AL and QWTC.caas-5AS greatly improved waterlogging tolerance,while the combined effects of all three identified QTL(QWTC.caas-4AL,QWTC.caas-5AS,and QWTC.caas-7DL) exhibited the most significant effect on waterlogging tolerance.Breeder-friendly kompetitive allele-specific PCR(KASP) markers(K_AX_111523809,K_AX_108971224,and K_AX_110553316) flanking the interval of QWTC.caas-4AL,QWTC.caas-5AS,and QWTC.caas-7DL were produced.These markers were tested in a collection of 240 wheat accessions,and three superior polymorphisms of the markers distributed over 67elite cultivars in the test population,from the Chinese provinces of Jiangsu,Anhui,and Hubei.The three KASP markers could be used for marker-assisted selection(MAS) to improve waterlogging tolerance in wheat. 展开更多
关键词 Genetic mapping QTL Waterlogging tolerance WHEAT
在线阅读 下载PDF
Anti-obesity effect and UHPLC-QTOF-MS/MS based metabolite profiling of Solanum nigrum leaf extract
8
作者 Zain Ul Aabideen muhammad Waseem Mumtaz +6 位作者 muhammad Tayyab Akhtar muhammad Asam Raza Hamid Mukhtar Ahmad Irfan Syed Ali Raza muhammad nadeem Yee Soon Ling 《Asian Pacific Journal of Tropical Biomedicine》 SCIE CAS 2022年第4期164-174,共11页
Objective:To evaluate the antioxidant potential and pancreatic lipase inhibitory action of optimized hydroethanolic extracts of Solanum nigrum.Methods:Optimized extraction for maximum recovery of metabolites was perfo... Objective:To evaluate the antioxidant potential and pancreatic lipase inhibitory action of optimized hydroethanolic extracts of Solanum nigrum.Methods:Optimized extraction for maximum recovery of metabolites was performed using a combination of freeze-drying and ultrasonication followed by determination of antioxidant and antiobesity properties.The ultra-high performance liquid chromatography equipped with mass spectrometry was used to analyze metabolite profiling of Solanum nigrum.Computational studies were performed using molecular docking and electrostatic potential analysis for individual compounds.The hypolipidemic potential of the most potent extract was assessed in the obese mice fed on fat rich diet.Results:The 80%hydroethanolic extract exhibited the highest extract yield,total phenolic contents,total flavonoid contents along with the strongest 2,2-diphenyl-1-picrylhydrazyl scavenging activity,total antioxidant power,and pancreatic lipase inhibitory properties.The 80%hydroethanolic extract not only regulated the lipid profile of obese mice but also restricted the weight gain in the liver,kidney,and heart.The 80%hydroethanolic extract also reduced alanine transaminase and aspartate transaminase concentrations in serum.The effects of plant extract at 300 mg/kg body weight were quite comparable with the standard drug orlistat.Conclusions:Solanum nigrum is proved as an excellent and potent source of secondary metabolites that might be responsible for obesity mitigation. 展开更多
关键词 Solanum nigrum Ultrasonication Metabolite profiling Total phenolic contents Total flavonoid content ANTIOXIDANT DPPH Total antioxidant power Pancreatic lipase UHPLC-QTOF-MS/MS ANTIOBESITY Mice HYPOLIPIDEMIC Molecular docking
暂未订购
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
9
作者 Ali Arshad muhammad nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
在线阅读 下载PDF
Bifurcation Analysis and Bounded Optical Soliton Solutions of the Biswas-Arshed Model
10
作者 Fahad Sameer Alshammari Md Fazlul Hoque +1 位作者 Harun-Or-Roshid muhammad nadeem 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2197-2217,共21页
We investigate the bounded travelling wave solutions of the Biswas-Arshed model(BAM)including the low group velocity dispersion and excluding the self-phase modulation.We integrate the nonlinear structure of the model... We investigate the bounded travelling wave solutions of the Biswas-Arshed model(BAM)including the low group velocity dispersion and excluding the self-phase modulation.We integrate the nonlinear structure of the model to obtain bounded optical solitons which pass through the optical fibers in the non-Kerr media.The bifurcation technique of the dynamical system is used to achieve the parameter bifurcation sets and split the parameter space into various areaswhich correspond to different phase portraits.All bounded optical solitons and bounded periodic wave solutions are identified and derived conforming to each region of these phase portraits.We also apply the extended sinh-Gordon equation expansion and the generalized Kudryashov integral schemes to obtain additional bounded optical soliton solutions of the BAM nonlinearity.We present more bounded optical shock waves,the bright-dark solitary wave,and optical rogue waves for the structure model via these schemes in different aspects. 展开更多
关键词 The Biswas-Arshed model the extended sinh-Gordon equation expansion the generalized Kudryashov approach shock wave double solitons optical singular double solitons chirp-free bright-dark double solitons
在线阅读 下载PDF
Breast cancer therapy by laser-induced Coulomb explosion of gold nanoparticles
11
作者 muhammad Gul Bahar Ashiq Mohammad Alam Saeed +2 位作者 Bashir Ahmad Tahir Noorddin Ibrahim muhammad nadeem 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 2013年第6期756-761,共6页
Objective: Laser-induced Coulomb explosion of gold nanoparticles for breast cancer has been studied by nanophotolysis technique. This study aimed to investigate whether laser-induced bubble formation due to Coulomb e... Objective: Laser-induced Coulomb explosion of gold nanoparticles for breast cancer has been studied by nanophotolysis technique. This study aimed to investigate whether laser-induced bubble formation due to Coulomb explosion can provide an effective approach for selective damage of breast cancer with gold nanoparticles. Method: Numerical method involves laser-induced Coulomb explosion of gold nanoparticles. Different parameters related to nanophotolysis such as laser fluence, tumor depth, cluster radius, laser pulse duration, and bubble formation is studied numerically. Numerical simulation was performed using Mat lab. Results: The gold nanopartieles of 10, 20, 30, 40, and 50 nm in radius could penetrate into tumor 1.14, 1.155, 1.189, 1.20 and 1.22 cm in depth respectively. The maximum penetration depth in tumor could be obtained with nanoparticles of 50 nm radius. Short laser pulse of 40 ns with nanoparticles of 10 nm radius could penetrate into tumor 1.14 cm in depth. Bubbles with a radius of 9 pm could effectively kill breast cancer cells without damaging healthy ones. The bubble radius increased from 4 to 9 lam with an increase in pulse duration in the range of 10 to 30 ns. Conclusions: Gold nanoparticles with increasing radius and bubble formation for selective damage of breast cancer cells are successfully probed. The present calculated results are compared with other experimental findings, and good correlation is found between the present work and previous experimental values. It was demonstrated that bubble formation in tumor may further increase the efficacy of breast cancer treatment. 展开更多
关键词 Gold nanoparticles tumor depth nanophotolysis bubble formation breast cancer
在线阅读 下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
12
作者 muhammad nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
在线阅读 下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
13
作者 muhammad nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher
在线阅读 下载PDF
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
14
作者 muhammad nadeem Ali Arshad +4 位作者 Saman Riaz SyedaWajiha Zahra muhammad Rashid Shahab S.Band Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2641-2659,共19页
Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one... Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one of the biggest issues that arise.Different types of malware are wreaking havoc on the clouds.Attacks on the cloud server are happening from both internal and external sides.This paper has developed a tool to prevent the cloud server from spamming attacks.When an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)classification.Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks.However,the KNN classifiers will determine which area the spammer belongs to.At the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results. 展开更多
关键词 Intrusion prevention system SPAMMING KNN classification SPAM cyber security BOTNET
在线阅读 下载PDF
Agronomy and Economy: Impact of Tillage and Poultry Manure on Mazie (<i>Zea mays</i>L.)
15
作者 Hafiz muhammad Rashad Javeed muhammad Shahid Ibni Zamir +3 位作者 Nasir Masood Rafi Qamar muhammad Shehzad muhammad nadeem 《American Journal of Plant Sciences》 2014年第6期799-810,共12页
Seedling emergence and seedling establishment are two important phases for the good crop stand and final maize crop harvest. A field study was conducted to explore the effects of different tillage practices and poultr... Seedling emergence and seedling establishment are two important phases for the good crop stand and final maize crop harvest. A field study was conducted to explore the effects of different tillage practices and poultry manure levels on the seedling emergence, growth, development, yield, and economics of the spring planted maize during 2010 and 2011. Experimental treatments include four tillage treatments (zero, minimum, conventional and deep tillage) and three poultry manure amendments (control (no manure), 5 Mg·ha-1 and 10 Mg·ha-1). Seedling emergence was linearly affected as the tillage intensity was increased. Significant relationship of tillage with leaf area index, leaf area duration, crop growth rate, net assimilation rate and total dry matter was recorded during the both years. Poultry manure at the rate of 10 Mg·ha-1 produced the higher leaf area index, leaf area duration, crop growth rate, total dry matter and grain yield as compared to 5 Mg·ha-1 and control. Moreover, experimental results concluded that the deep tillage practice has taken less time to start emergence. Similarly, higher values trend of leaf area index, leaf area duration, crop growth rate, total dry matter accumulation and grain yield was shifted from deep tillage to conventional, minimum and zero tillage practices during both years. Economically, the minimum tillage with poultry manure at rate of 10 Mg·ha-1 gave the better benefit to cost ratio and crop productivity as compared to conventional, deep and zero tillage. The experiment suggested the minimum tillage with poultry manure at the rate of 10 Mg·ha-1 may ensure the maize grain yield sustainability. 展开更多
关键词 AGRONOMY ECONOMY Leaf Area Index Maize Seedling Growth TILLAGE Pakistan
在线阅读 下载PDF
Etiology of Upper GI Bleeding on Endoscopy
16
作者 Junaid Khan muhammad Ali +7 位作者 Hareem Bakhsh Sobhi Sheikh Moazzam Waheed Ifrah Shahnawaz muhammad Abdullah Sardar muhammad Omer Naseem Omer Kamal Farah Bashir muhammad nadeem 《Neuroscience & Medicine》 2018年第1期16-21,共6页
Background: Several circumstances and conditions lead to UGIB. The commonest among them peptic ulcer to an approximation of 50% in cases. The second major cause may be esoghageal varices and third is mallory-weis tear... Background: Several circumstances and conditions lead to UGIB. The commonest among them peptic ulcer to an approximation of 50% in cases. The second major cause may be esoghageal varices and third is mallory-weis tears. There are also other causes, which may include erosins, tumors and other malformations like arteriovenous. Methods: This was an observational retrospective study of all patients referred to endoscopy. The study exclusion criteria include all patients who had repeat endoscopies within one month of the previous endoscopy whereas all the patients with UGIB were included in this study. Results: We retrieved data of total 150 patients who had experienced upper gastrointestinal endoscopy during the selected time period covered in the study, March 2015 to February 2016. The mean age of the patients was 43.3 ± 13.80. 80 (53.3%) of the patients were male and 70 (46.7%) were females. Exploring more into UGIB causes the majority of patients were with esophageal varices 68 (45.3%) with male to female share was 2:1. The second most cause was esophagitis (n = 22, (14.67%)), the distribution of the cause was similar in male to female. Conclusion: We may conclude from our findings that the most common cause of UGIB is esophageal varices in our population. 展开更多
关键词 UPPER GASTROINTESTINAL ENDOSCOPY Esophageal VARICES UPPER GASTROINTESTINAL Bleeding PEPTIC ULCER
暂未订购
Outcomes of Evacuation Extradural Hematoma via Craniotomy under Local Anesthesia
17
作者 Moazzam Waheed Sheikh Ifrah Shahnawaz +4 位作者 muhammad Abdullah Omer Kamal Rabia Naheed Aisha Bushra muhammad nadeem 《Neuroscience & Medicine》 2017年第3期41-45,共5页
Background: The EDH occurs due to the accumulation of bleeding between the inner table of the skull and the outer layer of the dura mater. It is said to account for 1% - 3% of all head injured patients and 9% of those... Background: The EDH occurs due to the accumulation of bleeding between the inner table of the skull and the outer layer of the dura mater. It is said to account for 1% - 3% of all head injured patients and 9% of those who are comatose. The only life-saving treatment of choice is evacuation of EDH via craniotomy. Methods: This was a prospective observational study, where 40 patients were in follow-up for determining the outcomes of evacuation via craniotomy. Results: Majority of the patients were young and males. The main outcome of the evacuation was favorable (recovered), but certain unfavorable outcomes were also accounted like mortality. Conclusion: The pre-surgery clinical findings like consciousness of patient were an important indicator for EDH evacuation outcome. In most of the cases, the outcome was favorable with progressive recovery. 展开更多
关键词 EVACUATION EXTRADURAL HEMATOMA Mortality CONSCIOUSNESS Unfavorable OUTCOMES
暂未订购
Gm Ms1 encodes a kinesin-like protein essential for male fertility in soybean(Glycine max L.) 被引量:15
18
作者 muhammad nadeem Andong Chen +6 位作者 Huilong Hong Dongdong Li Jiajia Li Duo Zhao Wei Wang Xiaobo Wang Lijuan Qiu 《Journal of Integrative Plant Biology》 SCIE CAS CSCD 2021年第6期1054-1064,共11页
The application of heterosis is a promising approach for greatly increasing yield in soybean(Glycine max L.). Nuclear male sterility is essential for hybrid seed production and the utilization of heterosis. Here we re... The application of heterosis is a promising approach for greatly increasing yield in soybean(Glycine max L.). Nuclear male sterility is essential for hybrid seed production and the utilization of heterosis. Here we report the cloning of the gene underlying the soybean male-sterile mutant ms-1,which has been widely used for recurrent selection in soybean breeding programs. We initially delimited the ms1 locus to a 16.15 kb region on chromosome13, based on SLAF_BSA sequencing followed by genotyping of an F_(2) population segregating for the locus. Compared with the same region in fertile plants, the mutant region lacks a sequence of approximately 38.7 kb containing five protein-coding genes, including an ortholog of the kinesin-like protein gene NACK2, named Gm Ms1. The Gm Ms1 knockout plants generated via CRISPR/Casmediated gene editing displayed a complete malesterile phenotype. Metabolic profiling showed that fertile anthers accumulated starch and sucrose normally, whereas sterile anthers had higher anthocyanin levels and lower flavonoid levels and lower antioxidant enzyme activities. These results provide insights into the molecular mechanisms governing male sterility and demonstrate that Gm Ms1 could be used to create male-sterile lines through targeted mutagenesis. These findings pave the way for designing seed production technology and an intelligent male-sterile line system to utilize heterosis in soybean. 展开更多
关键词 metabolome sequencing nuclear male sterility SOYBEAN third generation sequencing transcriptome sequencing
原文传递
Measurements of ^(nat) Cd(γ,x)reaction cross sections and isomer ratio of ^(1,5m.g)Cd with the bremsstrahlung end-point energies of 50 and 60 MeV
19
作者 muhammad nadeem Md.Shakilur Rahman +3 位作者 muhammad Shahid Guinyun Kim Haladhara Naik Nguyen Thi Hien 《Chinese Physics C》 SCIE CAS CSCD 2021年第12期80-93,共14页
The flux-weighted average cross sections ^(nat) Cd(γ,xn)^(115g,m,111m,109,107,105,104)Cd and ^(nat) Cd(γ,x)^113g,112,111g,110m)Ag reactions were measured at the bremsstrahlung end-point energies of 50 and 60 MeV.The... The flux-weighted average cross sections ^(nat) Cd(γ,xn)^(115g,m,111m,109,107,105,104)Cd and ^(nat) Cd(γ,x)^113g,112,111g,110m)Ag reactions were measured at the bremsstrahlung end-point energies of 50 and 60 MeV.The activa tion and off-line y-ray spectrometric technique was carried out using the 100 MeV electron linear accelerator at the Pohang Accelerator Laboratory,Korea.The ^(nat)lCd(γ,xn) reaction cross sections as a function of photon energy were theoretically calculated using the TALYS-1.95 and the EMPIRE-3.2 Malta codes.Then,the flux-weighted average cross sections were obtained from the theoretical values of mono-energetic photons.These values were compared with the flux-weighted values from the present study and were found to be in general agreement.The measured experimental reaction cross-sections and integral yields were described for cadmium and silver isotopes in the ^(nat)Cd(γ,xn)^(115g,m,111m,109,107,105,104) and ^(nat)Cd(γ,x)^(113g,112.111g,110m)Ag reactions.The isomeric yield ratio(IR) of ^(115g.m)Cd in the ^(nat)Cd(γ,xn) reaction was determined for the two bremsstrahlung end-point energies.The measured isomeric yield ratios of ^(115g,m)Cd in the ^(nat)Cd(γ,xn) reaction were also compared with the theoretical values of the nuclear model codes and previously published literature data of the ^(116)Cd(γ,x) and ^116(γ,2n) reactions.It was found that the IR value increases with increasing projectile energy,which demonstrates the characteristic of excitation energy.However,the higher IR value of ^(115g.m)Cd in the ^(116)Cd(n,2n)reaction compared to that in the ^(116)Cd(γ,x)reaction indicates the role of compound nuclear spin alongside excitation energy. 展开更多
关键词 ^(nat)Cd(γ xn)reaction cross sections isomer yield ratio of^(115g m)Cd off-lineγ-ray spectrometric technique TALYS-1.95 TENDL-2019 EMPIRE-3.2 Malta
原文传递
Measurement of ^(59)Co(ai,x)reaction cross sections with the fast neutrons based on the ^(9)Be(p,n)reaction
20
作者 muhammad Zaman muhammad nadeem +3 位作者 muhammad Sahid Kwangsoo Kim Guinyun Kim Nguyen Thi Hien 《Chinese Physics C》 SCIE CAS CSCD 2021年第4期248-255,共8页
The cross sections of the ^(59)Co(n,x)reaction in the average energy range of 15.2-37.2 MeV were meas-ured using activation and an off-line γ-ray spectrometric technique.The neutrons were generated from the ^(9)Be(p,... The cross sections of the ^(59)Co(n,x)reaction in the average energy range of 15.2-37.2 MeV were meas-ured using activation and an off-line γ-ray spectrometric technique.The neutrons were generated from the ^(9)Be(p,n)reaction with proton beam energies of 25-45 MeV at the MC-50 Cyclotron facility of the Korean Institute of Radi-ological and Medical Sciences(KIRAMS).Theoretical cal lculations of neutron-induced reactions on ^(59)Co were per-formed using the nuclear model code TALYS-1.9.The results for the ^(59)Co(n,x)reactions were compared with the theoretical values obtained using TALYS-1.9 and the literature data provided in EXFOR and the TENDL 2019 nuc-lear data library.The theoretical values obtained using TALYS-1.9 with adjusted parameters are comparable to the experimental data.The measured reaction cross sections of a few radionuclides are new,and the others are compar-able to the literature data,and thus,they can strengthen the database.The present study on cross sections leads to useful insight into the mechanisms of ^(59)Co(n,x)reactions. 展开更多
关键词 ^(59)Co(n x)reaction cross sections average neutron energy of 15.2-37.2 MeV off-lineγ-ray spectrometry MCNPX 2.6.0 simulation TALYS-1.9
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部