期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
Incidence, risk factors and clinical outcomes of pericardial effusion in left ventricular assist device patients
1
作者 muhammad Zubair Khan Yevgeniy Brailovsky +10 位作者 Mohammad Alfrad Nobel Bhuiyan Gregary Marhefka Abu S M Faisal Adrija Sircar Parker O'Neill J Eduardo Rame Sona Franklin muhammad waqas Hadia Shah Indranee Rajapreyar Rene J Alvarez 《World Journal of Cardiology》 2025年第6期107-114,共8页
BACKGROUND Development of pericardial effusion in patients with left ventricular assist devices(LVADs)can be detrimental to health outcomes.This study aims to elucidate the prevalence and risk factors for pericardial ... BACKGROUND Development of pericardial effusion in patients with left ventricular assist devices(LVADs)can be detrimental to health outcomes.This study aims to elucidate the prevalence and risk factors for pericardial effusion in patients with LVADs.AIM To elucidate risk factors associated with the presence of pericardial effusion in patients with LVADs and compare the clinical outcomes of those with and without pericardial effusion.The secondary goal is to determine the incidence of pericardiocentesis and pericardial window placement in patients with LVADs experiencing pericardial effusion.METHODS Data were obtained from the National Inpatient Sample database between 2016 and 2018.Statistical analysis was performed using Pearsonχ2 test and multivariate logistic regression analysis to determine clinical outcomes of pericardial effusion and to identify variables associated with pericardial effusion in LVAD patients,respectively.RESULTS The prevalence of LVAD was 9850(0.01%)among total study patients(n=98112095).The incidence of pericardial effusion among LVAD patients was 640(6.5%).The prevalence of liver disease(26.6%vs 17.4%),chronic kidney disease(CKD;54.6%vs 49.4%),hypothyroidism(21.9%vs 18.1%),congestive heart failure(98.4%vs 96.5%),atrial fibrillation(Afib;58.59%vs 50.5%),coronary artery disease(CAD;11.7%vs 4.4%),dyslipidemia(31.3%vs 39.3%),and having undergone percutaneous coronary intervention(PCI;1.6%vs 0.7%)was higher in the pericardial effusion cohort vs the non-pericardial effusion cohort.Multivariate regression analysis demonstrated that CAD(OR=2.89)and PCI(OR=2.2)had the greatest association with pericardial effusion in patients with LVADs.These were followed by liver disease(OR=1.72),hypothyroidism(OR=1.2),electrolyte derangement(OR=1.2),Afib(OR=1.1),and CKD(OR=1.05).Among patients with LVADs,the median length of stay(33 days vs 27 days)and hospitalization cost(847525 USD vs 792616 USD)were significantly higher in the pericardial effusion cohort compared to the non-pericardial effusion cohort.There was no significant difference in mortality between cohorts.The prevalence of cardiac tamponade was 109(17.9%of LVAD patients with pericardial effusion).Ten(9.2%of LVAD patients with cardiac tamponade)patients underwent pericardiocentesis and 44(40.3%)received a pericardial window.CONCLUSION This study shows that liver disease,CKD,PCI,hypothyroidism,electrolyte derangement,Afib,and CAD had a significant association with pericardial effusion in LVAD patients.Hospitalization cost and length of stay were higher in the pericardial effusion group,but mortality was the same. 展开更多
关键词 Left ventricular assist device Pericardial effusion Cardiac tamponade Pericardial window PERICARDIOCENTESIS Risk factors and clinical outcomes of pericardial effusion Older age Diabetes Larger body mass index Renal failure MALNUTRITION
暂未订购
Blockchain-Based Trust Model for Inter-Domain Routing
2
作者 Qiong Yang Li Ma +3 位作者 Sami Ullah Shanshan Tu Hisham Alasmary muhammad waqas 《Computers, Materials & Continua》 2025年第3期4821-4839,共19页
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks. 展开更多
关键词 Inter-domain routing BGP security blockchain trust model trust mechanisms trust evaluation
在线阅读 下载PDF
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
3
作者 Tianqi Peng Bei Gong +4 位作者 Chong Guo Akhtar Badshah muhammad waqas Hisham Alasmary Sheng Chen 《Digital Communications and Networks》 2025年第4期1292-1303,共12页
Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabli... Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems. 展开更多
关键词 Symmetric searchable encryption Conjunctive keyword search Forward and backward privacy Cloud server
在线阅读 下载PDF
The Impact of Domain Name Server(DNS)over Hypertext Transfer Protocol Secure(HTTPS)on Cyber Security:Limitations,Challenges,and Detection Techniques
4
作者 muhammad Dawood Shanshan Tu +4 位作者 Chuangbai Xiao muhammad Haris Hisham Alasmary muhammad waqas Sadaqat Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2024年第9期4513-4542,共30页
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of end-users.However,the adoption of DoH is still facing several research cha... The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of end-users.However,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user awareness.DoH significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security measures.Therefore,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user privacy.This paper provides an in-depth analysis of the effects of DoH on cybersecurity.We discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security studies.Overall,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security. 展开更多
关键词 DNS DNS over HTTPS CYBERSECURITY machine learning
在线阅读 下载PDF
Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network
5
作者 Yilei Wang Xin Sun +4 位作者 Guiping Zheng Ahmar Rashid Sami Ullah Hisham Alasmary muhammad waqas 《Computers, Materials & Continua》 SCIE EI 2024年第3期3909-3927,共19页
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e... The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field. 展开更多
关键词 IIoT trusted measure energy efficient
在线阅读 下载PDF
New strategy of S,N co‐doping of conductive‐copolymer‐derived carbon nanotubes to effectively improve the dispersion of PtCu nanocrystals for boosting the electrocatalytic oxidation of methanol 被引量:3
6
作者 Jingping Zhong Kexin Huang +6 位作者 Wentao Xu Huaguo Tang muhammad waqas Youjun Fan Ruixiang Wang Wei Chen Yixuan Wang 《Chinese Journal of Catalysis》 SCIE EI CAS CSCD 2021年第7期1205-1215,共11页
Efficacious regulation of the geometric and electronic structures of carbon nanomaterials via the introduction of defects and their synergy is essential to achieving good electrochemical performance.However,the guidel... Efficacious regulation of the geometric and electronic structures of carbon nanomaterials via the introduction of defects and their synergy is essential to achieving good electrochemical performance.However,the guidelines for designing hybrid materials with advantageous structures and the fundamental understanding of their electrocatalytic mechanisms remain unclear.Herein,superfine Pt and PtCu nanoparticles supported by novel S,N‐co‐doped multi‐walled CNT(MWCNTs)were prepared through the innovative pyrolysis of a poly(3,4‐ethylenedioxythiophene)/polyaniline copolymer as a source of S and N.The uniform wrapping of the copolymer around the MWCNTs provides a high density of evenly distributed defects on the surface after the pyrolysis treatment,facilitating the uniform distribution of ultrafine Pt and PtCu nanoparticles.Remarkably,the Pt_(1)Cu_(2)/SN‐MWCNTs show an obviously larger electroactive surface area and higher mass activity,stability,and CO poisoning resistance in methanol oxidation compared to Pt/SN‐MWCNTs,Pt/S‐MWCNTs,Pt/N‐MWCNTs,and commercial Pt/C.Density functional theory studies confirm that the co‐doping of S and N considerably deforms the CNTs and polarizes the adjacent C atoms.Consequently,both the adsorption of Pt1Cu2 onto the SN‐MWCNTs and the subsequent adsorption of methanol are enhanced;in addition,the catalytic activity of Pt_(1)Cu_(2)/SN‐MWCNTs for methanol oxidation is thermodynamically and kinetically more favorable than that of its CNT and N‐CNT counterparts.This work provides a novel method to fabricate high‐performance fuel cell electrocatalysts with highly dispersed and stable Pt‐based nanoparticles on a carbon substrate. 展开更多
关键词 Methanol oxidation Conductive copolymers Dual‐doped carbon nanotubes Pt‐based nanoparticles DFT calculation
在线阅读 下载PDF
Exploring the Role of Liver Cancer Stem Cells in Hepatocellular Carcinoma Metastasis
7
作者 Maria Fatima Maria Riaz +2 位作者 muhammad Amjad muhammad waqas muhammad Hashim Raza 《Proceedings of Anticancer Research》 2024年第6期8-23,共16页
Metastasis refers to disseminating cancerous tumors from their primary site to distant locations inside the body. Cancer cells must go through a sequence of events called the “metastatic cascade” to develop metastas... Metastasis refers to disseminating cancerous tumors from their primary site to distant locations inside the body. Cancer cells must go through a sequence of events called the “metastatic cascade” to develop metastases. Each stage necessitates a unique functional alteration. Cancer stem cells (CSCs) play a crucial role in tumor metastasis, but understanding their dynamic behavior and regulating mechanisms remains incomplete. This review explores the influence of liver CSCs on the biological processes that drive the spread and growth of cancer cells, as described by the “metastatic cascade” concept. Liver CSCs can spread to other organs by undergoing epithelial-mesenchymal transition (EMT). This alteration in the microenvironment facilitates cellular dissemination, immune surveillance evasion, dormancy induction, and subsequent reactivation. To effectively prevent and treat advanced hepatocellular carcinoma (HCC) metastases, it is crucial to understand the heterogeneity and features of liver CSCs involved in these processes. 展开更多
关键词 Liver cancer Stem cells Hepatocellular carcinoma Signaling pathway Tumor microenvironment METASTASIS
暂未订购
Single crystal growth and electronic structure of Rh-doped Sr_(3)Ir_(2)O_(7)
8
作者 王冰倩 彭舒婷 +10 位作者 欧志鹏 王宇晨 muhammad waqas 罗洋 魏志远 淮琳崴 沈建昌 缪宇 孙秀鹏 殷月伟 何俊峰 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期86-90,共5页
Ruddlesden-Popper iridate Sr_(3)Ir_(2)O_(7)is a spin-orbit coupled Mott insulator.Hole doped Sr_(3)Ir_(2)O_(7)provides an ideal platform to study the exotic quantum phenomena that occur near the metal-insulator transi... Ruddlesden-Popper iridate Sr_(3)Ir_(2)O_(7)is a spin-orbit coupled Mott insulator.Hole doped Sr_(3)Ir_(2)O_(7)provides an ideal platform to study the exotic quantum phenomena that occur near the metal-insulator transition(MIT)region.Rh substitution of Ir is an effective method to induce hole doping into Sr_(3)Ir_(2)O_(7).However,the highest doping level reported in Sr_(3)(Ir_(1-x)Rh_(x))_(2)O_(7)single crystals was only around 3%,which is far from the MIT region.In this paper,we report the successful growth of single crystals of Sr3(Ir_(1-x)Rh_(x))_(2)O_(7)with a doping level of~9%.The samples have been fully characterized,demonstrating the high quality of the single crystals.Transport measurements have been carried out,confirming the tendency of MIT in these samples.The electronic structure has also been examined by angle-resolved photoemission spectroscopy(ARPES)measurements.Our results establish a platform to investigate the heavily hole doped Sr_(3)Ir_(2)O_(7) compound,which also provide new insights into the MIT with hole doping in this material system. 展开更多
关键词 hole doped iridate single crystal growth metal-insulator transition angle-resolved photoemission spectroscopy(ARPES)
原文传递
Mutualistic fungal endophytes produce phytohormones and organic acids that promote japonica rice plant growth under prolonged heat stress 被引量:9
9
作者 muhammad waqas Abdul Latif KHAN +3 位作者 Raheem SHAHZAD Ihsan ULLAH Abdur Rahim KHAN In-Jung LEE 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2015年第12期1011-1018,共8页
This study identifies the potential role in heat-stress mitigation of phytohormones and other secondary metabolites produced by the endophytic fungus Paecilomyces formosus LWL1 in japonica rice cultivar Dongjin. The j... This study identifies the potential role in heat-stress mitigation of phytohormones and other secondary metabolites produced by the endophytic fungus Paecilomyces formosus LWL1 in japonica rice cultivar Dongjin. The japonica rice was grown in controlled chamber conditions with and without P. formosus LWL1 under no stress (NS) and prolonged heat stress (HS) conditions. Endophytic association under NS and HS conditions significantly improved plant growth attributes, such as plant height, fresh weight, dry weight, and chlorophyll content. Furthermore, P. for- mosus LWL1 protected the rice plants from HS compared with controls, indicated by the lower endogenous level of stress-signaling compounds such as abscisic acid (25.71%) and jasmonic acid (34.57%) and the increase in total protein content (18.76%-33.22%). Such fungal endophytes may be helpful for sustainable crop production under high environmental temperatures. 展开更多
关键词 Paecilomyces formosus LWL1 Plant-growth promotion Heat-stress mitigation PHYTOHORMONES Organicacids ENDOPHYTES
原文传递
Endophytes from medicinal plants and their potential for producing indole acetic acid, improving seed germination and mitigating oxidative stress 被引量:6
10
作者 Abdul Latif KHAN Syed Abdullah GILANI +10 位作者 muhammad waqas Khadija AL-HOSNI Salima AL-KHIZIRI Yoon-Ha KIM Liaqat ALI Sang-Mo KANG Sajjad ASAF Raheem SHAHZAD Javid HUSSAIN In-Jung LEE Ahmed AL-HARRASI 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2017年第2期125-137,共13页
Medicinal plants have been used by marginal communities to treat various ailments. However, the potential of endophytes within these bio-prospective medicinal plants remains unknown. The present study elucidates the e... Medicinal plants have been used by marginal communities to treat various ailments. However, the potential of endophytes within these bio-prospective medicinal plants remains unknown. The present study elucidates the endophytic diversity of medicinal plants(Caralluma acutangula, Rhazya stricta, and Moringa peregrina) and the endophyte role in seed growth and oxidative stress. Various organs of medicinal plants yielded ten endophytes, which were identified as Phoma sp.(6 isolates), Alternaria sp.(2), Bipolaris sp.(1), and Cladosporium sp.(1) based on 18 S rD NA sequencing and phylogenetic analysis. The culture filtrates(CFs; 25%, 50%, and 100% concentrations) from these endophytes were tested against the growth of normal and dwarf mutant rice lines. Endophytic CF exhibited dose-dependent growth stimulation and suppression effects. CF(100%) of Phoma sp. significantly increased rice seed germination and growth compared to controls and other endophytes. This growth-promoting effect was due to the presence of indole acetic acid in endophytic CF. The gas chromatography/mass spectrometry(GC/MS) analysis showed the highest indole acetic acid content((54.31±0.21) μmol/L) in Bipolaris sp. In addition, the isolate of Bipolaris sp. exhibited significantly higher radical scavenging and anti-lipid peroxidation activity than the other isolates. Bipolaris sp. and Phoma sp. also exhibited significantly higher flavonoid and phenolic contents. The medicinal plants exhibited the presence of bio-prospective endophytic strains, which could be used for the improvement of crop growth and the mitigation of oxidative stresses. 展开更多
关键词 Fungal endophytes DIVERSITY Medicinal plants ANTIOXIDANTS Indole acetic acid
原文传递
Evaluation of Humic Acid Application Methods for Yield and Yield Components of Mungbean 被引量:10
11
作者 muhammad waqas Bashir Ahmad +6 位作者 muhammad Arif Fazal Munsif Abdul Latif Khan muhammad Amin Sang-Mo Kang Yoon-Ha Kim In-Jung Lee 《American Journal of Plant Sciences》 2014年第15期2269-2276,共8页
A triplicate field experiment laid out in randomized complete block design was conducted to evaluate different humic acid (HA) application methods at Agricultural Research Farm, of KPK Agricultural University, Peshawa... A triplicate field experiment laid out in randomized complete block design was conducted to evaluate different humic acid (HA) application methods at Agricultural Research Farm, of KPK Agricultural University, Peshawar. Three methods of HA application: seed priming, foliar spray and soil application were included in the experiment. Humic acid application methods significantly affected pods plant-1, grains pod-1, 1000 grain weights, and grain yield whereas biological yield was not significantly affected by HA application methods. Humic acid application at the rate of 3 kg&middotha-1 resulted in higher number of pods plant-1, thousand grain weights and grain yield, however it was statistically similar to the treatments where HA was soil applied at rate of 1 and 2 kg&middotha-1, seed priming with 0% (water soaked), 1%, 2% HA solution and foliar spray with 0.01%, 0.05% and 0.1% of HA solution. It is concluded that HA application in all the three methods significantly enhances grain yield and yield components of mungbean. 展开更多
关键词 MUNGBEAN HUMIC Acid SEED PRIMING FOLIAR Spray Soil Application Yield
在线阅读 下载PDF
Multi-material Bio-inspired Soft Octopus Robot for Underwater Synchronous Swimming 被引量:4
12
作者 Faheem Ahmed muhammad waqas +6 位作者 Bushra Shaikh Umair Khan Afaque Manzoor Soomro Suresh Kumar Hina Ashraf Fida Hussain Memon Kyung Hyun Choi 《Journal of Bionic Engineering》 SCIE EI CSCD 2022年第5期1229-1241,共13页
Inspired by the simple yet amazing morphology of the Octopus, we propose the design, fabrication, and characterization of multi-material bio-inspired soft Octopus robot (Octobot). 3D printed molds for tentacles and he... Inspired by the simple yet amazing morphology of the Octopus, we propose the design, fabrication, and characterization of multi-material bio-inspired soft Octopus robot (Octobot). 3D printed molds for tentacles and head were used. The tentacles of the Octobot were casted using Ecoflex-0030 while head was fabricated using relatively flexible material, i.e., OOMOO-25. The head is attached to the functionally responsive tentacles (each tentacle is of 79.12 mm length and 7 void space diameter), whereas Shape Memory Alloy (SMA) muscle wires of 0.5 mm thickness are used in Octobot tentacles for dual thrust generation and actuation of Octobot. The tentacles were separated in two groups and were synchronously actuated. Each tentacle of the developed Octobot contains a pair of SMA muscles (SMA-α and SMA-β). SMA-α muscles being the main actuator, was powered by 9 V, 350 mA power supply, whereas SMA-β was used to provide back thrust and thus helps to increase the actuation frequency. Simulation work of the proposed model was performed in the SolidWorks environment to verify the vertical velocity using the octopus tentacle actuation. The design morphology of Octobot was optimized using simulation and TRACKER software by analyzing the experimental data of angle, displacement, and velocity of real octopus. The as-developed Octobot can swim at variable frequencies (0.5–2 Hz) with the average speed of 25 mm/s (0.5 BLS). Therefore, the proposed soft Octopus robot showed an excellent capability of mimicking the gait pattern of its natural counterpart. 展开更多
关键词 BIO-INSPIRED OCTOPUS Octobot Sub-surface Soft robotics SWIMMING
在线阅读 下载PDF
Role of copper grid mesh in the catalytic oxidation of CO over one-step synthesized Cu-Fe-Co ternary oxides thin film 被引量:3
13
作者 muhammad waqas Patrick Mountapmbeme Kouotou +2 位作者 Achraf El Kasmi Yu Wang Zhen-Yu Tian 《Chinese Chemical Letters》 SCIE CAS CSCD 2020年第5期1201-1206,共6页
The effective valuation of catalyst supports in the catalytic oxidation makes the contribution to understand the support effect of great interest.Here,the role of active substrate in the performance and stability of C... The effective valuation of catalyst supports in the catalytic oxidation makes the contribution to understand the support effect of great interest.Here,the role of active substrate in the performance and stability of CuFe-Co ternary oxides was studied towards the complete catalytic oxidation of CO.The Cu-Fe-Co oxide thin films were deposited on copper grid mesh(CUGM)using one-step pulsed-spray evaporation chemical vapor deposition method.Crystalline structure and morphology analyses revealed nano-crystallite sizes and do me-top-like morphology.Synergistic effects between Cu,Fe and Co,which affect the surface Cu^2+,Fe^3+,Co^3+and chemisorbed oxygen species(O2 and OH)of thin films over the active support and thus result in better reducibility.The thin film catalysts supported on CUGM exhibited attractive catalytic activity compared to the te rnary oxides supported on ine rt grid mesh at a high gas hourly space velocity.Moreove r,the stability in time-on-stream of the ternary oxides on CUGM was evaluated in the CO oxidation for 30 h.The ad opted deposition strategy ofternary oxides on CUGM presents an excessive amount of adsorbed active oxygen species that play an impo rtant role in the complete CO oxidation.The catalysts supported on CUGM showed better catalytic conve rsion than that on inert grid mesh and some literature-reported noble metal oxides as well as transition metal oxides counterparts,revealing the beneficial effect of the CUGM suppo rt in the improvement of the catalytic performance. 展开更多
关键词 Cu-Fe-Co ternary oxides PSE-CVD technique Support effect Time-on-stream Copper grid mesh
原文传递
An Efficient Impersonation Attack Detection Method in Fog Computing 被引量:3
14
作者 Jialin Wan muhammad waqas +4 位作者 Shanshan Tu Syed Mudassir Hussain Ahsan Shah Sadaqat Ur Rehman muhammad Hanif 《Computers, Materials & Continua》 SCIE EI 2021年第7期267-281,共15页
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t... Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER). 展开更多
关键词 Fog computing double Sarsa attack detection physical layer key security
在线阅读 下载PDF
Effective(kinetic freeze-out) temperature, transverse flow velocity, and kinetic freeze-out volume in high energy collisions 被引量:2
15
作者 muhammad waqas Fu-Hu Liu +1 位作者 Li-Li Li Haidar Mas’ud Alfanda 《Nuclear Science and Techniques》 SCIE CAS CSCD 2020年第11期36-49,共14页
The transverse momentum spectra of different types of particles produced in central and peripheral gold–gold(Au–Au)and inelastic proton–proton(pp)collisions at the Relativistic Heavy Ion Collider,as well as in cent... The transverse momentum spectra of different types of particles produced in central and peripheral gold–gold(Au–Au)and inelastic proton–proton(pp)collisions at the Relativistic Heavy Ion Collider,as well as in central and peripheral lead-lead(Pb–Pb)and pp collisions at the Large Hadron Collider,are analyzed by the multi-component standard(Boltzmann–Gibbs,Fermi–Dirac,and Bose–Einstein)distributions.The obtained results from the standard distribution give an approximate agreement with the measured experimental data by the STAR,PHENIX,and ALICE Collaborations.The behavior of the effective(kinetic freeze-out)temperature,transverse flow velocity,and kinetic freeze-out volume for particles with different masses is obtained,which observes the early kinetic freezeout of heavier particles as compared to the lighter particles.The parameters of emissions of different particles are observed to be different,which reveals a direct signature of the mass-dependent differential kinetic freeze-out.It is also observed that the peripheral nucleus–nucleus(AA)and pp collisions at the same center-of-mass energy per nucleon pair are in good agreement in terms of the extracted parameters. 展开更多
关键词 Transverse momentum spectra Effective temperature Kinetic freeze-out temperature Transverse flow velocity Kinetic freeze-out volume
在线阅读 下载PDF
Authentication of Vehicles and Road Side Units in Intelligent Transportation System 被引量:3
16
作者 muhammad waqas Shanshan Tu +5 位作者 Sadaqat Ur Rehman Zahid Halim Sajid Anwar Ghulam Abbas Ziaul Haq Abbas Obaid Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2020年第7期359-371,共13页
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and ... Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and governments.Smart and autonomous vehicles are connected wirelessly,which are more attracted for attackers due to the open nature of wireless communication.One of the problems is the rogue attack,in which the attacker pretends to be a legitimate user or access point by utilizing fake identity.To figure out the problem of a rogue attack,we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state information of the communication link.We consider the communication link between vehicle-to-vehicle,and vehicle-to-infrastructure.We evaluate the performance of our proposed technique by measuring the rogue attack probability,false alarm rate(FAR),mis-detection rate(MDR),and utility function of a receiver based on the test threshold values of reinforcement learning algorithm.The results show that the FAR and MDR are decreased significantly by selecting an appropriate threshold value in order to improve the receiver’s utility. 展开更多
关键词 Intelligent transportation system AUTHENTICATION rogue attack
在线阅读 下载PDF
Additive effects due to biochar and endophyte application enable soybean to enhance nutrient uptake and modulate nutritional parameters 被引量:1
17
作者 muhammad waqas Yoon-Ha KIM +6 位作者 Abdul Latif KHAN Raheem SHAHZAD Sajjad ASAF muhammad HAMAYUN Sang-Mo KANG muhammad Aaqil KHAN In-Jung LEE 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2017年第2期109-124,共16页
We studied the effects of hardwood-derived biochar(BC) and the phytohormone-producing endophyte Galactomyces geotrichum WLL1 in soybean(Glycine max(L.) Merr.) with respect to basic, macro- and micronutrient upta... We studied the effects of hardwood-derived biochar(BC) and the phytohormone-producing endophyte Galactomyces geotrichum WLL1 in soybean(Glycine max(L.) Merr.) with respect to basic, macro- and micronutrient uptakes and assimilations, and their subsequent effects on the regulation of functional amino acids, isoflavones, fatty acid composition, total sugar contents, total phenolic contents, and 1,1-diphenyl-2-picrylhydrazyl(DPPH)-scavenging activity. The assimilation of basic nutrients such as nitrogen was up-regulated, leaving carbon, oxygen, and hydrogen unaffected in BC+G. geotrichum-treated soybean plants. In comparison, the uptakes of macro- and micronutrients fluctuated in the individual or co-application of BC and G. geotrichum in soybean plant organs and rhizospheric substrate. Moreover, the same attribute was recorded for the regulation of functional amino acids, isoflavones, fatty acid composition, total sugar contents, total phenolic contents, and DPPH-scavenging activity. Collectively, these results showed that BC+G. geotrichum-treated soybean yielded better results than did the plants treated with individual applications. It was concluded that BC is an additional nutriment source and that the G. geotrichum acts as a plant biostimulating source and the effects of both are additive towards plant growth promotion. Strategies involving the incorporation of BC and endophytic symbiosis may help achieve eco-friendly agricultural production, thus reducing the excessive use of chemical agents. 展开更多
关键词 Phytohormone-producing endophytic fungi Nutrients uptake ASSIMILATION Nutritional quality SOYBEAN
原文传递
Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications 被引量:1
18
作者 muhammad waqas Shehr Bano +3 位作者 Fatima Hassan Shanshan Tu Ghulam Abbas Ziaul Haq Abbas 《Computers, Materials & Continua》 SCIE EI 2022年第12期4489-4499,共11页
Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between... Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies.Due to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and impersonation.Existing methods use physical layer authentication(PLA),themost promising solution to detect cyber-attacks.Still,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency target.These methods perform well but only in stationary scenarios.We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios.The features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify data.The authentication of the received signal is considered a binary classification problem.The transmitted data is labeled as legitimate information,and spoofing data is illegitimate information.Therefore,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks.It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile.The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time. 展开更多
关键词 Physical layer authentication machine learning cyber-physical systems SECURITY
在线阅读 下载PDF
Power Allocation Strategy for Secret Key Generation Method in Wireless Communications 被引量:1
19
作者 Bin Zhang muhammad waqas +2 位作者 Shanshan Tu Syed Mudassir Hussain Sadaqat Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2021年第8期2179-2188,共10页
Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wirele... Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR. 展开更多
关键词 Secret key generation rate power allocation physical layer wireless communication
在线阅读 下载PDF
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
20
作者 Yongjie Yang Shanshan Tu +3 位作者 Raja Hashim Ali Hisham Alasmary muhammad waqas muhammad Nouman Amjad 《Computers, Materials & Continua》 SCIE EI 2023年第1期801-815,共15页
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing capabili... With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing capabilities.Cloud computing has traditionally played an important role in establishing IoT.However,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic distribution.However,IoT networks are vulnerable to unwanted assaults because of their open and shared nature.As a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available.In this study,we examined the time-related aspects of network traffic data.We presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset.We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score. 展开更多
关键词 Fog computing intrusion detection bi-LSTM attention mechanism
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部