Aim: To study the occurrence of Y chromosome microdeletions in azoospermic patients with Klinefelter's syndrome (KFS). Methods: Blood and semen samples were collected from azoospermic patients with KFS (n = 14)...Aim: To study the occurrence of Y chromosome microdeletions in azoospermic patients with Klinefelter's syndrome (KFS). Methods: Blood and semen samples were collected from azoospermic patients with KFS (n = 14) and a control group of men of proven fertility (n = 13). Semen analysis was done according to World Health Organization (WHO) guidelines. Blood samples were processed for karyotyping, fluorescent in situ hybridization (FISH) and measurement of plasma follicle stimulating hormone (FSH) by radioimmunoassay. To determine Y chromosome microdeletions, polymerase chain reaction (PCR) of 16 sequence tagged sites (STS) and three genes (DFFRY, XKRY and RBM1 Y) was performed on isolated genomic DNA. Testicular fine needle aspiration cytology (FNAC) was done in selected cases. Results: Y chromosome microdeletions spanning the azoospermia factor (AZF)a and AZFb loci were found in four of the 14 azoospermic patients with KFS. Karyotype and FISH analysis revealed that, of the four cases showing Y chromosome microdeletion, three cases had a 47,XXY/46,XY chromosomal pattern and one case had a 46,XY/47,XXY/48,XXXY/48,XXYY chromosomal pattern. The testicular FNAC of one sample with Y chromosome microdeletion revealed Sertoli cell-only type of morphology. However, no Y chromosome microdeletions were observed in any of the 13 fertile men. All patients with KFS had elevated plasma FSH levels. Conclusion: Patients with KFS may harbor Y chromosome microdeletions and screening for these should be a part of their diagnostic work-up, particularly in those considering assisted reproductive techniques. (Asian JAndrol 2006 Jan; 8: 81-88)展开更多
Varicocele-associated male infertility has classically been managed using surgery or assisted reproductive techniques. With increasing evidence of oxidative stress as a pathophysiological factor in varicocele-associat...Varicocele-associated male infertility has classically been managed using surgery or assisted reproductive techniques. With increasing evidence of oxidative stress as a pathophysiological factor in varicocele-associated infertility, medical therapy especially antioxidants might become a treatment option with lower risks. We reviewed the existing literature on the role of various medical agents in the management of male infertility attributed to varicoceles. Medical therapy is typically evaluated in three different situations such as (a) comparison of two drugs or one drug with placebo, (b) comparison of drugs versus surgery, and (c) comparison of drugs as adjuvant therapy with surgery versus drug therapy alone. Due to heterogeneity of data and lack of well-conducted studies, there is insufficient data to recommend routine use of medical therapy for men with varicocele-associated infertility and surgery remains the treatment of choice. Pregnancy and live birth rates are usually not reported in most studies and mere improvement in sperm parameters or antioxidant capacity is insufficient to support its routine use. Antioxidant therapy is a potential option due to its theoretical benefit, data from preclinical studies, and lack of major side effects. Adjuvant therapy with antioxidants after surgical repair of varicocele may improve the outcome and is a potential area for further research.展开更多
Aim: To determine if Yq microdeletion frequency and loci of deletion are similar in two tissues (blood and sperm) of different embryological origin. Methods: The present study included 52 infertile oligozoospermic...Aim: To determine if Yq microdeletion frequency and loci of deletion are similar in two tissues (blood and sperm) of different embryological origin. Methods: The present study included 52 infertile oligozoospermic cases. In each case, DNA was isolated from blood and sperms and polymerase chain reaction (PCR) microdeletion analysis was done from genomic DNA isolated from both the tissues. The PCR products were analyzed on a 1.8% agarose gel. PCR amplifications found to be negative were repeated at least three times to confirm the deletion of a given marker. Results: Only 1 case harbored microdeletion in blood DNA, whereas 4 cases harbored microdeletion in sperm DNA. Conclusion: The frequency of Yq microdeletions is higher in germ cells as compared to blood. As the majority of infertile couples opt for assisted reproduction procreation techniques (ART), Yq microdeletion screening from germ cells is important to understand the genetic basis of infertility, to provide comprehensive counseling and most adapted therapeutics to the infertile couple.展开更多
Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the ...Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the level of reliability is not the same as it should be.Therefore,further research into the most detailed mechanisms for evaluating and increasing software reliability is essential.A signicant aspect of growing the degree of reliable applications is the quantitative assessment of reliability.There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software.However,none of these mechanisms are useful for all kinds of failure datasets and applications.Hence nding the most optimal model for reliability prediction is an important concern.This paper suggests a novel method to substantially pick the best model of reliability prediction.This method is the combination of analytic hierarchy method(AHP),hesitant fuzzy(HF)sets and technique for order of preference by similarity to ideal solution(TOPSIS).In addition,using the different iterations of the process,procedural sensitivity was also performed to validate the ndings.The ndings of the software reliability prediction models prioritization will help the developers to estimate reliability prediction based on the software type.展开更多
The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differ...The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differences in human life,as well as is intended to have noticeable impact in many other domains in the forthcoming years.The rapid growth in blockchain technology has created numerous new possibilities for use,especially for healthcare applications.The digital healthcare services require highly effective security methodologies that can integrate data security with the availablemanagement strategies.To test and understand this goal of security management in Saudi Arabian perspective,the authors performed a numerical analysis and simulation through a multi criteria decision making approach in this study.The authors adopted the fuzzy Analytical Hierarchy Process(AHP)for evaluating the effectiveness and then applied the fuzzy Technique forOrder of Preference by Similarity to Ideal Solution(TOPSIS)technique to simulate the validation of results.For eliciting highly corroborative and conclusive results,the study referred to a real time project of diabetes patients’management application of Kingdom of Saudi Arabia(KSA).The results discussed in this paper are scientifically proven and validated through various analysis approaches.Hence the present study can be a credible basis for other similar endeavours being undertaken in the domain of blockchain research.展开更多
Introduction:Optimal sound transmission across the ossicular chain is dependent on the appropriate alignment of the middle ear ossicles.Incudostapedial joint(ISJ)is conventionally considered to be at right angle.Objec...Introduction:Optimal sound transmission across the ossicular chain is dependent on the appropriate alignment of the middle ear ossicles.Incudostapedial joint(ISJ)is conventionally considered to be at right angle.Objective:We intended to study the ISJ anatomy and the impact of temporal bone pneumatization on the same.Methods:In a cadaveric study comprising of 47 human temporal bones,canal wall down mastoidectomy was carried out under microscopic guidance keeping the ossicular chain intact.The morphology of ISJ was recorded and analysed with respect to the pneumatization status of the temporal bone.The data analysis was performed using statistical software Stata version 12.0.Results:The mean ISJ angle for the 47 bones was 90.5^0(SD-15^0;range:54^0-122^0).The mean angle in well pneumatized bones was 93.7^0(SD-16.5;Range:54°-122^0)and in sclerotic mastoids was 88.7^0(SD-14;Range:68°-118^0).The difference in the ISJ angle in these two conditions was not statistically significant(p=0.27).The mean angle was found to be significantly more obtuse in the cases with partially eroded ISJ(111.4^0{SD-8.8;range:100.3^0-221.9^0};p=0.0001)and in the cases with an‘adherent/tilted morphology’of the stapes suprastructure with the promontory(mean-95.8^0(SD-13.8;range:70.7^0-120.4^0);p-<0.00001).Conclusion:The ISJ angle shows considerable variations.This variability needs to be taken into account when undertaking middle ear reconstructive procedures,specifically the ones involving the stapes footplate.The mastoid pneumatization does not appear to have an impact on the ISJ angle.展开更多
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,framew...Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability.展开更多
Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost imp...Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare.展开更多
Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study h...Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study has executed the forecastingmodel for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period.Towards this intent,the study analyzed different age groups of patients(child,adult,elderly)who were affected by COVID-19.The analysis was done city-wise and also included the number of recoveries recorded in different cities.Furthermore,the study also discusses the impact of COVID-19 on the economy.For conducting the stated analysis,the authors have created a list of factors that are known to cause the spread of COVID-19.As an effective countermeasure to contain the spread of Coronavirus in Saudi Arabia,this study also proposes to identify the most effective Computer Science technique that can be used by healthcare professionals.For this,the study employs the Fuzzy-Analytic Hierarchy Process integrated with the Technique for Order Performance by Similar to Ideal Solution(F.AHP.TOPSIS).After prioritizing the various Computer Science techniques,the ranking order that was obtained for the different techniques/tools to contain COVID-19 was:A4>A1>A2>A5>A3.Since the Blockchain technique obtained the highest priority,the study recommends that it must be used extensively as an efficacious and accurate means to combat COVID-19.展开更多
Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were ...Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus.Such enforced alienation affected both the mental and social condition of people significantly.Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement.However,COVID-19 brought all such communication to a grinding halt.Digital interactions have failed to enthuse the fervor that one enjoys in face-to-face meets.The pandemic has shoved the entire planet into an unstable state.The main focus and aim of the proposed study is to assess the impact of the pandemic on different aspects of the society in Saudi Arabia.To achieve this objective,the study analyzes two perspectives:the early approach,and the late approach of COVID-19 and the consequent effects on different aspects of the society.We used a Machine Learning based framework for the prediction of the impact of COVID-19 on the key aspects of society.Findings of this research study indicate that financial resources were the worst affected.Several countries are facing economic upheavals due to the pandemic and COVID-19 has had a considerable impact on the lives as well as the livelihoods of people.Yet the damage is not irretrievable and the world’s societies can emerge out of this setback through concerted efforts in all facets of life.展开更多
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended obj...The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices.展开更多
The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated ...The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare.Despite the phenomenal advancement in the present healthcare services,the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients’data.A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders.Various approaches and methods have been practiced by researchers to secure healthcare digital services.However,there are very few from the Machine learning(ML)domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records(EHRs).The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches.B.A.Kitchenham guidelines have been practiced as a manual to conduct this work.Seven well-known digital libraries namely IEEE Xplore,Science Direct,Springer Link,ACM Digital Library,Willey Online Library,PubMed(Medical and Bio-Science),and MDPI have been included to performan exhaustive search for the existing pertinent studies.Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion,yet the specified area has not been fully explored by the researchers.K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems’log data.Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies.This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively.Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion.展开更多
AIM:To evaluate telomere length in sperm DNA and its correlation with oxidative stress(normal,mild,severe).METHODS:The study included infertile men(n=112)and age matched fertile controls(n=102).The average telomere le...AIM:To evaluate telomere length in sperm DNA and its correlation with oxidative stress(normal,mild,severe).METHODS:The study included infertile men(n=112)and age matched fertile controls(n=102).The average telomere length from the sperm DNA was measured using a quantitative real time PCR based assay.Seminal reactive oxygen species(ROS)and 8-Isoprostane(8-IP)levels were measured by chemiluminescence assay and ELISA respectively.RESULTS:Average sperm telomere length in infertile men and controls was 0.609±0.15 and 0.789±0.060,respectively(P<0.0001).Seminal ROS levels in infertile was higher[66.61±28.32 relative light units(RLU)/s/million sperm]than in controls(14.04±10.67RLU/s/million sperm)(P<0.0001).The 8-IP level in infertile men was significantly higher(421.55±131.29pg/mL)than in controls(275.94±48.13 pg/mL)(P<0.001).When correlated to oxidative stress,in normal range of oxidative stress(ROS,0-21.3 RLU/s/million sperm)the average telomere length in cases was 0.663±0.14,in mild oxidative stress(ROS,21.3-35 RLU/s/million sperm)it was elevated(0.684±0.12)and in severe oxidative stress(ROS>35 RLU/s/million sperm)average telomere length was decreased to 0.595±0.15.CONCLUSION:Mild oxidative stress results in lengthening of telomere length,but severe oxidative stress results in shorter telomeres.Although telomere maintenance is a complex trait,the study shows that mild oxidative stress is beneficial in telomere length maintenance and thus a delicate balance needs to be established to maximize the beneficial effects of free radicals and prevent harmful effects of supra physiological levels.Detailed molecular evaluation of telomere structure,its correlation with oxidative stress would aid in elucidating the cause of accelerated telomere length attrition.展开更多
The oxidative dehydrogenation (ODH) of propane was conducted on gallium, aluminum, and chromium doped Si30VMgO catalysts. On doping, the concentrations of the phases responsible for the activity and selectivity incr...The oxidative dehydrogenation (ODH) of propane was conducted on gallium, aluminum, and chromium doped Si30VMgO catalysts. On doping, the concentrations of the phases responsible for the activity and selectivity increased in their concentrations. The reaction studies were conducted in a tubular steel reactor at temperatures of 753, 783, 813, and 843 K and atmospheric pressure. The total flow rates of the feed were chosen as 30, 40, 50, and 60 ml/min. The propane to oxygen ratios were chosen at 1 : 1, 2 : 1, and 3 : 1, respectively. The effect of various dopants on the activity and selectivity of the catalysts was studied. Deactivation studies were conducted over all the catalysts. The kinetic data were analyzed in terms of power law models and Langmuir-Hinshelwood (LH) models. The kinetic data results were analyzed by comparing the effect of dopants. Statistical model discrimination was done for the proposed models. AIC and BIC criteria were used for discrimination of the models.展开更多
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches a...Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues.It is crucial in offering a proactive security system in the field of cybersecurity.In real time,cybersecurity protects information,information systems,and networks from intruders.In the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches.At an increasing rate,intruders are breaching information security.Anomaly detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient clarifications.Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns.In a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action.The projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems.展开更多
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so...Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications.展开更多
In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day ...In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day consultancy services are aided by the use of multiple tools and techniques.However,ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically.Consultants usually tackle these functions after establishing the clients’needs and developing the appropriate strategy.Nevertheless,most of the consultants tend to focus more on the intended outcomes only and often ignore the security-specific issues.Our research study is an initiative to recommend the use of a hybrid computational technique based on fuzzy Analytical Hierarchy Process(AHP)and fuzzy Technique for Order Preference by Similarity to Ideal Solutions(TOPSIS)for prioritizing the tools and techniques that are used in consultancy services on the basis of their security features and efficacy.The empirical analysis conducted in this context shows that after implementing the assessment process,the rank of the tools and techniques obtained is:A7>A1>A4>A2>A3>A5>A6>A7,and General Electric McKinsey(GE-McKinsey)Nine-box Matrix(A7)obtained the highest rank.Thus,the outcomes show that this order of selection of the tools and techniques will give the most effective and secure services.The awareness about using the best tools and techniques in consultancy services is as important as selecting the most secure tool for solving a given problem.In this league,the results obtained in this study would be a conclusive and a reliable reference for the consultants.展开更多
The direct determination of toxic metal ions, in environmental samples, is difficult because of the latter's presence in trace concentration in association with complex matrices, thereby leading to insufficient sensi...The direct determination of toxic metal ions, in environmental samples, is difficult because of the latter's presence in trace concentration in association with complex matrices, thereby leading to insufficient sensitivity and selectivity of the methods used. The simultaneous removal of the matrix and preconcentration of the metal ions, through solid phase extraction,serves as the promising solution. The mechanism involved in solid phase extraction(SPE)depends on the nature of the sorbent and analyte. Thus, SPE is carried out by means of adsorption, ion exchange, chelation, ion pair formation, and so forth. As polymeric supports, the commercially available Amberlite resins have been found very promising for designing chelating matrices due to its good physical and chemical properties such as porosity, high surface area,durability and purity. This review presents an overview of the various works done on the modification of Amberlite XAD resins with the objective of making it an efficient sorbent. The methods of modifications which are generally based on simple impregnation, sorption as chelates and chemical bonding have been discussed. The reported results, including the preconcentration limit, the detection limit, sorption capacity, preconcentration factors etc., have been reproduced.展开更多
The purpose of this research is to study the effect of voids on the surface wave propagation in a layer of a transversely isotropic thermoelastic material with voids lying over an isotropic elastic half-space. The fre...The purpose of this research is to study the effect of voids on the surface wave propagation in a layer of a transversely isotropic thermoelastic material with voids lying over an isotropic elastic half-space. The frequency equation is derived after developing a mathematical model for welded and smooth contact boundary conditions. The dispersion curves giving the phase velocity and attenuation coefficient via wave number are plotted graphically to depict the effects of voids and anisotropy for welded contact boundary conditions. The specific loss and amplitudes of the volume fraction field, the normal stress, and the temperature change for welded contact are obtained and shown graphically for a particular model to depict the voids and anisotropy effects. Some special cases are also deduced from the present investigation.展开更多
The interactions of La( Ⅲ ), Pr( Ⅲ ), Nd( Ⅲ ), Sm( Ⅲ ), Eu(Ⅲ), Gd( Ⅲ ), Dy( Ⅲ ), and Yb( Ⅲ ) with cytosine, 5-bromocytosine, 5-azacytosine and 5-flurocytosine as primary ligands (L) and guani...The interactions of La( Ⅲ ), Pr( Ⅲ ), Nd( Ⅲ ), Sm( Ⅲ ), Eu(Ⅲ), Gd( Ⅲ ), Dy( Ⅲ ), and Yb( Ⅲ ) with cytosine, 5-bromocytosine, 5-azacytosine and 5-flurocytosine as primary ligands (L) and guanine (A) as secondary ligand for both binary ( 1 : 1 ) as well as ternary ( 1 : 1 : 1 ) systems were investigated by potentiometric equilibrium measurements at 25, 35 and 45 ℃ in aqueous solution (ionic strength, μ = 0.1 mol·dm^-3 NaNO3). The stability constants of the binary ( 1 : 1 ) and ternary ( 1 : 1 : 1 ) metal-ligand complexes follow the following order La 〈 Pr 〈 Nd 〈 Sm 〈 Eu 〉 Gd 〈 Dy 〉 Yb. Results also indicate that the ternary lanthanide complexes of La(Ⅲ), Pr(Ⅲ), Nd(Ⅲ), Sm(Ⅲ), Eu(Ⅲ), Gd(Ⅲ), Dy(Ⅲ), and Yb( Ⅲ ) are more stable than corresponding binary lanthanide complexes. The enthalpy (△Hf^o) and entropy (△Sf^o) changes for the formation of binary and ternary complexes were calculated from temperature coefficient data. The △△Sf^o values are positive for all the metal ligand systems. The negative △△Hf^o values indicate the extra stability of the ternary complexes by the exothermic enthalpy changes (△△Sf^o = △TSf^o - △BSf^o and △△Hf^o = △THf^o - △BHf^o where △TSf^o, △THf^o and △BSf^o, △BHf^o are the entropy and enthalpy values associated with the ternary and binary complexes, respectively). It was also proposed that the guanine is bonded to metal ions through N1/C6 = O and N7 whereas cytosine and its derivatives are bonded through N3 atoms in ternary complexes.展开更多
文摘Aim: To study the occurrence of Y chromosome microdeletions in azoospermic patients with Klinefelter's syndrome (KFS). Methods: Blood and semen samples were collected from azoospermic patients with KFS (n = 14) and a control group of men of proven fertility (n = 13). Semen analysis was done according to World Health Organization (WHO) guidelines. Blood samples were processed for karyotyping, fluorescent in situ hybridization (FISH) and measurement of plasma follicle stimulating hormone (FSH) by radioimmunoassay. To determine Y chromosome microdeletions, polymerase chain reaction (PCR) of 16 sequence tagged sites (STS) and three genes (DFFRY, XKRY and RBM1 Y) was performed on isolated genomic DNA. Testicular fine needle aspiration cytology (FNAC) was done in selected cases. Results: Y chromosome microdeletions spanning the azoospermia factor (AZF)a and AZFb loci were found in four of the 14 azoospermic patients with KFS. Karyotype and FISH analysis revealed that, of the four cases showing Y chromosome microdeletion, three cases had a 47,XXY/46,XY chromosomal pattern and one case had a 46,XY/47,XXY/48,XXXY/48,XXYY chromosomal pattern. The testicular FNAC of one sample with Y chromosome microdeletion revealed Sertoli cell-only type of morphology. However, no Y chromosome microdeletions were observed in any of the 13 fertile men. All patients with KFS had elevated plasma FSH levels. Conclusion: Patients with KFS may harbor Y chromosome microdeletions and screening for these should be a part of their diagnostic work-up, particularly in those considering assisted reproductive techniques. (Asian JAndrol 2006 Jan; 8: 81-88)
文摘Varicocele-associated male infertility has classically been managed using surgery or assisted reproductive techniques. With increasing evidence of oxidative stress as a pathophysiological factor in varicocele-associated infertility, medical therapy especially antioxidants might become a treatment option with lower risks. We reviewed the existing literature on the role of various medical agents in the management of male infertility attributed to varicoceles. Medical therapy is typically evaluated in three different situations such as (a) comparison of two drugs or one drug with placebo, (b) comparison of drugs versus surgery, and (c) comparison of drugs as adjuvant therapy with surgery versus drug therapy alone. Due to heterogeneity of data and lack of well-conducted studies, there is insufficient data to recommend routine use of medical therapy for men with varicocele-associated infertility and surgery remains the treatment of choice. Pregnancy and live birth rates are usually not reported in most studies and mere improvement in sperm parameters or antioxidant capacity is insufficient to support its routine use. Antioxidant therapy is a potential option due to its theoretical benefit, data from preclinical studies, and lack of major side effects. Adjuvant therapy with antioxidants after surgical repair of varicocele may improve the outcome and is a potential area for further research.
文摘Aim: To determine if Yq microdeletion frequency and loci of deletion are similar in two tissues (blood and sperm) of different embryological origin. Methods: The present study included 52 infertile oligozoospermic cases. In each case, DNA was isolated from blood and sperms and polymerase chain reaction (PCR) microdeletion analysis was done from genomic DNA isolated from both the tissues. The PCR products were analyzed on a 1.8% agarose gel. PCR amplifications found to be negative were repeated at least three times to confirm the deletion of a given marker. Results: Only 1 case harbored microdeletion in blood DNA, whereas 4 cases harbored microdeletion in sperm DNA. Conclusion: The frequency of Yq microdeletions is higher in germ cells as compared to blood. As the majority of infertile couples opt for assisted reproduction procreation techniques (ART), Yq microdeletion screening from germ cells is important to understand the genetic basis of infertility, to provide comprehensive counseling and most adapted therapeutics to the infertile couple.
基金funded by Grant No.12-INF2970-10 from the National Science,Technology and Innovation Plan(MAARIFAH)the King Abdul-Aziz City for Science and Technology(KACST)Kingdom of Saudi Arabia.
文摘Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the level of reliability is not the same as it should be.Therefore,further research into the most detailed mechanisms for evaluating and increasing software reliability is essential.A signicant aspect of growing the degree of reliable applications is the quantitative assessment of reliability.There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software.However,none of these mechanisms are useful for all kinds of failure datasets and applications.Hence nding the most optimal model for reliability prediction is an important concern.This paper suggests a novel method to substantially pick the best model of reliability prediction.This method is the combination of analytic hierarchy method(AHP),hesitant fuzzy(HF)sets and technique for order of preference by similarity to ideal solution(TOPSIS).In addition,using the different iterations of the process,procedural sensitivity was also performed to validate the ndings.The ndings of the software reliability prediction models prioritization will help the developers to estimate reliability prediction based on the software type.
基金Funding for this study was received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under the Grant No.IFPHI-264-611-2020.
文摘The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differences in human life,as well as is intended to have noticeable impact in many other domains in the forthcoming years.The rapid growth in blockchain technology has created numerous new possibilities for use,especially for healthcare applications.The digital healthcare services require highly effective security methodologies that can integrate data security with the availablemanagement strategies.To test and understand this goal of security management in Saudi Arabian perspective,the authors performed a numerical analysis and simulation through a multi criteria decision making approach in this study.The authors adopted the fuzzy Analytical Hierarchy Process(AHP)for evaluating the effectiveness and then applied the fuzzy Technique forOrder of Preference by Similarity to Ideal Solution(TOPSIS)technique to simulate the validation of results.For eliciting highly corroborative and conclusive results,the study referred to a real time project of diabetes patients’management application of Kingdom of Saudi Arabia(KSA).The results discussed in this paper are scientifically proven and validated through various analysis approaches.Hence the present study can be a credible basis for other similar endeavours being undertaken in the domain of blockchain research.
基金Funded by Research Section,All India Institute of Medical Sciences,New Delhi,India,File No.F.8-522/A-522/2017/RS(Project code No:A-522)Dated 19th September 2017
文摘Introduction:Optimal sound transmission across the ossicular chain is dependent on the appropriate alignment of the middle ear ossicles.Incudostapedial joint(ISJ)is conventionally considered to be at right angle.Objective:We intended to study the ISJ anatomy and the impact of temporal bone pneumatization on the same.Methods:In a cadaveric study comprising of 47 human temporal bones,canal wall down mastoidectomy was carried out under microscopic guidance keeping the ossicular chain intact.The morphology of ISJ was recorded and analysed with respect to the pneumatization status of the temporal bone.The data analysis was performed using statistical software Stata version 12.0.Results:The mean ISJ angle for the 47 bones was 90.5^0(SD-15^0;range:54^0-122^0).The mean angle in well pneumatized bones was 93.7^0(SD-16.5;Range:54°-122^0)and in sclerotic mastoids was 88.7^0(SD-14;Range:68°-118^0).The difference in the ISJ angle in these two conditions was not statistically significant(p=0.27).The mean angle was found to be significantly more obtuse in the cases with partially eroded ISJ(111.4^0{SD-8.8;range:100.3^0-221.9^0};p=0.0001)and in the cases with an‘adherent/tilted morphology’of the stapes suprastructure with the promontory(mean-95.8^0(SD-13.8;range:70.7^0-120.4^0);p-<0.00001).Conclusion:The ISJ angle shows considerable variations.This variability needs to be taken into account when undertaking middle ear reconstructive procedures,specifically the ones involving the stapes footplate.The mastoid pneumatization does not appear to have an impact on the ISJ angle.
基金Funding for this study is received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under Grant No.IFPHI-269-611-2020.
文摘Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability.
基金Funding for this study was received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under Grant No.IFPHI-286-611-2020.
文摘Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare.
文摘Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study has executed the forecastingmodel for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period.Towards this intent,the study analyzed different age groups of patients(child,adult,elderly)who were affected by COVID-19.The analysis was done city-wise and also included the number of recoveries recorded in different cities.Furthermore,the study also discusses the impact of COVID-19 on the economy.For conducting the stated analysis,the authors have created a list of factors that are known to cause the spread of COVID-19.As an effective countermeasure to contain the spread of Coronavirus in Saudi Arabia,this study also proposes to identify the most effective Computer Science technique that can be used by healthcare professionals.For this,the study employs the Fuzzy-Analytic Hierarchy Process integrated with the Technique for Order Performance by Similar to Ideal Solution(F.AHP.TOPSIS).After prioritizing the various Computer Science techniques,the ranking order that was obtained for the different techniques/tools to contain COVID-19 was:A4>A1>A2>A5>A3.Since the Blockchain technique obtained the highest priority,the study recommends that it must be used extensively as an efficacious and accurate means to combat COVID-19.
基金Funding for this study was received from the Ministry of Education andDeanship of Scientific Research at King Abdulaziz University, Kingdom of Saudi Arabia underthe Grant No. IFPHI-267-611-2020.
文摘Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus.Such enforced alienation affected both the mental and social condition of people significantly.Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement.However,COVID-19 brought all such communication to a grinding halt.Digital interactions have failed to enthuse the fervor that one enjoys in face-to-face meets.The pandemic has shoved the entire planet into an unstable state.The main focus and aim of the proposed study is to assess the impact of the pandemic on different aspects of the society in Saudi Arabia.To achieve this objective,the study analyzes two perspectives:the early approach,and the late approach of COVID-19 and the consequent effects on different aspects of the society.We used a Machine Learning based framework for the prediction of the impact of COVID-19 on the key aspects of society.Findings of this research study indicate that financial resources were the worst affected.Several countries are facing economic upheavals due to the pandemic and COVID-19 has had a considerable impact on the lives as well as the livelihoods of people.Yet the damage is not irretrievable and the world’s societies can emerge out of this setback through concerted efforts in all facets of life.
基金Funding for this study was granted by the King Abdul-Aziz City for Science and Technology(KACST),Kingdom of Saudi Arabia under the Grant Number:12-INF2970-10.
文摘The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices.
基金This research was supported by Taif University Researchers Supporting Project under the Grant No.TURSP-2020/211,Taif University,Taif,Saudi Arabia。
文摘The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare.Despite the phenomenal advancement in the present healthcare services,the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients’data.A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders.Various approaches and methods have been practiced by researchers to secure healthcare digital services.However,there are very few from the Machine learning(ML)domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records(EHRs).The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches.B.A.Kitchenham guidelines have been practiced as a manual to conduct this work.Seven well-known digital libraries namely IEEE Xplore,Science Direct,Springer Link,ACM Digital Library,Willey Online Library,PubMed(Medical and Bio-Science),and MDPI have been included to performan exhaustive search for the existing pertinent studies.Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion,yet the specified area has not been fully explored by the researchers.K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems’log data.Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies.This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively.Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion.
基金Supported by Department of Biotechnology(DBT),Government of India,No.1369
文摘AIM:To evaluate telomere length in sperm DNA and its correlation with oxidative stress(normal,mild,severe).METHODS:The study included infertile men(n=112)and age matched fertile controls(n=102).The average telomere length from the sperm DNA was measured using a quantitative real time PCR based assay.Seminal reactive oxygen species(ROS)and 8-Isoprostane(8-IP)levels were measured by chemiluminescence assay and ELISA respectively.RESULTS:Average sperm telomere length in infertile men and controls was 0.609±0.15 and 0.789±0.060,respectively(P<0.0001).Seminal ROS levels in infertile was higher[66.61±28.32 relative light units(RLU)/s/million sperm]than in controls(14.04±10.67RLU/s/million sperm)(P<0.0001).The 8-IP level in infertile men was significantly higher(421.55±131.29pg/mL)than in controls(275.94±48.13 pg/mL)(P<0.001).When correlated to oxidative stress,in normal range of oxidative stress(ROS,0-21.3 RLU/s/million sperm)the average telomere length in cases was 0.663±0.14,in mild oxidative stress(ROS,21.3-35 RLU/s/million sperm)it was elevated(0.684±0.12)and in severe oxidative stress(ROS>35 RLU/s/million sperm)average telomere length was decreased to 0.595±0.15.CONCLUSION:Mild oxidative stress results in lengthening of telomere length,but severe oxidative stress results in shorter telomeres.Although telomere maintenance is a complex trait,the study shows that mild oxidative stress is beneficial in telomere length maintenance and thus a delicate balance needs to be established to maximize the beneficial effects of free radicals and prevent harmful effects of supra physiological levels.Detailed molecular evaluation of telomere structure,its correlation with oxidative stress would aid in elucidating the cause of accelerated telomere length attrition.
文摘The oxidative dehydrogenation (ODH) of propane was conducted on gallium, aluminum, and chromium doped Si30VMgO catalysts. On doping, the concentrations of the phases responsible for the activity and selectivity increased in their concentrations. The reaction studies were conducted in a tubular steel reactor at temperatures of 753, 783, 813, and 843 K and atmospheric pressure. The total flow rates of the feed were chosen as 30, 40, 50, and 60 ml/min. The propane to oxygen ratios were chosen at 1 : 1, 2 : 1, and 3 : 1, respectively. The effect of various dopants on the activity and selectivity of the catalysts was studied. Deactivation studies were conducted over all the catalysts. The kinetic data were analyzed in terms of power law models and Langmuir-Hinshelwood (LH) models. The kinetic data results were analyzed by comparing the effect of dopants. Statistical model discrimination was done for the proposed models. AIC and BIC criteria were used for discrimination of the models.
基金Funding for this study was received fromthe Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under the Grant No.IFPHI-268-611-2020.
文摘Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues.It is crucial in offering a proactive security system in the field of cybersecurity.In real time,cybersecurity protects information,information systems,and networks from intruders.In the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches.At an increasing rate,intruders are breaching information security.Anomaly detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient clarifications.Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns.In a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action.The projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems.
基金This Project was funded by the Taif University Researchers Supporting Projects at Taif University,Kingdom of Saudi Arabia,under Grant Number:TURSP-2020/211.
文摘Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications.
基金Funding for this study was received from the Taif University Researchers Supporting Projects at Taif University,Kingdom of Saudi Arabia under Grant No.TURSP-2020/254.
文摘In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day consultancy services are aided by the use of multiple tools and techniques.However,ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically.Consultants usually tackle these functions after establishing the clients’needs and developing the appropriate strategy.Nevertheless,most of the consultants tend to focus more on the intended outcomes only and often ignore the security-specific issues.Our research study is an initiative to recommend the use of a hybrid computational technique based on fuzzy Analytical Hierarchy Process(AHP)and fuzzy Technique for Order Preference by Similarity to Ideal Solutions(TOPSIS)for prioritizing the tools and techniques that are used in consultancy services on the basis of their security features and efficacy.The empirical analysis conducted in this context shows that after implementing the assessment process,the rank of the tools and techniques obtained is:A7>A1>A4>A2>A3>A5>A6>A7,and General Electric McKinsey(GE-McKinsey)Nine-box Matrix(A7)obtained the highest rank.Thus,the outcomes show that this order of selection of the tools and techniques will give the most effective and secure services.The awareness about using the best tools and techniques in consultancy services is as important as selecting the most secure tool for solving a given problem.In this league,the results obtained in this study would be a conclusive and a reliable reference for the consultants.
基金the financial supports given to this work by Ministry of Higher Education (MOHE) Malaysia, project grant Q.J130000.2544.04H03Research Management Centre (RMC), Universiti Teknologi Malaysia (UTM.J.09.01/13.14/1/88J1d2 (49))
文摘The direct determination of toxic metal ions, in environmental samples, is difficult because of the latter's presence in trace concentration in association with complex matrices, thereby leading to insufficient sensitivity and selectivity of the methods used. The simultaneous removal of the matrix and preconcentration of the metal ions, through solid phase extraction,serves as the promising solution. The mechanism involved in solid phase extraction(SPE)depends on the nature of the sorbent and analyte. Thus, SPE is carried out by means of adsorption, ion exchange, chelation, ion pair formation, and so forth. As polymeric supports, the commercially available Amberlite resins have been found very promising for designing chelating matrices due to its good physical and chemical properties such as porosity, high surface area,durability and purity. This review presents an overview of the various works done on the modification of Amberlite XAD resins with the objective of making it an efficient sorbent. The methods of modifications which are generally based on simple impregnation, sorption as chelates and chemical bonding have been discussed. The reported results, including the preconcentration limit, the detection limit, sorption capacity, preconcentration factors etc., have been reproduced.
基金the Council of Scientific and Industrial Research (CSIR) for the financial support
文摘The purpose of this research is to study the effect of voids on the surface wave propagation in a layer of a transversely isotropic thermoelastic material with voids lying over an isotropic elastic half-space. The frequency equation is derived after developing a mathematical model for welded and smooth contact boundary conditions. The dispersion curves giving the phase velocity and attenuation coefficient via wave number are plotted graphically to depict the effects of voids and anisotropy for welded contact boundary conditions. The specific loss and amplitudes of the volume fraction field, the normal stress, and the temperature change for welded contact are obtained and shown graphically for a particular model to depict the voids and anisotropy effects. Some special cases are also deduced from the present investigation.
基金Project supported by UGC, New Delhi ,in the formof a major research scheme (12-107/2001(SR-I))
文摘The interactions of La( Ⅲ ), Pr( Ⅲ ), Nd( Ⅲ ), Sm( Ⅲ ), Eu(Ⅲ), Gd( Ⅲ ), Dy( Ⅲ ), and Yb( Ⅲ ) with cytosine, 5-bromocytosine, 5-azacytosine and 5-flurocytosine as primary ligands (L) and guanine (A) as secondary ligand for both binary ( 1 : 1 ) as well as ternary ( 1 : 1 : 1 ) systems were investigated by potentiometric equilibrium measurements at 25, 35 and 45 ℃ in aqueous solution (ionic strength, μ = 0.1 mol·dm^-3 NaNO3). The stability constants of the binary ( 1 : 1 ) and ternary ( 1 : 1 : 1 ) metal-ligand complexes follow the following order La 〈 Pr 〈 Nd 〈 Sm 〈 Eu 〉 Gd 〈 Dy 〉 Yb. Results also indicate that the ternary lanthanide complexes of La(Ⅲ), Pr(Ⅲ), Nd(Ⅲ), Sm(Ⅲ), Eu(Ⅲ), Gd(Ⅲ), Dy(Ⅲ), and Yb( Ⅲ ) are more stable than corresponding binary lanthanide complexes. The enthalpy (△Hf^o) and entropy (△Sf^o) changes for the formation of binary and ternary complexes were calculated from temperature coefficient data. The △△Sf^o values are positive for all the metal ligand systems. The negative △△Hf^o values indicate the extra stability of the ternary complexes by the exothermic enthalpy changes (△△Sf^o = △TSf^o - △BSf^o and △△Hf^o = △THf^o - △BHf^o where △TSf^o, △THf^o and △BSf^o, △BHf^o are the entropy and enthalpy values associated with the ternary and binary complexes, respectively). It was also proposed that the guanine is bonded to metal ions through N1/C6 = O and N7 whereas cytosine and its derivatives are bonded through N3 atoms in ternary complexes.