期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
Y chromosome microdeletions in azoospermic patients with Klinefelter's syndrome 被引量:9
1
作者 Anurag Mitra Rima Dada +3 位作者 rajeev kumar Narmada Prasad Gupta Kiran Kucheria Satish kumar Gupta 《Asian Journal of Andrology》 SCIE CAS CSCD 2006年第1期81-88,共8页
Aim: To study the occurrence of Y chromosome microdeletions in azoospermic patients with Klinefelter's syndrome (KFS). Methods: Blood and semen samples were collected from azoospermic patients with KFS (n = 14)... Aim: To study the occurrence of Y chromosome microdeletions in azoospermic patients with Klinefelter's syndrome (KFS). Methods: Blood and semen samples were collected from azoospermic patients with KFS (n = 14) and a control group of men of proven fertility (n = 13). Semen analysis was done according to World Health Organization (WHO) guidelines. Blood samples were processed for karyotyping, fluorescent in situ hybridization (FISH) and measurement of plasma follicle stimulating hormone (FSH) by radioimmunoassay. To determine Y chromosome microdeletions, polymerase chain reaction (PCR) of 16 sequence tagged sites (STS) and three genes (DFFRY, XKRY and RBM1 Y) was performed on isolated genomic DNA. Testicular fine needle aspiration cytology (FNAC) was done in selected cases. Results: Y chromosome microdeletions spanning the azoospermia factor (AZF)a and AZFb loci were found in four of the 14 azoospermic patients with KFS. Karyotype and FISH analysis revealed that, of the four cases showing Y chromosome microdeletion, three cases had a 47,XXY/46,XY chromosomal pattern and one case had a 46,XY/47,XXY/48,XXXY/48,XXYY chromosomal pattern. The testicular FNAC of one sample with Y chromosome microdeletion revealed Sertoli cell-only type of morphology. However, no Y chromosome microdeletions were observed in any of the 13 fertile men. All patients with KFS had elevated plasma FSH levels. Conclusion: Patients with KFS may harbor Y chromosome microdeletions and screening for these should be a part of their diagnostic work-up, particularly in those considering assisted reproductive techniques. (Asian JAndrol 2006 Jan; 8: 81-88) 展开更多
关键词 AZOOSPERMIA azoospermia factor follicle stimulating hormone Klinefelter's syndrome Y chromosome MICRODELETION
暂未订购
An update on the role of medical treatment including antioxidant therapy in varicocele 被引量:11
2
作者 Harshit Garg rajeev kumar 《Asian Journal of Andrology》 SCIE CAS CSCD 2016年第2期222-228,J0004,共8页
Varicocele-associated male infertility has classically been managed using surgery or assisted reproductive techniques. With increasing evidence of oxidative stress as a pathophysiological factor in varicocele-associat... Varicocele-associated male infertility has classically been managed using surgery or assisted reproductive techniques. With increasing evidence of oxidative stress as a pathophysiological factor in varicocele-associated infertility, medical therapy especially antioxidants might become a treatment option with lower risks. We reviewed the existing literature on the role of various medical agents in the management of male infertility attributed to varicoceles. Medical therapy is typically evaluated in three different situations such as (a) comparison of two drugs or one drug with placebo, (b) comparison of drugs versus surgery, and (c) comparison of drugs as adjuvant therapy with surgery versus drug therapy alone. Due to heterogeneity of data and lack of well-conducted studies, there is insufficient data to recommend routine use of medical therapy for men with varicocele-associated infertility and surgery remains the treatment of choice. Pregnancy and live birth rates are usually not reported in most studies and mere improvement in sperm parameters or antioxidant capacity is insufficient to support its routine use. Antioxidant therapy is a potential option due to its theoretical benefit, data from preclinical studies, and lack of major side effects. Adjuvant therapy with antioxidants after surgical repair of varicocele may improve the outcome and is a potential area for further research. 展开更多
关键词 antioxidant therapy drug therapy male infertility VARICOCELE
原文传递
Higher frequency of Yq microdeletions in sperm DNA as compared to DNA isolated from blood 被引量:7
3
作者 Rima Dada Rakesh kumar +5 位作者 M. B. Shamsi rajeev kumar Kiran Kucheria Raj K. Sharma Satish K. Gupta Narmada P. Gupta 《Asian Journal of Andrology》 SCIE CAS CSCD 2007年第5期720-722,共3页
Aim: To determine if Yq microdeletion frequency and loci of deletion are similar in two tissues (blood and sperm) of different embryological origin. Methods: The present study included 52 infertile oligozoospermic... Aim: To determine if Yq microdeletion frequency and loci of deletion are similar in two tissues (blood and sperm) of different embryological origin. Methods: The present study included 52 infertile oligozoospermic cases. In each case, DNA was isolated from blood and sperms and polymerase chain reaction (PCR) microdeletion analysis was done from genomic DNA isolated from both the tissues. The PCR products were analyzed on a 1.8% agarose gel. PCR amplifications found to be negative were repeated at least three times to confirm the deletion of a given marker. Results: Only 1 case harbored microdeletion in blood DNA, whereas 4 cases harbored microdeletion in sperm DNA. Conclusion: The frequency of Yq microdeletions is higher in germ cells as compared to blood. As the majority of infertile couples opt for assisted reproduction procreation techniques (ART), Yq microdeletion screening from germ cells is important to understand the genetic basis of infertility, to provide comprehensive counseling and most adapted therapeutics to the infertile couple. 展开更多
关键词 assisted reproductive techniques INFERTILITY SEMEN genomic DNA Yq screening
暂未订购
Evaluating the Impact of Prediction Techniques: Software Reliability Perspective 被引量:8
4
作者 Kavita Sahu Fahad A.Alzahrani +1 位作者 R.K.Srivastava rajeev kumar 《Computers, Materials & Continua》 SCIE EI 2021年第5期1471-1488,共18页
Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the ... Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the level of reliability is not the same as it should be.Therefore,further research into the most detailed mechanisms for evaluating and increasing software reliability is essential.A signicant aspect of growing the degree of reliable applications is the quantitative assessment of reliability.There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software.However,none of these mechanisms are useful for all kinds of failure datasets and applications.Hence nding the most optimal model for reliability prediction is an important concern.This paper suggests a novel method to substantially pick the best model of reliability prediction.This method is the combination of analytic hierarchy method(AHP),hesitant fuzzy(HF)sets and technique for order of preference by similarity to ideal solution(TOPSIS).In addition,using the different iterations of the process,procedural sensitivity was also performed to validate the ndings.The ndings of the software reliability prediction models prioritization will help the developers to estimate reliability prediction based on the software type. 展开更多
关键词 Software reliability reliability prediction prediction techniques hesitant-fuzzy-AHP hesitant-fuzzy-TOPSIS
在线阅读 下载PDF
Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique 被引量:5
5
作者 Asif Irshad Khan Abdullah Saad Al-Malaise ALGhamdi +6 位作者 Fawaz Jaber Alsolami Yoosef B.Abushark Abdulmohsen Almalawi Abdullah Marish Ali Alka Agrawal rajeev kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2835-2860,共26页
The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differ... The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differences in human life,as well as is intended to have noticeable impact in many other domains in the forthcoming years.The rapid growth in blockchain technology has created numerous new possibilities for use,especially for healthcare applications.The digital healthcare services require highly effective security methodologies that can integrate data security with the availablemanagement strategies.To test and understand this goal of security management in Saudi Arabian perspective,the authors performed a numerical analysis and simulation through a multi criteria decision making approach in this study.The authors adopted the fuzzy Analytical Hierarchy Process(AHP)for evaluating the effectiveness and then applied the fuzzy Technique forOrder of Preference by Similarity to Ideal Solution(TOPSIS)technique to simulate the validation of results.For eliciting highly corroborative and conclusive results,the study referred to a real time project of diabetes patients’management application of Kingdom of Saudi Arabia(KSA).The results discussed in this paper are scientifically proven and validated through various analysis approaches.Hence the present study can be a credible basis for other similar endeavours being undertaken in the domain of blockchain research. 展开更多
关键词 Blockchain technology data management fuzzy logic AHP TOPSIS
在线阅读 下载PDF
Study of morphologic variability of incudostapedial angle and its relation with temporal bone pneumatization 被引量:5
6
作者 Anup Singh David Victor kumar Irugu +3 位作者 rajeev kumar Hitesh Verma Anandita Gupta Abha kumari 《Journal of Otology》 CSCD 2020年第2期50-53,共4页
Introduction:Optimal sound transmission across the ossicular chain is dependent on the appropriate alignment of the middle ear ossicles.Incudostapedial joint(ISJ)is conventionally considered to be at right angle.Objec... Introduction:Optimal sound transmission across the ossicular chain is dependent on the appropriate alignment of the middle ear ossicles.Incudostapedial joint(ISJ)is conventionally considered to be at right angle.Objective:We intended to study the ISJ anatomy and the impact of temporal bone pneumatization on the same.Methods:In a cadaveric study comprising of 47 human temporal bones,canal wall down mastoidectomy was carried out under microscopic guidance keeping the ossicular chain intact.The morphology of ISJ was recorded and analysed with respect to the pneumatization status of the temporal bone.The data analysis was performed using statistical software Stata version 12.0.Results:The mean ISJ angle for the 47 bones was 90.5^0(SD-15^0;range:54^0-122^0).The mean angle in well pneumatized bones was 93.7^0(SD-16.5;Range:54°-122^0)and in sclerotic mastoids was 88.7^0(SD-14;Range:68°-118^0).The difference in the ISJ angle in these two conditions was not statistically significant(p=0.27).The mean angle was found to be significantly more obtuse in the cases with partially eroded ISJ(111.4^0{SD-8.8;range:100.3^0-221.9^0};p=0.0001)and in the cases with an‘adherent/tilted morphology’of the stapes suprastructure with the promontory(mean-95.8^0(SD-13.8;range:70.7^0-120.4^0);p-<0.00001).Conclusion:The ISJ angle shows considerable variations.This variability needs to be taken into account when undertaking middle ear reconstructive procedures,specifically the ones involving the stapes footplate.The mastoid pneumatization does not appear to have an impact on the ISJ angle. 展开更多
关键词 HUMAN Ear ossicles Anatomic variation Stapes surgery
暂未订购
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective 被引量:3
7
作者 Yoosef BAbushark Asif Irshad Khan +5 位作者 Fawaz Jaber Alsolami Abdulmohsen Almalawi Md Mottahir Alam Alka Agrawal rajeev kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第7期1203-1218,共16页
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,framew... Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability. 展开更多
关键词 Security requirements engineering cyber-security USABILITY fuzzy logic MCDM
在线阅读 下载PDF
Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment 被引量:3
8
作者 Ahmed S.Alfakeeh Abdulmohsen Almalawi +6 位作者 Fawaz Jaber Alsolami Yoosef B.Abushark Asif Irshad Khan Adel Aboud S.Bahaddad Alka Agrawal rajeev kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2297-2317,共21页
Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost imp... Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare. 展开更多
关键词 Web applications security risk security durability hesitantbased decision-making approach
在线阅读 下载PDF
Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia 被引量:2
9
作者 Abdulaziz Attaallah Masood Ahmad +3 位作者 Adil Hussain Seh Alka Agrawal rajeev kumar Raees Ahmad Khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期419-436,共18页
Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study h... Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study has executed the forecastingmodel for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period.Towards this intent,the study analyzed different age groups of patients(child,adult,elderly)who were affected by COVID-19.The analysis was done city-wise and also included the number of recoveries recorded in different cities.Furthermore,the study also discusses the impact of COVID-19 on the economy.For conducting the stated analysis,the authors have created a list of factors that are known to cause the spread of COVID-19.As an effective countermeasure to contain the spread of Coronavirus in Saudi Arabia,this study also proposes to identify the most effective Computer Science technique that can be used by healthcare professionals.For this,the study employs the Fuzzy-Analytic Hierarchy Process integrated with the Technique for Order Performance by Similar to Ideal Solution(F.AHP.TOPSIS).After prioritizing the various Computer Science techniques,the ranking order that was obtained for the different techniques/tools to contain COVID-19 was:A4>A1>A2>A5>A3.Since the Blockchain technique obtained the highest priority,the study recommends that it must be used extensively as an efficacious and accurate means to combat COVID-19. 展开更多
关键词 CORONAVIRUS social impact safety precautions fuzzy-AHP.TOPSIS block-chain technique COVID-19 monitoring
在线阅读 下载PDF
Impact Assessment of COVID-19 Pandemic Through Machine Learning Models 被引量:2
10
作者 Fawaz Jaber Alsolami Abdullah Saad Al-Malaise ALGhamdi +6 位作者 Asif Irshad Khan Yoosef B.Abushark Abdulmohsen Almalawi Farrukh Saleem Alka Agrawal rajeev kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第9期2895-2912,共18页
Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were ... Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus.Such enforced alienation affected both the mental and social condition of people significantly.Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement.However,COVID-19 brought all such communication to a grinding halt.Digital interactions have failed to enthuse the fervor that one enjoys in face-to-face meets.The pandemic has shoved the entire planet into an unstable state.The main focus and aim of the proposed study is to assess the impact of the pandemic on different aspects of the society in Saudi Arabia.To achieve this objective,the study analyzes two perspectives:the early approach,and the late approach of COVID-19 and the consequent effects on different aspects of the society.We used a Machine Learning based framework for the prediction of the impact of COVID-19 on the key aspects of society.Findings of this research study indicate that financial resources were the worst affected.Several countries are facing economic upheavals due to the pandemic and COVID-19 has had a considerable impact on the lives as well as the livelihoods of people.Yet the damage is not irretrievable and the world’s societies can emerge out of this setback through concerted efforts in all facets of life. 展开更多
关键词 CORONAVIRUS social impact safety COVID-19 monitoring machine learning framework fuzzy AHP-TOPSIS
在线阅读 下载PDF
Integrity Assessment of Medical Devices for Improving Hospital Services 被引量:3
11
作者 Fahad A.Alzahrani Masood Ahmad +2 位作者 Mohd Nadeem rajeev kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第6期3619-3633,共15页
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended obj... The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices. 展开更多
关键词 Integrity of the medical devices fuzzy-ANP.TOPSIS security assessment
暂未订购
An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records 被引量:2
12
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Alka Agrawal Nitish Pathak rajeev kumar Raees Ahmad Khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1387-1422,共36页
The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated ... The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare.Despite the phenomenal advancement in the present healthcare services,the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients’data.A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders.Various approaches and methods have been practiced by researchers to secure healthcare digital services.However,there are very few from the Machine learning(ML)domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records(EHRs).The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches.B.A.Kitchenham guidelines have been practiced as a manual to conduct this work.Seven well-known digital libraries namely IEEE Xplore,Science Direct,Springer Link,ACM Digital Library,Willey Online Library,PubMed(Medical and Bio-Science),and MDPI have been included to performan exhaustive search for the existing pertinent studies.Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion,yet the specified area has not been fully explored by the researchers.K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems’log data.Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies.This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively.Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion. 展开更多
关键词 EHRs healthcare machine learning systematic analysis
在线阅读 下载PDF
Mild oxidative stress is beneficial for sperm telomere length maintenance 被引量:5
13
作者 Swetasmita Mishra rajeev kumar +2 位作者 Neena Malhotra Neeta Singh Rima Dada 《World Journal of Methodology》 2016年第2期163-170,共8页
AIM:To evaluate telomere length in sperm DNA and its correlation with oxidative stress(normal,mild,severe).METHODS:The study included infertile men(n=112)and age matched fertile controls(n=102).The average telomere le... AIM:To evaluate telomere length in sperm DNA and its correlation with oxidative stress(normal,mild,severe).METHODS:The study included infertile men(n=112)and age matched fertile controls(n=102).The average telomere length from the sperm DNA was measured using a quantitative real time PCR based assay.Seminal reactive oxygen species(ROS)and 8-Isoprostane(8-IP)levels were measured by chemiluminescence assay and ELISA respectively.RESULTS:Average sperm telomere length in infertile men and controls was 0.609±0.15 and 0.789±0.060,respectively(P<0.0001).Seminal ROS levels in infertile was higher[66.61±28.32 relative light units(RLU)/s/million sperm]than in controls(14.04±10.67RLU/s/million sperm)(P<0.0001).The 8-IP level in infertile men was significantly higher(421.55±131.29pg/mL)than in controls(275.94±48.13 pg/mL)(P<0.001).When correlated to oxidative stress,in normal range of oxidative stress(ROS,0-21.3 RLU/s/million sperm)the average telomere length in cases was 0.663±0.14,in mild oxidative stress(ROS,21.3-35 RLU/s/million sperm)it was elevated(0.684±0.12)and in severe oxidative stress(ROS>35 RLU/s/million sperm)average telomere length was decreased to 0.595±0.15.CONCLUSION:Mild oxidative stress results in lengthening of telomere length,but severe oxidative stress results in shorter telomeres.Although telomere maintenance is a complex trait,the study shows that mild oxidative stress is beneficial in telomere length maintenance and thus a delicate balance needs to be established to maximize the beneficial effects of free radicals and prevent harmful effects of supra physiological levels.Detailed molecular evaluation of telomere structure,its correlation with oxidative stress would aid in elucidating the cause of accelerated telomere length attrition. 展开更多
关键词 TELOMERE Oxidative stress Reactive oxygen species INFERTILITY 8-Isoprostane
在线阅读 下载PDF
Effect of gallium, aluminium, and chromium on silica supported V-Mg-O catalysts during oxidative dehydrogenation of propane: Kinetic study 被引量:1
14
作者 B.Ravi kumar rajeev kumar 《Journal of Natural Gas Chemistry》 EI CAS CSCD 2008年第3期256-263,共8页
The oxidative dehydrogenation (ODH) of propane was conducted on gallium, aluminum, and chromium doped Si30VMgO catalysts. On doping, the concentrations of the phases responsible for the activity and selectivity incr... The oxidative dehydrogenation (ODH) of propane was conducted on gallium, aluminum, and chromium doped Si30VMgO catalysts. On doping, the concentrations of the phases responsible for the activity and selectivity increased in their concentrations. The reaction studies were conducted in a tubular steel reactor at temperatures of 753, 783, 813, and 843 K and atmospheric pressure. The total flow rates of the feed were chosen as 30, 40, 50, and 60 ml/min. The propane to oxygen ratios were chosen at 1 : 1, 2 : 1, and 3 : 1, respectively. The effect of various dopants on the activity and selectivity of the catalysts was studied. Deactivation studies were conducted over all the catalysts. The kinetic data were analyzed in terms of power law models and Langmuir-Hinshelwood (LH) models. The kinetic data results were analyzed by comparing the effect of dopants. Statistical model discrimination was done for the proposed models. AIC and BIC criteria were used for discrimination of the models. 展开更多
关键词 oxidative dehydrogenation PROPANE GALLIUM ALUMINUM CHROMIUM KINETIC
在线阅读 下载PDF
Cyber Security Analysis and Evaluation for Intrusion Detection Systems 被引量:1
15
作者 Yoosef B.Abushark Asif Irshad Khan +5 位作者 Fawaz Alsolami Abdulmohsen Almalawi Md Mottahir Alam Alka Agrawal rajeev kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第7期1765-1783,共19页
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches a... Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues.It is crucial in offering a proactive security system in the field of cybersecurity.In real time,cybersecurity protects information,information systems,and networks from intruders.In the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches.At an increasing rate,intruders are breaching information security.Anomaly detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient clarifications.Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns.In a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action.The projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems. 展开更多
关键词 CYBERSECURITY machine learning AHP-TOPSIS fuzzy logic intrusion detection systems
在线阅读 下载PDF
Hybrid Computational Modeling for Web Application Security Assessment 被引量:1
16
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Md Tarique Jamal Ansari rajeev kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期469-489,共21页
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so... Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 展开更多
关键词 Healthcare web application security assessment hesitant fuzzy sets AHP-TOPSIS
在线阅读 下载PDF
Impact of Tools and Techniques for Securing Consultancy Services 被引量:1
17
作者 Wael Alosaimi Abdullah Alharbi +4 位作者 Hashem Alyami Masood Ahmad Abhishek kumar Pandey rajeev kumar Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期347-360,共14页
In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day ... In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day consultancy services are aided by the use of multiple tools and techniques.However,ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically.Consultants usually tackle these functions after establishing the clients’needs and developing the appropriate strategy.Nevertheless,most of the consultants tend to focus more on the intended outcomes only and often ignore the security-specific issues.Our research study is an initiative to recommend the use of a hybrid computational technique based on fuzzy Analytical Hierarchy Process(AHP)and fuzzy Technique for Order Preference by Similarity to Ideal Solutions(TOPSIS)for prioritizing the tools and techniques that are used in consultancy services on the basis of their security features and efficacy.The empirical analysis conducted in this context shows that after implementing the assessment process,the rank of the tools and techniques obtained is:A7>A1>A4>A2>A3>A5>A6>A7,and General Electric McKinsey(GE-McKinsey)Nine-box Matrix(A7)obtained the highest rank.Thus,the outcomes show that this order of selection of the tools and techniques will give the most effective and secure services.The awareness about using the best tools and techniques in consultancy services is as important as selecting the most secure tool for solving a given problem.In this league,the results obtained in this study would be a conclusive and a reliable reference for the consultants. 展开更多
关键词 Consultancy services fuzzy AHP fuzzy TOPSIS consultancy tools and techniques security evaluation
在线阅读 下载PDF
New generation Amberlite XAD resin for the removal of metal ions: A review 被引量:1
18
作者 Akil Ahmad Jamal Akhter Siddique +4 位作者 Mohammad Asaduddin Laskar rajeev kumar Siti Hamidah Mohd-Setapar Asma Khatoon Rayees Ahmad Shiekh 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2015年第5期104-123,共20页
The direct determination of toxic metal ions, in environmental samples, is difficult because of the latter's presence in trace concentration in association with complex matrices, thereby leading to insufficient sensi... The direct determination of toxic metal ions, in environmental samples, is difficult because of the latter's presence in trace concentration in association with complex matrices, thereby leading to insufficient sensitivity and selectivity of the methods used. The simultaneous removal of the matrix and preconcentration of the metal ions, through solid phase extraction,serves as the promising solution. The mechanism involved in solid phase extraction(SPE)depends on the nature of the sorbent and analyte. Thus, SPE is carried out by means of adsorption, ion exchange, chelation, ion pair formation, and so forth. As polymeric supports, the commercially available Amberlite resins have been found very promising for designing chelating matrices due to its good physical and chemical properties such as porosity, high surface area,durability and purity. This review presents an overview of the various works done on the modification of Amberlite XAD resins with the objective of making it an efficient sorbent. The methods of modifications which are generally based on simple impregnation, sorption as chelates and chemical bonding have been discussed. The reported results, including the preconcentration limit, the detection limit, sorption capacity, preconcentration factors etc., have been reproduced. 展开更多
关键词 Amberlite XAD Toxic metals Chelating resin Preconcentration Sorption capacity
原文传递
Propagation of wave at the boundary surface of transversely isotropic thermoelastic material with voids and isotropic elastic half-space
19
作者 Rajneesh kumar rajeev kumar 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2010年第9期1153-1172,共20页
The purpose of this research is to study the effect of voids on the surface wave propagation in a layer of a transversely isotropic thermoelastic material with voids lying over an isotropic elastic half-space. The fre... The purpose of this research is to study the effect of voids on the surface wave propagation in a layer of a transversely isotropic thermoelastic material with voids lying over an isotropic elastic half-space. The frequency equation is derived after developing a mathematical model for welded and smooth contact boundary conditions. The dispersion curves giving the phase velocity and attenuation coefficient via wave number are plotted graphically to depict the effects of voids and anisotropy for welded contact boundary conditions. The specific loss and amplitudes of the volume fraction field, the normal stress, and the temperature change for welded contact are obtained and shown graphically for a particular model to depict the voids and anisotropy effects. Some special cases are also deduced from the present investigation. 展开更多
关键词 propagation of wave transverse isotropy thermoelastic with voids isotropic elastic half-spaze phase velocity attenuation coefficient
在线阅读 下载PDF
Solution and Thermodynamic Studies on Binary and Ternary Complexes of Lanthanides
20
作者 rajeev kumar Udai P Singh 《Journal of Rare Earths》 SCIE EI CAS CSCD 2005年第4期389-396,共8页
The interactions of La( Ⅲ ), Pr( Ⅲ ), Nd( Ⅲ ), Sm( Ⅲ ), Eu(Ⅲ), Gd( Ⅲ ), Dy( Ⅲ ), and Yb( Ⅲ ) with cytosine, 5-bromocytosine, 5-azacytosine and 5-flurocytosine as primary ligands (L) and guani... The interactions of La( Ⅲ ), Pr( Ⅲ ), Nd( Ⅲ ), Sm( Ⅲ ), Eu(Ⅲ), Gd( Ⅲ ), Dy( Ⅲ ), and Yb( Ⅲ ) with cytosine, 5-bromocytosine, 5-azacytosine and 5-flurocytosine as primary ligands (L) and guanine (A) as secondary ligand for both binary ( 1 : 1 ) as well as ternary ( 1 : 1 : 1 ) systems were investigated by potentiometric equilibrium measurements at 25, 35 and 45 ℃ in aqueous solution (ionic strength, μ = 0.1 mol·dm^-3 NaNO3). The stability constants of the binary ( 1 : 1 ) and ternary ( 1 : 1 : 1 ) metal-ligand complexes follow the following order La 〈 Pr 〈 Nd 〈 Sm 〈 Eu 〉 Gd 〈 Dy 〉 Yb. Results also indicate that the ternary lanthanide complexes of La(Ⅲ), Pr(Ⅲ), Nd(Ⅲ), Sm(Ⅲ), Eu(Ⅲ), Gd(Ⅲ), Dy(Ⅲ), and Yb( Ⅲ ) are more stable than corresponding binary lanthanide complexes. The enthalpy (△Hf^o) and entropy (△Sf^o) changes for the formation of binary and ternary complexes were calculated from temperature coefficient data. The △△Sf^o values are positive for all the metal ligand systems. The negative △△Hf^o values indicate the extra stability of the ternary complexes by the exothermic enthalpy changes (△△Sf^o = △TSf^o - △BSf^o and △△Hf^o = △THf^o - △BHf^o where △TSf^o, △THf^o and △BSf^o, △BHf^o are the entropy and enthalpy values associated with the ternary and binary complexes, respectively). It was also proposed that the guanine is bonded to metal ions through N1/C6 = O and N7 whereas cytosine and its derivatives are bonded through N3 atoms in ternary complexes. 展开更多
关键词 LANTHANIDE solution studies CYTOSINE thermodynamic properties rare earths
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部