期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
Resilient TCP Variant Enabling Smooth Network Updates for Software-Defined Data Center Networks
1
作者 Abdul Basit Dogar Sami Ullah +3 位作者 Yiran Zhang Hisham Alasmary muhammad waqas Sheng Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第5期1615-1632,共18页
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not ... Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow rerouting.In this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration.We look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a solution.Simulations are used to assess the proposed NUFTCP.Our findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably. 展开更多
关键词 software defined data center networks network updates DCTCP out-of-order packets packet drop SDN
原文传递
The Impact of Domain Name Server(DNS)over Hypertext Transfer Protocol Secure(HTTPS)on Cyber Security:Limitations,Challenges,and Detection Techniques
2
作者 muhammad Dawood Shanshan Tu +4 位作者 Chuangbai Xiao muhammad Haris Hisham Alasmary muhammad waqas Sadaqat Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2024年第9期4513-4542,共30页
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of end-users.However,the adoption of DoH is still facing several research cha... The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of end-users.However,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user awareness.DoH significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security measures.Therefore,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user privacy.This paper provides an in-depth analysis of the effects of DoH on cybersecurity.We discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security studies.Overall,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security. 展开更多
关键词 DNS DNS over HTTPS CYBERSECURITY machine learning
下载PDF
Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network
3
作者 Yilei Wang Xin Sun +4 位作者 Guiping Zheng Ahmar Rashid Sami Ullah Hisham Alasmary muhammad waqas 《Computers, Materials & Continua》 SCIE EI 2024年第3期3909-3927,共19页
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e... The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field. 展开更多
关键词 IIoT trusted measure energy efficient
下载PDF
Single crystal growth and electronic structure of Rh-doped Sr_(3)Ir_(2)O_(7)
4
作者 王冰倩 彭舒婷 +10 位作者 欧志鹏 王宇晨 muhammad waqas 罗洋 魏志远 淮琳崴 沈建昌 缪宇 孙秀鹏 殷月伟 何俊峰 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期86-90,共5页
Ruddlesden-Popper iridate Sr_(3)Ir_(2)O_(7)is a spin-orbit coupled Mott insulator.Hole doped Sr_(3)Ir_(2)O_(7)provides an ideal platform to study the exotic quantum phenomena that occur near the metal-insulator transi... Ruddlesden-Popper iridate Sr_(3)Ir_(2)O_(7)is a spin-orbit coupled Mott insulator.Hole doped Sr_(3)Ir_(2)O_(7)provides an ideal platform to study the exotic quantum phenomena that occur near the metal-insulator transition(MIT)region.Rh substitution of Ir is an effective method to induce hole doping into Sr_(3)Ir_(2)O_(7).However,the highest doping level reported in Sr_(3)(Ir_(1-x)Rh_(x))_(2)O_(7)single crystals was only around 3%,which is far from the MIT region.In this paper,we report the successful growth of single crystals of Sr3(Ir_(1-x)Rh_(x))_(2)O_(7)with a doping level of~9%.The samples have been fully characterized,demonstrating the high quality of the single crystals.Transport measurements have been carried out,confirming the tendency of MIT in these samples.The electronic structure has also been examined by angle-resolved photoemission spectroscopy(ARPES)measurements.Our results establish a platform to investigate the heavily hole doped Sr_(3)Ir_(2)O_(7) compound,which also provide new insights into the MIT with hole doping in this material system. 展开更多
关键词 hole doped iridate single crystal growth metal-insulator transition angle-resolved photoemission spectroscopy(ARPES)
下载PDF
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
5
作者 Yongjie Yang Shanshan Tu +3 位作者 Raja Hashim Ali Hisham Alasmary muhammad waqas muhammad Nouman Amjad 《Computers, Materials & Continua》 SCIE EI 2023年第1期801-815,共15页
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing capabili... With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing capabilities.Cloud computing has traditionally played an important role in establishing IoT.However,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic distribution.However,IoT networks are vulnerable to unwanted assaults because of their open and shared nature.As a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available.In this study,we examined the time-related aspects of network traffic data.We presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset.We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score. 展开更多
关键词 Fog computing intrusion detection bi-LSTM attention mechanism
下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
6
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman muhammad waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
下载PDF
New strategy of S,N co‐doping of conductive‐copolymer‐derived carbon nanotubes to effectively improve the dispersion of PtCu nanocrystals for boosting the electrocatalytic oxidation of methanol 被引量:2
7
作者 Jingping Zhong Kexin Huang +6 位作者 Wentao Xu Huaguo Tang muhammad waqas Youjun Fan Ruixiang Wang Wei Chen Yixuan Wang 《Chinese Journal of Catalysis》 SCIE EI CAS CSCD 2021年第7期1205-1215,共11页
Efficacious regulation of the geometric and electronic structures of carbon nanomaterials via the introduction of defects and their synergy is essential to achieving good electrochemical performance.However,the guidel... Efficacious regulation of the geometric and electronic structures of carbon nanomaterials via the introduction of defects and their synergy is essential to achieving good electrochemical performance.However,the guidelines for designing hybrid materials with advantageous structures and the fundamental understanding of their electrocatalytic mechanisms remain unclear.Herein,superfine Pt and PtCu nanoparticles supported by novel S,N‐co‐doped multi‐walled CNT(MWCNTs)were prepared through the innovative pyrolysis of a poly(3,4‐ethylenedioxythiophene)/polyaniline copolymer as a source of S and N.The uniform wrapping of the copolymer around the MWCNTs provides a high density of evenly distributed defects on the surface after the pyrolysis treatment,facilitating the uniform distribution of ultrafine Pt and PtCu nanoparticles.Remarkably,the Pt_(1)Cu_(2)/SN‐MWCNTs show an obviously larger electroactive surface area and higher mass activity,stability,and CO poisoning resistance in methanol oxidation compared to Pt/SN‐MWCNTs,Pt/S‐MWCNTs,Pt/N‐MWCNTs,and commercial Pt/C.Density functional theory studies confirm that the co‐doping of S and N considerably deforms the CNTs and polarizes the adjacent C atoms.Consequently,both the adsorption of Pt1Cu2 onto the SN‐MWCNTs and the subsequent adsorption of methanol are enhanced;in addition,the catalytic activity of Pt_(1)Cu_(2)/SN‐MWCNTs for methanol oxidation is thermodynamically and kinetically more favorable than that of its CNT and N‐CNT counterparts.This work provides a novel method to fabricate high‐performance fuel cell electrocatalysts with highly dispersed and stable Pt‐based nanoparticles on a carbon substrate. 展开更多
关键词 Methanol oxidation Conductive copolymers Dual‐doped carbon nanotubes Pt‐based nanoparticles DFT calculation
下载PDF
Evaluation of Humic Acid Application Methods for Yield and Yield Components of Mungbean 被引量:8
8
作者 muhammad waqas Bashir Ahmad +6 位作者 muhammad Arif Fazal Munsif Abdul Latif Khan muhammad Amin Sang-Mo Kang Yoon-Ha Kim In-Jung Lee 《American Journal of Plant Sciences》 2014年第15期2269-2276,共8页
A triplicate field experiment laid out in randomized complete block design was conducted to evaluate different humic acid (HA) application methods at Agricultural Research Farm, of KPK Agricultural University, Peshawa... A triplicate field experiment laid out in randomized complete block design was conducted to evaluate different humic acid (HA) application methods at Agricultural Research Farm, of KPK Agricultural University, Peshawar. Three methods of HA application: seed priming, foliar spray and soil application were included in the experiment. Humic acid application methods significantly affected pods plant-1, grains pod-1, 1000 grain weights, and grain yield whereas biological yield was not significantly affected by HA application methods. Humic acid application at the rate of 3 kg&middotha-1 resulted in higher number of pods plant-1, thousand grain weights and grain yield, however it was statistically similar to the treatments where HA was soil applied at rate of 1 and 2 kg&middotha-1, seed priming with 0% (water soaked), 1%, 2% HA solution and foliar spray with 0.01%, 0.05% and 0.1% of HA solution. It is concluded that HA application in all the three methods significantly enhances grain yield and yield components of mungbean. 展开更多
关键词 MUNGBEAN HUMIC Acid SEED PRIMING FOLIAR Spray Soil Application Yield
下载PDF
An Efficient Impersonation Attack Detection Method in Fog Computing 被引量:3
9
作者 Jialin Wan muhammad waqas +4 位作者 Shanshan Tu Syed Mudassir Hussain Ahsan Shah Sadaqat Ur Rehman muhammad Hanif 《Computers, Materials & Continua》 SCIE EI 2021年第7期267-281,共15页
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t... Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER). 展开更多
关键词 Fog computing double Sarsa attack detection physical layer key security
下载PDF
Effective(kinetic freeze-out) temperature, transverse flow velocity, and kinetic freeze-out volume in high energy collisions 被引量:2
10
作者 muhammad waqas Fu-Hu Liu +1 位作者 Li-Li Li Haidar Mas’ud Alfanda 《Nuclear Science and Techniques》 SCIE CAS CSCD 2020年第11期36-49,共14页
The transverse momentum spectra of different types of particles produced in central and peripheral gold–gold(Au–Au)and inelastic proton–proton(pp)collisions at the Relativistic Heavy Ion Collider,as well as in cent... The transverse momentum spectra of different types of particles produced in central and peripheral gold–gold(Au–Au)and inelastic proton–proton(pp)collisions at the Relativistic Heavy Ion Collider,as well as in central and peripheral lead-lead(Pb–Pb)and pp collisions at the Large Hadron Collider,are analyzed by the multi-component standard(Boltzmann–Gibbs,Fermi–Dirac,and Bose–Einstein)distributions.The obtained results from the standard distribution give an approximate agreement with the measured experimental data by the STAR,PHENIX,and ALICE Collaborations.The behavior of the effective(kinetic freeze-out)temperature,transverse flow velocity,and kinetic freeze-out volume for particles with different masses is obtained,which observes the early kinetic freezeout of heavier particles as compared to the lighter particles.The parameters of emissions of different particles are observed to be different,which reveals a direct signature of the mass-dependent differential kinetic freeze-out.It is also observed that the peripheral nucleus–nucleus(AA)and pp collisions at the same center-of-mass energy per nucleon pair are in good agreement in terms of the extracted parameters. 展开更多
关键词 Transverse momentum spectra Effective temperature Kinetic freeze-out temperature Transverse flow velocity Kinetic freeze-out volume
下载PDF
Authentication of Vehicles and Road Side Units in Intelligent Transportation System 被引量:3
11
作者 muhammad waqas Shanshan Tu +5 位作者 Sadaqat Ur Rehman Zahid Halim Sajid Anwar Ghulam Abbas Ziaul Haq Abbas Obaid Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2020年第7期359-371,共13页
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and ... Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and governments.Smart and autonomous vehicles are connected wirelessly,which are more attracted for attackers due to the open nature of wireless communication.One of the problems is the rogue attack,in which the attacker pretends to be a legitimate user or access point by utilizing fake identity.To figure out the problem of a rogue attack,we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state information of the communication link.We consider the communication link between vehicle-to-vehicle,and vehicle-to-infrastructure.We evaluate the performance of our proposed technique by measuring the rogue attack probability,false alarm rate(FAR),mis-detection rate(MDR),and utility function of a receiver based on the test threshold values of reinforcement learning algorithm.The results show that the FAR and MDR are decreased significantly by selecting an appropriate threshold value in order to improve the receiver’s utility. 展开更多
关键词 Intelligent transportation system AUTHENTICATION rogue attack
下载PDF
Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications 被引量:1
12
作者 muhammad waqas Shehr Bano +3 位作者 Fatima Hassan Shanshan Tu Ghulam Abbas Ziaul Haq Abbas 《Computers, Materials & Continua》 SCIE EI 2022年第12期4489-4499,共11页
Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between... Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies.Due to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and impersonation.Existing methods use physical layer authentication(PLA),themost promising solution to detect cyber-attacks.Still,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency target.These methods perform well but only in stationary scenarios.We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios.The features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify data.The authentication of the received signal is considered a binary classification problem.The transmitted data is labeled as legitimate information,and spoofing data is illegitimate information.Therefore,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks.It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile.The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time. 展开更多
关键词 Physical layer authentication machine learning cyber-physical systems SECURITY
下载PDF
Power Allocation Strategy for Secret Key Generation Method in Wireless Communications 被引量:1
13
作者 Bin Zhang muhammad waqas +2 位作者 Shanshan Tu Syed Mudassir Hussain Sadaqat Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2021年第8期2179-2188,共10页
Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wirele... Secret key generation(SKG)is an emerging technology to secure wireless communication from attackers.Therefore,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’uncertainty.However,the physical layer secret key generation(PHY-SKG)depends on two fundamental parameters,i.e.,coherence time and power allocation.The coherence time for PHY-SKG is not applicable to secure wireless channels.This is because coherence time is for a certain period of time.Thus,legitimate users generate the secret keys(SKs)with a shorter key length in size.Hence,an attacker can quickly get information about the SKs.Consequently,the attacker can easily get valuable information from authentic users.Therefore,we considered the scheme of power allocation to enhance the secret key generation rate(SKGR)between legitimate users.Hence,we propose an alternative method,i.e.,a power allocation,to improve the SKGR.Our results show 72%higher SKGR in bits/sec by increasing power transmission.In addition,the power transmission is based on two important parameters,i.e.,epsilon and power loss factor,as given in power transmission equations.We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR.The SKGR is approximately 40.7%greater at 250 from 50 mW at epsilon=1.The value of SKGR is reduced to 18.5%at 250 mW when epsilonis 0.5.Furthermore,the transmission power is also measured against the different power loss factor values,i.e.,3.5,3,and 2.5,respectively,at epsilon=0.5.Hence,it is concluded that the value of epsilon and power loss factor impacts power transmission and,consequently,impacts the SKGR. 展开更多
关键词 Secret key generation rate power allocation physical layer wireless communication
下载PDF
Fine-grained Ship Image Recognition Based on BCNN with Inception and AM-Softmax
14
作者 Zhilin Zhang Ting Zhang +4 位作者 Zhaoying Liu Peijie Zhang Shanshan Tu Yujian Li muhammad waqas 《Computers, Materials & Continua》 SCIE EI 2022年第10期1527-1539,共13页
The fine-grained ship image recognition task aims to identify various classes of ships.However,small inter-class,large intra-class differences between ships,and lacking of training samples are the reasons that make th... The fine-grained ship image recognition task aims to identify various classes of ships.However,small inter-class,large intra-class differences between ships,and lacking of training samples are the reasons that make the task difficult.Therefore,to enhance the accuracy of the fine-grained ship image recognition,we design a fine-grained ship image recognition network based on bilinear convolutional neural network(BCNN)with Inception and additive margin Softmax(AM-Softmax).This network improves the BCNN in two aspects.Firstly,by introducing Inception branches to the BCNN network,it is helpful to enhance the ability of extracting comprehensive features from ships.Secondly,by adding margin values to the decision boundary,the AM-Softmax function can better extend the inter-class differences and reduce the intra-class differences.In addition,as there are few publicly available datasets for fine-grained ship image recognition,we construct a Ship-43 dataset containing 47,300 ship images belonging to 43 categories.Experimental results on the constructed Ship-43 dataset demonstrate that our method can effectively improve the accuracy of ship image recognition,which is 4.08%higher than the BCNN model.Moreover,comparison results on the other three public fine-grained datasets(Cub,Cars,and Aircraft)further validate the effectiveness of the proposed method. 展开更多
关键词 Fine-grained ship image recognition INCEPTION AM-softmax BCNN
下载PDF
A Framework of Lightweight Deep Cross-Connected Convolution Kernel Mapping Support Vector Machines
15
作者 Qi Wang Zhaoying Liu +3 位作者 Ting Zhang Shanshan Tu Yujian Li muhammad waqas 《Journal on Artificial Intelligence》 2022年第1期37-48,共12页
Deep kernel mapping support vector machines have achieved good results in numerous tasks by mapping features from a low-dimensional space to a high-dimensional space and then using support vector machines for classifi... Deep kernel mapping support vector machines have achieved good results in numerous tasks by mapping features from a low-dimensional space to a high-dimensional space and then using support vector machines for classification.However,the depth kernel mapping support vector machine does not take into account the connection of different dimensional spaces and increases the model parameters.To further improve the recognition capability of deep kernel mapping support vector machines while reducing the number of model parameters,this paper proposes a framework of Lightweight Deep Convolutional Cross-Connected Kernel Mapping Support Vector Machines(LC-CKMSVM).The framework consists of a feature extraction module and a classification module.The feature extraction module first maps the data from low-dimensional to high-dimensional space by fusing the representations of different dimensional spaces through cross-connections;then,it uses depthwise separable convolution to replace part of the original convolution to reduce the number of parameters in the module;The classification module uses a soft margin support vector machine for classification.The results on 6 different visual datasets show that LC-CKMSVM obtains better classification accuracies on most cases than the other five models. 展开更多
关键词 Convolutional neural network cross-connected lightweight framework depthwise separable convolution
下载PDF
Extraction and antibacterial potential of traditional medicinal plant Cypreus compressus
16
作者 Amir Hassan Shahzeb +1 位作者 muhammad waqas Nawaz Khan 《TMR Modern Herbal Medicine》 CAS 2021年第3期63-72,共10页
Plants are naturally occurring sources of drugs and can be used to minimize the problem of curing diseases up to the greater extent;for that purpose,we select a medicinal plant named Cypreus compressus.The extract is ... Plants are naturally occurring sources of drugs and can be used to minimize the problem of curing diseases up to the greater extent;for that purpose,we select a medicinal plant named Cypreus compressus.The extract is taken in the ethanol solvent.The crude extract of this medicinal plant is taken in Erlenmeyer flask tapped with a cotton pad.The crude extract is diluted to different concentrations in order to check the antibacterial activity at different concentrations of crude.The main aim of our work is to determine the antibacterial sensitivity test of Cypreus compressus against two types of bacteria i.e.,E.coli and S.aureus.Among all the different concentrations,the most significant was 20 mg for both types of bacteria i.e.,E.coli and S.aureus showing the greater zone of inhibition among all other concentrations that may use as an antibacterial agent in the future. 展开更多
关键词 Cypreus compressus EXTRACTION Antibacterial activity Microbes
下载PDF
Multiplicity dependence of the freezeout parameters in high energy hadron-hadron collisions 被引量:1
17
作者 muhammad Ajaz Majid Shehzad +7 位作者 muhammad waqas Haifa I.Alrebdi Mohammad Ayaz Ahmad Antalov Jagnandan Shawn Jagnandan Murad Badshah Jalal Hasan Baker Abdul Mosawir Quraishi 《Chinese Physics C》 SCIE CAS CSCD 2024年第5期124-133,共10页
We examined the transverse momentum(pT)spectra of various identified particles,encompassing both light-flavored and strange hadrons(π++π−,K++K−,p+p¯,ϕ,K0s,Λ+Λ¯,Ξ−+Ξ¯+,andΩ−+Ω¯+),across diff... We examined the transverse momentum(pT)spectra of various identified particles,encompassing both light-flavored and strange hadrons(π++π−,K++K−,p+p¯,ϕ,K0s,Λ+Λ¯,Ξ−+Ξ¯+,andΩ−+Ω¯+),across different multiplicity classes in proton-proton collisions(p-p)at a center-of-mass energy of s√=7 TeV.Utilizing the Tsallis and Hagedorn models,parameters relevant to the bulk properties of nuclear matter were extracted.Both models exhibit good agreement with experimental data.In our analyses,we observed a consistent decrease in the effective temperature(T)for the Tsallis model and the kinetic or thermal freeze-out temperature(T0)for the Hagedorn model,as we transitioned from higher multiplicity(class-I)to lower multiplicity(class-X).This trend is attributed to the diminished energy transfer in higher multiplicity classes.Additionally,we observed that the transverse flow velocity(βT)experiences a decline from class-I to class-X.The normalization constant,which represents the multiplicity of produced particles,was observed to decrease as we moved toward higher multiplicity classes.While the effective and kinetic freeze-out temperatures,as well as the transverse flow velocity,show a mild dependency on multiplicity for lighter particles,this dependency becomes more pronounced for heavier particles.The multiplicity parameter for heavier particles was observed to be smaller than that of lighter particles,indicating a greater abundance of lighter hadrons compared to heavier ones.Various particle species were observed to undergo decoupling from the fireball at distinct temperatures:lighter particles exhibit lower temperatures,while heavier ones show higher temperatures,thereby supporting the concept of multiple freeze-out scenarios.Moreover,we identified a positive correlation between the kinetic freeze-out temperature and transverse flow velocity,a scenario where particles experience stronger collective motion at a higher freeze-out temperature.The reason for this positive correlation is that,as the multiplicity increases,more energy is transferred into the system.This increased energy causes greater excitation and pressure within the system,leading to a quick expansion. 展开更多
关键词 multiplicity dependence collective properties thermal energy
原文传递
Comparative analysis of jet and underlying event properties across various models as a function of charged particle multiplicity at 7 TeV
18
作者 Maryam Waqar Haifa I.Alrebdi +2 位作者 muhammad waqas K.S.Al-mugren muhammad Ajaz 《Chinese Physics C》 SCIE CAS CSCD 2024年第9期118-125,共8页
In this study,a comprehensive analysis of jets and underlying events as a function of charged particle multiplicity in proton-proton(pp)collisions at a center-of-mass energy of √s=7 TeV is conducted.Various Monte Car... In this study,a comprehensive analysis of jets and underlying events as a function of charged particle multiplicity in proton-proton(pp)collisions at a center-of-mass energy of √s=7 TeV is conducted.Various Monte Carlo(MC)event generators,including Pythia8.308,EPOS 1.99,EPOSLHC,EPOS4_(Hydro),and EPOS4_(noHydro),are employed to predict particle production.The predictions from these models are compared with experimental data from the CMS collaboration.The charged particles are categorized into those associated with underlying events and those linked to jets,and the analysis is restricted to charged particles with|η|<2.4 and p_T>0.25 GeV/c.By comparing the MC predictions with CMS data,we find that EPOS4_(Hydro),EPOSLHC,and Pythia8 consistently reproduce the experimental results for all charged particles,underlying events,intrajets,and leading charged particles.For charged jet rates with p_T^(ch.jet)>5 GeV/c,EPOS4_(Hydro)and Pythia8 perform exceptionally well.In the case of charged jet rates with p_T^(ch.jet)→30 GeV/c,EPOSLHC reproduces satisfactorily good results,whereas EPOS4 Hydro exhibits good agreement with the data at higher charged particle multiplicities compared to the other models.This can be attributed to the conversion of energy into flow when"Hydro=on"leading to an increase in multiplicity.The EPOSLHC model describes the data better owing to the new collective flow effects,correlated flow treatment,and parameterization compared to EPOS 1.99.However,the examination of the jet p_T spectrum and normalized charged p_T density reveals that EPOS4_(Hydro),EPOS4_(noHydro),and EPOSLHC exhibit good agreement with the experimental results,whereas Pythia8 and EPOS 1.99 do not perform as well owing to the lack of correlated flow treatment. 展开更多
关键词 Monte Carlo models underlying event jets charged particle multiplicity
原文传递
Design and Synthesis of NiO@Co_(3)O_(4)@ZSM-5 Heterogeneous Multitask Hollow Structures for Tandem Catalysis
19
作者 muhammad waqas 《Chemical Research in Chinese Universities》 SCIE CAS CSCD 2024年第3期529-535,共7页
Precipitation and impregnation procedures unevenly distribute metals on zeolite,limiting chemical transformation in Lewis-acid,Brönsted-acid and metal-catalyzed tandem reactions.Although,heterogeneous multitask t... Precipitation and impregnation procedures unevenly distribute metals on zeolite,limiting chemical transformation in Lewis-acid,Brönsted-acid and metal-catalyzed tandem reactions.Although,heterogeneous multitask transition metals oxides@zeolites are promising catalysts for sustainable processes;nevertheless,synthesis is fascinating and complex.Herein,the construction of purposely designed multitask materials segregated in selective shells reveals the remarkable spatial organization of metals-zeolite,resulting in them being suitable for a wide range of tandem reactions.The synthesis of multi-site catalysts begins with a universal wet chemistry approach that yields nickel oxide(NiO)crystals.Then,the NiO crystals are stabilized using cationic dodecyltrimethylammonium bromide,followed by achieving cross-linking carbon growth by emulsion polymerization of glucose in hydrothermal treatment to yield uniformed NiO@carbon spheres(NiO@CSs).Next,sequential adsorption of cobalt cations and colloidal ZSM-5(1%in H_(2)O,mass fraction),followed by calcination in air,yielded NiO@cobalt oxide@zeolite denoted as NiO@Co_(3)O_(4)@ZEO hollow spheres.The hollowing mechanism and materials segregation within shells are revealed by scanning and transmission electron microscopy,thermogravimetric analysis,and X-ray diffraction.The finding advances the rational synthesis of heterogenous core-shell hollow structures for various gas phase catalytic tandem reactions to yield valuable chemicals. 展开更多
关键词 MULTIFUNCTIONAL Core-shell hollow spheres Gas-phase reaction Valuable chemical
原文传递
JUNO sensitivity on proton decay p→νK^(+)searches 被引量:1
20
作者 Angel Abusleme Thomas Adam +608 位作者 Shakeel Ahmad Rizwan Ahmed Sebastiano Aiello muhammad Akram 安丰鹏 安琪 Giuseppe Andronico Nikolay Anfimov Vito Antonelli Tatiana Antoshkina Burin Asavapibhop João Pedro Athayde Marcondes de André Didier Auguste Nikita Balashov Wander Baldini Andrea Barresi Davide Basilico Eric Baussan Marco Bellato Antonio Bergnoli Thilo Birkenfeld Sylvie Blin David Blum Simon Blyth Anastasia Bolshakova Mathieu Bongrand Clément Bordereau Dominique Breton Augusto Brigatti Riccardo Brugnera Riccardo Bruno Antonio Budano Mario Buscemi Jose Busto Ilya Butorov Anatael Cabrera Barbara Caccianiga 蔡浩 蔡啸 蔡严克 蔡志岩 Riccardo Callegari Antonio Cammi Agustin Campeny 曹传亚 曹国富 曹俊 Rossella Caruso Cédric Cerna 常劲帆 Yun Chang 陈平平 Po-An Chen 陈少敏 陈旭荣 Yi-Wen Chen 陈义学 陈羽 陈长 程捷 程雅苹 Alexey Chetverikov Davide Chiesa Pietro Chimenti Artem Chukanov Gérard Claverie Catia Clementi Barbara Clerbaux Selma Conforti Di Lorenzo Daniele Corti Flavio Dal Corso Olivia Dalager Christophe De La Taille 邓智 邓子艳 Wilfried Depnering Marco Diaz Xuefeng Ding 丁雅韵 Bayu Dirgantara Sergey Dmitrievsky Tadeas Dohnal Dmitry Dolzhikov Georgy Donchenko 董建蒙 Evgeny Doroshkevich Marcos Dracos Frédéric Druillole 杜然 杜书先 Stefano Dusini Martin Dvorak Timo Enqvist Heike Enzmann Andrea Fabbri Ulrike Fahrendholz 范东华 樊磊 方建 方文兴 Marco Fargetta Dmitry Fedoseev Li-Cheng Feng 冯启春 Richard Ford Amélie Fournier 甘浩男 Feng Gao Alberto Garfagnini Arsenii Gavrikov Marco Giammarchi Agnese Giaz Nunzio Giudice Maxim Gonchar 龚光华 宫辉 Yuri Gornushkin Alexandre Göttel Marco Grassi Christian Grewing Vasily Gromov 顾旻皓 谷肖飞 古宇 关梦云 Nunzio Guardone Maria Gul 郭聪 郭竞渊 郭万磊 郭新恒 郭宇航 Paul Hackspacher Caren Hagner 韩然 Yang Han muhammad Sohaib Hassan 何苗 何伟 Tobias Heinz Patrick Hellmuth 衡月昆 Rafael Herrera 贺远强 侯少静 Yee Hsiung Bei-Zhen Hu 胡航 胡健润 胡俊 胡守扬 胡涛 胡宇翔 胡焯钧 黄春豪 黄桂鸿 黄翰雄 黄文昊 黄鑫 黄性涛 黄永波 惠加琪 霍雷 霍文驹 Cédric Huss Safeer Hussain Ara Ioannisian Roberto Isocrate Beatrice Jelmini Kuo-Lun Jen Ignacio Jeria 季筱璐 吉星曌 贾慧慧 贾俊基 蹇司玉 蒋荻 蒋炜 江晓山 金如意 荆小平 Cécile Jollet Jari Joutsenvaara Sirichok Jungthawan Leonidas Kalousis Philipp Kampmann 康丽 Rebin Karaparambil Narine Kazarian Amina Khatun Khanchai Khosonthongkee Denis Korablev Konstantin Kouzakov Alexey Krasnoperov Andre Kruth Nikolay Kutovskiy Pasi Kuusiniemi Tobias Lachenmaier Cecilia Landini Sébastien Leblanc Victor Lebrin Frederic Lefevre 雷瑞庭 Rupert Leitner Jason Leung 李德民 李飞 李福乐 李高嵩 李海涛 李慧玲 李佳褀 李梦朝 李民 李楠 李楠 李清江 李茹慧 黎山峰 李涛 李卫东 李卫国 李笑梅 李小男 李兴隆 李仪 李依宸 李玉峰 李兆涵 李志兵 李紫源 梁浩 梁昊 廖佳军 Daniel Liebau Ayut Limphirat Sukit Limpijumnong Guey-Lin Lin 林盛鑫 林韬 凌家杰 Ivano Lippi 刘芳 刘海东 刘宏邦 刘红娟 刘洪涛 刘绘 刘江来 刘金昌 刘敏 刘倩 刘钦 Runxuan Liu 刘双雨 刘树彬 刘术林 刘小伟 刘熙文 刘言 刘云哲 Alexey Lokhov Paolo Lombardi Claudio Lombardo Kai Loo 陆川 路浩奇 陆景彬 吕军光 路书祥 卢晓旭 Bayarto Lubsandorzhiev Sultim Lubsandorzhiev Livia Ludhova Arslan Lukanov 罗凤蛟 罗光 罗朋威 罗舒 罗武鸣 Vladimir Lyashuk 马帮争 马秋梅 马斯 马骁妍 马续波 Jihane Maalmi Yury Malyshkin Roberto Carlos Mandujano Fabio Mantovani Francesco Manzali 冒鑫 冒亚军 Stefano M.Mari Filippo Marini Sadia Marium Cristina Martellini Gisele Martin-Chassard Agnese Martini Matthias Mayer Davit Mayilyan Ints Mednieks 孟月 Anselmo Meregaglia Emanuela Meroni David Meyhöfer Mauro Mezzetto Jonathan Miller Lino Miramonti Paolo Montini Michele Montuschi Axel Müller Massimiliano Nastasi Dmitry V.Naumov Elena Naumova Diana Navas-Nicolas Igor Nemchenok Minh Thuan Nguyen Thi 宁飞鹏 宁哲 Hiroshi Nunokawa Lothar Oberauer Juan Pedro Ochoa-Ricoux Alexander Olshevskiy Domizia Orestano Fausto Ortica Rainer Othegraven Alessandro Paoloni Sergio Parmeggiano 裴亚田 Nicomede Pelliccia 彭安国 彭海平 Frédéric Perrot Pierre-Alexandre Petitjean Fabrizio Petrucci Oliver Pilarczyk Luis Felipe Piñeres Rico Artyom Popov Pascal Poussot Wathan Pratumwan Ezio Previtali 齐法制 祁鸣 钱森 钱小辉 钱圳 乔浩 秦中华 丘寿康 muhammad Usman Rajput Gioacchino Ranucci Neill Raper Alessandra Re Henning Rebber Abdel Rebii 任斌 任杰 Barbara Ricci Mariam Rifai Markus Robens Mathieu Roche Narongkiat Rodphai Aldo Romani Bedřich Roskovec Christian Roth 阮向东 阮锡超 Saroj Rujirawat Arseniy Rybnikov Andrey Sadovsky Paolo Saggese Simone Sanfilippo Anut Sangka Nuanwan Sanguansak Utane Sawangwit Julia Sawatzki Fatma Sawy Michaela Schever Cédric Schwab Konstantin Schweizer Alexandr Selyunin Andrea Serafini Giulio Settanta Mariangela Settimo 邵壮 Vladislav Sharov Arina Shaydurova 石京燕 史娅楠 Vitaly Shutov Andrey Sidorenkov FedorŠimkovic Chiara Sirignano Jaruchit Siripak Monica Sisti Maciej Slupecki Mikhail Smirnov Oleg Smirnov Thiago Sogo-Bezerra Sergey Sokolov Julanan Songwadhana Boonrucksar Soonthornthum Albert Sotnikov OndřejŠrámek Warintorn Sreethawong Achim Stahl Luca Stanco Konstantin Stankevich DušanŠtefánik Hans Steiger Jochen Steinmann Tobias Sterr Matthias Raphael Stock Virginia Strati Alexander Studenikin 孙世峰 孙希磊 孙勇杰 孙永昭 Narumon Suwonjandee Michal Szelezniak 唐健 唐强 唐泉 唐晓 Alexander Tietzsch Igor Tkachev Tomas Tmej Marco Danilo Claudio Torri Konstantin Treskov Andrea Triossi Giancarlo Troni Wladyslaw Trzaska Cristina Tuve Nikita Ushakov Johannes van den Boom Stefan van Waasen Guillaume Vanroyen Vadim Vedin Giuseppe Verde Maxim Vialkov Benoit Viaud Cornelius Moritz Vollbrecht Cristina Volpe Vit Vorobel Dmitriy Voronin Lucia Votano Pablo Walker 王彩申 Chung-Hsiang Wang 王恩 王国利 王坚 王俊 王坤宇 汪璐 王美芬 王孟 王萌 王瑞光 王思广 王维 王为 王文帅 王玺 王湘粤 王仰夫 王耀光 王义 王忆 王贻芳 王元清 王玉漫 王喆 王铮 王志民 王综轶 muhammad waqas Apimook Watcharangkool 韦良红 魏微 韦雯露 魏亚东 温凯乐 温良剑 Christopher Wiebusch Steven Chan-Fai Wong Bjoern Wonsak 吴帝儒 吴群 吴智 Michael Wurm Jacques Wurtz Christian Wysotzki 习宇飞 夏冬梅 Xiang Xiao 谢小川 谢宇广 谢章权 邢志忠 续本达 徐程 徐东莲 徐繁荣 许杭锟 徐吉磊 徐晶 徐美杭 徐音Yu Xu 闫保军 Taylor Yan 闫文奇 严雄波 Yupeng Yan 杨安波 杨长根 杨成峰 杨欢 杨洁 杨雷 杨晓宇 杨翊凡 Yifan Yang 姚海峰 Zafar Yasin 叶佳璇 叶梅 叶子平 Ugur Yegin Frédéric Yermia 易培淮 尹娜 尹翔伟 尤郑昀 俞伯祥 余炽业 喻纯旭 余泓钊 于淼 于向辉 于泽源 于泽众 袁成卓 袁影 袁振雄 岳保彪 Noman Zafar Andre Zambanini Vitalii Zavadskyi 曾珊 曾婷轩 曾裕达 占亮 张爱强 张飞洋 张国庆 张海琼 张宏浩 张家梁 张家文 张杰 张金 张景波 张金楠 张鹏 张清民 张石其 张澍 张涛 张晓梅 张鑫 张玄同 张学尧 张岩 张银鸿 张易于 张永鹏 张宇 张圆圆 张玉美 张振宇 张志坚 赵凤仪 赵洁 赵荣 赵书俊 赵天池 郑冬琴 郑华 郑阳恒 钟伟荣 周静 周莉 周楠 周顺 周彤 周详 朱江 朱康甫 朱科军 朱志航 庄博 庄红林 宗亮 邹佳恒 JUNO Collaboration 《Chinese Physics C》 SCIE CAS CSCD 2023年第11期7-22,共16页
The Jiangmen Underground Neutrino Observatory(JUNO)is a large liquid scintillator detector designed to explore many topics in fundamental physics.In this study,the potential of searching for proton decay in the p→νK... The Jiangmen Underground Neutrino Observatory(JUNO)is a large liquid scintillator detector designed to explore many topics in fundamental physics.In this study,the potential of searching for proton decay in the p→νK^(+)mode with JUNO is investigated.The kaon and its decay particles feature a clear three-fold coincidence signature that results in a high efficiency for identification.Moreover,the excellent energy resolution of JUNO permits suppression of the sizable background caused by other delayed signals.Based on these advantages,the detection efficiency for the proton decay via p→νK^(+)is 36.9%±4.9%with a background level of 0.2±0.05(syst)±0.2(stat)events after 10 years of data collection.The estimated sensitivity based on 200 kton-years of exposure is 9.6×1033 years,which is competitive with the current best limits on the proton lifetime in this channel and complements the use of different detection technologies. 展开更多
关键词 proton decay grand unified theories JUNO liquid scintillator detector
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部