期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Prevention and treatment of hypoxia-induced colorectal cancer damage in albino Wister rats
1
作者 Ishrat Jahan Manju Pandey +3 位作者 Shalini Pal Bushra Jabi Mohd Yaqub Khan Gaurav Kaithwas 《Life Research》 2024年第1期16-23,共8页
Background:In the early metastasis of colon cancer,cancer cells detach,migrate,and infiltrate surrounding tissues,including lymph vessels and blood vessels.Tumor heterogeneity arises from both tumor cells and distinct... Background:In the early metastasis of colon cancer,cancer cells detach,migrate,and infiltrate surrounding tissues,including lymph vessels and blood vessels.Tumor heterogeneity arises from both tumor cells and distinct microenvironments.Maldistribution of blood vessels,creates hypoxic regions within the tumors,fostering cancer stem cell-like properties due to reduced oxygen and nutrient supply.Under hypoxia,tumor cells shift to a glycolytic pathway,producing more lactic acid that acidifies the microenvironment and leads to unstable heart rate variability(HRV)factors,weight disparity,and a higher incidence of aberrant crypt foci(ACF).These hypoxic-induced parameters promote cancer cell invasion,increase radiation resistance,and facilitate cancer cell migration.Methods:In this study,we induced hypoxia-preneoplastic colon damage in albino Wister rats by administrating 1,2-dimethyl hydrazine(DMH).After successfully creating a hypoxic environment in albino Wister rats,resulting in preneoplastic colon damage,we randomly allocated Wistar albino rats into seven groups,each containing 8 animals,and conducted a 6-week study.Group 1-Normal control(administered 1 mM EDTA+saline,2 ml/kg/day,p.o.);group 2-Toxic control(administered DMH,30 mg/kg/week,s.c.);group 3-Standard treatment(DMH,30 mg/kg/week,s.c.for 6 weeks),followed by 5-fluorouracil and Leucovorin(25 mg/kg each on 1^(st),3^(rd),7^(th),and 10^(th) days,i.p.after 6 weeks administration of DMH);group 4-Low dose of P1(DMH,30 mg/kg/week,s.c.+P1,2 mg/kg,i.v.,weekly for 3 weeks);group 5-High dose P1(DMH,30 mg/kg/week,s.c.+P1,4 mg/kg,i.v.,weekly for 3 weeks),group 6-Low dose of P2(DMH,30 mg/kg/week,s.c.,+P2,2 mg/kg,i.v.,weekly for 3 weeks),group 7-High dose of P2(DMH,30 mg/kg/week,s.c.,+P2,4 mg/kg,i.v.weekly for 3 weeks).Results:DMH-treated rats exhibited alterations in HRV factors,weight disparity,elevated gastric pH,increased total acidity,a higher incidence of ACF,and changes in antioxidant markers(TBARs,SOD,catalase,GSH).Brightfield microscopy at 40x magnification revealed the presence of large crypts within aberrant crypt foci in the toxic control group.Conclusion:Treatment groups P1 and P2 containing triazine derivatives initiated proteasomal degradation of Hypoxia Inducible Factor-1α(HIF-1α)by activating Prolyl Hydroxylase(PHDs)pathways.HIF-1αunder a hypoxic environment is responsible for activating a multitude of genes involved in angiogenesis,metastasis,invasiveness,pH changes,metabolic reprogramming,stem cell maintenance,resistance to radiation,and downstream regulation of the immune system.Treatment with P1 and P2 groups helped minimize the ACF count and restored HRV factors,weight disparity,pH levels,total acidity,and oxidative balance.Our findings emphasize the potential role of 1,2,4-triazine derivatives in suppressing hypoxia-induced colon carcinogenesis. 展开更多
关键词 colon cancer 1 2 4-triazine derivatives oxidative stress hypoxia-induced colon carcinogenesis
下载PDF
Evaluating the Impact of Prediction Techniques: Software Reliability Perspective 被引量:7
2
作者 Kavita Sahu Fahad A.Alzahrani +1 位作者 R.K.Srivastava Rajeev Kumar 《Computers, Materials & Continua》 SCIE EI 2021年第5期1471-1488,共18页
Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the ... Maintaining software reliability is the key idea for conducting quality research.This can be done by having less complex applications.While developers and other experts have made signicant efforts in this context,the level of reliability is not the same as it should be.Therefore,further research into the most detailed mechanisms for evaluating and increasing software reliability is essential.A signicant aspect of growing the degree of reliable applications is the quantitative assessment of reliability.There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software.However,none of these mechanisms are useful for all kinds of failure datasets and applications.Hence nding the most optimal model for reliability prediction is an important concern.This paper suggests a novel method to substantially pick the best model of reliability prediction.This method is the combination of analytic hierarchy method(AHP),hesitant fuzzy(HF)sets and technique for order of preference by similarity to ideal solution(TOPSIS).In addition,using the different iterations of the process,procedural sensitivity was also performed to validate the ndings.The ndings of the software reliability prediction models prioritization will help the developers to estimate reliability prediction based on the software type. 展开更多
关键词 Software reliability reliability prediction prediction techniques hesitant-fuzzy-AHP hesitant-fuzzy-TOPSIS
下载PDF
Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique 被引量:5
3
作者 Asif Irshad Khan Abdullah Saad Al-Malaise ALGhamdi +6 位作者 Fawaz Jaber Alsolami Yoosef B.Abushark Abdulmohsen Almalawi Abdullah Marish Ali Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2835-2860,共26页
The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differ... The blockchain technology plays a significant role in the present era of information technology.In the last few years,this technology has been used effectively in several domains.It has already made significant differences in human life,as well as is intended to have noticeable impact in many other domains in the forthcoming years.The rapid growth in blockchain technology has created numerous new possibilities for use,especially for healthcare applications.The digital healthcare services require highly effective security methodologies that can integrate data security with the availablemanagement strategies.To test and understand this goal of security management in Saudi Arabian perspective,the authors performed a numerical analysis and simulation through a multi criteria decision making approach in this study.The authors adopted the fuzzy Analytical Hierarchy Process(AHP)for evaluating the effectiveness and then applied the fuzzy Technique forOrder of Preference by Similarity to Ideal Solution(TOPSIS)technique to simulate the validation of results.For eliciting highly corroborative and conclusive results,the study referred to a real time project of diabetes patients’management application of Kingdom of Saudi Arabia(KSA).The results discussed in this paper are scientifically proven and validated through various analysis approaches.Hence the present study can be a credible basis for other similar endeavours being undertaken in the domain of blockchain research. 展开更多
关键词 Blockchain technology data management fuzzy logic AHP TOPSIS
下载PDF
Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia 被引量:2
4
作者 Abdulaziz Attaallah Masood Ahmad +3 位作者 Adil Hussain Seh Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期419-436,共18页
Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study h... Ever since its outbreak inWuhan,COVID-19 has cloaked the entireworld in a pall of despondency and uncertainty.The present study describes the exploratory analysis of all COVID cases in Saudi Arabia.Besides,the study has executed the forecastingmodel for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period.Towards this intent,the study analyzed different age groups of patients(child,adult,elderly)who were affected by COVID-19.The analysis was done city-wise and also included the number of recoveries recorded in different cities.Furthermore,the study also discusses the impact of COVID-19 on the economy.For conducting the stated analysis,the authors have created a list of factors that are known to cause the spread of COVID-19.As an effective countermeasure to contain the spread of Coronavirus in Saudi Arabia,this study also proposes to identify the most effective Computer Science technique that can be used by healthcare professionals.For this,the study employs the Fuzzy-Analytic Hierarchy Process integrated with the Technique for Order Performance by Similar to Ideal Solution(F.AHP.TOPSIS).After prioritizing the various Computer Science techniques,the ranking order that was obtained for the different techniques/tools to contain COVID-19 was:A4>A1>A2>A5>A3.Since the Blockchain technique obtained the highest priority,the study recommends that it must be used extensively as an efficacious and accurate means to combat COVID-19. 展开更多
关键词 CORONAVIRUS social impact safety precautions fuzzy-AHP.TOPSIS block-chain technique COVID-19 monitoring
下载PDF
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective 被引量:3
5
作者 Yoosef BAbushark Asif Irshad Khan +5 位作者 Fawaz Jaber Alsolami Abdulmohsen Almalawi Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第7期1203-1218,共16页
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,framew... Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product architecture.Several models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle.Therefore it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance.This assessment will allow changes to the engineering process of security requirements.The consistency of security requirements depends heavily on the usability of security requirements engineering.Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability.There seems to be no realistic implementation of such models because the concept of usability is not specific.This paper aims at specifying the different taxonomy of usability and design hierarchical usability model.The taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements engineering.The multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering.Five significant usability criteria are identified and used to evaluate the six different alternatives.Such strategies are graded as per their expected values of usability. 展开更多
关键词 Security requirements engineering cyber-security USABILITY fuzzy logic MCDM
下载PDF
Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment 被引量:3
6
作者 Ahmed S.Alfakeeh Abdulmohsen Almalawi +6 位作者 Fawaz Jaber Alsolami Yoosef B.Abushark Asif Irshad Khan Adel Aboud S.Bahaddad Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2297-2317,共21页
Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost imp... Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare. 展开更多
关键词 Web applications security risk security durability hesitantbased decision-making approach
下载PDF
Integrity Assessment of Medical Devices for Improving Hospital Services 被引量:3
7
作者 Fahad A.Alzahrani Masood Ahmad +2 位作者 Mohd Nadeem Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第6期3619-3633,共15页
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended obj... The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices. 展开更多
关键词 Integrity of the medical devices fuzzy-ANP.TOPSIS security assessment
下载PDF
Impact Assessment of COVID-19 Pandemic Through Machine Learning Models 被引量:2
8
作者 Fawaz Jaber Alsolami Abdullah Saad Al-Malaise ALGhamdi +6 位作者 Asif Irshad Khan Yoosef B.Abushark Abdulmohsen Almalawi Farrukh Saleem Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第9期2895-2912,共18页
Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were ... Ever since its outbreak in the Wuhan city of China,COVID-19 pandemic has engulfed more than 211 countries in the world,leaving a trail of unprecedented fatalities.Even more debilitating than the infection itself,were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus.Such enforced alienation affected both the mental and social condition of people significantly.Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement.However,COVID-19 brought all such communication to a grinding halt.Digital interactions have failed to enthuse the fervor that one enjoys in face-to-face meets.The pandemic has shoved the entire planet into an unstable state.The main focus and aim of the proposed study is to assess the impact of the pandemic on different aspects of the society in Saudi Arabia.To achieve this objective,the study analyzes two perspectives:the early approach,and the late approach of COVID-19 and the consequent effects on different aspects of the society.We used a Machine Learning based framework for the prediction of the impact of COVID-19 on the key aspects of society.Findings of this research study indicate that financial resources were the worst affected.Several countries are facing economic upheavals due to the pandemic and COVID-19 has had a considerable impact on the lives as well as the livelihoods of people.Yet the damage is not irretrievable and the world’s societies can emerge out of this setback through concerted efforts in all facets of life. 展开更多
关键词 CORONAVIRUS social impact safety COVID-19 monitoring machine learning framework fuzzy AHP-TOPSIS
下载PDF
An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records 被引量:1
9
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Alka Agrawal Nitish Pathak Rajeev Kumar Raees Ahmad Khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1387-1422,共36页
The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated ... The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare.Despite the phenomenal advancement in the present healthcare services,the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients’data.A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders.Various approaches and methods have been practiced by researchers to secure healthcare digital services.However,there are very few from the Machine learning(ML)domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records(EHRs).The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches.B.A.Kitchenham guidelines have been practiced as a manual to conduct this work.Seven well-known digital libraries namely IEEE Xplore,Science Direct,Springer Link,ACM Digital Library,Willey Online Library,PubMed(Medical and Bio-Science),and MDPI have been included to performan exhaustive search for the existing pertinent studies.Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion,yet the specified area has not been fully explored by the researchers.K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems’log data.Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies.This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively.Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion. 展开更多
关键词 EHRs healthcare machine learning systematic analysis
下载PDF
Hybrid Computational Modeling for Web Application Security Assessment 被引量:1
10
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期469-489,共21页
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so... Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 展开更多
关键词 Healthcare web application security assessment hesitant fuzzy sets AHP-TOPSIS
下载PDF
Impact of Tools and Techniques for Securing Consultancy Services 被引量:1
11
作者 Wael Alosaimi Abdullah Alharbi +4 位作者 Hashem Alyami Masood Ahmad Abhishek Kumar Pandey Rajeev Kumar Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期347-360,共14页
In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day ... In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day consultancy services are aided by the use of multiple tools and techniques.However,ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically.Consultants usually tackle these functions after establishing the clients’needs and developing the appropriate strategy.Nevertheless,most of the consultants tend to focus more on the intended outcomes only and often ignore the security-specific issues.Our research study is an initiative to recommend the use of a hybrid computational technique based on fuzzy Analytical Hierarchy Process(AHP)and fuzzy Technique for Order Preference by Similarity to Ideal Solutions(TOPSIS)for prioritizing the tools and techniques that are used in consultancy services on the basis of their security features and efficacy.The empirical analysis conducted in this context shows that after implementing the assessment process,the rank of the tools and techniques obtained is:A7>A1>A4>A2>A3>A5>A6>A7,and General Electric McKinsey(GE-McKinsey)Nine-box Matrix(A7)obtained the highest rank.Thus,the outcomes show that this order of selection of the tools and techniques will give the most effective and secure services.The awareness about using the best tools and techniques in consultancy services is as important as selecting the most secure tool for solving a given problem.In this league,the results obtained in this study would be a conclusive and a reliable reference for the consultants. 展开更多
关键词 Consultancy services fuzzy AHP fuzzy TOPSIS consultancy tools and techniques security evaluation
下载PDF
A threshold voltage model of short-channel fully-depleted recessed-source/drain(Re-S/D) SOI MOSFETs with high-k dielectric
12
作者 Gopi Krishna Saramekala Sarvesh Dubey Pramod Kumar Tiwari 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第10期604-611,共8页
In this paper, a surface potential based threshold voltage model of fully-depleted(FD) recessed-source/drain(Re-S/D)silicon-on-insulator(SOI) metal-oxide semiconductor field-effect transistor(MOSFET) is presen... In this paper, a surface potential based threshold voltage model of fully-depleted(FD) recessed-source/drain(Re-S/D)silicon-on-insulator(SOI) metal-oxide semiconductor field-effect transistor(MOSFET) is presented while considering the effects of high-k gate-dielectric material induced fringing-field. The two-dimensional(2D) Poisson's equation is solved in a channel region in order to obtain the surface potential under the assumption of the parabolic potential profile in the transverse direction of the channel with appropriate boundary conditions. The accuracy of the model is verified by comparing the model's results with the 2D simulation results from ATLAS over a wide range of channel lengths and other parameters,including the dielectric constant of gate-dielectric material. 展开更多
关键词 recessed-source/drain (Re-S/D) high-k gate-material fringing field and SCEs
下载PDF
Evaluating the Impact of Software Security Tactics: A Design Perspective
13
作者 Mamdouh Alenezi Abhishek Kumar Pandey +5 位作者 Richa Verma Mohd Faizan Shalini Chandra Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第3期2283-2299,共17页
Design architecture is the edifice that strengthens the functionalities as well as the security of web applications.In order to facilitate architectural security from the web application’s design phase itself,practit... Design architecture is the edifice that strengthens the functionalities as well as the security of web applications.In order to facilitate architectural security from the web application’s design phase itself,practitioners are now adopting the novel mechanism of security tactics.With the intent to conduct a research from the perspective of security tactics,the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution(AHP-TOPSIS)method for selecting and assessing multi-criteria decisions.The adopted methodology is a blend of fuzzy analytic hierarchy process(fuzzy AHP)and fuzzy technique for order preference by similarity ideal solution(fuzzy TOPSIS).To establish the efficacy of this methodology,the results are obtained after the evaluation have been tested on fifteen different web application projects(Online Quiz competition,Entrance Test,and others)of the Babasaheb Bhimrao Ambedkar University,Lucknow,India.The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications.The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security. 展开更多
关键词 Web application software security security tactics fuzzy AHP fuzzy TOPSIS
下载PDF
Bacterial biofilms in human gastrointestinal tract: An intricate balance between health and inflammatory bowel diseases
14
作者 Niharika Chandra Ankita Srivastava Sunil Kumar 《World Journal of Pharmacology》 2019年第3期26-40,共15页
Inflammatory bowel disease (IBD) has been a worldwide health problem. It is characterized by severe intestinal inflammation due to immune responses against the gut microbes in genetically susceptible individuals. The ... Inflammatory bowel disease (IBD) has been a worldwide health problem. It is characterized by severe intestinal inflammation due to immune responses against the gut microbes in genetically susceptible individuals. The understanding of gut microbiota for its composition and complex interaction in normal and diseased conditions has been assisted by the use of molecular, metagenomics and meta transcriptomics studies. The alteration of intestinal microbiota is the key determinant in the degree of inflammation caused and the prolonged course of disease. The relationship between luminal gut bacteria and innate immunity is also of prime significance. Such developments have further led to the search of specific (including bacteria and fungi) as a causative agent of IBD. Although detailed research has been done for the role of gut microbiota in IBD, molecular mechanisms and related gene expression are still not well understood in this disease, which hampers the generation of effective therapeutic agents for IBD. This paper assessed various factors contributing to IBD, genetic dysbiosis and pathogenic influence in the gut microbiota, interactions such as microbiome-host immune system interaction and microbe-microbe interactions involved in IBD, currently available IBD therapies, followed by a detailed review on bacterial infections that might be involved in IBD, globally and specifically in India. 展开更多
关键词 ULCERATIVE COLITIS Crohn’s DISEASE Inflammatory BOWEL DISEASE Gut microbiota LACTIC acid bacteria
下载PDF
Analyzing the Implications of COVID-19 Pandemic through an Intelligent-Computing Technique
15
作者 Abhishek Kumar Pandey Jehad F.Al-Amri +2 位作者 Ahmad F.Subahi Rajeev Kumar Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期959-974,共16页
The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the WorldHealth Organization (WHO) on March 11, 2020. COVID-19 has already affectedmore th... The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the WorldHealth Organization (WHO) on March 11, 2020. COVID-19 has already affectedmore than 211 nations. In such a bleak scenario, it becomes imperative to analyzeand identify those regions in Saudi Arabia that are at high risk. A preemptivestudy done in the context of predicting the possible COVID-19 hotspots wouldfacilitate in the implementation of prompt and targeted countermeasures againstSARS-CoV-2, thus saving many lives. Working towards this intent, the presentstudy adopts a decision making based methodology of simulation named Analytical Hierarchy Process (AHP), a multi criteria decision making approach, forassessing the risk of COVID-19 in different regions of Saudi Arabia. AHP givesthe ability to measure the risks numerically. Moreover, numerical assessments arealways effective and easy to understand. Hence, this research endeavour employsFuzzy based computational method of decision making for its empirical analysis.Findings in the proposed paper suggest that Riyadh and Makkah are the mostsusceptible regions, implying that if sustained and focused preventive measuresare not introduced at the right juncture, the two cities could be the worst afflictedwith the infection. The results obtained through Fuzzy based computationalmethod of decision making are highly corroborative and would be very usefulfor categorizing and assessing the current COVID-19 situation in the Kingdomof Saudi Arabia. More specifically, identifying the cities that are likely to beCOVID-19 hotspots would help the country’s health and medical fraternity toreinforce intensive containment strategies to counter the ills of the pandemic insuch regions. 展开更多
关键词 COVID-19 Saudi Arabian regions risk assessment dynamics of infection fuzzy AHP
下载PDF
Prevalence of Ringing Delusion among Mobile Phone Users
16
作者 Neeraj Kumar Raees A. Khan 《E-Health Telecommunication Systems and Networks》 2012年第4期37-42,共6页
The exponential application of mobile technology has led to a concern about implications of electromagnetic radiation on human health. As we are aware that mobile phone radiates EMR when users communicate to others an... The exponential application of mobile technology has led to a concern about implications of electromagnetic radiation on human health. As we are aware that mobile phone radiates EMR when users communicate to others and that time subscribers of the device are regularly exposed nearby 40% - 50% of total mobile irradiation. We analyzed the risk of "Ringing Delusion" among normal users, moderate users and heavy users when compared to low users. Although the "Ringing Delusion" has not been added in medical terminology but we found frequently such kind of symptoms among mobile phone users. "Ringing Delusion" may be considered as an imagination of ringing voice from cellular phone. The risk was also compared between urban and rural, male and female and adult and children population. The information was gathered through well designed questionnaires for cellular user’s demographic and social characteristics, adopted safety measures and calling duration. Prevalence of “Ringing Delusion” among rural users was higher than the urban users. A trend for the risk was also observed in male users in comparison to female. Study may support innovators to re-examine health effects of mobile phones. 展开更多
关键词 EXTENSIVE User Mobile PHONE RINGING DELUSION Survey Study QUESTIONNAIRE Sensitivity
下载PDF
Green Communication: An Effective Approach to Minimize Risk of Forgetfulness from Mobile Phone Usage
17
作者 Aditi Mishra Neeraj Kumar Tiwari 《E-Health Telecommunication Systems and Networks》 2014年第1期1-7,共7页
The usage of mobile-phone among children increased significantly. Children are in their growing phase and cells of their body are rapidly dividing, therefore propagation of electro-magnetic (EM) radiation occurs quick... The usage of mobile-phone among children increased significantly. Children are in their growing phase and cells of their body are rapidly dividing, therefore propagation of electro-magnetic (EM) radiation occurs quickly in children. The aim of the present study was to evaluate the extent of mobile-phone usage as well as its possible health effect. A total number of 455 (398 children and 57 adults, 396 urban and 59 rural) students of age group ranging from 10-29 years participated in this study. An “Information Gathering Chronological (IGC) model” was used for the collection and evaluation of information. The four major parameters, i.e. demographic and public uniqueness, mobile-phone consumption patterns, grievance of the “forgetfulness” symptom to the subjects and awareness about the safety measures were included to get the concise information from participants. We have observed that the prevalence of “forgetfulness” was 23.95% among mobile-phone users. The incidence of overall “forgetfulness” symptoms was 23.59%, 17.46%, 25.00% and 37.50% in low (LU), normal (NU), moderate (MU) and heavy (HU) mobile-phone users respectively. A trend for risk for “forgetfulness” was observed in HU as compared to LU in overall mobile-phone users. Three folds and nearly five folds increased risk for “forgetfulness” was found among HU as compared to LU in children (p ≤ 0.0210) and urban area mobile-phone users respectively. No significant difference for “forgetfulness” symptoms was found in other categories (i.e. adult and rural mobile-phone users). These results suggested that the incidences of “forgetfulness” among children from urban area mobile-phone users were significantly increased. 展开更多
关键词 Cellular PHONE ELECTROMAGNETIC HYPERSENSITIVITY (EHS) Self Reported SYMPTOM Forgetfulness
下载PDF
Evaluating the Impacts of Security-Durability Characteristic:Data Science Perspective
18
作者 Abdullah Alharbi Masood Ahmad +5 位作者 Wael Alosaimi Hashem Alyami Alka Agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期557-567,共11页
Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps ha... Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps have been found to be less durable in recent years;thus reducing their business continuity.High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability.Hence,there is a necessity to link in the gap between durability and security of the web application.Indeed,security mechanisms must be used to enhance durability as well as the security of the web application.Although durability and security are not related directly,some of their factors influence each other indirectly.Characteristics play an important role in reducing the void between durability and security.In this respect,the present study identifies key characteristics of security and durability that affect each other indirectly and directly,including confidentiality,integrity availability,human trust and trustworthiness.The importance of all the attributes in terms of their weight is essential for their influence on the whole security during the development procedure of web application.To estimate the efficacy of present study,authors employed the Hesitant Fuzzy Analytic Hierarchy Process(H-Fuzzy AHP).The outcomes of our investigations and conclusions will be a useful reference for the web application developers in achieving a more secure and durable web application. 展开更多
关键词 Software security DURABILITY durability of security services web application development process
下载PDF
Studying the efficacy of isolation as a control strategy and elimination of tuberculosis in India:A mathematical model
19
作者 Archana Singh Bhadauria Hom Nath Dhungana +2 位作者 Vinay Verma Stephen Woodcock Tapan Rai 《Infectious Disease Modelling》 CSCD 2023年第2期458-470,共13页
India has the highest burden of both tuberculosis(TB)and multidrug-resistant TB(MDRTB)based on the WHO Global TB Report 2019.Although the available data suggest that the total TB incidence has declined,the absolute nu... India has the highest burden of both tuberculosis(TB)and multidrug-resistant TB(MDRTB)based on the WHO Global TB Report 2019.Although the available data suggest that the total TB incidence has declined,the absolute number of new cases is still increasing.The number of reported TB cases in India in 2018 was 2.2 million,which was 1.5 million in 2009.About 47%increment in TB case notification in India within a decade shows a persistent public health problem.India contributes about 22%of the World's TB burden.Indian National Strategic Plan 2017e2025,sets out the government plans to eliminate TB by 2025.However,the milestone seems unrealistic to achieve the TB eradication goal by 2025.We developed a five-dimensional mathematical model to understand the TB dynamics in India and investigate the possibility of the earliest TB eradication time frame.The model stratifies the entire TB class into three different classes as drug-sensitive(DS),MDR,and isolated classes.The effective reproduction number,equilibrium points,and stability analysis of the model were carried out.This model predicts the total estimated cases of DS-TB and MDR-TB from 2018 to 2035 through numerical simulation and suggests that TB may be eliminated by 2035 in India if the treatment success rate could be achieved to 95%,by contact tracing and isolating at least 50%of MDR-TB. 展开更多
关键词 Multi-drug resistant Drug-sensitive ISOLATION Reproduction number Mathematical modelling
原文传递
Fractal dynamics and computational analysis of local fractional Poisson equations arising in electrostatics
20
作者 Jagdev Singh Hassan Kamil Jassim +1 位作者 Devendra Kumar Ved Prakash Dubey 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第12期12-18,共7页
In this paper,the local fractional natural decomposition method(LFNDM)is used for solving a local fractional Poisson equation.The local fractional Poisson equation plays a significant role in the study of a potential ... In this paper,the local fractional natural decomposition method(LFNDM)is used for solving a local fractional Poisson equation.The local fractional Poisson equation plays a significant role in the study of a potential field due to a fixed electric charge or mass density distribution.Numerical examples with computer simulations are presented in this paper.The obtained results show that LFNDM is effective and convenient for application. 展开更多
关键词 poisson equation local fractional natural transform adomian decomposition method local fractional derivative ELECTROSTATICS fractal media
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部