62 research outputs found

    Combination of the Single-Valued Neutrosophic Fuzzy Set and the Soft Set with Applications in Decision-Making

    Get PDF
    In this article, we propose a novel concept of the single-valued neutrosophic fuzzy soft set by combining the single-valued neutrosophic fuzzy set and the soft set. For possible applications, five kinds of operations (e.g., subset, equal, union, intersection, and complement) on single-valued neutrosophic fuzzy soft sets are presented. Then, several theoretical operations of single-valued neutrosophic fuzzy soft sets are given. In addition, the first type for the fuzzy decision-making based on single-valued neutrosophic fuzzy soft set matrix is constructed. Finally, we present the second type by using the AND operation of the single-valued neutrosophic fuzzy soft set for fuzzy decision-making and clarify its applicability with a numerical example

    Exogenous application of low and high molecular weight organic acids differentially affected the uptake of cadmium in wheat-rice cropping system in alkaline calcareous soil

    Get PDF
    Anthropogenic cadmium (Cd) in arable soils is becoming a global concern due to its harmful effects on crop yield and quality. The current study examined the role of exogenously applied low molecular weight organic acids (LMWOAs) including oxalic acid (OxA), tartaric acid (TA) and high molecular weight organic acids (HMWOAs) like citric acid (CA) and humic acid (HA) for the bioavailability of Cd in wheat-rice cropping system. Maximum increase in root dry-weight, shoot dry-weight, and grain/paddy yields was recorded with HA for both crops. The HA significantly decreased AB-DTPA Cd in contaminated soils which remained 41% for wheat and 48% for rice compared with their respective controls. The minimum concentration of Cd in roots, shoots and grain/paddy was observed in HA treatment in both crops. The organic acids significantly increased the growth parameters, photosynthetic activity, and relative leaf moisture contents for both wheat and rice crops compared to that with the contaminated control. Application of OxA and TA increased the bioavailability of Cd in soils and plant tissues while CA and HA decreased the bioavailability of Cd in soils and plants. The highest decrease in Cd uptake, bioaccumulation, translocation factor, immobilization, translocation, harvest, and health risk indices were observed with HA while maximum increase was recorded with OxA for both wheat and rice. The results concluded that use of HMWOAs is effective in soil Cd immobilization being maximum with HA. While LMWOAs can be used for the phytoextraction of Cd in contaminated soils having maximum potential with OxA

    Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation

    Get PDF
    © 2018, Springer International Publishing AG, part of Springer Nature. The main protocol of the Internet protocol version 6 suites is the neighbour discovery protocol, which is geared towards substitution of address resolution protocol, router discovery, and function redirection in Internet protocol version 4. Internet protocol version 6 nodes employ neighbour discovery protocol to detect linked hosts and routers in Internet protocol version 6 network without the dependence on dynamic host configuration protocol server, which has earned the neighbour discovery protocol the title of the stateless protocol. The authentication process of the neighbour discovery protocol exhibits weaknesses that make this protocol vulnerable to attacks. Denial of service attacks can be triggered by a malicious host through the introduction of spoofed addresses in neighbour discovery protocol messages. Internet version 6 protocols are not well supported by Network Intrusion Detection System as is the case with Internet Protocol version 4 protocols. Several data mining techniques have been introduced to improve the classification mechanism of Intrusion detection system. In addition, extensive researches indicated that there is no Intrusion Detection system for Internet Protocol version 6 using advanced machine-learning techniques toward distributed denial of service attacks. This paper aims to detect Distributed Denial of Service attacks of the Neighbour Discovery protocol using machine-learning techniques, due to the severity of the attacks and the importance of Neighbour Discovery protocol in Internet Protocol version 6. Decision tree algorithm and Random Forest Algorithm showed high accuracy results in comparison to the other benchmarked algorithms

    Functional analysis of germline <em>VANGL2</em> variants using rescue assays of <em>vangl2</em> knockout zebrafish

    Get PDF
    \ua9 The Author(s) 2023. Published by Oxford University Press. Developmental studies have shown that the evolutionarily conserved Wnt Planar Cell Polarity (PCP) pathway is essential for the development of a diverse range of tissues and organs including the brain, spinal cord, heart and sensory organs, as well as establishment of the left-right body axis. Germline mutations in the highly conserved PCP gene VANGL2 in humans have only been associated with central nervous system malformations, and functional testing to understand variant impact has not been performed. Here we report three new families with missense variants in VANGL2 associated with heterotaxy and congenital heart disease p.(Arg169His), non-syndromic hearing loss p.(Glu465Ala) and congenital heart disease with brain defects p.(Arg135Trp). To test the in vivo impact of these and previously described variants, we have established clinically-relevant assays using mRNA rescue of the vangl2 mutant zebrafish. We show that all variants disrupt Vangl2 function, although to different extents and depending on the developmental process. We also begin to identify that different VANGL2 missense variants may be haploinsufficient and discuss evidence in support of pathogenicity. Together, this study demonstrates that zebrafish present a suitable pipeline to investigate variants of unknown significance and suggests new avenues for investigation of the different developmental contexts of VANGL2 function that are clinically meaningful

    Mucormycosis co-infection in COVID-19 patients: An update

    Get PDF
    Mucormycosis (MCM) is a rare fungal disorder that has recently been increased in parallel with novel COVID-19 infection. MCM with COVID-19 is extremely lethal, particularly in immunocompromised individuals. The collection of available scientific information helps in the management of this co-infection, but still, the main question on COVID-19, whether it is occasional, participatory, concurrent, or coincidental needs to be addressed. Several case reports of these co-infections have been explained as causal associations, but the direct contribution in immunocompromised individuals remains to be explored completely. This review aims to provide an update that serves as a guide for the diagnosis and treatment of MCM patients’ co-infection with COVID-19. The initial report has suggested that COVID-19 patients might be susceptible to developing invasive fungal infections by different species, including MCM as a co-infection. In spite of this, co-infection has been explored only in severe cases with common triangles: diabetes, diabetes ketoacidosis, and corticosteroids. Pathogenic mechanisms in the aggressiveness of MCM infection involves the reduction of phagocytic activity, attainable quantities of ferritin attributed with transferrin in diabetic ketoacidosis, and fungal heme oxygenase, which enhances iron absorption for its metabolism. Therefore, severe COVID-19 cases are associated with increased risk factors of invasive fungal co-infections. In addition, COVID-19 infection leads to reduction in cluster of differentiation, especially CD4+ and CD8+ T cell counts, which may be highly implicated in fungal co-infections. Thus, the progress in MCM management is dependent on a different strategy, including reduction or stopping of implicit predisposing factors, early intake of active antifungal drugs at appropriate doses, and complete elimination via surgical debridement of infected tissues

    The cost of link layer security in IoT embedded devices

    No full text
    Security of Internet of Things (IoT) devices is important for the acceptance of IoT applications. Several security mechanisms have been proposed, however, due to the limited resources in IoT devices, their overhead should be evaluated carefully. Many existing security solutions have been evaluated by simulation. However, with the increasing deployment of real nodes, a more accurate result based on real hardware is necessary. This research aims to evaluate the impact of applying security features of IEEE 802.15.4 on example hardware. The evaluation includes the impact on the Microcontroller Unit (MCU), radio, latency, packet throughput and transmission power. The results show that enabling software security services impact limited devices significantly. This impact could be translated into a decrease in throughput to almost 44%, an increase in latency and energy consumption to almost 197% and 86% respectively with maximum security level. The outcome of this paper is intended to benefit network designers and researchers by allowing them to model security overhead, allowing them to choose the security level, if enabled, which suits their application requirements.</p

    Differential Uptake and Translocation of Cadmium and Lead by Quinoa: A Multivariate Comparison of Physiological and Oxidative Stress Responses

    No full text
    Contamination of soils with cadmium (Cd) and lead (Pb) has emerged as a serious environmental issue that reduces crop productivity. However, the metals tolerance and accumulation potential of quinoa (Chenopodium Quinoa Willd) under the combined stress of Cd and Pb has not yet been explored. In the present hydroponic study, the physiological and biochemical characteristics of quinoa exposed to Cd and Pb were explored. Four-week-old plants of quinoa genotype ‘Puno’ were grown under different concentrations of Cd (0, 50 and 100 µM), Pb (0, 250 and 500 µM) alone as well as in combinations. The results showed that with increasing Cd and Pb levels in the nutrient solution, the plant biomass, stomatal conductance and chlorophyll contents were decreased. However, the concurrent application of higher concentrations of Cd (100 µM) and Pb (500 µM) caused even more reduction in the plant biomass (more than 50% than the control) and physiological attributes. The combined application of Pb and Cd caused oxidative stress through an overproduction of H2O2 (10-fold) and TBARS (12.5-fold), leading to decrease in membrane stability (52%). The oxidative stress was alleviated by a 7-fold, 10-fold and 9-fold overactivation of superoxide dismutase (SOD), peroxidase (POD) and catalase (CAT), respectively. An excessive uptake of Cd resulted in a limited uptake of Pb and K in the roots and shoots of quinoa plants. The Cd and Pb tolerance and uptake potential of Puno showed its ability to stabilize Cd and Pb in co-contaminated soils

    Comprehensive Patient Health Care System for the Saudi Hospitals using Information and Mobile Computing Technologies

    No full text
    Information Technology (I. T) forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly in an area as complex as healthcare. Therefore, diverse information systems must he integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of provid ing healthcare. It is crucial to identify the processes in the healthcare sector that would he benefitted.from the support of Information Technology. The paper is focused on the use of Comprehensive Patient Healthcare System (CPHS) comprising two large subsystems, Computerized Patient Record System (CPRS) and Mobile Computing Clinical System (MC.C.S) as an application of state-of-the-art information and mobile computing technologies in Saudi Arabia hospitals as part of an ongoing research project. Significantly, the use of such technologies with highly efficient techniques for essential information gathering in a timely and cost effective manner in hospital sites is critical in order to understand how to enhance quality health care services to improve the life of patients and rapid decision making. It would therefore be expected that the project would facilitate optimal hospital resource utilization for medical purposes in Saudi Arabia. This development would therefore pave the way for opening new venues in which such highly advanced information and mobile computing technologies are employed in the hospitals and other sectors beyond the field of medical care.PAPER TYPE: Research PaperKEYWORDS : Comprehensive Patient Healthcare System (CPHS); Computerized Patient Record System (CPRS); Mobile Computing Clinical System (MCCS); Information Communication Technology (ICT); Mobile Technolog

    Information Security: Securing a Network Device with Passwords to Protect Information

    No full text
    Information security is a complex and critical subject, conventionally only tackled by well-trained and experienced professionals. The importance of an effective password policy at the device level is obvious and often entire networks can be brought down due to the lack of simple password security on a single device. Typically, there are numerous devices on a network but the router is at the heart of any network which connects Local Area Networks (LANs) to the outside world (Internet). The Internet is essentially a collection of different Internet Service Providers (ISPs) and routers using Border Gateway Protocol (BGP) providing connectivity between different ISPs around the globe. The Internet is expanding at an enormous speed and secure exchange of information is needed by organisations and individuals alike. This paper emphasises the need for an effective device-level password security as an essential component of a more comprehensive organisational security policy. As an illustration, a practical implementation of effective password security is carried out using one of the most widely deployed routers in the industry.KEYWORDS : Information Security, Password Policy, Border Gateway Protocol (BGP), Internet Service Provider (ISP), Local Area Network (LAN)PAPER TYPE : Empirica

    Adsorption Behavior of Methylene Blue Dye by Novel CrossLinked O-CM-Chitosan Hydrogel in Aqueous Solution: Kinetics, Isotherm and Thermodynamics

    No full text
    The chemical cross-linking of carboxymethyl chitosan (O-CM-chitosan), as a method for its modification, was performed using trimellitic anhydride isothiocyanate to obtain novel cross-linked O-CM-chitosan hydrogel. Its structure was proven using FTIR, XRD and SEM. Its adsorption capacity for the removal of Methylene Blue (MB) dye from aqueous solution was studied. The effects of different factors on the adsorption process, such as the pH, temperature and concentration of the dye, in addition to applications of the kinetic studies of the adsorption process, adsorption isotherm and thermodynamic parameters, were studied. It was found that the amount of adsorbed MB dye increases with increasing temperature. A significant increase was obtained in the adsorption capacities and removal percentage of MB dye with increasing pH values. An increase in the initial dye concentration increases the adsorption capacities, and decreases the removal percentage. It was found that the pseudo-second-order mechanism is predominant, and the overall rate of the dye adsorption process appears to be controlled by more than one step. The Langmuir model showed high applicability for the adsorption of MB dye onto O-CM-chitosan hydrogel. The value of the activation energy (Ea) is 27.15 kJ mol−1 and the thermodynamic parameters were evaluated. The regeneration and reuse of the investigated adsorbent was investigated
    corecore