3,647 research outputs found

    The Coming Quantum Computing Evolution in the Pharmaceutical Industry and Drug R&D

    Get PDF
    Quantum computing is poised to revolutionize the pharmaceutical industry and dramatically accelerate the drug discovery and development process. By harnessing the power of quantum mechanics, quantum computers can analyze molecular interactions and simulate chemical processes with unprecedented speed and accuracy. This article provides a comprehensive overview of how quantum computing will impact drug R&D, with a focus on the key application areas of molecular modeling, genomics, clinical trials, and drug discovery. An in-depth analysis is provided on how quantum algorithms, quantum machine learning, and quantum simulations will enable faster and more targeted drug design, predictive modeling of drug interactions, accelerated genomics analysis, and improved clinical trial design. The challenges facing the development of quantum computing in pharma are also discussed. Overall, quantum computing offers immense promise to slash the time and cost of bringing new life-saving drugs to market, as well as unlocking new capabilities in personalized medicine and drug optimization

    The effect of Tin additionon on Structural and magnetic properties of the stannoferrite Li0.5+0.5XFe2.5-1.5XSnXO4

    Get PDF
    The physical properties of ferrites are verysensitive to microstructure, which in turn critically dependson the manufacturing process.Nanocrystalline Lithium Stannoferrite system Li0.5+0.5XFe2.5-1.5XSnXO4,X= (0, 0.2, 0.4, 0.6, 0.8 and 1.0) fine particles were successfully prepared by double sintering ceramic technique at pre-sintering temperature of 500oC for 3 h andthepre-sintered material was crushed and sintered finally in air at 1000oC.The structural and microstructural evolutions of the nanophase have been studied using X-ray powder diffraction (XRD) and the Rietveld method.The refinement results showed that the nanocrystalline ferrite has a two phases of ordered and disordered phases for polymorphous lithium Stannoferrite.The particle size of as obtained samples were found to be ~20 nm through TEM that increases up to ~ 85 nmand isdependent on the annealing temperature. TEM micrograph reveals that the grains of sample are spherical in shape. (TEM) analysis confirmed the X-ray results.The particle size of stannic substituted lithium ferrite fine particle obtained from the XRD using Scherrer equation.Magneticmeasurements obtained from lake shores vibrating sample magnetometer (VSM), saturation magnetization ofordered LiFe5O8 was found to be (57.829 emu/g) which was lower than disordered LiFe5O8(62.848 emu/g).Theinterplay between superexchange interactions of Fe3+ ions at A and B sublattices gives rise to ferrimagnetic ordering of magnetic moments,with a high Curie-Weiss temperature (TCW ~ 900 K)

    Introduction

    Get PDF

    Muslim women in contemporary societies: realities and opportunities

    Get PDF
    This book brings to focus, ideas articulated by some contemporary Muslim writers during a three-day conference organized by the International Institute for Muslim Unity (IIUM), on the politico-religious and socio-economic challenges of Muslim women in our time. Edited by Hassan Ahmed Ibrahim and Zaleha Kamaruddin, the book which features seventeen essays with an introductory note, addresses the challenges facing Muslim Women across diverse cultural and national backgrounds. With a gist that discrimination against women has no basis in Islam; the authors suggested what should be done in order to remedy the dominant misrepresentation in many Muslim countries where women are held inferior. The progress made by some Muslim countries where women enjoy political rights and are allowed participation in the public domain were highlighted while places and areas where much need to be done were also given due attention. By and large, the book opens a vista on how Muslim women can be empowered such that the Ummah can optimize their contributions to its civilizational development

    Urban Planning In Ibadan, Nigeria 1960 to 2010: A Historical Analytical Study with Special Reference to Islamic Connections

    Get PDF
    Ibadan is located in Southwestern Nigeria, in the southeastern part of Oyo state about 120km east of the border to Republic of Benin. The city’s total area is 1,190 sq miles (3,080km2). The city isnaturally drained by four rivers which have many tributaries: Ona River in the north and west, Ogbere River towards the east, Ogunpa flowing through the city and Kudeti River in the centralpart of Ibadan metropolis. Ogunpa River the third stream has a channel length of 12.76km and a catchment area of 54.92km2

    Jamāl al-Dīn al-Afghāni: An exploratory study of his place in the Tajdid movement and position towards the Sudanese Mahdiyya

    Get PDF
    Much had been written in Islamic (notably in Arabic and Persian) and Western (particularly English and French) languages about the monumental mujaddid (Islamic reformer) and political activist Jamāl al-Dīn al-Husaini (1838-1897), popularly known by his self- styled pseudonym “al-Afghāni”. Nonetheless, this article revisits him mainly because the challenges that the Islamic world faced and which he tried, in vain, to address during his turbulent time remain basically the same in our chaotic time, even in a much acute form after the historic September 11, 2001 incident. Chief among those are the devastating Shi'i-Sunni conflict and the accelerating Western cultural and physical invasion of the Muslim world The article attempts to give a fresh interpretation and assessment of Afghāni’s complex character, stormy life and religo-political legacy. The study also poses a presumably interesting question, namely, why Afghāni’s visionary thought was not acclaimed during his life, and may it be recalled now to address the stubborn problem that the Muslims are currently facing, particularly the Muslim-Muslim confrontation in Iraq, Syria and elsewhere, and the general disarray of the Ummah

    Secure authentication and key agreement via abstract multi-agent interaction

    Get PDF
    Authentication and key agreement are the foundation for secure communication over the Internet. Authenticated Key Exchange (AKE) protocols provide methods for communicating parties to authenticate each other, and establish a shared session key by which they can encrypt messages in the session. Within the category of AKE protocols, symmetric AKE protocols rely on pre-shared master keys for both services. These master keys can be transformed after each session in a key-evolving scheme to provide the property of forward secrecy, whereby the compromise of master keys does not allow for the compromise of past session keys. This thesis contributes a symmetric AKE protocol named AMI (Authentication via Multi-Agent Interaction). The AMI protocol is a novel formulation of authentication and key agreement as a multi-agent system, where communicating parties are treated as autonomous agents whose behavior within the protocol is governed by private agent models used as the master keys. Parties interact repeatedly using their behavioral models for authentication and for agreeing upon a unique session key per communication session. These models are evolved after each session to provide forward secrecy. The security of the multi-agent interaction process rests upon the difficulty of modeling an agent's decisions from limited observations about its behavior, a long-standing problem in AI research known as opponent modeling. We conjecture that it is difficult to efficiently solve even by a quantum computer, since the problem is fundamentally one of missing information rather than computational hardness. We show empirically that the AMI protocol achieves high accuracy in correctly identifying legitimate agents while rejecting different adversarial strategies from the security literature. We demonstrate the protocol's resistance to adversarial agents which utilize random, replay, and maximum-likelihood estimation (MLE) strategies to bypass the authentication test. The random strategy chooses actions randomly without attempting to mimic a legitimate agent. The replay strategy replays actions previously observed by a legitimate client. The MLE strategy estimates a legitimate agent model using previously observed interactions, as an attempt to solve the opponent modeling problem. This thesis also introduces a reinforcement learning approach for efficient multi-agent interaction and authentication. This method trains an authenticating server agent's decision model to take effective probing actions which decrease the number of interactions in a single session required to successfully reject adversarial agents. We empirically evaluate the number of interactions required for a trained server agent to reject an adversarial agent, and show that using the optimized server leads to a much more sample-efficient interaction process than a server agent selecting actions by a uniform-random behavioral policy. Towards further research on and adoption of the AMI protocol for authenticated key-exchange, this thesis also contributes an open-source application written in Python, PyAMI. PyAMI consists of a multi-agent system where agents run on separate virtual machines, and communicate over low-level network sockets using TCP. The application supports extending the basic client-server setting to a larger multi-agent system for group authentication and key agreement, providing two such architectures for different deployment scenarios

    The Emerging World Order: Issues and Concerns for Muslims

    Get PDF

    The Egyptian Empire, 1805-1848

    Get PDF
    corecore