26 research outputs found

    CFD Based Numerical Study of Pilgrim

    Get PDF
    Tawaf is one of the most important rituals of Hajj/Umrah pilgrimage and is performed in the Mataf area of the holy mosqu

    A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

    Get PDF
    Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems. However, due to unique characteristics of such systems i.e., battery power, bandwidth and processor overheads and network dynamics, intrusion detection for IoT is a challenge, which requires taking into account the trade-off between detection accuracy and performance overheads. In~this context, we are focused at highlighting this trade-off and its significance to achieve effective intrusion detection for IoT. Specifically, this paper presents a comprehensive study of existing intrusion detection systems for IoT systems in three aspects: computational overhead, energy consumption and privacy implications. Through extensive study of existing intrusion detection approaches, we have identified open challenges to achieve effective intrusion detection for IoT infrastructures. These include resource constraints, attack complexity, experimentation rigor and unavailability of relevant security data. Further, this paper is envisaged to highlight contributions and limitations of the state-of-the-art within intrusion detection for IoT, and~aid the research community to advance it by identifying significant research directions

    Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions

    Get PDF
    The Internet of Multimedia Things (IoMT) orchestration enables the integration of systems, software, cloud, and smart sensors into a single platform. The IoMT deals with scalar as well as multimedia data. In these networks, sensor-embedded devices and their data face numerous challenges when it comes to security. In this paper, a comprehensive review of the existing literature for IoMT is presented in the context of security and blockchain. The latest literature on all three aspects of security, i.e., authentication, privacy, and trust is provided to explore the challenges experienced by multimedia data. The convergence of blockchain and IoMT along with multimedia-enabled blockchain platforms are discussed for emerging applications. To highlight the significance of this survey, large-scale commercial projects focused on security and blockchain for multimedia applications are reviewed. The shortcomings of these projects are explored and suggestions for further improvement are provided. Based on the aforementioned discussion, we present our own case study for healthcare industry: a theoretical framework having security and blockchain as key enablers. The case study reflects the importance of security and blockchain in multimedia applications of healthcare sector. Finally, we discuss the convergence of emerging technologies with security, blockchain and IoMT to visualize the future of tomorrow's applications. © 2020 Elsevier Lt

    (1E,3E,5E,7E)-4,4′-(Octa-1,3,5,7-tetra­ene-1,8-di­yl)dipyridine

    Get PDF
    The title compound, C18H16N2, crystallizes with one and a half independent mol­ecules in the asymmetric unit, with the half-mol­ecule being completed by crystallographic inversion symmetry. Both independent mol­ecules are almost planar, with the non-H atoms exhibiting r.m.s. deviations from the least-squares mol­ecular plane of 0.175 and 0.118 Å, respectively

    Web services composition for concurrent plan using artificial intelligence planning

    Get PDF
    Automatic planning of web services composition is a challenging problem both in academia and real-world application. Artificial Intelligence (AI) planning can be applied to automate web services composition by depicting composition problem as AI planning problem. Web services composition would combine multiple services whenever some requirements cannot be fulfilled by a single service. Subsequently, many of the planning algorithms to detect and generate composition plan would focus only on sequence composition thus, neglecting concurrent composition. The aim of this paper is to develop an approach to generate a concurrent plan for web services composition based on semantic web services (OWL-S) and Hierarchical Task Network (HTN) Planning. A Bioinformatics case study for pathway data retrieval is used to validate the effectiveness of proposed approach. The planning algorithm extend Hierarchical Task Network (HTN) algorithm to solve the problem of automatic web service composition in the context of concurrent task planning. Experimental analysis showed that the proposed algorithms are capable of detecting and generating concurrent plan when compared with existing algorithms

    Babesia duncani multi-omics identifies virulence factors and drug targets

    Get PDF
    Babesiosis is a malaria-like disease in humans and animals that is caused by Babesia species, which are tick-transmitted apicomplexan pathogens. Babesia duncani causes severe to lethal infection in humans, but despite the risk that this parasite poses as an emerging pathogen, little is known about its biology, metabolic requirements or pathogenesis. Unlike other apicomplexan parasites that infect red blood cells, B. duncani can be continuously cultured in vitro in human erythrocytes and can infect mice resulting in fulminant babesiosis and death. We report comprehensive, detailed molecular, genomic, transcriptomic and epigenetic analyses to gain insights into the biology of B. duncani. We completed the assembly, 3D structure and annotation of its nuclear genome, and analysed its transcriptomic and epigenetics profiles during its asexual life cycle stages in human erythrocytes. We used RNA-seq data to produce an atlas of parasite metabolism during its intraerythrocytic life cycle. Characterization of the B. duncani genome, epigenome and transcriptome identified classes of candidate virulence factors, antigens for diagnosis of active infection and several attractive drug targets. Furthermore, metabolic reconstitutions from genome annotation and in vitro efficacy studies identified antifolates, pyrimethamine and WR-99210 as potent inhibitors of B. duncani to establish a pipeline of small molecules that could be developed as effective therapies for the treatment of human babesiosis.We thank R. Gao for her contribution to the initial eforts to sequence the B. duncani genome. C.B.M.’s research was supported by grants from the National Institutes of Health (AI097218, GM110506, AI123321 and R43AI136118), the Steven and Alexandra Cohen Foundation (Lyme 62 2020), and the Global Lyme Alliance. S.L.’s research was supported by grants by the US National Science Foundation (IIS 1814359) and the National Institutes of Health (1R01AI169543-01). K.G.L.R.’s research was supported by the National Institutes of Allergy and Infectious Diseases (R01 AI136511, R01 AI142743-01 and R21 AI142506-01), the University of California, Riverside (NIFA-Hatch-225935) and the Health Institute Carlos III (PI20CIII/00037).S

    Diagnostic Challenge of Gitelman Syndrome: A Rare but Significant Cause of Electrolyte Imbalance

    No full text
    Objective: This case study presents a young female patient diagnosed with symptomatic electrolyte disturbances, later confirmed as Gitelman syndrome (GS). It highlights the underlying pathophysiology and emphasizes the importance of its proper management. Background: GS is a rare genetic disorder affecting kidney electrolyte reabsorption, leading to symptoms like weakness, muscle cramps, fatigue, nausea, and vomiting. Diagnosis involves lab tests and genetic confirmation, with treatment comprising electrolyte supplementation and medications. Ongoing management is vital to prevent complications. Case presentation: A 23-year-old Caucasian female presented to the ED with sudden weakness in all extremities, thirst, and lightheadedness. Lab results showed hyperglycemia 166 (70-100 mg/dL),severe hypokalemia 1.1 (3.6-5.1 mmol/L), mild hypercalcemia 11 (8.9-10.4 mg/dL), and severe hypophosphatemia 0.6 (2.3-7.0 mg/dL). Incidentally, she had prior hypokalemia history from a motor accident hospitalization and managed it with KCl for a year but stopped when symptoms improved. She was treated with electrolyte replacement and discharged with oral potassium. Five days later, she returned with severe hypokalemia 1.3, mild hypercalcemia 10.7, and severe hypophosphatemia 0.6. A 24-hour urinary test showed distal convoluted tubulopathy indicative of GS. She was treated with replacement therapy and spironolactone, with instructions for ongoing supplementation and follow-up with a nephrologist. Discussion: GS is mostly caused by mutations in the SLC12A3 gene, affecting the kidneys’ sodium chloride cotransporter function, as confirmed in our patient. Conclusion: While GS has no cure, appropriate treatment with medication and dietary adjustments can enhance patients’ quality of life by maintaining electrolyte balance. Healthcare providers’ awareness is crucial for effective care and complication prevention
    corecore