LIVIVO - The Search Portal for Life Sciences

zur deutschen Oberfläche wechseln
Advanced search

Search results

Result 1 - 10 of total 25

Search options

  1. Article ; Online: Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions.

    Bhatti, David Samuel / Saleem, Shahzad / Imran, Azhar / Kim, Hyeon Jeong / Kim, Ki-Il / Lee, Kyu-Chul

    Scientific reports

    2024  Volume 14, Issue 1, Page(s) 3428

    Abstract: The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network. It is too difficult to prevent a priori; all the possible countermeasures are ... ...

    Abstract The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network. It is too difficult to prevent a priori; all the possible countermeasures are either too expensive or ineffective. Indeed, literature solutions either require expensive hardware (typically UWB or secure GPS transceivers) or pose specific constraints to the adversarial behavior (doing or not doing a suspicious action). The proposed solution belongs to the second category because the adversary is assumed to have done one or more known suspicious actions. In this solution, we adopt a heuristic approach to detect wormholes in ad hoc networks based on the detection of their illicit behaviors. Wormhole and post wormhole attacks are often confused in literature; that's why we clearly state that our methodology does not provide a defence against wormholes, but rather against the actions that an adversary does after the wormhole, such as packet dropping, tampering with TTL, replaying and looping, etc. In terms of contributions, the proposed solution addresses the knock-out capability of attackers that is less targeted by the researcher's community. In addition, it neither requires any additional hardware nor a change in it; instead, it is compatible with the existing network stack. The idea is simulated in ns2.30, and the average detection rate of the proposed solution is found to be 98-99%. The theoretical time to detect a wormhole node lies between 0.07-0.71 seconds. But, from the simulation, the average detection and isolation time is 0.67 seconds. In term of packet loss, the proposed solution has a relatively overhead of [Formula: see text] 22%. It works well in static and mobile scenarios, but the frame losses are higher in mobile scenarios as compared to static ones. The computational complexity of the solution is O(n). Simulation results advocate that the solution is effective in terms of memory, processing, bandwidth, and energy cost. The solution is validated using statistical parameters such as Accuracy, Precision, F1-Score and Matthews correlation coefficient ([Formula: see text]).
    Language English
    Publishing date 2024-02-10
    Publishing country England
    Document type Journal Article
    ZDB-ID 2615211-3
    ISSN 2045-2322 ; 2045-2322
    ISSN (online) 2045-2322
    ISSN 2045-2322
    DOI 10.1038/s41598-024-53938-9
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  2. Article ; Online: Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie-Hellman (DH) in single and multi-server queuing scenarios.

    Bhatti, David Samuel / Sidrat, Salbia / Saleem, Shahzad / Malik, Annas Wasim / Suh, BeomKyu / Kim, Ki-Il / Lee, Kyu-Chul

    PloS one

    2024  Volume 19, Issue 1, Page(s) e0293626

    Abstract: The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local communication; however, security remains a key issue, regardless of the ... ...

    Abstract The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local communication; however, security remains a key issue, regardless of the communication coverage area. Session initiation protocol (SIP) is one of the most widely adopted VOIP connection establishment protocols but requires added security. On the Internet, different security protocols, such as HTTPS (SSL/TLS), IPSec, and S/MIME, are used to protect SIP communication. These protocols require sophisticated infrastructure and some pose a significant overhead that may deteriorate SIP performance. In this article, we propose the following: i) avoid using Internet bandwidth and complex Internet protocols for local communication within an organization, but harness WLAN connectivity, ii) use multi-threaded or multicore computer systems to handle concurrent calls instead of installing hardware-based SIP servers, and iii) run each thread in a separate core. Cryptography is a key tool for securely transmitting confidential data for long- and short-range communication, and the Diffie-Hellman (DH) protocol has consistently been a popular choice for secret key exchanges. Primarily, used for symmetric key sharing, it has been proven effective in generating public/private key pairs, sharing public keys securely over public channels, and subsequently deriving shared secret keys from private/public keys. This key exchange scheme was proposed to safeguard VOIP communication within WLANs, which rely on the SIP for messaging and multimedia communication. For ensuring an efficient implementation of SIP, the system was rigorously analyzed using the M/M/1 and M/M/c queuing models. We analyze the behavior of SIP servers with queuing models with and without end-to-end security and increase users' trust in SIP security by providing a transparent sense of end-to-end security as they create and manage their private and public keys instead of relying on the underlying SIP technology. This research implements instant messaging, voice conversation, and secret key generation over DH while implementing and observing the role of multi-threading in multiqueue systems that serve incoming calls. By increasing the number of threads from one to two, the SIP response time improved from 20.23809 to 0.08070 min at an arrival rate of 4250 calls/day and a service rate of three calls/min. Similarly, by adding one to seven threads, the queue length was reduced by four calls/min. Implementing secure media streaming and reliable AES-based signaling for session confidentiality and integrity introduces a minor 8-ms tradeoff in SIP service performance. However, the advantages of implementing added security outweigh this limitation.
    MeSH term(s) Computer Security ; Software ; Computers ; Communication ; Internet ; Confidentiality
    Language English
    Publishing date 2024-01-25
    Publishing country United States
    Document type Journal Article
    ZDB-ID 2267670-3
    ISSN 1932-6203 ; 1932-6203
    ISSN (online) 1932-6203
    ISSN 1932-6203
    DOI 10.1371/journal.pone.0293626
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  3. Article ; Online: Analysis of dataset on reduction of high temperature stress by green net shade alleviate oxidative stress and augments the growth and vase life of gladiolus cut flower.

    Qayyum, Muhammad Mazhar / Hassan, Imran / Khan, Shah Masaud / Subhan, Mishal / Saleem, Shahzad / Fiaz, Sajid / Alharbi, Sulaiman Ali / Ansari, Mohammad Javed

    Data in brief

    2024  Volume 54, Page(s) 110378

    Abstract: The study was conducted to investigate the effect of green net shade during staggered planting times on growth, biochemical, antioxidant enzymes and vase life of gladiolus cut flowers. The green net shade effectively reduces the internal temperature, ... ...

    Abstract The study was conducted to investigate the effect of green net shade during staggered planting times on growth, biochemical, antioxidant enzymes and vase life of gladiolus cut flowers. The green net shade effectively reduces the internal temperature, particularly during extremely hot planting times. Under the green net shade conditions, high quality morphological and biochemical observations were observed during the months of March and April planting times. These included longer plant height, spike length, a higher number of leaves plant
    Language English
    Publishing date 2024-04-05
    Publishing country Netherlands
    Document type Journal Article
    ZDB-ID 2786545-9
    ISSN 2352-3409 ; 2352-3409
    ISSN (online) 2352-3409
    ISSN 2352-3409
    DOI 10.1016/j.dib.2024.110378
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  4. Book ; Online: DroidMorph

    Alam, Shahid / Abideen, M. Zain ul / Saleem, Shahzad

    Are We Ready to Stop the Attack of Android Malware Clones?

    2021  

    Abstract: The number of Android malware variants (clones) are on the rise and, to stop this attack of clones we need to develop new methods and techniques for analysing and detecting them. As a first step, we need to study how these malware clones are generated. ... ...

    Abstract The number of Android malware variants (clones) are on the rise and, to stop this attack of clones we need to develop new methods and techniques for analysing and detecting them. As a first step, we need to study how these malware clones are generated. This will help us better anticipate and recognize these clones. In this paper we present a new tool named DroidMorph, that provides morphing of Android applications (APKs) at different level of abstractions, and can be used to create Android application (malware/benign) clones. As a case study we perform testing and evaluating resilience of current commercial anti-malware products against attack of the Android malware clones generated by DroidMorph. We found that 8 out of 17 leading commercial anti-malware programs were not able to detect any of the morphed APKs. We hope that DroidMorph will be used in future research, to improve Android malware clones analysis and detection, and help stop them.
    Keywords Computer Science - Cryptography and Security
    Publishing date 2021-06-16
    Publishing country us
    Document type Book ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  5. Article ; Online: Viability of Free and Alginate-Carrageenan Gum Coated

    Saeed, Muhammad / Khanam, Rehana / Hafeez, Hammad / Ahmad, Zulfiqar / Saleem, Shahzad / Tariq, Muhammad Rizwan / Safdar, Waseem / Waseem, Muhammad / Ali, Umair / Azam, Muhammad / Rehman, Muhammad Adil / Shah, Faiz-Ul-Hassan

    ACS omega

    2024  Volume 9, Issue 12, Page(s) 13840–13851

    Abstract: The survivability of encapsulated and nonencapsulated probiotics consisting ... ...

    Abstract The survivability of encapsulated and nonencapsulated probiotics consisting of
    Language English
    Publishing date 2024-03-14
    Publishing country United States
    Document type Journal Article
    ISSN 2470-1343
    ISSN (online) 2470-1343
    DOI 10.1021/acsomega.3c08588
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  6. Article ; Online: A Survey on Wireless Wearable Body Area Networks: A Perspective of Technology and Economy.

    Bhatti, David Samuel / Saleem, Shahzad / Imran, Azhar / Iqbal, Zafar / Alzahrani, Abdulkareem / Kim, HyunJung / Kim, Ki-Il

    Sensors (Basel, Switzerland)

    2022  Volume 22, Issue 20

    Abstract: The deployment of wearable or body-worn devices is increasing rapidly, and thus researchers' interests mainly include technical and economical issues, such as networking, interoperability, security, power optimization, business growth and regulation. To ... ...

    Abstract The deployment of wearable or body-worn devices is increasing rapidly, and thus researchers' interests mainly include technical and economical issues, such as networking, interoperability, security, power optimization, business growth and regulation. To address these issues properly, previous survey papers usually focused on describing the wireless body area network architecture and network protocols. This implies that deployment issues and awareness issues of wearable and BAN devices are not emphasized in previous work. To defeat this problem, in this study, we have focused on feasibility, limitations, and security concerns in wireless body area networks. In the aspect of the economy, we have focused on the compound annual growth rate of these devices in the global market, different regulations of wearable/wireless body area network devices in different regions and countries of the world and feasible research projects for wireless body area networks. In addition, this study focuses on the domain of devices that are equally important to physicians, sportsmen, trainers and coaches, computer scientists, engineers, and investors. The outcomes of this study relating to physicians, fitness trainers and coaches indicate that the use of these devices means they would be able to treat their clients in a more effective way. The study also converges the focus of businessmen on the Annual Growth Rate (CAGR) and provides manufacturers and vendors with information about different regulatory bodies that are monitoring and regulating WBAN devices. Therefore, by providing deployment issues in the aspects of technology and economy at the same time, we believe that this survey can serve as a preliminary material that will lead to more advancements and improvements in deployment in the area of wearable wireless body area networks. Finally, we present open issues and further research direction in the area of wireless body area networks.
    MeSH term(s) Humans ; Wireless Technology ; Technology ; Wearable Electronic Devices ; Computer Communication Networks
    Language English
    Publishing date 2022-10-11
    Publishing country Switzerland
    Document type Journal Article ; Review
    ZDB-ID 2052857-7
    ISSN 1424-8220 ; 1424-8220
    ISSN (online) 1424-8220
    ISSN 1424-8220
    DOI 10.3390/s22207722
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  7. Article ; Online: Efficiency of botanical pesticides against some pests infesting hydroponic cucumber, cultivated under greenhouse conditions

    Muhammad Shoaib Saleem / Tuba Sharf Batool / Muhammad Faheem Akbar / Saboohi Raza / Saleem Shahzad

    Egyptian Journal of Biological Pest Control, Vol 29, Iss 1, Pp 1-

    2019  Volume 7

    Abstract: Abstract Greenhouse cultivation of vegetables, especially cucumber in hydroponic/soilless culture, has been developed in different parts of the world. There is an expanding interest in hydroponics because they can produce fresh food closer to urban areas. ...

    Abstract Abstract Greenhouse cultivation of vegetables, especially cucumber in hydroponic/soilless culture, has been developed in different parts of the world. There is an expanding interest in hydroponics because they can produce fresh food closer to urban areas. The objective of this study was to evaluate the efficiency of the biopesticides: matrine (extract from Sophora flavescens), spintoram (derived from soil bacterium Saccharopolyspora spinosa), azadirachtin (neem extract), and Annona squamosa (custard apple extract) against the cotton aphid (Aphis gossypii Glov.) and the two-spotted spider mite, (Tetranychus urticae Koch.). A drip-irrigation hydroponics system (DIHS) was designed and used for this study. Fourteen-day-old seedlings of cucumber plants were shifted in DIHS, and nutrient requirements were maintained during the period of experiment. Randomized complete block design (RCBD) was used for this experiment with 3 replicates and with 5 treatments. Data were collected 24 h pre-treatment and 1, 3, 7, and 14 days post-treatment. Results revealed that the custard apple extract showed the highest efficiency (80 and 76%) reduction against the aphid and the mite, respectively, followed by matrine (legend) and neem extract (73%), and spintoram (radiant) (69%) in case of the aphid, while it was followed by matrine (legend) (75%), spintoram (radiant), (66%), and neem extract (56%) in the case of the mite.
    Keywords Biopesticides ; Cucumber ; Greenhouse ; Hydroponics ; Aphids ; Two-spotted spider mite ; Agriculture ; S
    Subject code 630
    Language English
    Publishing date 2019-06-01T00:00:00Z
    Publisher SpringerOpen
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  8. Article ; Online: Study of

    Biswas, Partha / Bibi, Shabana / Yousafi, Qudsia / Mehmood, Asim / Saleem, Shahzad / Ihsan, Awais / Dey, Dipta / Hasan Zilani, Md Nazmul / Hasan, Md Nazmul / Saleem, Rasha / Awaji, Aeshah A / Fahmy, Usama A / Abdel-Daim, Mohamed M

    Molecules (Basel, Switzerland)

    2023  Volume 28, Issue 7

    Abstract: An evaluation of the expression and predictive significance of ... ...

    Abstract An evaluation of the expression and predictive significance of the
    MeSH term(s) Humans ; Tumor Suppressor Protein p53/metabolism ; Molecular Docking Simulation ; Proto-Oncogene Proteins c-mdm2/metabolism ; DNA Copy Number Variations ; Prognosis ; Brain Neoplasms/drug therapy ; Brain Neoplasms/genetics ; Brain Neoplasms/metabolism ; Glioma/drug therapy ; Glioma/genetics ; Glioma/metabolism ; Biomarkers ; Drug Development ; Brain/metabolism
    Chemical Substances Tumor Suppressor Protein p53 ; Proto-Oncogene Proteins c-mdm2 (EC 2.3.2.27) ; Biomarkers ; MDM2 protein, human (EC 2.3.2.27)
    Language English
    Publishing date 2023-03-27
    Publishing country Switzerland
    Document type Journal Article
    ZDB-ID 1413402-0
    ISSN 1420-3049 ; 1431-5165 ; 1420-3049
    ISSN (online) 1420-3049
    ISSN 1431-5165 ; 1420-3049
    DOI 10.3390/molecules28072977
    Database MEDical Literature Analysis and Retrieval System OnLINE

    More links

    Kategorien

  9. Article: Effect of seed pelleting with biocontrol agents on growth and colonisation of roots of mungbean by root‐infecting fungi

    Ramzan, Nadia / Nayara Noreen / Saleem Shahzad / Zahida Perveen

    Journal of the science of food and agriculture. 2016 Aug., v. 96, no. 11

    2016  

    Abstract: BACKGROUND: Mungbean (Vigna radiata (L.) Wilczek) is a leguminous pulse crop that is a major source of proteins, vitamins and minerals. Root‐infecting fungi produce severe plant diseases like root rot, charcoal rot, damping‐off and stem rot. The ... ...

    Abstract BACKGROUND: Mungbean (Vigna radiata (L.) Wilczek) is a leguminous pulse crop that is a major source of proteins, vitamins and minerals. Root‐infecting fungi produce severe plant diseases like root rot, charcoal rot, damping‐off and stem rot. The soil‐borne pathogens can be controlled by chemicals, but these chemicals have several negative effects. Use of microbial antagonist such as fungi and bacteria is a safe, effective and eco‐friendly method for the control of many soil‐borne pathogens. Biological control agents promote plant growth and develop disease resistance. Application of bacteria and fungi as seed dressing suppressed the root‐infecting fungi on leguminous crops. RESULTS: Seeds of mungbean were pelleted with different biocontrol agents to determine their effect on plant growth and colonisation of roots by root‐infecting fungi, viz. Fusarium solani, Macrophomina phaseolina, Pythium aphanidermatum, Rhizoctonia solani and Sclerotium rolfsii. Treatment of mungbean seeds with fungal antagonists showed more shoot and root length as compared to bacterial antagonists, whereas seed treated with bacterial antagonists showed maximum shoot and root weight. Trichoderma harzianum and Bacillus subtilis were the best among all the biocontrol agents since they provided the highest plant growth and greater reduction in root colonisation by all root‐infecting fungi. Bacillus cereus, Trichoderma virens, Pseudomonas fluorescens and Micrococcus varians were also effective against root‐infecting fungi but to a lesser extent. T. harzianum, T. virens, B. subtilis and P. fluorescens were found to be best among all biocontrol agents. CONCLUSION: The root‐infecting fungi can be controlled by pelleting seeds with biocontrol agents as it is safe and effective method. Additionally, plant growth was promoted more by this method. © 2015 Society of Chemical Industry
    Keywords adverse effects ; antagonists ; Athelia rolfsii ; Bacillus cereus ; Bacillus subtilis ; bacteria ; charcoal rot ; control methods ; crops ; damping off ; disease resistance ; fungal antagonists ; fungi ; Fusarium solani ; Kocuria varians ; Macrophomina phaseolina ; minerals ; mung beans ; pelleting ; plant growth ; proteins ; Pseudomonas fluorescens ; Pythium aphanidermatum ; root rot ; roots ; seed dressings ; seeds ; shoots ; soil-borne diseases ; stem rot ; Thanatephorus cucumeris ; Trichoderma harzianum ; Trichoderma virens ; Vigna radiata ; vitamins
    Language English
    Dates of publication 2016-08
    Size p. 3694-3700.
    Publishing place John Wiley & Sons, Ltd
    Document type Article
    Note JOURNAL ARTICLE
    ZDB-ID 184116-6
    ISSN 1097-0010 ; 0022-5142
    ISSN (online) 1097-0010
    ISSN 0022-5142
    DOI 10.1002/jsfa.7553
    Database NAL-Catalogue (AGRICOLA)

    More links

    Kategorien

  10. Article: Population structure and phylogenetic relationship of Peach [Prunus persica (L.) Batsch] and Nectarine [Prunus persica var. nucipersica (L.) C.K. Schneid.] based on retrotransposon markers

    Naeem, Hina / Awan, Faisal Saeed / Dracatos, Peter Michael / Sajid, Muhammad Wasim / Saleem, Shahzad / Yousafi, Qudsia / Khan, Muhammad Saad / Mehmood, Asim / Zulfiqar, Bushra

    Genetic resources and crop evolution. 2021 Oct., v. 68, no. 7

    2021  

    Abstract: For effective varietal improvement of horticultural crops peach (Prunus persica) and nectarine (Prunus persica var. nucipersica), information about their population structure and genetic relatedness plays an important role. In this study we used ... ...

    Abstract For effective varietal improvement of horticultural crops peach (Prunus persica) and nectarine (Prunus persica var. nucipersica), information about their population structure and genetic relatedness plays an important role. In this study we used retrotransposon-based markers (iPBS) to estimate the genetic diversity and population structure of 48 peach and nectarine genotypes from various distinct geographical regions of Punjab and Khyber Pakhtunkhwa, Pakistan. A total of 461 alleles were identified from PCR amplicons derived from nine iPBS primer pairs with an average of 8.5 alleles/locus. Among all four groups the genotypes collected from Swat and Hunza had the highest and the lowest expected heterozygosity, unbiased expected heterozygosity and Shannon’s information index, respectively. We constructed a Neighbour-Joining dendrogram and performed principal coordinate analysis based on the distance matrices, and both forms of analysis grouped the 48 genotypes into two distinct clusters. The STRUCTURE software distributed the forty-eight genotypes into two main populations (k = 2) indicating a low diversity between genotypes collected from Chakwal, Swat, Mansehra and Hunza.
    Keywords Prunus persica var. nucipersica ; computer software ; genetic relationships ; genetic variation ; heterozygosity ; horticulture ; loci ; multidimensional scaling ; nectarines ; peaches ; phylogeny ; population structure ; retrotransposons ; Pakistan
    Language English
    Dates of publication 2021-10
    Size p. 3011-3023.
    Publishing place Springer Netherlands
    Document type Article
    ZDB-ID 1134125-7
    ISSN 0925-9864
    ISSN 0925-9864
    DOI 10.1007/s10722-021-01172-x
    Database NAL-Catalogue (AGRICOLA)

    More links

    Kategorien

To top