148 research outputs found

    Combination of the Single-Valued Neutrosophic Fuzzy Set and the Soft Set with Applications in Decision-Making

    Get PDF
    In this article, we propose a novel concept of the single-valued neutrosophic fuzzy soft set by combining the single-valued neutrosophic fuzzy set and the soft set. For possible applications, five kinds of operations (e.g., subset, equal, union, intersection, and complement) on single-valued neutrosophic fuzzy soft sets are presented. Then, several theoretical operations of single-valued neutrosophic fuzzy soft sets are given. In addition, the first type for the fuzzy decision-making based on single-valued neutrosophic fuzzy soft set matrix is constructed. Finally, we present the second type by using the AND operation of the single-valued neutrosophic fuzzy soft set for fuzzy decision-making and clarify its applicability with a numerical example

    Exogenous application of low and high molecular weight organic acids differentially affected the uptake of cadmium in wheat-rice cropping system in alkaline calcareous soil

    Get PDF
    Anthropogenic cadmium (Cd) in arable soils is becoming a global concern due to its harmful effects on crop yield and quality. The current study examined the role of exogenously applied low molecular weight organic acids (LMWOAs) including oxalic acid (OxA), tartaric acid (TA) and high molecular weight organic acids (HMWOAs) like citric acid (CA) and humic acid (HA) for the bioavailability of Cd in wheat-rice cropping system. Maximum increase in root dry-weight, shoot dry-weight, and grain/paddy yields was recorded with HA for both crops. The HA significantly decreased AB-DTPA Cd in contaminated soils which remained 41% for wheat and 48% for rice compared with their respective controls. The minimum concentration of Cd in roots, shoots and grain/paddy was observed in HA treatment in both crops. The organic acids significantly increased the growth parameters, photosynthetic activity, and relative leaf moisture contents for both wheat and rice crops compared to that with the contaminated control. Application of OxA and TA increased the bioavailability of Cd in soils and plant tissues while CA and HA decreased the bioavailability of Cd in soils and plants. The highest decrease in Cd uptake, bioaccumulation, translocation factor, immobilization, translocation, harvest, and health risk indices were observed with HA while maximum increase was recorded with OxA for both wheat and rice. The results concluded that use of HMWOAs is effective in soil Cd immobilization being maximum with HA. While LMWOAs can be used for the phytoextraction of Cd in contaminated soils having maximum potential with OxA

    Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation

    Get PDF
    © 2018, Springer International Publishing AG, part of Springer Nature. The main protocol of the Internet protocol version 6 suites is the neighbour discovery protocol, which is geared towards substitution of address resolution protocol, router discovery, and function redirection in Internet protocol version 4. Internet protocol version 6 nodes employ neighbour discovery protocol to detect linked hosts and routers in Internet protocol version 6 network without the dependence on dynamic host configuration protocol server, which has earned the neighbour discovery protocol the title of the stateless protocol. The authentication process of the neighbour discovery protocol exhibits weaknesses that make this protocol vulnerable to attacks. Denial of service attacks can be triggered by a malicious host through the introduction of spoofed addresses in neighbour discovery protocol messages. Internet version 6 protocols are not well supported by Network Intrusion Detection System as is the case with Internet Protocol version 4 protocols. Several data mining techniques have been introduced to improve the classification mechanism of Intrusion detection system. In addition, extensive researches indicated that there is no Intrusion Detection system for Internet Protocol version 6 using advanced machine-learning techniques toward distributed denial of service attacks. This paper aims to detect Distributed Denial of Service attacks of the Neighbour Discovery protocol using machine-learning techniques, due to the severity of the attacks and the importance of Neighbour Discovery protocol in Internet Protocol version 6. Decision tree algorithm and Random Forest Algorithm showed high accuracy results in comparison to the other benchmarked algorithms

    Functional analysis of germline <em>VANGL2</em> variants using rescue assays of <em>vangl2</em> knockout zebrafish

    Get PDF
    \ua9 The Author(s) 2023. Published by Oxford University Press. Developmental studies have shown that the evolutionarily conserved Wnt Planar Cell Polarity (PCP) pathway is essential for the development of a diverse range of tissues and organs including the brain, spinal cord, heart and sensory organs, as well as establishment of the left-right body axis. Germline mutations in the highly conserved PCP gene VANGL2 in humans have only been associated with central nervous system malformations, and functional testing to understand variant impact has not been performed. Here we report three new families with missense variants in VANGL2 associated with heterotaxy and congenital heart disease p.(Arg169His), non-syndromic hearing loss p.(Glu465Ala) and congenital heart disease with brain defects p.(Arg135Trp). To test the in vivo impact of these and previously described variants, we have established clinically-relevant assays using mRNA rescue of the vangl2 mutant zebrafish. We show that all variants disrupt Vangl2 function, although to different extents and depending on the developmental process. We also begin to identify that different VANGL2 missense variants may be haploinsufficient and discuss evidence in support of pathogenicity. Together, this study demonstrates that zebrafish present a suitable pipeline to investigate variants of unknown significance and suggests new avenues for investigation of the different developmental contexts of VANGL2 function that are clinically meaningful

    Mucormycosis co-infection in COVID-19 patients: An update

    Get PDF
    Mucormycosis (MCM) is a rare fungal disorder that has recently been increased in parallel with novel COVID-19 infection. MCM with COVID-19 is extremely lethal, particularly in immunocompromised individuals. The collection of available scientific information helps in the management of this co-infection, but still, the main question on COVID-19, whether it is occasional, participatory, concurrent, or coincidental needs to be addressed. Several case reports of these co-infections have been explained as causal associations, but the direct contribution in immunocompromised individuals remains to be explored completely. This review aims to provide an update that serves as a guide for the diagnosis and treatment of MCM patients’ co-infection with COVID-19. The initial report has suggested that COVID-19 patients might be susceptible to developing invasive fungal infections by different species, including MCM as a co-infection. In spite of this, co-infection has been explored only in severe cases with common triangles: diabetes, diabetes ketoacidosis, and corticosteroids. Pathogenic mechanisms in the aggressiveness of MCM infection involves the reduction of phagocytic activity, attainable quantities of ferritin attributed with transferrin in diabetic ketoacidosis, and fungal heme oxygenase, which enhances iron absorption for its metabolism. Therefore, severe COVID-19 cases are associated with increased risk factors of invasive fungal co-infections. In addition, COVID-19 infection leads to reduction in cluster of differentiation, especially CD4+ and CD8+ T cell counts, which may be highly implicated in fungal co-infections. Thus, the progress in MCM management is dependent on a different strategy, including reduction or stopping of implicit predisposing factors, early intake of active antifungal drugs at appropriate doses, and complete elimination via surgical debridement of infected tissues

    The cost of link layer security in IoT embedded devices

    No full text
    Security of Internet of Things (IoT) devices is important for the acceptance of IoT applications. Several security mechanisms have been proposed, however, due to the limited resources in IoT devices, their overhead should be evaluated carefully. Many existing security solutions have been evaluated by simulation. However, with the increasing deployment of real nodes, a more accurate result based on real hardware is necessary. This research aims to evaluate the impact of applying security features of IEEE 802.15.4 on example hardware. The evaluation includes the impact on the Microcontroller Unit (MCU), radio, latency, packet throughput and transmission power. The results show that enabling software security services impact limited devices significantly. This impact could be translated into a decrease in throughput to almost 44%, an increase in latency and energy consumption to almost 197% and 86% respectively with maximum security level. The outcome of this paper is intended to benefit network designers and researchers by allowing them to model security overhead, allowing them to choose the security level, if enabled, which suits their application requirements.</p

    Information Security: Securing a Network Device with Passwords to Protect Information

    No full text
    Information security is a complex and critical subject, conventionally only tackled by well-trained and experienced professionals. The importance of an effective password policy at the device level is obvious and often entire networks can be brought down due to the lack of simple password security on a single device. Typically, there are numerous devices on a network but the router is at the heart of any network which connects Local Area Networks (LANs) to the outside world (Internet). The Internet is essentially a collection of different Internet Service Providers (ISPs) and routers using Border Gateway Protocol (BGP) providing connectivity between different ISPs around the globe. The Internet is expanding at an enormous speed and secure exchange of information is needed by organisations and individuals alike. This paper emphasises the need for an effective device-level password security as an essential component of a more comprehensive organisational security policy. As an illustration, a practical implementation of effective password security is carried out using one of the most widely deployed routers in the industry.KEYWORDS : Information Security, Password Policy, Border Gateway Protocol (BGP), Internet Service Provider (ISP), Local Area Network (LAN)PAPER TYPE : Empirica
    corecore