823 results on '"Adel, R."'
Search Results
2. A robust collocation method for time fractional PDEs based on mean value theorem and cubic B-splines
- Author
-
Adel R. Hadhoud, Fatma M. Gaafar, Faisal E. Abd Alaal, Ayman A. Abdelaziz, Salah Boulaaras, and Taha Radwan
- Subjects
35R11 ,34K20 ,35Bxx ,65Nxx ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
This paper explains and applies a numerical technique utilizing the cubic B-spline functions and the mean value theorem (MVT) to solve a general time fractional partial differential equation (FPDE). The MVT for integrals enables us to approximate the time fractional derivatives in an appropriate simple form. We use the cubic B-spline functions to construct the numerical solution and its spatial derivatives. The great advantage of our technique is that it enables us to approximate solutions of many time FPDEs for several choices of F(x, t, u, ux, uxx). Two numerical examples have been included to emphasize the accuracy and efficiency of the method. It is demonstrated that the numerical method is unconditionally stable by employing the Von Neumann method (VNM).
- Published
- 2024
- Full Text
- View/download PDF
3. A robust collocation method for time fractional PDEs based on mean value theorem and cubic B-splines
- Author
-
Hadhoud, Adel R., Gaafar, Fatma M., Alaal, Faisal E. Abd, Abdelaziz, Ayman A., Boulaaras, Salah, and Radwan, Taha
- Published
- 2024
- Full Text
- View/download PDF
4. Evaluating Ascon Hardware on 7-Series FPGA Devices
- Author
-
Adel R. Alharbi, Amer Aljaedi, Abdullah Aljuhni, Moahd K. Alghuson, Hussain Aldawood, and Sajjad Shaukat Jamal
- Subjects
Ascon ,lightweight ,cryptography ,hardware ,accelerator ,architecture ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The applications regarding the Internet of Things (IoT) demand lightweight and robust cryptographic solutions to ensure authenticated encryption with associated data (AEAD). Also, the lightweight cryptographic solutions that provide data confidentiality, integrity, and authenticity in a single algorithm are critical. In this regard, the CAESAR and NIST lightweight cryptography (LWC) competitions were concluded in 2019 and recently in 2023, respectively, with Ascon selected as the new LWC standard. Ascon has been evaluated (in the literature) for various characteristics, including some limited efforts on field-programmable gate array (FPGA) devices. A comprehensive evaluation of Ascon’s hardware implementation is still needed. Therefore, this work presents a unified hardware implementation of two variants of Ascon, i.e., Ascon-128 and Ascon-128a, to investigate the performance of the AEAD operation on 7-series FPGA devices up to the post-place and route level. For AEAD computations in our work, an iterative design-level approach with a finite-state machine (FSM)-based dedicated controller is employed. The benchmarking results show that Ascon utilizes 1632, 1497, 1904, and 1756 look-up tables on Virtex, Kintex, Spartan, and Artix 7-series FPGA devices, respectively. The operating frequencies on these devices are 335, 331, 309, and 317 MHz, with power consumptions of 239, 236, 219, and 222 mW. Consequently, our evaluation of Ascon demonstrates higher performance in operating frequency on Kintex-7 FPGA.
- Published
- 2024
- Full Text
- View/download PDF
5. DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication
- Author
-
Adel R. Alharbi, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Amer Aljaedi, Abdullah Aljuhni, and Dalal J. Alanazi
- Subjects
Binary elliptic curves ,point multiplication ,hardware design ,implementation ,FPGA ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve point multiplication Algorithm over $GF(2^{233})$ using Lopez-Dahab projective coordinates. Moreover, we propose a digit-parallel modular multiplier, which reduces clock cycles and improves throughput. Also, we provided how to use our proposed digit-parallel multiplier for post-quantum cryptography algorithms. In addition, we use the proposed digit-parallel multiplier with the square circuit to implement the Itoh-Tsujii inversion algorithm for modular inversion computation; this permits hardware resource minimization. An efficient finite-state machine controller is implemented for control functionalities. A figure of merit in throughput/area is defined for reasonable comparison to state-of-the-art. We provide implementation results after post-place-and-route on field-programmable gate array devices. On the Virtex-7 device, our design utilizes 3386 slices and requires 7218 clock cycles; it achieves a maximum frequency of 365 MHz and computes one point multiplication in $19.77\mu s$ . The total power consumption of our design is 2027 mW. The calculated values for throughput and figure of merit are 50.58Kbps and 14.93, respectively. Consequently, the implementation results and comparisons reveal our design’s suitability for applications requiring area and throughput-optimized cryptographic implementations.
- Published
- 2024
- Full Text
- View/download PDF
6. Impacts of kaolinite enrichment on biochar and hydrochar characterization, stability, toxicity, and maize germination and growth
- Author
-
Hamed A. Al-Swadi, Abdullah S. Al-Farraj, Mohammad I. Al-Wabel, Munir Ahmad, Adel R. A. Usman, Jahangir Ahmad, Mohammed Awad Mousa, and Muhammad Imran Rafique
- Subjects
Medicine ,Science - Abstract
Abstract In this study, biochar (BC) and hydrochar (HC) composites were synthesized with natural kaolinite clay and their properties, stability, carbon (C) sequestration potential, polycyclic aromatic hydrocarbons (PAHs) toxicity, and impacts on maize germination and growth were explored. Conocarpus waste was pretreated with 0%, 10%, and 20% kaolinite and pyrolyzed to produce BCs (BC, BCK10, and BCK20, respectively), while hydrothermalized to produce HCs (HC, HCK10, and HCK20, respectively). The synthesized materials were characterized using X-ray diffraction, scanning electron microscope analyses, Fourier transform infrared, thermogravimetric analysis, surface area, proximate analyses, and chemical analysis to investigate the distinction in physiochemical and structural characteristics. The BCs showed higher C contents (85.73–92.50%) as compared to HCs (58.81–61.11%). The BCs demonstrated a higher thermal stability, aromaticity, and C sequestration potential than HCs. Kaolinite enriched-BCs showed the highest cation exchange capacity than pristine BC (34.97% higher in BCK10 and 38.04% higher in BCK20 than pristine BC), while surface area was the highest in kaolinite composited HCs (202.8% higher in HCK10 and 190.2% higher in HCK20 than pristine HC). The recalcitrance index (R50) speculated a higher recalcitrance for BC, BCK10, and BCK20 (R50 > 0.7), minimal degradability for HCK10 and HCK20 (0.5
- Published
- 2024
- Full Text
- View/download PDF
7. On the Numerical Investigations of a Fractional-Order Mathematical Model for Middle East Respiratory Syndrome Outbreak
- Author
-
Faisal E. Abd Alaal, Adel R. Hadhoud, Ayman A. Abdelaziz, and Taha Radwan
- Subjects
fractional derivatives ,mathematical model ,fixed-point theorem ,mean value method (MVM) ,implicit trapezoidal method (ITM) ,stability ,Thermodynamics ,QC310.15-319 ,Mathematics ,QA1-939 ,Analysis ,QA299.6-433 - Abstract
Middle East Respiratory Syndrome (MERS) is a human coronavirus subtype that poses a significant public health concern due to its ability to spread between individuals. This research aims to develop a fractional-order mathematical model to investigate the MERS pandemic and to subsequently develop two numerical methods to solve this model numerically to evaluate and comprehend the analysis results. The fixed-point theorem has been used to demonstrate the existence and uniqueness of the solution to the suggested model. We approximate the solutions of the proposed model using two numerical methods: the mean value theorem and the implicit trapezoidal method. The stability of these numerical methods is studied using various results and primary lemmas. Finally, we compare the results of our methods to demonstrate their efficiency and conduct a numerical simulation of the obtained results. A comparative study based on real data from Riyadh, Saudi Arabia is provided. The study’s conclusions demonstrate the computational efficiency of our approaches in studying nonlinear fractional differential equations that arise in daily life problems.
- Published
- 2024
- Full Text
- View/download PDF
8. Using Fuzzy TOPSIS and Balanced Scorecard for Kaizen Evaluation
- Author
-
El Dardery Ola I.S., Gomaa Ismail, Rayan Adel R. M., Frendy, Khayat Ghada El, and Sabry Sara H.
- Subjects
balanced scorecard ,continuous improvement ,evaluation ,fuzzy topsis ,kaizen ,performance measurement ,q56 ,m41 ,h83 ,Business ,HF5001-6182 - Abstract
Kaizen is a very important continuous improvement technique; however, measuring kaizen results/benefits have not been clearly and comprehensively addressed by the literature.
- Published
- 2023
- Full Text
- View/download PDF
9. Employing the Laplace Residual Power Series Method to Solve (1+1)- and (2+1)-Dimensional Time-Fractional Nonlinear Differential Equations
- Author
-
Adel R. Hadhoud, Abdulqawi A. M. Rageh, and Taha Radwan
- Subjects
differential equations ,Laplace transform ,residual power series ,time-fractional differential equations ,Thermodynamics ,QC310.15-319 ,Mathematics ,QA1-939 ,Analysis ,QA299.6-433 - Abstract
In this paper, we present a highly efficient analytical method that combines the Laplace transform and the residual power series approach to approximate solutions of nonlinear time-fractional partial differential equations (PDEs). First, we derive the analytical method for a general form of fractional partial differential equations. Then, we apply the proposed method to find approximate solutions to the time-fractional coupled Berger equations, the time-fractional coupled Korteweg–de Vries equations and time-fractional Whitham–Broer–Kaup equations. Secondly, we extend the proposed method to solve the two-dimensional time-fractional coupled Navier–Stokes equations. The proposed method is validated through various test problems, measuring quality and efficiency using error norms E2 and E∞, and compared to existing methods.
- Published
- 2024
- Full Text
- View/download PDF
10. Emphysema Progression and Lung Function Decline Among Angiotensin Converting Enzyme Inhibitors and Angiotensin-Receptor Blockade Users in the COPDGene Cohort
- Author
-
Tejwani, Vickram, Fawzy, Ashraf, Putcha, Nirupama, Castaldi, Peter J, Cho, Michael H, Pratte, Katherine A, Bhatt, Surya P, Lynch, David A, Humphries, Stephen M, Kinney, Gregory L, D’Alessio, Franco R, Hansel, Nadia N, Crapo, James D, Silverman, Edwin K, Make, Barry J, Regan, Elizabeth A, Beaty, Terri, Begum, Ferdouse, Cho, Michael, DeMeo, Dawn L, Boueiz, Adel R, Foreman, Marilyn G, Halper-Stromberg, Eitan, Hayden, Lystra P, Hersh, Craig P, Hetmanski, Jacqueline, Hobbs, Brian D, Hokanson, John E, Laird, Nan, Lange, Christoph, Lutz, Sharon M, McDonald, Merry-Lynn, Parker, Margaret M, Prokopenko, Dmitry, Qiao, Dandi, Regan, Elizabeth, Sakornsakolpat, Phuwanat, Wan, Emily S, Won, Sungho, Centeno, Juan Pablo, Charbonnier, Jean-Paul, Coxson, Harvey O, Galban, Craig J, Han, MeiLan K, Hoffman, Eric A, Humphries, Stephen, Jacobson, Francine L, Judy, Philip F, Kazerooni, Ella A, Kluiber, Alex, Nardelli, Pietro, Newell, John D, Notary, Aleena, Oh, Andrea, Ross, James C, San Jose Estepar, Raul, Schroeder, Joyce, Sieren, Jered, Stoel, Berend C, Tschirren, Juerg, Van Beek, Edwin, Ginneken, Bramvan, van Rikxoort, Eva, Sanchez-Ferrero, Gonzalo Vegas, Veitel, Lucas, Washko, George R, Wilson, Carla G, Jensen, Robert, Everett, Douglas, Crooks, Jim, Pratte, Katherine, Strand, Matt, Kinney, Gregory, Young, Kendra A, Bon, Jessica, Diaz, Alejandro A, Make, Barry, Murray, Susan, Soler, Xavier, Bowler, Russell P, Kechris, Katerina, Banaei-Kashani, Farnoush, Curtis, Jeffrey L, Pernicano, Perry G, Hanania, Nicola, Atik, Mustafa, Boriek, Aladin, Guntupalli, Kalpatha, and Guy, Elizabeth
- Subjects
Biomedical and Clinical Sciences ,Cardiovascular Medicine and Haematology ,Clinical Sciences ,Clinical Research ,Emphysema ,Lung ,Tobacco ,Chronic Obstructive Pulmonary Disease ,Tobacco Smoke and Health ,Cancer ,Respiratory ,Aged ,Angiotensin Receptor Antagonists ,Angiotensin-Converting Enzyme Inhibitors ,Cohort Studies ,Disease Progression ,Female ,Forced Expiratory Volume ,Humans ,Lung Volume Measurements ,Male ,Middle Aged ,Prospective Studies ,Protective Factors ,Pulmonary Disease ,Chronic Obstructive ,Pulmonary Emphysema ,Spirometry ,Tomography ,X-Ray Computed ,Vital Capacity ,Walk Test ,angiotensin II ,COPD ,emphysema progression ,COPDGene Investigators ,Respiratory System ,Cardiovascular medicine and haematology ,Clinical sciences - Abstract
BackgroundAttenuation of transforming growth factor β by blocking angiotensin II has been shown to reduce emphysema in a murine model. General population studies have demonstrated that the use of angiotensin converting enzyme inhibitors (ACEis) and angiotensin-receptor blockers (ARBs) is associated with reduction of emphysema progression in former smokers and that the use of ACEis is associated with reduction of FEV1 progression in current smokers.Research questionIs use of ACEi and ARB associated with less progression of emphysema and FEV1 decline among individuals with COPD or baseline emphysema?MethodsFormer and current smokers from the Genetic Epidemiology of COPD Study who attended baseline and 5-year follow-up visits, did not change smoking status, and underwent chest CT imaging were included. Adjusted linear mixed models were used to evaluate progression of adjusted lung density (ALD), percent emphysema (%total lung volume
- Published
- 2021
11. The Association Between Lung Hyperinflation and Coronary Artery Disease in Smokers
- Author
-
Chandra, Divay, Gupta, Aman, Kinney, Gregory L, Fuhrman, Carl R, Leader, Joseph K, Diaz, Alejandro A, Bon, Jessica, Barr, R Graham, Washko, George, Budoff, Matthew, Hokanson, John, Sciurba, Frank C, Crapo, James D, Silverman, Edwin K, Make, Barry J, Regan, Elizabeth A, Beaty, Terri, Begum, Ferdouse, Boueiz, Adel R, Castaldi, Peter J, Cho, Michael, DeMeo, Dawn L, Foreman, Marilyn G, Halper-Stromberg, Eitan, Hayden, Lystra P, Hersh, Craig P, Hetmanski, Jacqueline, Hobbs, Brian D, Hokanson, John E, Laird, Nan, Lange, Christoph, Lutz, Sharon M, McDonald, Merry-Lynn, Parker, Margaret M, Prokopenko, Dmitry, Qiao, Dandi, Sakornsakolpat, Phuwanat, Wan, Emily S, Won, Sungho, Al Qaisi, Mustafa, Coxson, Harvey O, Gray, Teresa, Han, MeiLan K, Hoffman, Eric A, Humphries, Stephen, Jacobson, Francine L, Judy, Philip F, Kazerooni, Ella A, Kluiber, Alex, Lynch, David A, Newell, John D, Ross, James C, San Jose Estepar, Raul, Schroeder, Joyce, Sieren, Jered, Stinson, Douglas, Stoel, Berend C, Tschirren, Juerg, Van Beek, Edwin, van Ginneken, Bram, van Rikxoort, Eva, Wilson, Carla G, Jensen, Robert, Crooks, Jim, Everett, Douglas, Moore, Camille, Strand, Hughes, John, Kinney, Gregory, Pratte, Katherine, Young, Kendra A, Bhatt, Surya, Martinez, Carlos, Murray, Susan, Soler, Xavier, Banaei-Kashani, Farnoush, Bowler, Russell P, Kechris, Katerina, Curtis, Jeffrey L, Pernicano, Perry G, Hanania, Nicola, Atik, Mustafa, Boriek, Aladin, Guntupalli, Kalpatha, Guy, Elizabeth, and Parulekar, Amit
- Subjects
Biomedical and Clinical Sciences ,Cardiovascular Medicine and Haematology ,Clinical Sciences ,Tobacco Smoke and Health ,Emphysema ,Chronic Obstructive Pulmonary Disease ,Atherosclerosis ,Biomedical Imaging ,Clinical Research ,Heart Disease - Coronary Heart Disease ,Heart Disease ,Lung ,Tobacco ,Cardiovascular ,Prevention ,Respiratory ,Good Health and Well Being ,Airway Obstruction ,Airway Remodeling ,Asymptomatic Diseases ,Biological Variation ,Population ,Coronary Artery Disease ,Coronary Vessels ,Female ,Humans ,Male ,Middle Aged ,Organ Size ,Plethysmography ,Pulmonary Emphysema ,Respiratory Function Tests ,Risk Factors ,Smoking ,Tomography ,X-Ray Computed ,United States ,COPD ,coronary artery disease ,lung hyperinflation ,smoking ,COPDGene Investigators ,Respiratory System ,Cardiovascular medicine and haematology ,Clinical sciences - Abstract
BackgroundSmokers manifest varied phenotypes of pulmonary impairment.Research questionWhich pulmonary phenotypes are associated with coronary artery disease (CAD) in smokers?Study design and methodsWe analyzed data from the University of Pittsburgh COPD Specialized Center for Clinically Oriented Research (SCCOR) cohort (n = 481) and the Genetic Epidemiology of COPD (COPDGene) cohort (n = 2,580). Participants were current and former smokers with > 10 pack-years of tobacco exposure. Data from the two cohorts were analyzed separately because of methodologic differences. Lung hyperinflation was assessed by plethysmography in the SCCOR cohort and by inspiratory and expiratory CT scan lung volumes in the COPDGene cohort. Subclinical CAD was assessed as the coronary artery calcium score, whereas clinical CAD was defined as a self-reported history of CAD or myocardial infarction (MI). Analyses were performed in all smokers and then repeated in those with airflow obstruction (FEV1 to FVC ratio, < 0.70).ResultsPulmonary phenotypes, including airflow limitation, emphysema, lung hyperinflation, diffusion capacity, and radiographic measures of airway remodeling, showed weak to moderate correlations (r < 0.7) with each other. In multivariate models adjusted for pulmonary phenotypes and CAD risk factors, lung hyperinflation was the only phenotype associated with calcium score, history of clinical CAD, or history of MI (per 0.2 higher expiratory and inspiratory CT scan lung volume; coronary calcium: OR, 1.2; 95% CI, 1.1-1.5; P = .02; clinical CAD: OR, 1.6; 95% CI, 1.1-2.3; P = .01; and MI in COPDGene: OR, 1.7; 95% CI, 1.0-2.8; P = .05). FEV1 and emphysema were associated with increased risk of CAD (P < .05) in models adjusted for CAD risk factors; however, these associations were attenuated on adjusting for lung hyperinflation. Results were the same in those with airflow obstruction and were present in both cohorts.InterpretationLung hyperinflation is associated strongly with clinical and subclinical CAD in smokers, including those with airflow obstruction. After lung hyperinflation was accounted for, FEV1 and emphysema no longer were associated with CAD. Subsequent studies should consider measuring lung hyperinflation and examining its mechanistic role in CAD in current and former smokers.
- Published
- 2021
12. Numerical Methods Based on the Hybrid Shifted Orthonormal Polynomials and Block-Pulse Functions for Solving a System of Fractional Differential Equations
- Author
-
Abdulqawi A. M. Rageh and Adel R. Hadhoud
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper develops two numerical methods for solving a system of fractional differential equations based on hybrid shifted orthonormal Bernstein polynomials with generalized block-pulse functions (HSOBBPFs) and hybrid shifted orthonormal Legendre polynomials with generalized block-pulse functions (HSOLBPFs). Using these hybrid bases and the operational matrices method, the system of fractional differential equations is reduced to a system of algebraic equations. Error analysis is performed and some simulation examples are provided to demonstrate the efficacy of the proposed techniques. The numerical results of the proposed methods are compared to those of the existing numerical methods. These approaches are distinguished by their ability to work on the wide interval 0,a, as well as their high accuracy and rapid convergence, demonstrating the utility of the proposed approaches over other numerical methods.
- Published
- 2024
- Full Text
- View/download PDF
13. Redefined Quintic B-Spline Collocation Method to Solve the Time-Fractional Whitham-Broer-Kaup Equations
- Author
-
Adel R. Hadhoud and Abdulqawi A. M. Rageh
- Subjects
Mathematics ,QA1-939 ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
This article proposes a collocation approach based on a redefined quintic B-spline basis for solving the time-fractional Whitham-Broer-Kaup equations. The presented method involves discretizing the time-fractional derivatives using an L1-approximation scheme and then approximating the spatial derivatives using the redefined quintic B-spline basis. The von Neumann technique has been used to demonstrate that the proposed method is unconditionally stable. The error estimates are discussed and show that the proposed method is third-order convergent. The results demonstrate the potential of the proposed method as a reliable tool for solving fractional differential equations.
- Published
- 2024
- Full Text
- View/download PDF
14. System decomposition method-based global stability criteria for T-S fuzzy Clifford-valued delayed neural networks with impulses and leakage term
- Author
-
Abdulaziz M. Alanazi, R. Sriraman, R. Gurusamy, S. Athithan, P. Vignesh, Zaid Bassfar, Adel R. Alharbi, and Amer Aljaedi
- Subjects
global asymptotic stability ,clifford-valued neural networks ,lyapunov-krasovskii functionals ,takagi-sugeno fuzzy ,impulses ,Mathematics ,QA1-939 - Abstract
This paper investigates the global asymptotic stability problem for a class of Takagi-Sugeno fuzzy Clifford-valued delayed neural networks with impulsive effects and leakage delays using the system decomposition method. By applying Takagi-Sugeno fuzzy theory, we first consider a general form of Takagi-Sugeno fuzzy Clifford-valued delayed neural networks. Then, we decompose the considered -dimensional Clifford-valued systems into -dimensional real-valued systems in order to avoid the inconvenience caused by the non-commutativity of the multiplication of Clifford numbers. By using Lyapunov-Krasovskii functionals and integral inequalities, we derive new sufficient criteria to guarantee the global asymptotic stability for the considered neural networks. Further, the results of this paper are presented in terms of real-valued linear matrix inequalities, which can be directly solved using the MATLAB LMI toolbox. Finally, a numerical example is provided with their simulations to demonstrate the validity of the theoretical analysis.
- Published
- 2023
- Full Text
- View/download PDF
15. Prevalent and Incident Anemia in PARADIGM-HF and the Effect of Sacubitril/Valsartan
- Author
-
Curtain, James P., Adamson, Carly, Docherty, Kieran F., Jhund, Pardeep S., Desai, Akshay S., Lefkowitz, Martin P., Rizkala, Adel R., Rouleau, Jean L., Swedberg, Karl, Zile, Michael R., Solomon, Scott D., Packer, Milton, and McMurray, John J.V.
- Published
- 2023
- Full Text
- View/download PDF
16. Machine Learning Characterization of COPD Subtypes Insights From the COPDGene Study
- Author
-
Castaldi, Peter J, Boueiz, Adel, Yun, Jeong, San Jose Estepar, Raul, Ross, James C, Washko, George, Cho, Michael H, Hersh, Craig P, Kinney, Gregory L, Young, Kendra A, Regan, Elizabeth A, Lynch, David A, Criner, Gerald J, Dy, Jennifer G, Rennard, Stephen I, Casaburi, Richard, Make, Barry J, Crapo, James, Silverman, Edwin K, Hokanson, John E, Crapo, James D, Beaty, Terri, Begum, Ferdouse, Cho, Michael, DeMeo, Dawn L, Boueiz, Adel R, Foreman, Marilyn G, Halper-Stromberg, Eitan, Hayden, Lystra P, Hetmanski, Jacqueline, Hobbs, Brian D, Laird, Nan, Lange, Christoph, Lutz, Sharon M, McDonald, Merry-Lynn, Parker, Margaret M, Prokopenko, Dmitry, Qiao, Dandi, Regan, Elizabeth, Sakornsakolpat, Phuwanat, Wan, Emily S, Won, Sungho, Centeno, Juan Pablo, Charbonnier, Jean-Paul, Coxson, Harvey O, Galban, Craig J, Han, MeiLan K, Hoffman, Eric A, Humphries, Stephen, Jacobson, Francine L, Judy, Philip F, Kazerooni, Ella A, Kluiber, Alex, Nardelli, Pietro, Newell, John D, Notary, Aleena, Oh, Andrea, Schroeder, Joyce, Sieren, Jered, Stoel, Berend C, Tschirren, Juerg, Van Beek, Edwin, van Ginneken, Bram, van Rikxoort, Eva, Sanchez-Ferrero, Gonzalo Vegas, Veitel, Lucas, Washko, George R, Wilson, Carla G, Jensen, Robert, Everett, Douglas, Crooks, Jim, Pratte, Katherine, Strand, Matt, Kinney, Gregory, Bhatt, Surya P, Bon, Jessica, Diaz, Alejandro A, Make, Barry, Murray, Susan, Soler, Xavier, Bowler, Russell P, and Kechris, Katerina
- Subjects
Biomedical and Clinical Sciences ,Cardiovascular Medicine and Haematology ,Clinical Sciences ,Genetics ,Chronic Obstructive Pulmonary Disease ,Lung ,2.1 Biological and endogenous factors ,Aetiology ,Respiratory ,Cluster Analysis ,Diagnostic Imaging ,Disease Progression ,Genetic Predisposition to Disease ,Genome-Wide Association Study ,Humans ,Machine Learning ,Molecular Epidemiology ,Phenotype ,Pulmonary Disease ,Chronic Obstructive ,Respiratory Function Tests ,COPD ,emphysema ,machine learning ,COPDGene Investigators ,Respiratory System ,Cardiovascular medicine and haematology ,Clinical sciences - Abstract
COPD is a heterogeneous syndrome. Many COPD subtypes have been proposed, but there is not yet consensus on how many COPD subtypes there are and how they should be defined. The COPD Genetic Epidemiology Study (COPDGene), which has generated 10-year longitudinal chest imaging, spirometry, and molecular data, is a rich resource for relating COPD phenotypes to underlying genetic and molecular mechanisms. In this article, we place COPDGene clustering studies in context with other highly cited COPD clustering studies, and summarize the main COPD subtype findings from COPDGene. First, most manifestations of COPD occur along a continuum, which explains why continuous aspects of COPD or disease axes may be more accurate and reproducible than subtypes identified through clustering methods. Second, continuous COPD-related measures can be used to create subgroups through the use of predictive models to define cut-points, and we review COPDGene research on blood eosinophil count thresholds as a specific example. Third, COPD phenotypes identified or prioritized through machine learning methods have led to novel biological discoveries, including novel emphysema genetic risk variants and systemic inflammatory subtypes of COPD. Fourth, trajectory-based COPD subtyping captures differences in the longitudinal evolution of COPD, addressing a major limitation of clustering analyses that are confounded by disease severity. Ongoing longitudinal characterization of subjects in COPDGene will provide useful insights about the relationship between lung imaging parameters, molecular markers, and COPD progression that will enable the identification of subtypes based on underlying disease processes and distinct patterns of disease progression, with the potential to improve the clinical relevance and reproducibility of COPD subtypes.
- Published
- 2020
17. Disease Progression Modeling in Chronic Obstructive Pulmonary Disease
- Author
-
Young, Alexandra L, Bragman, Felix JS, Rangelov, Bojidar, Han, MeiLan K, Galbán, Craig J, Lynch, David A, Hawkes, David J, Alexander, Daniel C, Hurst, John R, Crapo, James D, Silverman, Edwin K, Make, Barry J, Regan, Elizabeth A, Beaty, Terri, Begum, Ferdouse, Castaldi, Peter J, Cho, Michael, DeMeo, Dawn L, Boueiz, Adel R, Foreman, Marilyn G, Halper-Stromberg, Eitan, Hayden, Lystra P, Hersh, Craig P, Hetmanski, Jacqueline, Hobbs, Brian D, Hokanson, John E, Laird, Nan, Lange, Christoph, Lutz, Sharon M, McDonald, Merry-Lynn, Parker, Margaret M, Qiao, Dandi, Wan, Emily S, Won, Sungho, Sakornsakolpat, Phuwanat, Prokopenko, Dmitry, Al Qaisi, Mustafa, Coxson, Harvey O, Gray, Teresa, Hoffman, Eric A, Humphries, Stephen, Jacobson, Francine L, Judy, Philip F, Kazerooni, Ella A, Kluiber, Alex, Newell, John D, Ross, James C, Estepar, Raul San Jose, Schroeder, Joyce, Sieren, Jered, Stinson, Douglas, Stoel, Berend C, Tschirren, Juerg, Van Beek, Edwin, van Ginneken, Bram, van Rikxoort, Eva, Washko, George, Wilson, Carla G, Jensen, Robert, Everett, Douglas, Crooks, Jim, Moore, Camille, Strand, Matt, Hughes, John, Kinney, Gregory, Pratte, Katherine, Young, Kendra A, Bhatt, Surya, Bon, Jessica, Martinez, Carlos, Murray, Susan, Soler, Xavier, Bowler, Russell P, Kechris, Katerina, Banaei-Kashani, Farnoush, Curtis, Jeffrey L, Martinez, Carlos H, Pernicano, Perry G, Hanania, Nicola, Alapat, Philip, Atik, Mustafa, Bandi, Venkata, Boriek, Aladin, Guntupalli, Kalpatha, Guy, Elizabeth, Nachiappan, Arun, Parulekar, Amit, Barr, R Graham, Austin, John, D’Souza, Belinda, Pearson, Gregory DN, Rozenshtein, Anna, Thomashow, Byron, MacIntyre, Neil, McAdams, H Page, Washington, Lacey, McEvoy, Charlene, and Tashjian, Joseph
- Subjects
Biomedical Imaging ,Lung ,Clinical Research ,Chronic Obstructive Pulmonary Disease ,Aetiology ,4.2 Evaluation of markers and technologies ,Detection ,screening and diagnosis ,4.1 Discovery and preclinical testing of markers and technologies ,2.1 Biological and endogenous factors ,Respiratory ,Aged ,Disease Progression ,Female ,Humans ,Male ,Middle Aged ,Models ,Theoretical ,Pulmonary Disease ,Chronic Obstructive ,Tomography ,X-Ray Computed ,clustering ,CT imaging ,emphysema ,bronchitis ,chronic obstructive pulmonary disease ,COPDGene Investigators ,Medical and Health Sciences ,Respiratory System - Abstract
Rationale: The decades-long progression of chronic obstructive pulmonary disease (COPD) renders identifying different trajectories of disease progression challenging.Objectives: To identify subtypes of patients with COPD with distinct longitudinal progression patterns using a novel machine-learning tool called "Subtype and Stage Inference" (SuStaIn) and to evaluate the utility of SuStaIn for patient stratification in COPD.Methods: We applied SuStaIn to cross-sectional computed tomography imaging markers in 3,698 Global Initiative for Chronic Obstructive Lung Disease (GOLD) 1-4 patients and 3,479 controls from the COPDGene (COPD Genetic Epidemiology) study to identify subtypes of patients with COPD. We confirmed the identified subtypes and progression patterns using ECLIPSE (Evaluation of COPD Longitudinally to Identify Predictive Surrogate Endpoints) data. We assessed the utility of SuStaIn for patient stratification by comparing SuStaIn subtypes and stages at baseline with longitudinal follow-up data.Measurements and Main Results: We identified two trajectories of disease progression in COPD: a "Tissue→Airway" subtype (n = 2,354, 70.4%), in which small airway dysfunction and emphysema precede large airway wall abnormalities, and an "Airway→Tissue" subtype (n = 988, 29.6%), in which large airway wall abnormalities precede emphysema and small airway dysfunction. Subtypes were reproducible in ECLIPSE. Baseline stage in both subtypes correlated with future FEV1/FVC decline (r = -0.16 [P
- Published
- 2020
18. Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution
- Author
-
Adel R. Alharbi, Sajjad Shaukat Jamal, Muhammad Fahad Khan, Mohammad Asif Gondal, and Aaqif Afzaal Abbasi
- Subjects
Symmetric cipher ,block cipher ,S-Box optimization ,PRNG ,S-Box construction ,Gaussian distribution ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Block ciphers are widely used for securing data and are known for their resistance to various types of attacks. The strength of a block cipher against these attacks often depends on the S-boxes used in the cipher. There are many chaotic map-based techniques in the literature for constructing the dynamic S-Boxes. While chaos-based approaches have certain attractive properties for this purpose, they also have some inherent weaknesses, including finite precision effect, dynamical degradation of chaotic systems, non-uniform distribution, discontinuity in chaotic sequences. These weaknesses can limit the effectiveness of chaotic map-based substitution boxes. In this paper, we propose an innovative approach for constructing dynamic S-boxes using Gaussian distribution-based pseudo-random sequences. The proposed technique overcomes the weaknesses of existing chaos-based S-box techniques by leveraging the strength of pseudo-randomness sequences. However, one of the main drawbacks of using Gaussian distribution-based pseudo-random sequences is the low nonlinearity of the resulting S-boxes. To address this limitation, we introduce the use of genetic algorithms (GA) to optimize the nonlinearity of Gaussian distribution-based S-boxes while preserving a high level of randomness. The proposed technique is evaluated using standard S-box performance criteria, including nonlinearity, bit independence criterion (BIC), linear approximation probability (LP), strict avalanche criterion (SAC), and differential approximation probability (DP). Results demonstrate that the proposed technique achieves a maximum nonlinearity of 112, which is comparable to the ASE algorithm.
- Published
- 2023
- Full Text
- View/download PDF
19. Association between genetic polymorphism, severity, and treatment response among COVID-19 infected Egyptian patients
- Author
-
Abdelrahman Alaa, Neven Sarhan, Mohamed Gamal Lotfy El-Ansary, Naglaa Samir Bazan, Khaled Farouk, Raed Shahat Ismail, Mona Farag Schalaan, and Adel R. A. Abd-Allah
- Subjects
COVID-19 ,ACE2 ,ACE1 ,TMPRSS2 ,severity ,genetic polymorphism ,Therapeutics. Pharmacology ,RM1-950 - Abstract
Background: The world has been suffering from the Coronavirus Disease-2019 (COVID-19) pandemic since the end of 2019. The COVID-19-infected patients differ in the severity of the infection and the treatment response. Several studies have been conducted to explore the factors that affect the severity of COVID-19 infection. One of these factors is the polymorphism of the angiotensin converting enzyme 2 (ACE-2) and the type 2 transmembrane serine protease (TMPRSS2) genes since these two proteins have a role in the entry of the virus into the cell. Also, the ACE-1 regulates the ACE-2 expression, so it is speculated to influence the COVID-19 severity.Objective: This study investigates the relationship between the ACE-1, ACE-2, and TMPRSS2 genes single nucleotide polymorphism (SNPs) and the COVID-19 disease severity, treatment response, need for hospitalization, and ICU admission in Egyptian patients.Patients and Methods: The current study is an observational prospective, cohort study, in which 109 total COVID-19 patients and 20 healthy volunteers were enrolled. Of those 109 patients, 51 patients were infected with the non-severe disease and were treated in an outpatient setting, and 58 suffered from severe disease and required hospitalization and were admitted to the ICU. All 109 COVID-19 patients received the treatment according to the Egyptian treatment protocol.Results: Genotypes and allele frequencies among severe and non-severe patients were determined for ACE-1 rs4343, TMPRSS2 rs12329760, and ACE-2 rs908004. The GG genotype and the wild allele of the ACE-2 rs908004 and the mutant allele of the ACE-1 rs4343 were significantly more predominant in severe patients. In contrast, no significant association existed between the TMPRSS2 rs12329760 genotypes or alleles and the disease severity.Conclusion: The results of this study show that the ACE-1 and ACE-2 SNPs can be used as severity predictors for COVID-19 infection since also they have an effect on length of hospitalization.
- Published
- 2023
- Full Text
- View/download PDF
20. Sources, toxicity potential, and human health risk assessment of heavy metals-laden soil and dust of urban and suburban areas as affected by industrial and mining activities
- Author
-
Hamed A. Al-Swadi, Adel R. A. Usman, Abdullah S. Al-Farraj, Mohammad I. Al-Wabel, Munir Ahmad, and Abdulelah Al-Faraj
- Subjects
Medicine ,Science - Abstract
Abstract Sources and levels of heavy metals (HMs) in soil and dust of urban and suburban areas in Riyadh (industrial city) and Mahad AD’Dahab (mining area) cities in Saudi Arabia were reported in this study. Additionally, the concentrations of HMs in different soil particle size fractions (> 250, 63–250 and 2). The hazard index values of dust and soil ( 1, suggesting non-carcinogenic risk. Therefore, the dust and soil samples from the mined area of Mahad AD’Dahab had a higher pollution levels, as well as ecological and human health risks than those from Riyadh. Hence, the pollution of such residential environments with HMs (especially Cd, Cu, Zn, and Pb) needs to be monitored.
- Published
- 2022
- Full Text
- View/download PDF
21. Sacubitril/Valsartan and Frailty in Patients With Heart Failure and Preserved Ejection Fraction
- Author
-
Butt, Jawad H., Dewan, Pooja, Jhund, Pardeep S., Anand, Inder S., Atar, Dan, Ge, Junbo, Desai, Akshay S., Echeverria, Luis E., Køber, Lars, Lam, Carolyn S.P., Maggioni, Aldo P., Martinez, Felipe, Packer, Milton, Rouleau, Jean L., Sim, David, Van Veldhuisen, Dirk J., Vrtovec, Bojan, Zannad, Faiez, Zile, Michael R., Gong, Jianjian, Lefkowitz, Martin P., Rizkala, Adel R., Solomon, Scott D., and McMurray, John J.V.
- Published
- 2022
- Full Text
- View/download PDF
22. Sources, toxicity potential, and human health risk assessment of heavy metals-laden soil and dust of urban and suburban areas as affected by industrial and mining activities
- Author
-
Al-Swadi, Hamed A., Usman, Adel R. A., Al-Farraj, Abdullah S., Al-Wabel, Mohammad I., Ahmad, Munir, and Al-Faraj, Abdulelah
- Published
- 2022
- Full Text
- View/download PDF
23. On the Numerical Investigations of a Fractional-Order Mathematical Model for Middle East Respiratory Syndrome Outbreak.
- Author
-
Abd Alaal, Faisal E., Hadhoud, Adel R., Abdelaziz, Ayman A., and Radwan, Taha
- Subjects
- *
MIDDLE East respiratory syndrome , *NONLINEAR differential equations , *FRACTIONAL differential equations , *PUBLIC health , *CORONAVIRUSES - Abstract
Middle East Respiratory Syndrome (MERS) is a human coronavirus subtype that poses a significant public health concern due to its ability to spread between individuals. This research aims to develop a fractional-order mathematical model to investigate the MERS pandemic and to subsequently develop two numerical methods to solve this model numerically to evaluate and comprehend the analysis results. The fixed-point theorem has been used to demonstrate the existence and uniqueness of the solution to the suggested model. We approximate the solutions of the proposed model using two numerical methods: the mean value theorem and the implicit trapezoidal method. The stability of these numerical methods is studied using various results and primary lemmas. Finally, we compare the results of our methods to demonstrate their efficiency and conduct a numerical simulation of the obtained results. A comparative study based on real data from Riyadh, Saudi Arabia is provided. The study's conclusions demonstrate the computational efficiency of our approaches in studying nonlinear fractional differential equations that arise in daily life problems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
- Author
-
Amer Aljaedi, Muhammad Rashid, Sajjad Shaukat Jamal, Adel R. Alharbi, and Mohammed Alotaibi
- Subjects
hardware ,accelerator ,elliptic curve cryptography ,point multiplication ,FPGA ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
This article proposes a flexible hardware accelerator optimized from a throughput and area point of view for the computationally intensive part of elliptic curve cryptography. The target binary fields, defined by the National Institute of Standards and Technology, are GF(2163), GF(2233), GF(2283), GF(2409), and GF(2571). For the optimization of throughput, the proposed accelerator employs a digit-parallel multiplier. The size of the digit is 41 bits. The proposed accelerator has reused the multiplication and squaring circuit for area optimization to compute modular inversions. Flexibility is included using three additional buffers on top of the proposed accelerator architecture to load different input parameters. Finally, a dedicated controller is used to optimize control signal handling. The architecture is modeled using Verilog and implemented up to the post-place-and-route level on a Xilinx Virtex-7 field-programmable gate array. The area utilization of our accelerator in slices is 1479, 1998, 2573, 3271, and 4469 for m=163 to 571. The time needed to perform one-point multiplication is 7.15, 10.60, 13.26, 20.96, and 30.42 μs. Similarly, the throughput over area figures for the same key lengths are 94.56, 47.21, 29.30, 14.58, and 7.35. Consequently, achieved results and a comprehensive performance comparison show the suitability of the proposed design for constrained environments that demand throughput/area-efficient implementations.
- Published
- 2023
- Full Text
- View/download PDF
25. CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps
- Author
-
Chandrashekhar Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Adel R. Alharbi, Sarita Gajbhiye Meshram, and Iqtadar Hussain
- Subjects
Certificateless group signcryption scheme (CGSS) ,fractional chaotic maps (FCM) ,provably secure scheme ,authentication ,Diffie-Hellman (DH) problem ,wireless security networks ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In recent years, there has been a lot of research interest in analyzing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more realistic solution for achieving message confidentiality and authentication simultaneously. However, the security of a signcryption scheme is questionable when deployed in modern safety-critical systems, especially as billions of sensitive user information is transmitted over open communication channels. In order to address this problem, a lightweight, provably secure certificateless technique that uses Fractional Chaotic Maps (FCM) for group-oriented signcryption (CGST) is proposed. The main feature of the CGST-FCM technique is that any group signcrypter may encrypt data/information with the group manager (GM) and have it sent to the verifier seamlessly. This implies the legitimacy of the signcrypted information/data is verifiable using the public conditions of the group, but they cannot link it to the conforming signcrypter. In this scenario, valid signcrypted information/data cannot be produced by the GM or any signcrypter in that category alone. However, the GM is allowed to reveal the identity of the signcrypter when there is a legal conflict to restrict repudiation of the signature. Generally, the CGST-FCM technique is protected from the indistinguishably chosen ciphertext attack (IND-CCA). Additionally, the computationally difficult Diffie-Hellman (DH) problems have been used to build unlinkability, untraceability, unforgeability, and robustness of the projected CGST-FCM scheme. Finally, the security investigation of the presented CGST-FCM technique shows appreciable consistency and high efficiency when applied in real-time security applications.
- Published
- 2022
- Full Text
- View/download PDF
26. Blood eosinophil count thresholds and exacerbations in patients with chronic obstructive pulmonary disease
- Author
-
Yun, Jeong H, Lamb, Andrew, Chase, Robert, Singh, Dave, Parker, Margaret M, Saferali, Aabida, Vestbo, Jørgen, Tal-Singer, Ruth, Castaldi, Peter J, Silverman, Edwin K, Hersh, Craig P, Crapo, James D, Make, Barry J, Regan, Elizabeth A, Beaty, Terri, Begum, Ferdouse, Busch, Robert, Cho, Michael, DeMeo, Dawn L, Boueiz, Adel R, Foreman, Marilyn G, Halper-Stromberg, Eitan, Hansel, Nadia N, Hardin, Megan E, Hayden, Lystra P, Hetmanski, Jacqueline, Hobbs, Brian D, Hokanson, John E, Laird, Nan, Lange, Christoph, Lutz, Sharon M, McDonald, Merry-Lynn, Qiao, Dandi, Santorico, Stephanie, Silverman, E, Wan, Emily S, Won, Sungho, Qaisi, Mustafa Al, Coxson, Harvey O, Gray, Teresa, Han, MeiLan K, Hoffman, Eric A, Humphries, Stephen, Jacobson, Francine L, Judy, Philip F, Kazerooni, Ella A, Kluiber, Alex, Lynch, David A, Newell, John D, Ross, James C, San Jose Estepar, Raul, Schroeder, Joyce, Sieren, Jered, Stinson, Douglas, Stoel, Berend C, Tschirren, Juerg, Van Beek, Edwin, van Ginneken, Bram, van Rikxoort, Eva, Washko, George, Wilson, Carla G, Jensen, Robert, Everett, Douglas, Crooks, Jim, Moore, Camille, Strand, Matt, Hughes, John, Kinney, Gregory, Pratte, Katherine, Young, Kendra A, Curtis, Jeffrey L, Martinez, Carlos H, Pernicano, Perry G, Hanania, Nicola, Alapat, Philip, Atik, Mustafa, Bandi, Venkata, Boriek, Aladin, Guntupalli, Kalpatha, Guy, Elizabeth, Nachiappan, Arun, Parulekar, Amit, Hersh, Craig, Barr, R Graham, Austin, John, D'Souza, Belinda, Pearson, Gregory DN, and Rozenshtein, Anna
- Subjects
Lung ,Chronic Obstructive Pulmonary Disease ,Clinical Research ,Respiratory ,Aged ,Disease Progression ,Eosinophils ,Female ,Humans ,Leukocyte Count ,Longitudinal Studies ,Male ,Middle Aged ,Observational Studies as Topic ,Pulmonary Disease ,Chronic Obstructive ,Chronic obstructive pulmonary disease ,asthma ,eosinophil ,exacerbation ,COPDGene and ECLIPSE Investigators ,Immunology ,Allergy - Abstract
BACKGROUND:Eosinophilic airway inflammation in patients with chronic obstructive pulmonary disease (COPD) is associated with exacerbations and responsivity to steroids, suggesting potential shared mechanisms with eosinophilic asthma. However, there is no consistent blood eosinophil count that has been used to define the increased exacerbation risk. OBJECTIVE:We sought to investigate blood eosinophil counts associated with exacerbation risk in patients with COPD. METHODS:Blood eosinophil counts and exacerbation risk were analyzed in patients with moderate-to-severe COPD by using 2 independent studies of former and current smokers with longitudinal data. The Genetic Epidemiology of COPD (COPDGene) study was analyzed for discovery (n = 1,553), and the Evaluation of COPD Longitudinally to Identify Predictive Surrogate Endpoints (ECLIPSE) study was analyzed for validation (n = 1,895). A subset of the ECLIPSE study subjects were used to assess the stability of blood eosinophil counts over time. RESULTS:COPD exacerbation risk increased with higher eosinophil counts. An eosinophil count threshold of 300 cells/μL or greater showed adjusted incidence rate ratios for exacerbations of 1.32 in the COPDGene study (95% CI, 1.10-1.63). The cutoff of 300 cells/μL or greater was validated for prospective risk of exacerbation in the ECLIPSE study, with adjusted incidence rate ratios of 1.22 (95% CI, 1.06-1.41) using 3-year follow-up data. Stratified analysis confirmed that the increased exacerbation risk associated with an eosinophil count of 300 cells/μL or greater was driven by subjects with a history of frequent exacerbations in both the COPDGene and ECLIPSE studies. CONCLUSIONS:Patients with moderate-to-severe COPD and blood eosinophil counts of 300 cells/μL or greater had an increased risk exacerbations in the COPDGene study, which was prospectively validated in the ECLIPSE study.
- Published
- 2018
27. Numerical treatment of the generalized time-fractional Huxley-Burgers’ equation and its stability examination
- Author
-
Hadhoud Adel R., Abd Alaal Faisal E., Abdelaziz Ayman A., and Radwan Taha
- Subjects
the generalized time-fractional huxley-burgers’ equation ,the mean value theorem ,the cubic b-spline ,collocation method ,stability analysis ,34dxx ,35r11 ,65-xx ,65d07 ,65l60 ,Mathematics ,QA1-939 - Abstract
In this paper, we show how to approximate the solution to the generalized time-fractional Huxley-Burgers’ equation by a numerical method based on the cubic B-spline collocation method and the mean value theorem for integrals. We use the mean value theorem for integrals to replace the time-fractional derivative with a suitable approximation. The approximate solution is constructed by the cubic B-spline. The stability of the proposed method is discussed by applying the von Neumann technique. The proposed method is shown to be conditionally stable. Several numerical examples are introduced to show the efficiency and accuracy of the method.
- Published
- 2021
- Full Text
- View/download PDF
28. Enhancing topic clustering for Arabic security news based on k‐means and topic modelling
- Author
-
Adel R. Alharbi, Mohammad Hijji, and Amer Aljaedi
- Subjects
computational linguistics ,data analysis ,Internet ,natural language processing ,pattern clustering ,text analysis ,Telecommunication ,TK5101-6720 - Abstract
Abstract The internet has become one of the main sources of news spread as it unleashed the information dissemination space, where the news websites express opinions on entities while also reporting on recent or unusual security risks. Recently, many research studies have focused on sentimental reflection on the views and impressions of people utilising natural language processing and analytical linguistics. Therefore, we have collected corpus from popular Arabic websites that publish articles related to recent security issues, and we provide light weight preprocessing techniques where data is term matrix is transformed. We also present an intensive lexical‐driven data analysis with visualised data views, as our topic modelling technique can effectively extract significant topics from all the collected text from different websites. Our experiments validate the k‐means clustering algorithm with and without the latent Dirichlet allocation topic modelling method, and we adopted various validation techniques to measure the topic clustering internally and externally. As shown in the experiments' results, our proposed combined method has a high round index rate of 87.2%, with a large number of topics and clusters.
- Published
- 2021
- Full Text
- View/download PDF
29. A new structure to n-dimensional trigonometric cubic B-spline functions for solving n-dimensional partial differential equations
- Author
-
K. R. Raslan, Khalid K. Ali, Mohamed S. Mohamed, and Adel R. Hadhoud
- Subjects
Collocation method ,n-dimensional trigonometric cubic B-splines ,Mathematics ,QA1-939 - Abstract
Abstract In this paper, we present a new structure of the n-dimensional trigonometric cubic B-spline collocation algorithm, which we show in three different formats: one-, two-, and three-dimensional. These constructs are critical for solving mathematical models in different fields. We illustrate the efficiency and accuracy of the proposed method by its application to a few two- and three-dimensional test problems. We use other numerical methods available in the literature to make comparisons.
- Published
- 2021
- Full Text
- View/download PDF
30. Non-polynomial B-spline and shifted Jacobi spectral collocation techniques to solve time-fractional nonlinear coupled Burgers’ equations numerically
- Author
-
Adel R. Hadhoud, H. M. Srivastava, and Abdulqawi A. M. Rageh
- Subjects
Liouville–Caputo fractional derivative ,Non-polynomial B-spline functions ,Fractional coupled Burgers’ equation ,Shifted Jacobi polynomial ,Jacobi–Gauss quadrature ,Von Neumann stability ,Mathematics ,QA1-939 - Abstract
Abstract This paper proposes two numerical approaches for solving the coupled nonlinear time-fractional Burgers’ equations with initial or boundary conditions on the interval [ 0 , L ] $[0, L]$ . The first method is the non-polynomial B-spline method based on L1-approximation and the finite difference approximations for spatial derivatives. The method has been shown to be unconditionally stable by using the Von-Neumann technique. The second method is the shifted Jacobi spectral collocation method based on an operational matrix of fractional derivatives. The proposed algorithms’ main feature is that when solving the original problem it is converted into a nonlinear system of algebraic equations. The efficiency of these methods is demonstrated by applying several examples in time-fractional coupled Burgers equations. The error norms and figures show the effectiveness and reasonable accuracy of the proposed methods.
- Published
- 2021
- Full Text
- View/download PDF
31. Silver nanoparticles and Chlorella treatments induced glucosinolates and kaempferol key biosynthetic genes in Eruca sativa
- Author
-
Hanan I. Sayed Ahmed, Doaa E. Elsherif, Adel R. El-Shanshory, Ashraf S. Haider, and Reda M. Gaafar
- Subjects
AgNPs ,Marine microalga ,Eruca sativa ,Glucosinolates ,Kaempferol ,Chalcone synthase ,Medicine (General) ,R5-920 ,Science - Abstract
Abstract Background Microalgae and nanoparticles are currently considered promising tools for numerous agricultural and biotechnological applications. The green microalga Chlorella sp. MF1 and its biosynthesized silver nanoparticles (AgNPs) were used in this study as biofortification agents to enhance glucosinolate and kaempferol levels in Eruca sativa. UV–visible spectroscopy, XRD, FTIR and TEM were comprehensively used for characterizing Chlorella-based AgNPs. Results The biosynthesized AgNPs were found to be spherical in shape, with size ranging from 1.45 to 5.08 nm. According to FTIR measurements, silver ions were reduced to AgNPs by functional groups such as amide, hydroxyl and carboxylate. Different experimental treatments were conducted, including either soaking seeds of E. sativa or foliar spray with various concentrations of Chlorella suspension (1, 2, 3 and 4 g L−1) and AgNPs (5, 10, 20 and 40 mg L−1). Expression levels of five key genes in the biosynthetic pathway of glucosinolates (MAM1, SUR1, MYB34 and MYB51) and kaempferol (CHS) were assessed using qRT-PCR. The results indicated an upregulation in the gene expression levels in all treatments compared to control, recording the highest level at 40 mg L−1 AgNPs and 4 g L−1 Chlorella suspension. In addition, high glucosinolates and kaempferol content was detected in plants whose leaves were sprayed with AgNPs and Chlorella suspension (40 mg L−1 and 4 g L−1) based on HPLC analysis. Sequence analysis of amplified CHS fragments from E. sativa plants treated with AgNPs (40 mg L−1) showed high sequence similarity to A. thaliana CHS gene. However, there were several CHS regions with sequence polymorphism (SNPs and Indels) in foliar sprayed plants. Conclusions Results of this study evidenced that the application of AgNPs and Chlorella suspension increased glucosinolates and kaempferol content in E. sativa through upregulation of key genes in their biosynthetic pathway.
- Published
- 2021
- Full Text
- View/download PDF
32. Worsening Heart Failure Episodes Outside a Hospital Setting in Heart Failure With Preserved Ejection Fraction: The PARAGON-HF Trial
- Author
-
Vaduganathan, Muthiah, Cunningham, Jonathan W., Claggett, Brian L., Causland, Finnian Mc, Barkoudah, Ebrahim, Finn, Peter, Zannad, Faiez, Pfeffer, Marc A., Rizkala, Adel R., Sabarwal, Shalini, McMurray, John J.V., Solomon, Scott, and Desai, Akshay S.
- Published
- 2021
- Full Text
- View/download PDF
33. Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
- Author
-
Amer Aljaedi, Sajjad Shaukat Jamal, Muhammad Rashid, Adel R. Alharbi, Mohammed Alotaibi, and Dalal J. Alanazi
- Subjects
area-efficient ,crypto processor design ,ECC ,point multiplication ,FPGA ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
This paper proposes a novel hardware design for a compact crypto processor devoted to elliptic-curve point multiplication over GF(2233). We focus on minimizing hardware usage, which we obtain using an iterative bit–serial finite field modular multiplier for polynomial coefficient multiplication. The same multiplier is also used for modular squares and inversion computations, further optimizing the hardware footprint. Our design offers flexibility by permitting users to load different curve parameters and secret keys while keeping a low-area hardware design. To efficiently generate the control signals, we utilize a finite-state-machine-based controller. We have implemented the proposed crypto processor on Virtex-6 and Virtex-7 FPGA devices, and we have evaluated its performance at clock frequencies of 100, 50, and 10 MHz. Specifically, for one point multiplication computation on Virtex-7 FPGA, our crypto processor uses 391 slices, attains a maximum frequency of 161 MHz, has a latency of 4.45 ms, and consumes 77 mW of power. These results, along with a comparison to state-of-the-art designs, clearly demonstrate the practicality of our crypto processor for applications requiring efficient and compact cryptographic computations.
- Published
- 2023
- Full Text
- View/download PDF
34. Incidence and Outcomes of Pneumonia in Patients With Heart Failure
- Author
-
Shen, Li, Jhund, Pardeep S., Anand, Inder S., Bhatt, Ankeet S., Desai, Akshay S., Maggioni, Aldo P., Martinez, Felipe A., Pfeffer, Marc A., Rizkala, Adel R., Rouleau, Jean L., Swedberg, Karl, Vaduganathan, Muthiah, Vardeny, Orly, van Veldhuisen, Dirk J., Zannad, Faiez, Zile, Michael R., Packer, Milton, Solomon, Scott D., and McMurray, John J.V.
- Published
- 2021
- Full Text
- View/download PDF
35. A mechanistic study of CO2/brine relative permeability
- Author
-
Traki, Adel R. A. and Sohrabi, Mehran
- Subjects
363.738 - Abstract
CO2 injection in geologic formations (hydrocarbon reservoirs as well as aquifers) is increasingly considered as a method for increasing oil recovery and, at the same time, storing CO2 in these formations to reduce the CO2 emissions, which are considered to be the main cause responsible for global warming or the greenhouse phenomenon. Among many parameters significantly impacting the flow and distribution of CO2 in the formations is relative permeability (KrCO2). The protocols being used to measure CO2 relative permeability are facing a lot of challenges and problems. In this study, an assessment package tool has been designed and applied in order to verify the protocols and data resulted from CO2 relative permeability experiments published, with recommendations to avoid errors, all that to prospectively help in determining lab measurements which need to be defined, and thus getting reliable CO2 relative permeability data to be used for obtaining accurate prediction of the flow properties to CO2 through (CGS) or (EOR). Moreover, introducing some vital notices whereby the CO2 relative permeability curves could be read and interpreted correctly was an additional work which has been done. Another issue is that the capillary properties like wettability, IFT and viscosity are considered as the main factors controlling the shape of CO2 relative permeability curve and subsequently its value; however, it is found that any set of rock samples, even extracted from the same formation or from different formations with the same rock type and developing the same capillary properties as well, will produce different CO2 relative permeability curves. This phenomenon had been attributed to rock pore structure or quality, no details of the physics has been described in producing variant CO2 relative permeability curves for the set of samples assumed. In this study, we introduced an interpretation of how the rock internal structure or quality leads to producing variant CO2 relative permeability curves, and it was presented as an upgraded concept called ‘pore and throat distributions’. This new concept has been verified using a set of pore-network models with variant pore and throat distributions. Using theoretical modelling, rather than the empirical or experimental one, was inevitable as to avoid the side effects of the interactions1 (among the CO2, brine and rock contents) on CO2 relative permeability, and also to put aside the effect of other capillary properties mentioned. Going back to Darcy’s law, the CO2 relative permeability is a decisive parameter that controls the CO2 injection rate, but what should be mentioned here is that Darcy’s law just introduces the KrCO2 relative permeability as a term which affects CO2 injection rate and never goes beyond this term to parameters or factors controlling the KrCO2 value and investigates their impact on CO2 injection rate. In this study and by using KrCO2 data published and a real aquifer model we found that the normal pore and throat distributions with similar connection (a new concept introduced before) produced the best injection rates comparing with other cases of abnormal distributions. The difference among the relative permeability of CO2 and other gases, like methane (CH4) and Ethane (C2H6), has also been studied using a theoretical model. The results illustrated that there was no difference among the relative permeabilities related to CO2 and other gases (CH4, C2H6). Finally, the wettability distribution concept has been introduced as a factor controlling the magnitude of CO2 endpoint relative permeability for rock samples having the same rock and capillary properties. Some differences between the systems of gas-oil and CO2-Brine, in terms of interfacial tension, have been interpreted depending on the notion of free and adherent layers thickness.
- Published
- 2016
36. Employing the Laplace Residual Power Series Method to Solve (1+1)- and (2+1)-Dimensional Time-Fractional Nonlinear Differential Equations.
- Author
-
Hadhoud, Adel R., Rageh, Abdulqawi A. M., and Radwan, Taha
- Subjects
- *
PARTIAL differential equations , *NONLINEAR differential equations , *FRACTIONAL differential equations , *DIFFERENTIAL equations , *POWER series - Abstract
In this paper, we present a highly efficient analytical method that combines the Laplace transform and the residual power series approach to approximate solutions of nonlinear time-fractional partial differential equations (PDEs). First, we derive the analytical method for a general form of fractional partial differential equations. Then, we apply the proposed method to find approximate solutions to the time-fractional coupled Berger equations, the time-fractional coupled Korteweg–de Vries equations and time-fractional Whitham–Broer–Kaup equations. Secondly, we extend the proposed method to solve the two-dimensional time-fractional coupled Navier–Stokes equations. The proposed method is validated through various test problems, measuring quality and efficiency using error norms E 2 and E ∞ , and compared to existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps
- Author
-
Noor Munir, Majid Khan, Mohammad Mazyad Hazzazi, Amer Aljaedi, Abd Al Karim Haj Ismail, Adel R. Alharbi, and Iqtadar Hussain
- Subjects
Chaotic map ,chosen-plaintext attack ,conditional shift ,cryptanalysis ,Internet of Health Things ,known-plaintext attack ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Many encryption algorithms are designed to decrease the probability of cyberattacks by assuring data security as well as system and participant authentication. However, in the development of computer resources cryptanalytical techniques have been developed and performed competitively in information security with good results. In this paper, we reported security flaws in the recently offered encryption technique based on a chaotic map for Internet of Health Things (IoHT) security. The scheme was based on a new chaotic map, modified Mandelbrot set, and conditional shift algorithm asserting the encryption algorithm is secure. We have performed some cryptographic attacks to retrieve the key from the understudy cryptosystem. The key was retrieved in little computation by using a chosen-plaintext attack and one known plaintext ciphertext pair. The minimum execution time of performed attacks indicates the vulnerability of the diffusion-based encryption algorithm. To enhance the security of the understudy cryptographic algorithm, we have also suggested certain improvements.
- Published
- 2021
- Full Text
- View/download PDF
38. IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks
- Author
-
Chandrashekhar Meshram, Agbotiname Lucky Imoize, Azeddine Elhassouny, Amer Aljaedi, Adel R. Alharbi, and Sajjad Shaukat Jamal
- Subjects
5G wireless sensor network systems ,fractional chaotic maps ,identity-based signature scheme ,provably secure ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing concerns that 5G-WSNs pose new security threats to sensitive user information. User authentication and key agreement have been provided for secure end-to-end communication. However, stricter security techniques are required as billions of massive devices are being networked to collect and process complex user data in real-time. Therefore, anonymous authentication and authorization are highly coveted for privacy preservation and prevention of unlawful exploitation of user data. However, guaranteeing data integrity, authentication, and non-repudiation require special-purpose identity-based signature techniques that are quite difficult to design in practice. In order to address this problem, this paper proposes a lightweight, provably secure identity-based online/offline signature technique (IBOOST) and its extension for massive devices in 5G-WSNs using fractional chaotic maps. The IBOOST scheme achieves multi-time use of offline storage at a lower processing time. Therefore, the signer can reuse the offline pre-stored information in a polynomial time. This makes our IBOOST superior to the existing online/offline signature techniques that allow only a single signature. Additionally, the new technique enables the pre-registration process with a secret key, and no secret key is required in the offline stage. Also, the proposed IBOOST proves to be secure in the random oracle unforgeability under the chosen message attack (UF-IBS-CMA). Finally, the IBOOST and its enhanced version (A-IBOOST) give the lowest computational costs compared to several contending techniques. Therefore, the proposed IBOOST shows superior security and performance with better computational overhead than the preliminary techniques.
- Published
- 2021
- Full Text
- View/download PDF
39. Integration of Spatial and Frequency Domain Encryption for Digital Images
- Author
-
Arslan Shafique, Mohammad Mazyad Hazzazi, Adel R. Alharbi, and Iqtadar Hussain
- Subjects
Chaos ,noise resistance ,chaotic logistic map ,DWT ,security ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Transmission of multimedia data such as images, videos, and audio over the Internet is risky due to cyberattacks. To overcome the security issues, several encryption schemes are proposed over the last few decades which also possess few vulnerabilities such as time inefficiency and weak security. In this research, to provide the highest level of security to the digital data, chaos is incorporated for the scrambling of rows and columns of the plaintext image. Further, a noisy image is generated based on the chaotic logistic map and the suitable initial conditions which are selected based on the analysis performed. For the reduction of the encryption computational time, a Discrete Wavelet Transform (DWT) is used in which only low-frequency bands are encrypted because most of the plaintext information lies in such frequency bands. To gauge the performance of the proposed encryption scheme, several security tests such as entropy, correlation, energy, peak signal to noise ratio, mean square error, keyspace, and key sensitivity analysis, noise-resistant, and cropping attack analyses are performed. From the cropping and noise attack analysis, we have found that the proposed encryption algorithm can decrypt the plaintext image with negligible loss of information but the content of the plaintext image can be visualized.
- Published
- 2021
- Full Text
- View/download PDF
40. Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
- Author
-
Muhammad Ramzan, Tariq Shah, Mohammad Mazyad Hazzazi, Amer Aljaedi, and Adel R. Alharbi
- Subjects
Elliptic curves ,substitution box ,image encryption ,security analysis ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks (Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests (Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications.
- Published
- 2021
- Full Text
- View/download PDF
41. New solitary wave solutions of a highly dispersive physical model
- Author
-
Ali, Khalid K. and hadhoud, Adel R.
- Published
- 2020
- Full Text
- View/download PDF
42. DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication
- Author
-
Alharbi, Adel R., primary, Hazzazi, Mohammad Mazyad, additional, Jamal, Sajjad Shaukat, additional, Aljaedi, Amer, additional, Aljuhni, Abdullah, additional, and Alanazi, Dalal J., additional
- Published
- 2024
- Full Text
- View/download PDF
43. Underpinning Quality Assurance: Identifying Core Testing Strategies for Multiple Layers of Internet-of-Things-Based Applications
- Author
-
Aljaedi, Amer, primary, Siddique, Saba, additional, Satti, Muhammad Islam, additional, Alharbi, Adel R., additional, Alotaibi, Mohammed, additional, and Usman, Muhammad, additional
- Published
- 2023
- Full Text
- View/download PDF
44. Factors affecting in vitro embryo production: insights into dromedary camel
- Author
-
Adel R. Moawad, Ibrahim M. Ghoneim, Gamal M. Darwish, Magdy R. Badr, Diya A. El-Badry, and Abou Bakr A. EL-Wishy
- Subjects
dromedary camel ,embryo ,ivm/ivf/ivc ,oocytes ,quality ,Biotechnology ,TP248.13-248.65 ,Medicine (General) ,R5-920 ,Internal medicine ,RC31-1245 - Abstract
The Dromedary camel (Camelus dromedaries) is an important species because of its ability to produce good quality meat, milk, and fibers under harsh environmental conditions. Camels are also crucial for transportation, racing, and as draft animals in agriculture. Therefore, dromedary camels play a critical role in the economy for millions of people living in the arid part of the world. The inherent capability of camels to produce meat and milk is highly correlated with their reproductive performance. Compared with other domestic species, the reproductive efficiency in camelids is low. Although recent reproductive technologies such as in vitro fertilization (IVF) and somatic cell nuclear transfer (SCNT) have been successfully applied to camelids and the birth of live offspring following these technologies has been reported; in vitro embryo production (IVP) has lagged in this species. The development of the IVP system for dromedary camels may be a useful tool for the genetic improvement of this species. IVP in farm animals includes three main steps; in vitro maturation (IVM) of an oocyte, IVF of a matured oocyte, and in vitro culture (IVC) of fertilized oocyte up to the blastocyst stage. This review aims to summarize various factors that influence oocyte quality, IVM, and in vitro embryo development in dromedary camel.
- Published
- 2020
- Full Text
- View/download PDF
45. A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
- Author
-
Adel R. Alharbi, Jawad Ahmad, null Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, and William J Buchanan
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme is proposed using linear feedback shift register (LFSR) and chaos-based quantum chaotic map. The focus of the scheme is mainly dependent on the secret keys from the input of the algorithm. The threat landscape, the statistical test analysis, along critical comparisons with other schemes indicate that the presented algorithm is significantly secure and is resistant to a wide range of different attacks such as differential and statistical attacks. The proposed method has sufficiently higher sensitivity and security when compared to existing encryption algorithms. Several security parameters validated the security of proposed work such as correlation coefficient analyses among the neighboring pixels, entropy, the number of pixels change rate (NPCR), unified average change intensity (UACI), mean square error (MSE), brute force, key sensitivity, and peak signal to noise ratio (PSNR) analyses. The randomness of the ciphers produced by the proposed technique is also passed through NIST-800-22. The results of NIST indicate that the ciphers are highly random and do not produce any type of periodicity or pattern.
- Published
- 2022
- Full Text
- View/download PDF
46. Large Field-Size Throughput/Area Accelerator for Elliptic-Curve Point Multiplication on FPGA
- Author
-
Ahmed Alhomoud, Sajjad Shaukat Jamal, Saleh M. Altowaijri, Mohamed Ayari, Adel R. Alharbi, and Amer Aljaedi
- Subjects
throughput/area ,hardware accelerator ,elliptic-curve ,point multiplication ,FPGA ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
This article presents a throughput/area accelerator for elliptic-curve point multiplication over GF(2571). To optimize the throughput, we proposed an efficient hardware accelerator architecture for a fully recursive Karatsuba multiplier to perform polynomial multiplications in one clock cycle. To minimize the hardware resources, we have utilized the proposed Karatsuba multiplier for modular square implementations. Moreover, the Itoh-Tsujii algorithm for modular inverse computation is operated using multiplier resources. These strategies permit us to reduce the hardware resources of our implemented accelerator over a large field size of 571 bits. A controller is implemented to provide control functionalities. Our throughput/area accelerator is implemented in Verilog HDL using the Vivado IDE tool. The results after the place-and-route are given on Xilinx Virtex-6 and Virtex-7 devices. The utilized slices on Virtex-6 and Virtex-7 devices are 6107 and 5683, respectively. For the same FPGA devices, our accelerator can operate at a maximum of 319 MHz and 361 MHz. The latency values for Virtex-6 and Virtex-7 devices are 28.73 μs and 25.38 μs. The comparison to the state-of-the-art shows that the proposed architecture outperforms in throughput/area values. Thus, our accelerator architecture is suitable for cryptographic applications that demand a throughput and area simultaneously.
- Published
- 2023
- Full Text
- View/download PDF
47. Non-polynomial B-spline and shifted Jacobi spectral collocation techniques to solve time-fractional nonlinear coupled Burgers’ equations numerically
- Author
-
Hadhoud, Adel R., Srivastava, H. M., and Rageh, Abdulqawi A. M.
- Published
- 2021
- Full Text
- View/download PDF
48. A new structure to n-dimensional trigonometric cubic B-spline functions for solving n-dimensional partial differential equations
- Author
-
Raslan, K. R., Ali, Khalid K., Mohamed, Mohamed S., and Hadhoud, Adel R.
- Published
- 2021
- Full Text
- View/download PDF
49. Silver nanoparticles and Chlorella treatments induced glucosinolates and kaempferol key biosynthetic genes in Eruca sativa
- Author
-
Sayed Ahmed, Hanan I., Elsherif, Doaa E., El-Shanshory, Adel R., Haider, Ashraf S., and Gaafar, Reda M.
- Published
- 2021
- Full Text
- View/download PDF
50. Latency-Aware Accelerator of SIMECK Lightweight Block Cipher
- Author
-
Adel R. Alharbi, Hassan Tariq, Amer Aljaedi, and Abdullah Aljuhni
- Subjects
cryptography ,lightweight ,block cipher ,SIMECK ,RFID ,WSNs ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
This article presents a latency-optimized implementation of the SIMECK lightweight block cipher on a field-programmable-gate-array (FPGA) platform with a block and key lengths of 32 and 64 bits. The critical features of our architecture include parallelism, pipelining, and a dedicated controller. Parallelism splits the digits of the key and data blocks into smaller segments. Then, we use each segmented key and data block in parallel for encryption and decryption computations. Splitting key and data blocks helps reduce the required clock cycles. A two-stage pipelining is used to shorten the critical path and to improve the clock frequency. A dedicated controller is implemented to provide control functionalities. For the performance evaluation of our design, we report implementation results for two different cases on Xilinx 7-series FPGA devices. For our case one, the proposed architecture can operate on 382, 379, and 388 MHz frequencies for Kintex-7, Virtex-7, and Artix-7 devices. On the same Kintex-7, Virtex-7, and Artix-7 devices, the utilized Slices are 49, 51, and 50. For one encryption and decryption computation, our design takes 16 clock cycles. The minimum power consumption is 172 mW on the Kintex-7 device. For the second case, we targeted the same circuit frequency of 50 MHz for synthesis on Kintex-7, Virtex-7, and Artix-7 devices. With minimum hardware resource utilization (51 Slices), the least consumed power of 13.203 mW is obtained for the Kintex-7 device. For proof-of-concept, the proposed SIMECK design is validated on the NEXYS 4 FPGA with the Artix-7 device. Consequently, the implementation results reveal that the proposed architecture is suitable for many resource-constrained cryptographic applications.
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.