754 results on '"Muzammil M"'
Search Results
102. Three-Tier authentication and secure key exchange over insecure channel
- Author
-
Muzammil M. Ahmad and Sibghatullah I. Khan
- Subjects
Password ,020203 distributed computing ,Authentication ,Password policy ,business.industry ,Computer science ,02 engineering and technology ,Mutual authentication ,Computer security ,computer.software_genre ,S/KEY ,Public-key cryptography ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Server ,Passive attack ,Authentication protocol ,0202 electrical engineering, electronic engineering, information engineering ,Challenge–response authentication ,business ,computer ,Key exchange ,Data Authentication Algorithm - Abstract
Authentication and key exchange securely over the insecure channel is a big deal these days. It plays vital role in big data applications. Mutual authentication is generally relay at the single channel between two users. An attacker performs the passive attack (traffic analysis) and switch towards the active attack Three tier authentication system checks the authenticity of the client at three independent channels and if found secure then only allow the client to get the services from the application server. Two intermediate servers will provide two-split passwords and the application server will provide the complete password. These intermediate servers will forward the split password towards the main application server which compares and finds the similarities between them. Whole communication is based on public key cryptography to achieve mutual authentication, confidentiality and integrity of the message.
- Published
- 2017
103. High-Tech Governance Through Big Data Surveillance: Tracing the Global Deployment of Mass Surveillance Infrastructures, 1995 to Present
- Author
-
Nadiya Kostyuk, Vishnupriya Das, Fan Liang, Wei Chen, and Muzammil M. Hussain
- Subjects
education.field_of_study ,business.industry ,Corporate governance ,Big data ,Population ,Public relations ,High tech ,World-system ,Information and Communications Technology ,Political science ,Law ,Normalization (sociology) ,Information infrastructure ,business ,education - Abstract
State powers and high technology industries have historically and symbiotically implemented new information and communication technologies (ICTs) to advance their operational goals. However, much of the scholarship and policy discourse studying such practices is limited to well-known mass surveillance revelations in advanced-industrialized Western democratic contexts. We present the first event-catalogued case-history analysis of 306 cases of mass surveillance systems that currently exist across 139 nation-states in the world system. Identifying the ‘known universe’ of these population-wide data infrastructures that shape the evolving relationships between citizens and state powers, this study pays particular attention to and fills an existing void in the contemporary study and understanding of mass surveillance practices by examining how population surveillance systems have diffused across the international system. By closely investigating cases of state-backed cross-sector surveillance collaborations, we address the following questions: What is the recent, global history of state-sanctioned mass surveillance systems deployment? Which stakeholders have most prominently expressed support for, benefited from, or opposed these systems, and why? What have been the comparative societal responses to the normalization of these systems in recent decades? Addressing these questions provides valuable traction for understanding how comparative contexts shape the way governance technologies unfold and spread, potentially in ways that re-enforce state powers’ interests and dominance over their citizens.
- Published
- 2017
104. A Cross-Sectional Evaluation of Dental Professional's Knowledge of Locally Delivered Antimicrobial Agents and their Application in Periodontal Practice
- Author
-
Muzammil Moin Ahmed and Dhafer S Alasmari
- Subjects
locally delivered antimicrobial agents ,periodontal disease ,periodontal practice ,pharmacological actions ,Pharmacy and materia medica ,RS1-441 ,Analytical chemistry ,QD71-142 - Abstract
Introduction: Dentists must employ locally delivered antimicrobial agents (LDAs) in a way that is in line with current recommendations from the scientific literature and the guidelines set by professional organizations. Considering the dearth of research on this topic, it is not known what strategies are adapted when using LDAs in their periodontal practice. So, the purpose of this research was to investigate how LDAs are utilized by dental professionals in their distinct periodontal practices. Materials and Methods: This cross-sectional study used a closed-ended questionnaire. Dental professionals received electronic copies of the eight-item questionnaire. The questionnaire assessed the relevance of LDAs, how frequently they are used, which ones are used most, the number of patients who receive them, their understanding of pharmacological activities, and their knowledge of current treatment guidelines. The questionnaire's validity and reliability were evaluated before being presented to participants. Using the Statistical Package for the Social Sciences (SPSS), the input was analyzed. Results: A total of 120 dental professionals, with an average age of 34.7 years, answered the questionnaire. Half of these individuals have no history of ever using LDAs. The most frequent LDA used in its different forms was chlorhexidine gluconate (CHX), followed by tetracycline. The majority of participants placed LDAs (80%) in less than 10 patients. Less than half acknowledged the different LDAs and their pharmacological activities. Not even 70% of clinicians were up-to-date on the current European Federation of Periodontology (EFP) guidelines. None of the participants discounted the significance of LDAs in periodontal care. Conclusion: Dental professionals regard LDAs as essential to periodontal therapy. Yet, they lacked knowledge about general, pharmacological, and clinical aspects. The patient experience with LDAs was limited by an inappropriate deployment pattern.
- Published
- 2023
- Full Text
- View/download PDF
105. A cross-sectional study to evaluate dental professionals' knowledge of antiplaque mouth rinse agents and their application in periodontal practice
- Author
-
Muzammil Moin Ahmed
- Subjects
antiplaque agents ,dental care ,mouth rinses ,periodontal therapy ,Pharmacy and materia medica ,RS1-441 ,Analytical chemistry ,QD71-142 - Abstract
Background: Mouth rinse agents reduce inflammation and microbial burden, improving periodontal clinical parameters. Yet, improper clinical use of these compounds might have several deleterious repercussions. Given the lack of research on the knowledge and application of antiplaque mouth rinse agents, this research was conducted. Methods: The research is an electronic survey wherein responses were gathered for ten items with predetermined answers in addition to covariate data. The questions were conceived to illuminate the level of knowledge possessed by dental professionals and their utilization pattern in periodontal practice. The data gathered underwent quantitative statistical analysis. Results: Participants in the study included 100 dental professionals from various disciplines, all of whom agreed that mouth rinses are a vital adjuvant in periodontal therapy. Most acknowledged being aware of the various mouth rinse agents, but their knowledge and application of mouth rinses were largely confined to chlorhexidine gluconate, with little consideration being given to alternative antiplaque agents. Conclusion: Little knowledge exists among dental professionals regarding mouth rinse agents and their appropriate application. Dental schools, clinical advisory organizations, and other establishments could educate dental professionals on the specific guidelines for utilizing antiplaque mouth rinses in a dental context, especially as an adjunct to periodontal therapy.
- Published
- 2023
- Full Text
- View/download PDF
106. 508 PREVALENCE OF HEPATITIS D AMONG HCV AND HBV COINFECTED PATIENTS IN THE UNITED STATES
- Author
-
Kaur, Satinder P., Maqsood, Muhammad H., kolli, Himabindu, Khan, Muzammil M., Ali, Mukarram Jamat, and Lau, Daryl
- Published
- 2021
- Full Text
- View/download PDF
107. Anti-HIV therapy: a lesson in drug design
- Author
-
Mansuri, Muzammil M. and Hitchcock, Michael J.M.
- Subjects
AIDS vaccines -- Research ,AIDS (Disease) -- Drug therapy ,HIV (Viruses) -- Research ,Chemicals, plastics and rubber industries ,Chemistry - Abstract
Current research on drugs for anti-HIV therapy centers on finding the appropriate inhibitors that can obstruct the replication cycle of the AIDS virus without attacking the functions it shares with the host. Screens that identify compounds that can inhibit the target step are developed following the identification of the target. Leads often result from screens, and what follows is iterative chemical synthesis where chemical structures similar to the lead but without undesirable effects are developed. A common method for detecting leads is the screening of microbial or plant extracts mixtures.
- Published
- 1992
108. Biomechanical Study on Three Screw-Based Atlantoaxial Fixation Techniques: A Finite Element Study
- Author
-
Deniz Ufuk Erbulut, Muzammil Mumtaz, Iman Zafarparandeh, and Ali Fahir Özer
- Subjects
atlantoaxial fixation ,lateral mass screw ,pedicle screws ,screw-based technique ,transarticular screw ,Medicine - Abstract
Study Design This is a finite element study. Purpose This study is aimed to compare the biomechanical behaviors of three screw-based atlantoaxial fixation techniques. Overview of Literature Screw-based constructs that are widely used to stabilize the atlantoaxial joint come with their own challenges in surgery. Clinical and in vitro studies have compared the effectiveness of screw-based constructs in joint fixation. Nevertheless, there is limited information regarding the biomechanical behavior of these constructs, such as the stresses and strains they experience. Methods A finite element model of the upper cervical spine was developed. A type II dens fracture was induced in the intact model to produce the injured model. The following three constructs were simulated on the intact and injured models: transarticular screw (C1–C2TA), lateral mass screw in C1 and pedicle screw in C2 (C1LM1–C2PD), and lateral mass screw in C1 and translaminar screw in C2 (C1LM1–C2TL). Results In the intact model, flexion–extension range of motion (ROM) was reduced by up to 99% with C11–C2TA and 98% with C1LM1–C2PD and C1LM1–C2TL. The lateral bending ROM in the intact model was reduced by 100%, 95%, and 75% with C11–C2TA, C1LM1–C2PD, and C1LM1–C2TL, respectively. The axial rotation ROM in the intact model was reduced by 99%, 98%, and 99% with C11–C2TA, C1LM1–C2PD, and C1LM1–C2TL, respectively. The largest maximum von Mises stress was predicted for C1LM1–C2TL (332 MPa) followed by C1LM1–C2PD (307 MPa) and C11–C2TA (133 MPa). Maximum stress was predicted to be at the lateral mass screw head of the C1LM1–C2TL construct. Conclusions Our model indicates that the biomechanical stability of the atlantoaxial joint in lateral bending with translaminar screws is not as reliable as that with transarticular and pedicle screws. Translaminar screws experience large stresses that may lead to failure of the construct before the required bony fusion occurs.
- Published
- 2022
- Full Text
- View/download PDF
109. Titanium elastic nailing in shaft femur fracture in paediatric patients
- Author
-
Amin, Dr. Tarkik K, primary, Makwana, Dr. Vipul R, additional, Modi, Dr. Dhaval R, additional, Joshi, Dr. Arpit V, additional, Prajapati, Dr. Mrudul M, additional, Kazi, Dr. Muzammil M, additional, and Bhavsar, Dr. Nishant V, additional
- Published
- 2018
- Full Text
- View/download PDF
110. Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure
- Author
-
Liang, Fan, primary, Das, Vishnupriya, additional, Kostyuk, Nadiya, additional, and Hussain, Muzammil M., additional
- Published
- 2018
- Full Text
- View/download PDF
111. Preparation, Structural and Dielectric Behaviors of CoxMn1-xMn2O4 (0 ≤ x ≤ 1) Nanoparticles
- Author
-
Taufiq, A., primary, Muzammil, M., additional, Fuad, A., additional, Hidayat, N., additional, Sunaryono, S., additional, Mufti, N., additional, Hidayat, A., additional, Diantoro, M., additional, and Munasir, M., additional
- Published
- 2018
- Full Text
- View/download PDF
112. Three Arenas for Interrogating Digital Politics in Middle East Affairs
- Author
-
Sonia Jawaid Shaikh and Muzammil M. Hussain
- Subjects
History ,Politics ,Middle East ,Sociology and Political Science ,Political science ,Geography, Planning and Development ,Gender studies - Published
- 2015
113. LearnOnline
- Author
-
Muzammil M. Baig
- Subjects
Cooperative learning ,Multimedia ,Computer science ,Active learning ,ComputingMilieux_COMPUTERSANDEDUCATION ,Educational technology ,Virtual learning environment ,Open learning ,computer.software_genre ,computer ,Experiential learning ,Learning sciences ,Synchronous learning - Abstract
Personal Learning Environments (PLEs) help the learners to take control of their learning. PLEs enable the learners to set their own leaning targets and manage their learning by communicating with others in the process of learning. As latest technological advancements have brought revolution in every field of life, so as in the PLEs. Modern PLEs are the integration of a number of latest technologies i.e. blogs, Wikis, RSS feeds, where content is shaped as per the individual needs and interests of the students. Focusing on these latest aspects of the PLEs, University of South Australia initiated a three year new learning platform project in 2010, called LearnOnline, which will replace the University's current online teaching environment UniSAnet. LearnOnline was launched with a vision to foster richer learning through promoting students' active involvement in their courses and involving the students in a deeper learning experience. LearnOnline is built on modular approach and consists of different components i.e. ePortfolio, Course Outline, Lecture Recording, Copyright Monitoring, Student Email, Assessment and Feedback, Virtual Classroom, Course and Teacher Evaluation. Each component is developed separately and is fully independent. This methodology is helping the incremental implementation of the LearnOnline. As soon as a component is completed, after testing, it becomes the part of LearnOnline. In this paper, the author explains the features and workings of LearnOnline in detail and also evaluates its design methodologies.
- Published
- 2013
114. What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring
- Author
-
Philip N. Howard and Muzammil M. Hussain
- Subjects
Civil society ,media_common.quotation_subject ,Geography, Planning and Development ,Authoritarianism ,Collective action ,Democracy ,Security forces ,Politics ,Political economy ,Political Science and International Relations ,Sociology ,Democratization ,Social science ,Social movement ,media_common - Abstract
It has been 15 years since the last wave of democratization. But as a region, North Africa and the Middle East were noticeably devoid of popular democracy movements—until the early months of 2011. Democratization movements had existed long before technologies like mobile phones and the Internet came to these countries. But with these technologies, people sharing an interest in democracy built extensive networks and activated collective action movements for political change. What might have made regimes more susceptible than others to these uprisings, and what might explain the relative successes of some movements over others? What role does information technology have in the modern recipe for democratization? Weighing multiple political, economic, demographic, and cultural conditions, we find that information infrastructure—especially mobile phone use—consistently appears as one of the key ingredients in parsimonious models for the conjoined combinations of causes behind regime fragility and social movement success. To understand the successes and failures of contemporary political protests, we must also assess how civil society leaders and authoritarian security forces treat communication technologies as democratically consequential.
- Published
- 2013
115. Sectarian minorities and democratic transition in the Middle East: survey of lebanese public opinion
- Author
-
Salamey, Imad, Hussain, Muzammil M., Salamey, Imad, and Hussain, Muzammil M.
- Abstract
Ongoing political upheavals in many Middle East and North African countries represent major challenges to decades of authoritarian rule. Simultaneously, these upheavals also present a major dilemma to movements and parties laboring to replace rapidly collapsing authoritarian regimes. Some analysts and publics are haunted by the danger of Islamist taking advantage of democratic transition to claim majoritarian rule. Such a situation has alarmed non-religious, secular, liberal, and sectarian minority groups with the possibility of emerging majoritarian Islamist tyranny that aborts the prospects for genuinely pluralistic polities and societies. This paper sheds light on whether such fears and reservations exist, whether they are 'minority' oriented, and how they project prospective regimes. Based on a representative public opinion survey of Lebanese sectarian attitude, it assesses the extent to which belonging to a sectarian 'minority' group shapes political attitudes and judgments toward the contemporary 'revolutionary' changes in the Middle East and North Africa. The results also inform the potential variations and opinion polarization with respect to 'Arab Spring' revolutions.
- Published
- 2017
116. On Generalized Sehgal–Guseman-Like Contractions and Their Fixed-Point Results with Applications to Nonlinear Fractional Differential Equations and Boundary Value Problems for Homogeneous Transverse Bars
- Author
-
Muhammad Din, Umar Ishtiaq, Muzammil Mukhtar, Salvatore Sessa, and Hassan Ali Ghazwani
- Subjects
fixed point ,Hardy–Rogers-type contractions ,uniqueness ,?-metric spaces ,boundary value problem ,Mathematics ,QA1-939 - Abstract
The goal of this study is to describe the class of modified Sehgal–Guseman-like contraction mappings and set up some fixed-point results in S-metric spaces. The class of generalized Sehgal–Guseman-like contraction mappings contains enhancements of Banach contractions, Kannan contractions, Chatterjee contractions, Chatterjee-type contractions, quasi-contractions, Ćirić–Reich–Rus-type contractions, Hardy–Rogers-type contractions, Reich-type contractions, interpolative Kannan contractions, interpolative Chatterjee contractions, among others, with their generalizations in S-metric spaces. We offer significant examples to substantiate the reliability of our results. This study also establishes consequential fixed-point results and applies them to nonlinear fractional differential equations and the boundary value problem for homogeneous transverse bars. At the end of the manuscript, we present an important open problem.
- Published
- 2024
- Full Text
- View/download PDF
117. Quality of Reporting Randomized Controlled Trials Published in Three of the Most Citable Periodontal Journals from 2018 to 2022
- Author
-
Fahad Alharbi, Khalid Gufran, Muzammil Moin Ahmed, Abdulaziz Alsakr, and Abdullah Almutairi
- Subjects
CONSORT ,periodontology ,quality reporting ,RCTs ,Medicine - Abstract
This study aimed to evaluate the reporting quality of randomized clinical trials (RCTs) in periodontology. Three leading periodontology journals, the Journal of Periodontology (JOP), the Journal of Clinical Periodontology (JOCP), and the Journal of Periodontal Research (JOPR), were selected for this investigation. The RCTs were identified by manually searching for human trial articles published in these three journals. Two authors independently conducted the literature search, and a pre-piloted extraction sheet was used to screen the potential RCTs. The CONSORT checklist guidelines were employed to calculate the score value. Intra-examiner reliability was assessed by scoring a random sample of 10% of the papers in a second round conducted by the first examiner three months after the initial data collection. A search of abstracts published over a five-year period yielded 176 articles that reported RCTs, accounting for 11.7% of all articles published in the three journals. The highest number of RCTs was published in 2020, and more than half of the included RCTs (51%) originated from Europe. Many of the analyzed RCTs inadequately reported almost half of the items on the CONSORT checklist. Furthermore, univariate analysis revealed significant associations between certain factors and the overall CONSORT score, such as publication in JOP (p = 0.048), publication year of 2019 (p = 0.041) and 2021 (p = 0.042), first author from North America (p = 0.016), and RCTs with more than six authors (p = 0.042). Clinical trial research in periodontics has made significant progress in the past five years. However, there is room for improvement in adhering to the CONSORT guidelines.
- Published
- 2023
- Full Text
- View/download PDF
118. The Role of Digital Media
- Author
-
Muzammil M. Hussain and Philip N. Howard
- Subjects
Civil society ,Middle East ,Sociology and Political Science ,business.industry ,media_common.quotation_subject ,Democracy ,Digital media ,Politics ,Law ,Political economy ,Social media ,The Internet ,Sociology ,Democratization ,business ,media_common - Abstract
As has often been noted in these pages, one world region has been practically untouched by the third wave of democratization: North Africa and the Middle East. The Arab world has lacked not only democracy, but even large popular movements pressing for it. In December 2010 and the first months of 2011, however, this situation changed with stunning speed. Massive and sustained public demonstrations demanding political reform cascaded from Tunis to Cairo, Sana‘a, Amman, and Manama. This inspired people in Casablanca, Damascus, Tripoli, and dozens of other cities to take to the streets to call for change. By May, major political casualties littered the ground: Tunisia’s Zine al-Abidine Ben Ali and Egypt’s Hosni Mubarak, two of the region’s oldest dictators, were gone; the Libyan regime of Muammar Qadhafi was battling an armed rebellion that had taken over half the country and attracted NATO help; and several monarchs had sacked their cabinets and committed to constitutional reforms. Governments around the region had sued for peace by promising their citizens hundreds of billions of dollars in new spending of various kinds. Morocco and Saudi Arabia appeared to be fending off serious domestic uprisings, but as of this writing in May 2011, the outcomes for regimes in Bahrain, Jordan, Syria, and Yemen remain far from certain. There are many ways to tell the story of political change. But one of the most consistent narratives from civil society leaders in Arab countries has been that the Internet, mobile phones, and social media such as Facebook and Twitter made the difference this time. Using these technologies, people interested in democracy could build extensive net
- Published
- 2011
119. Fifteen Minutes of Fame: The Power of Blogs in the Lifecycle of Viral Political Information
- Author
-
Karine Nahon, Shawn Walker, Jeff Hemsley, and Muzammil M. Hussain
- Subjects
Health (social science) ,Public Administration ,Presidential election ,business.industry ,Health Policy ,Blogosphere ,Advertising ,Computer Science Applications ,World Wide Web ,Politics ,Empirical research ,Political science ,Elite ,The Internet ,Dynamism ,business ,Period (music) - Abstract
This empirical study addresses dynamics of viral information in the blogosphere and aims to fill gaps in the literature. In this study, we present a new methodology which enables us to capture the dynamism and the time-factor of information diffusion in networks. Moreover, we argue that the blogosphere is not monolithic and illuminate the role of four important blog types: elite, toppolitical, top-general and tail blogs. We also create a map of the ‗life cycle‘ of blogs posting links to viral information, specifically viral videos at the 2008 US presidential election. Finally, we show that elite and top-general blogs ignite the virality process, which means that they get the chance to frame messages and influence agenda setting, while, top-political and tail blogs act as followers in the process. To accomplish this, we gathered data on blogs (n=9,765) and their posts (n=13,173) linking to 65 of the top US presidential election videos that became viral on the Internet during the period between March 2007 and June 2009.
- Published
- 2011
120. Three-Tier authentication and secure key exchange over insecure channel
- Author
-
Ahmad, Muzammil M., primary and Khan, Sibghatullah I., additional
- Published
- 2017
- Full Text
- View/download PDF
121. High-Tech Governance Through Big Data Surveillance: Tracing the Global Deployment of Mass Surveillance Infrastructures, 1995 to Present
- Author
-
Kostyuk, Nadiya, primary, Chen, Wei, additional, Das, Vishnupriya, additional, Liang, Fan, additional, and Hussain, Muzammil M., additional
- Published
- 2017
- Full Text
- View/download PDF
122. Diagnosis of Fungal Sinusitis; Is Fungal Culture a Must?
- Author
-
Mubashrah Aziz, Sadia Mailk, Muniba Manzoor, Sadaf Aziz, Munazzah Aziz, and Muzammil Manzoor
- Subjects
Computed tomography ,Functional endoscopic sinus surgery ,Fungal sinusitis ,Medicine ,Medicine (General) ,R5-920 - Abstract
Objective: To determine the diagnostic accuracy of computed tomography (CT) of paranasal sinuses (PNS) in detecting fungal sinusitis keeping fungal culture as the gold standard. Study Design: Cross-sectional validation study. Place and Duration of Study: Department of Radiology, Combined Military Hospital, Rawalpindi Pakistan, from Jun 2018 to Jun 2019. Methodology: A total of 323 patients of either gender were included in the study (aged from 10-70 years). All the patients underwent plain CT scans of paranasal sinuses, and the CT scan findings were reported and recorded on pre-designed proforma. Results were then compared with the culture report of each patient respectively. Results: Among all the patients undergoing CT scans, paranasal sinuses 177 were True Positives, while 07 were False Positives. Out of a total of 139 CT scan-negative patients, 6 (False Negative) had fungal sinusitis on culture, whereas 133 (True Negative) had no fungal sinusitis on culture (p=0.001). Overall sensitivity, specificity, positive predictive value, negative predictive value and diagnostic accuracy of CT scan Paranasal sinuses were 96.72%, 95.0%, 96.20%, 95.68% and 95.98%,respectively. Conclusion: CT scan of paranasal sinuses is a highly sensitive and accurate non-invasive investigation in detecting fungal sinusitis.
- Published
- 2023
- Full Text
- View/download PDF
123. Methods to Mitigate Risk of Composition Attack in Independent Data Publications
- Author
-
Bradley A. Malin, Qiang Tang, Jixue Liu, Muzammil M. Baig, Raymond Heatherly, Jiuyong Li, Sarowar A. Sattar, Li, J, Sattar, SA, Baig, MM, Liu, J, Heatherly, R, Tang, Q, and Malin, B
- Subjects
Information retrieval ,central technique ,Data anonymization ,Intersection (set theory) ,business.industry ,Computer science ,Generalization ,Adversary ,computer.software_genre ,Data sharing ,privacy preserving data ,data publication ,Data mining ,business ,Composition (language) ,computer ,Risk management ,Strengths and weaknesses - Abstract
Data publication is a simple and cost-effective approach for data sharing across organizations. Data anonymization is a central technique in privacy preserving data publications. Many methods have been proposed to anonymize individual datasets and multiple datasets of the same data publisher. In real life, a dataset is rarely isolated and two datasets published by two organizations may contain the records of the same individuals. For example, patients might have visited two hospitals for follow-up or specialized treatment regarding a disease, and their records are independently anonymized and published. Although each published dataset poses a small privacy risk, the intersection of two datasets may severely compromise the privacy of the individuals. The attack using the intersection of datasets published by different organizations is called a composition attack. Some research work has been done to study methods for anonymizing data to prevent a composition attack for independent data releases where one data publisher has no knowledge of records of another data publisher. In this chapter, we discuss two exemplar methods, a randomization based and a generalization based approaches, to mitigate risks of composition attacks. In the randomization method, noise is added to the original values to make it difficult for an adversary to pinpoint an individual’s record in a published dataset. In the generalization method, a group of records according to potentially identifiable attributes are generalized to the same so that individuals are indistinguishable. We discuss and experimentally demonstrate the strengths and weaknesses of both types of methods. We also present a mixed data publication framework where a small proportion of the records are managed and published centrally and other records are managed and published locally in different organizations to reduce the risk of the composition attack and improve the overall utility of the data usc
- Published
- 2015
124. Nilai Educational Parenting dalam Surah Lukman Ayat 12 - 19 serta Relevansinya dengan Penguatan Pendidikan Karakter
- Author
-
Muzammil Muzammil and Yazid Albustomi
- Subjects
educational parenting ,qs. lukman verses 12-19 ,character education ,Islam ,BP1-253 - Abstract
Character education is a plus character education, which involves aspects of knowledge, feelings, and action. The focus of the research in this study is to find out and describe more deeply on the value of parental education and the value of character education contained in the story of Luqman al-Hakim in the letter Luqman verses 12-19. The research method used in this research is library research. The values of parenting education contained in the letter Luqman verses 12-19 are gratitude, being wise, doing good deeds, being respectful, being friendly, being patient, and being humble. Meanwhile, the relevance of religious character with parenting education is the cultivation of a sense of faith so that it is not affected by anything. While the nationalist character is able to prioritize the interests of the nation rather than personal interests. Independent character is a behavior or attitude that is used fully and to achieve all of his hopes, ideals, and dreams without dependence on others. The character of Integrity is based on efforts to produce himself as a person who can always be trusted in words and actions. The character of mutual assistance is an activity that will be carried out together by one group or individual using having to be actively or passively involved in it.
- Published
- 2022
- Full Text
- View/download PDF
125. State Power 2.0 : Authoritarian Entrenchment and Political Engagement Worldwide
- Author
-
Muzammil M. Hussain, Philip N. Howard, Muzammil M. Hussain, and Philip N. Howard
- Subjects
- Internet--Political aspects, Internet--Government policy, Internet--Censorship, Authoritarianism, Social control
- Abstract
Digital media and online social networking applications have changed the way in which dissent is organized with social movement leaders using online applications and digital content systems to organize collective action, activate local protest groups, network with international social movements and share their political perspectives. In the past, authoritarian regimes could control broadcast media in times of political crisis by destroying newsprint supplies, seizing radio and television stations, and blocking phone calls. It is much more difficult to control media in the digital age though there have certainly been occasions when states have successfully shut down their digital networks. What causes state-powers to block internet access, disable digital networks or even shut off internet access? How is it done, what is the impact and how do dissidents attempt to fight back? In this timely and accessible volume a collection of high profile, international scholars answer these key questions using cases from Israel, Iran, Russia, Morocco, Vietnam and Kuwait and assess the political economy of the actors, institutions and regimes involved and effected by the state-management and control of digital networks.
- Published
- 2013
126. Democracy's Fourth Wave? : Digital Media and the Arab Spring
- Author
-
Philip N. Howard, Muzammil M. Hussain, Philip N. Howard, and Muzammil M. Hussain
- Subjects
- Internet--Social aspects--Arab countries, Revolutions--Arab countries--History--21st century, Arab Spring, 2010-, Information technology--Political aspects--Arab countries, Internet--Political aspects--Arab countries
- Abstract
Did digital media really'cause'the Arab Spring, or is it an important factor of the story behind what might become democracy's fourth wave? An unlikely network of citizens used digital media to start a cascade of social protest that ultimately toppled four of the world's most entrenched dictators. Howard and Hussain find that the complex causal recipe includes several economic, political and cultural factors, but that digital media is consistently one of the most important sufficient and necessary conditions for explaining both the fragility of regimes and the success of social movements. This book looks at not only the unexpected evolution of events during the Arab Spring, but the deeper history of creative digital activism throughout the region.
- Published
- 2013
127. Characterizing Interconnection Networks in Terms of Complexity via Entropy Measures
- Author
-
Jinhong Zhang, Asfand Fahad, Muzammil Mukhtar, and Ali Raza
- Subjects
entropy measures ,complexity ,interconnection networks ,Benes networks ,topological indices ,information functionals ,Mathematics ,QA1-939 - Abstract
One of the most recent advancements in graph theory is the use of a multidisciplinary approach to the investigation of specific structural dependent features, such as physico-chemical properties, biological activity and the entropy measure of a graph representing objects like a network or a chemical compound. The ability of entropy measures to determine both the certainty and uncertainty about objects makes them one of the most investigated topics in science along with its multidisciplinary nature. As a result, many formulae, based on vertices, edges and symmetry, for determining the entropy of graphs have been developed and investigated in the field of graph theory. These measures assist in understanding the characteristics of graphs, such as the complexity of the networks or graphs, which may be determined using entropy measures. In this paper, we derive formulae of entropy measures of an extensively studied family of the interconnection networks and classify them in terms of complexity. This is accomplished by utilizing all three tools, including analytical formulae, graphical methods and numerical tables.
- Published
- 2023
- Full Text
- View/download PDF
128. Third World Citizens and the Information Technology Revolution Nivien Saleh
- Author
-
Hussain, Muzammil M.
- Published
- 2013
129. Total disc replacement alters the biomechanics of cervical spine based on sagittal cervical alignment: A finite element study
- Author
-
Muzammil Mumtaz, Justin Mendoza, Sudharshan Tripathi, Amey Kelkar, Norihiro Nishida, Ashish Sahai, and Vijay K Goel
- Subjects
biomechanics ,cervical alignment ,cervical arthroplasty ,cervical spine ,finite element analysis ,sagittal alignment ,total disc replacement ,Diseases of the musculoskeletal system ,RC925-935 - Abstract
Introduction: The correlation between cervical alignment and clinical outcome of total disc replacement (TDR) surgery is arguable. We believe that this conflict exists because the parameters that influence the biomechanics of the cervical spine are not well understood, specifically the effect of TDR on different cervical alignments. Methods: A validated osseo-ligamentous model from C2-C7 was used in this study. The C2-C7 Cobb angle of the base model was modified to represent: lordotic (−10°), straight (0°), and kyphotic (+10°) cervical alignment. The TDR surgery was simulated at the C5-C6 segment. The range of motion (ROM), intradiscal pressure, annular stresses, and facet loads were computed for all the models. Results: The ROM results demonstrated kyphotic alignment after TDR surgery to be the most mobile when compared to intact base model (41% higher in flexion–extension, 51% higher in lateral bending, and 27% higher in axial rotation) followed by straight and lordotic alignment, respectively. The annular stresses for the kyphotic alignment when compared to intact base model were higher at the index level (33% higher in flexion–extension and 48% higher in lateral bending) compared to other alignments. The lordotic model demonstrated higher facet contact forces at the index level (75% higher in extension than kyphotic alignment, 51% higher in lateral bending than kyphotic alignment, and 78% higher in axial rotation than kyphotic alignment) when compared among the three alignment models. Conclusion: Preoperative cervical alignment should be an integral part of surgical planning for TDR surgery as different cervical alignments may significantly alter the postsurgical outcomes.
- Published
- 2022
- Full Text
- View/download PDF
130. Information Technology and the Limited States of the Arab Spring
- Author
-
Muzammil M. Hussain and Philip N. Howard
- Subjects
Geography ,geography.geographical_feature_category ,Economy ,business.industry ,Spring (hydrology) ,Information technology ,business - Published
- 2014
131. Pluralistic Ignorance and the Spiral of Silence Meet
- Author
-
Patricia Moy and Muzammil M. Hussain
- Subjects
Majority opinion ,Spiral of silence ,business.industry ,Social reality ,media_common.quotation_subject ,Public relations ,Public opinion ,Newspaper ,Political science ,business ,Function (engineering) ,Articulation (sociology) ,Mass media ,media_common - Abstract
When Elisabeth Noelle-Neumann conceived of and developed her spiral of silence theory in the 1960s and early 1970s, she formulated it in an era when scholars perceived a return to all-powerful media-namely, that the media were able to exert strong eff ects because audience members actively turned to newspapers, television, radio, and magazines to help defi ne social reality. Indeed, the spiral of silence emerged as a theory not only of public opinion, but also of media eff ects. With their ubiquity, consonance, and cumulativeness, the mass media of decades ago allowed individuals to gauge the climate of public opinion and speak out or not, depending on whether they perceived themselves to be in the minority or majority opinion. In this process of eff ects, the media served what Noelle-Neumann (1993) termed an “articulation function,” providing audience members with arguments used to back up their opinions. After all, “if the mass media fail to provide them, there will be no words” (p. 172).
- Published
- 2014
132. Media and Public Opinion in a Fragmented Society
- Author
-
Patricia Moy and Muzammil M. Hussain
- Published
- 2014
133. Association between schizophrenia and periodontal disease in relation to cortisol levels: an ELISA-based descriptive analysis
- Author
-
Bariah Fahad Albahli, Najd Mohammed Alrasheed, Raghad Saleh Alabdulrazaq, Dhafer S. Alasmari, and Muzammil Moin Ahmed
- Subjects
Schizophrenia ,Periodontitis ,Cortisol ,Mental disorders ,Periodontal risk factors ,Periodontal medicine ,Neurosciences. Biological psychiatry. Neuropsychiatry ,RC321-571 - Abstract
Abstract Background Schizophrenia is a chronic psychosis marked by multiple bioenvironmental and immunological dysregulation with its intricate role in etiopathogenesis of periodontal disease remaining unclear. Hence, the aim of this study is to determine the association between periodontal disease and schizophrenia in relation with cortisol levels. Methods The study is in descriptive design comprised of 40 subjects randomly selected (20 schizophrenic patients as Group A and 20 healthy volunteers as group B). All the study participants underwent complete periodontal examination including scoring of gingival index (GI), plaque index (PI), Probing depths (PD) and clinical attachment loss (CAL). Salivary cortisol levels are estimated using ELISA. Link between schizophrenia and periodontal disease is described in relation to cortisol levels with elimination of other shared risk factors, such as tobacco smoking and xerostomia. Results Significant higher values of periodontal parameters are observed in Group A with schizophrenic patients (GI 2.467 ± 0.528; PI 2.402 ± 0.526; PD 2.854 ± 0.865; CAL 1.726 ± 3.096) than Group B with healthy subjects (GI 0.355 ± 0.561; PI 0.475 ± 0.678; PD 1.493 ± 0.744; CAL 0.108 ± 0.254). However, cortisol levels are lower in schizophrenic group (0.190 ± 0.059) than non-schizophrenic group (0.590 ± 0.228) ruling out the possible role of cortisol in periodontal disease severity associated with schizophrenic patients. Conclusion Findings of this study, provides ground evidence for consideration of schizophrenia as a risk factor for periodontitis and demands greater emphasis on management of schizophrenic patients in dental setting similar to other comorbid disorders such as diabetes mellitus and also incorporating periodontal care measures in the clinical guidelines for schizophrenia management.
- Published
- 2021
- Full Text
- View/download PDF
134. Structure–activity relationship studies of flavopiridol analogues
- Author
-
Peter J. Worland, Christopher McClure, Muzammil M. Mansuri, Krishna K. Murthi, Marja Dubay, Leonardo Brizuela, Kollol Pal, and Michael D. Boisclair
- Subjects
Pyridines ,Clinical Biochemistry ,Pharmaceutical Science ,Antineoplastic Agents ,Tumor cells ,Inhibitory postsynaptic potential ,Biochemistry ,Structure-Activity Relationship ,Piperidines ,Cyclin-dependent kinase ,Drug Discovery ,Tumor Cells, Cultured ,Structure–activity relationship ,Enzyme Inhibitors ,Molecular Biology ,Cyclin ,Flavonoids ,biology ,Chemistry ,Kinase ,Organic Chemistry ,Cell cycle ,Cyclin-Dependent Kinases ,Cell biology ,Chromones ,biology.protein ,Molecular Medicine ,Drug Screening Assays, Antitumor ,biological phenomena, cell phenomena, and immunity - Abstract
Cyclin dependent kinases (CDKs) along with the complementary cyclins form key regulatory checkpoint controls on the cell cycle. Flavopiridol is a synthetic flavone that shows potent and selective cyclin-dependent kinase inhibitory activity. In this paper, we report modifications of the 3-hydroxy-1-methylpiperidinyl (D ring) of flavopiridol and their effect on CDK inhibitory activity.
- Published
- 2000
135. Methods to Mitigate Risk of Composition Attack in Independent Data Publications
- Author
-
snt [research center], Fonds National de la Recherche - FnR [sponsor], Li, Jiuyong, Sattar, Sarowar A., Baig, Muzammil M., Liu, Jixue, Tang, Qiang, Malin, Bradley, snt [research center], Fonds National de la Recherche - FnR [sponsor], Li, Jiuyong, Sattar, Sarowar A., Baig, Muzammil M., Liu, Jixue, Tang, Qiang, and Malin, Bradley
- Abstract
Data publication is a simple and cost-effective approach for data sharing across organizations. Data anonymization is a central technique in privacy preserving data publications. Many methods have been proposed to anonymize individual datasets and multiple datasets of the same data publisher. In real life, a dataset is rarely isolated and two datasets published by two organizations may contain the records of the same individuals. For example, patients might have visited two hospitals for follow-up or specialized treatment regarding a disease, and their records are independently anonymized and published. Although each published dataset poses a small privacy risk, the intersection of two datasets may severely compromise the privacy of the individuals. The attack using the intersection of datasets published by different organizations is called a composition attack. Some research work has been done to study methods for anonymizing data to prevent a composition attack for independent data releases where one data publisher has no knowledge of records of another data publisher. In this chapter, we discuss two exemplar methods, a randomization based and a generalization based approaches, to mitigate risks of composition attacks. In the randomization method, noise is added to the original values to make it difficult for an adversary to pinpoint an individual’s record in a published dataset. In the generalization method, a group of records according to potentially identifiable attributes are generalized to the same so that individuals are indistinguishable. We discuss and experimentally demonstrate the strengths and weaknesses of both types of methods. We also present a mixed data publication framework where a small proportion of the records are managed and published centrally and other records are managed and published locally in different organizations to reduce the risk of the composition attack and improve the overall utility of the data.
- Published
- 2015
136. A Comparative Biomechanical Analysis of Various Rod Configurations Following Anterior Column Realignment and Pedicle Subtraction Osteotomy
- Author
-
Muzammil Mumtaz, Justin Mendoza, Ardalan Seyed Vosoughi, Anthony S. Unger, and Vijay K. Goel
- Subjects
adult spinal deformity ,anterior column realignment ,multirod constructs ,finite element analysis ,rod fracture ,pedicle subtraction osteotomy ,Neurology. Diseases of the nervous system ,RC346-429 - Abstract
Objective The objective of this study was to compare the biomechanical differences of different rod configurations following anterior column realignment (ACR) and pedicle subtraction osteotomy (PSO) for an optimal correction technique and rod configuration that would minimize the risk of rod failure. Methods A validated spinopelvic (L1-pelvis) finite element model was used to simulate ACR at the L3–4 level. The ACR procedure was followed by dual-rod fixation, and for 4-rod constructs, either medial/lateral accessory rods (connected to primary rods) or satellite rods (directly connected to ACR level screws). The range of motion (ROM), maximum von Mises stress on the rods, and factor of safety (FOS) were calculated for the ACR models and compared to the existing literature of different PSO rod configurations. Results All of the 4-rod ACR constructs showed a reduction in ROM and maximum von Mises stress compared to the dual-rod ACR construct. Additionally, all of the 4-rod ACR constructs showed greater percentage reduction in ROM and maximum von Mises stress compared to the PSO 4-rod configurations. The ACR satellite rod construct had the maximum stress reduction i.e., 47.3% compared to dual-rod construct and showed the highest FOS (4.76). These findings are consistent with existing literature that supports the use of satellite rods to reduce the occurrence of rod fracture. Conclusion Our findings suggest that the ACR satellite rod construct may be the most beneficial in reducing the risk of rod failure compared to all other PSO and ACR constructs.
- Published
- 2021
- Full Text
- View/download PDF
137. Elastic and electro-optical properties of XYZ (X = Li, Na and K; Y = Mg; Z = N, P, As, Sb and Bi) compounds
- Author
-
Arif, M., primary, Murtaza, G., additional, Ali, R., additional, Khenata, R., additional, Takagiwa, Y., additional, Muzammil, M., additional, and Omran, S. Bin, additional
- Published
- 2015
- Full Text
- View/download PDF
138. Synthesis and structure-activity relationship of C-3 quaternary ammonium cephalosporins exhibiting anti-MRSA activities
- Author
-
Joanne J. Bronson, Oak K. Kim, Thomas W. Hudyma, John D. Matiskella, Yasutsugu Ueda, and Muzammil M. Mansuri
- Subjects
Stereochemistry ,medicine.drug_class ,Organic Chemistry ,Clinical Biochemistry ,Cephalosporin ,Pharmaceutical Science ,biochemical phenomena, metabolism, and nutrition ,bacterial infections and mycoses ,medicine.disease_cause ,Biochemistry ,Medicinal chemistry ,Chemical synthesis ,chemistry.chemical_compound ,Betaine ,chemistry ,Staphylococcus aureus ,Drug Discovery ,medicine ,Lactam ,Molecular Medicine ,Structure–activity relationship ,Ammonium ,Molecular Biology ,Antibacterial agent - Abstract
A series of cephalosporins bearing C-3 quaternary ammonium groups were prepared and evaluated for their anti-MRSA activity. They exhibit good to excellent in vitro activity (MICs = 1−8 μg/mL) against MRSA.
- Published
- 1997
139. Synthesis and structure-activity relationship of C-3 benzoyloxymethyl cephalosporins exhibiting anti-MRSA activities
- Author
-
Oak K. Kim, John W. Russell, Valerie W. Bidwell, Yasutsugu Ueda, and Muzammil M. Mansuri
- Subjects
Micrococcaceae ,Stereochemistry ,medicine.drug_class ,education ,Clinical Biochemistry ,Cephalosporin ,Pharmaceutical Science ,medicine.disease_cause ,Biochemistry ,Chemical synthesis ,chemistry.chemical_compound ,Drug Discovery ,medicine ,Structure–activity relationship ,Molecular Biology ,Antibacterial agent ,biology ,Organic Chemistry ,biochemical phenomena, metabolism, and nutrition ,bacterial infections and mycoses ,biology.organism_classification ,humanities ,In vitro ,chemistry ,Staphylococcus aureus ,Lactam ,Molecular Medicine - Abstract
A series of cephalosporins bearing C-3 benzoyloxymethyl groups were prepared and evaluated for their anti-MRSA activity and plasma stability. They exhibit excellent in vitro activity (MIC = 0.06 ∼2 μg/mL) against MRSA and excellent stability in human plasma.
- Published
- 1997
140. Authoritarian Responses and Consequences
- Author
-
Philip N. Howard and Muzammil M. Hussain
- Subjects
Political economy ,Political science ,Authoritarianism - Published
- 2013
141. Information Infrastructure and the Organization of Protest
- Author
-
Philip N. Howard and Muzammil M. Hussain
- Subjects
business.industry ,Political science ,Information infrastructure ,Public relations ,Public administration ,business - Published
- 2013
142. Democracy’s Fourth Wave?
- Author
-
Philip N. Howard and Muzammil M. Hussain
- Published
- 2013
143. Introduction
- Author
-
Philip N. Howard and Muzammil M. Hussain
- Published
- 2013
144. Al Jazeera, Social Media, and Digital Journalism
- Author
-
Muzammil M. Hussain and Philip N. Howard
- Subjects
business.industry ,Political science ,Internet privacy ,Journalism ,Social media ,business - Published
- 2013
145. The Recent History of Digital Media and Dissent
- Author
-
Philip N. Howard and Muzammil M. Hussain
- Subjects
business.industry ,media_common.quotation_subject ,Political science ,Gender studies ,Dissent ,business ,Digital media ,media_common - Published
- 2013
146. Application of the Heck reaction in the synthesis of truncated naphthoic acid retinoids
- Author
-
Peter R. Reczek, John E. Starrett, Kenneth M. Tramposch, Kuo-Long Yu, Jacek Ostrowski, Muzammil M. Mansuri, and Simon Chen
- Subjects
medicine.drug_class ,Stereochemistry ,Organic Chemistry ,Clinical Biochemistry ,Pharmaceutical Science ,Biochemistry ,In vitro ,Receptor selectivity ,Transactivation ,chemistry.chemical_compound ,chemistry ,In vivo ,Heck reaction ,Drug Discovery ,medicine ,Molecular Medicine ,Retinoid ,Naphthoic acid ,Molecular Biology ,Naphthalene - Abstract
A series of truncated naphthoic acid retinoids have been prepared using the Heck reaction. These retinoids were evaluated in the RAR transactivation assay in vitro and in the utriculi reduction assay in vivo. It has been found that the naphthalene ring of the retinoids is crucial for their retinoid activity and receptor selectivity.
- Published
- 1996
147. Structural modifications of 6-naphthalene-2-carboxylate retinoids
- Author
-
Kenneth M. Tramposch, Muzammil M. Mansuri, Simon Chen, Kuo-Long Yu, Peter R. Reczek, Jacek Ostrowski, and John E. Starrett
- Subjects
medicine.drug_class ,Stereochemistry ,Organic Chemistry ,Clinical Biochemistry ,Heteroatom ,Pharmaceutical Science ,Aromaticity ,Biochemistry ,chemistry.chemical_compound ,Transactivation ,chemistry ,embryonic structures ,Drug Discovery ,medicine ,Molecular Medicine ,Retinoid ,Carboxylate ,Selectivity ,Molecular Biology ,Linker ,Naphthalene - Abstract
The keto linker of 2-naphthoate retinoid 1 has been found nonessential for RAR transactivation activity and can be replaced with heteroatoms such as S, O, N without significant reduction of the activity. On the other hand, substitutions on the aromatic rings of retinoids 1 and 2 resulted in analogs with reduced potentcy and RAR selectivity.
- Published
- 1996
148. A simple synthesis of biaryl phospholipase A2 inhibitors: Probing hydrophobic effects
- Author
-
Muzammil M. Mansuri, Kenneth M. Tramposch, D O Nettleton, Joanne J. Bronson, and Dane M. Springer
- Subjects
Phospholipase A ,Stereochemistry ,Chemistry ,Phospholipase A2 inhibitor ,Organic Chemistry ,Clinical Biochemistry ,Pharmaceutical Science ,Human platelet ,Biochemistry ,Combinatorial chemistry ,Drug Discovery ,Molecular Medicine ,Molecular Biology ,Diphenic anhydride - Abstract
A series of biaryl acids has been synthesized by treating diphenic anhydride with a variety of amines. The one step strategy allows the rapid interchange of groups for evaluating the hydrophobic constraints of inhibitors of phopholipase A 2 . The most active inhibitor synthesized displayed an IC 50 = 6 μM against human platelet phospholipase A 2 .
- Published
- 1996
149. A Randomized Clinical Trial of the Effect of Intraoperative Saline Perfusion on Postvasectomy Azoospermia
- Author
-
Muzammil M. Ahmed, Gary J. Faerber, Gary D. Smith, Phillip Rodgers, Timothy G. Schuster, Dana A. Ohl, and Brian H. Eisner
- Subjects
Adult ,Male ,endocrine system ,medicine.medical_specialty ,Time Factors ,medicine.medical_treatment ,Sodium Chloride ,Urine ,Saline flush ,Vas Deferens ,Semen ,Vasectomy ,medicine ,Humans ,Postoperative Period ,Therapeutic Irrigation ,Saline ,Original Research ,Azoospermia ,Intraoperative Care ,Sperm Count ,urogenital system ,business.industry ,Vas deferens ,Oligospermia ,Middle Aged ,medicine.disease ,Sperm ,Surgery ,Treatment Outcome ,medicine.anatomical_structure ,Vas deferens surgery ,Family Practice ,business - Abstract
We wanted to determine whether a saline flush during vasectomy would reduce the time needed to reach azoospermia.During vasectomy men were randomly assigned to flush the prostatic end of the vas deferens with 10 mL of normal saline (intervention group, n = 50), while the remaining men (n = 56) served as controls. Sperm counts were performed on the immediate postprocedure urine specimen and on semen samples at 1, 6, and 12 weeks after vasectomy.The postprocedure urine specimens from the intervention and control groups contained 29.2 x 106 and 0.004 x 106 sperm, respectively (P.001). Total sperm counts in the ejaculate for intervention and control groups at 1, 6, and 12 weeks were (in millions of sperm): 14.1 and 13.8, 0.4 and 8.0, and 0.0 and 0.011, respectively (P.05 at all time points). There was no difference in the rate at which the men in the 2 groups achieved azoospermia.Vasal perfusion with saline during vasectomy was effective in removing sperm from the distal vas; however, perfusion did not increase the rate at which men achieve azoospermia.
- Published
- 2004
150. Synthesis of Nitrone Analogues of Rar α Selective Retinoid AM580
- Author
-
Muzammil M. Mansuri, Simon Chen, Kuo-Long Yu, John E. Starrett, Peter R. Reczek, and Jacek Ostrowski
- Subjects
chemistry.chemical_classification ,Stereochemistry ,medicine.drug_class ,Organic Chemistry ,Nitrone ,chemistry.chemical_compound ,chemistry ,Amide ,Oxidizing agent ,medicine ,Moiety ,Amine gas treating ,Retinoid ,Dimethyldioxirane ,Linker - Abstract
Synthesis of nitrone analogues of RAR α-selective retinoid Am 580 in which the amide linker is replaced with a nitrone moiety is discribed. The nitrone segment was constructed by oxidizing the corresponding amine using MCPBA or dimethyldioxirane. The resulting nitrone derivatives were found unstable in acidic and basic conditions. The stability limitations of using this nitrone moiety as an amide surrogate are briefed.
- Published
- 1995
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.