31 results on '"Saleem, Kashif"'
Search Results
2. Integrating Differential Evolution into Gazelle Optimization for advanced global optimization and engineering applications
- Author
-
Biswas, Saptadeep, Singh, Gyan, Maiti, Binanda, Ezugwu, Absalom El-Shamir, Saleem, Kashif, Smerat, Aseel, Abualigah, Laith, and Bera, Uttam Kumar
- Published
- 2025
- Full Text
- View/download PDF
3. Heat and mass evaluation for free convective flow due to porous surface with thermal radiation and Dufour effects
- Author
-
Mopuri, Obulesu, Ganteda, Charankumar, Saleem, Kashif, El-Meligy, Mohammed, Pothala, Jaya Lakshmi, Ganjikunta, Aruna, Khan, Sami Ullah, and Khn, M. Ijaz
- Published
- 2024
- Full Text
- View/download PDF
4. A modified lightweight authenticated key agreement protocol for Internet of Drones
- Author
-
Chaudhary, Dharminder, Soni, Tanmay, Vasudev, Kondeti Lakshmi, and Saleem, Kashif
- Published
- 2023
- Full Text
- View/download PDF
5. Subjective logic-based trust model for fog computing
- Author
-
Al Muhtadi, Jalal, Alamri, Rawan A., Khan, Farrukh Aslam, and Saleem, Kashif
- Published
- 2021
- Full Text
- View/download PDF
6. Performance evaluation of a Fog-assisted IoT solution for e-Health applications
- Author
-
Vilela, Pedro H., Rodrigues, Joel J.P.C., Solic, Petar, Saleem, Kashif, and Furtado, Vasco
- Published
- 2019
- Full Text
- View/download PDF
7. Security and privacy based access control model for internet of connected vehicles
- Author
-
Habib, Muhammad Asif, Ahmad, Mudassar, Jabbar, Sohail, Khalid, Shehzad, Chaudhry, Junaid, Saleem, Kashif, Rodrigues, Joel J.P. C., and Khalil, Muhammad Sayim
- Published
- 2019
- Full Text
- View/download PDF
8. Postpartum depression prediction through pregnancy data analysis for emotion-aware smart systems
- Author
-
Moreira, Mário W.L., Rodrigues, Joel J.P.C., Kumar, Neeraj, Saleem, Kashif, and Illin, Igor V.
- Published
- 2019
- Full Text
- View/download PDF
9. Misty clouds—A layered cloud platform for online user anonymity in Social Internet of Things
- Author
-
Al-Muhtadi, Jalal, Qiang, Ma, Saleem, Kashif, AlMusallam, Manan, and Rodrigues, Joel J.P.C.
- Published
- 2019
- Full Text
- View/download PDF
10. A Framework to Determine Applications’ Authenticity
- Author
-
Naeem, Rida Zojaj, Abbas, Haider, Shafqat, Narmeen, Saleem, Kashif, and Iqbal, Waseem
- Published
- 2019
- Full Text
- View/download PDF
11. International linkage of the Russian market and the Russian financial crisis: A multivariate GARCH analysis
- Author
-
Saleem, Kashif
- Published
- 2009
- Full Text
- View/download PDF
12. Pricing of global and local sources of risk in Russian stock market
- Author
-
Saleem, Kashif and Vaihekoski, Mika
- Published
- 2008
- Full Text
- View/download PDF
13. Pulmonary artery dissection in a patient with right-sided mechanical circulatory support and an LVAD.
- Author
-
Savsani, Parth, Chapa, Jeffrey, Saleem, Kashif, Ballut, Kareem, Ilonze, Onyedika, Guglin, Maya, and Rao, Roopa A.
- Published
- 2022
- Full Text
- View/download PDF
14. Donor Substance Abuse And Heart Transplantation Outcomes.
- Author
-
Sabra, Mohammad, Ilonze, Onyedika, Rao, Roopa, Saleem, Kashif, and Guglin, Maya
- Abstract
Heart failure (HF) affects about 64.3 million individuals worldwide and 6.2 million adults in the United States. Heart transplantation continues to be the gold standard for treatment of advanced HF. The International Society for Heart and Lung Transplantation (ISHLT) recognizes drug abuse including legalized substances like alcohol and tobacco as an absolute contraindication for heart transplantation but provides vague guidance on some other substances. In this review, we analyze the literature on the hearts of donors with prior substance use and focus on outcomes of heart transplantation such as survival, rejection, and allograft vasculopathy. The authors independently searched PubMed reviewing articles published till December 31, 2021 and using the following terms: "Alcohol" AND "Donor" AND "Heart Transplantation". The last two terms remained the same while we also used them in combination with "Cocaine", "Marijuana", "Tobacco", "Smoking", "Methamphetamine", "Opioids" and "Nicotine". We also manually searched the references in all pertinent articles. The search was limited to English language. Articles describing pediatric patients were excluded. We selected the studies with the data on the outcomes of cardiac transplantation, specifically survival, incidence of rejection, and allograft vasculopathy. The data of the 27 studies meeting our criteria were included in this review. Regarding cocaine use, 5 studies evaluated heart transplantation outcomes in donors with history of cocaine use. Interestingly, no study found any increase of mortality, rejection, or allograft vasculopathy when the donor hearts with current or prior cocaine use were accepted. Despite early reports suggesting poor outcomes of heart transplant from donors with alcohol use, more recent studies show no increased risk of mortality, rejection, or allograft vasculopathy as shown in the table. Nicotine use among donors in heart transplantation was associated with worse outcomes in the 4 studies that were included in the analysis. Among the studies that looked at the effect of opioid use in donors for heart transplantation, none showed increased mortality, rejection, or allograft vasculopathy. Our study provides insight towards the consideration of heart transplant from donors with history of substance use. The presented evidence demonstrates the safety of using donor hearts from patients with history of cocaine, alcohol, and opioid use. Despite the limitations in interpreting the presented evidence, our paper provides insight that should drive future research targeted into the evaluation of substance use in heart transplant. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
- Author
-
Yaseen, Muhammad, Saleem, Kashif, Orgun, Mehmet A., Derhab, Abdelouahid, Abbas, Haider, Al-Muhtadi, Jalal, Iqbal, Waseem, and Rashid, Imran
- Subjects
DATA acquisition systems ,DATA security ,PATIENT monitoring ,WIRELESS sensor nodes ,MEDICAL informatics - Abstract
Recent advances in hardware technology have led to the development of low cost, power efficient and more feature rich devices that are amongst the most critical parts of communication networks. These devices or sensors can now sense data with more accuracy, process it by themselves and send it to the neighboring node or the sink node. However, robust and reliable security mechanisms are not yet properly implemented on these sensors due to their limited energy and computation power. Sensors also play a very important role in eHealthcare systems where ubiquitous patient monitoring is performed. As data is generated from the sensor nodes, reliable, secure and attack-resistant data acquisition and transmission is important for an efficient eHealthcare systems. This survey focuses on security issues of sensors data acquisition and transmission protocols, describing their main security features and comparing them in the context of a secure eHealthcare system. A taxonomy of open issues and future challenges is also discussed with respect to specific security metrics described in the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
16. Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
- Author
-
Derhab, Abdelouahid, Saleem, Kashif, Al-Muhtadi, Jalal, and Orgun, Mehmet A.
- Subjects
- *
BEHAVIOR , *USER interfaces , *WIRELESS communications , *INSTANT messaging , *DATA security - Abstract
In this paper, we propose OnDroid , a prevention system to defend against outgoing malicious SMSs in Android devices. OnDroid is user-friendly as it considers the user's little understanding of the Android system. It also considers multiple threat scenarios and requires less interaction with the user. For each SMS-sending operation, OnDroid first checks if the mobile device state mismatches the user's behavior. If so, the operation is blocked. Otherwise, it is delayed for a while and the user is notified to confirm or reject the operation. If the SMS is considered normal, the user does not need to take any action and the SMS is sent when the delay expires. Efficiency analysis shows that malicious SMS operations might be missed when the user is unavailable. To deal with this issue, we propose a method by which the user behavior can be adjusted to achieve 100 % of malicious SMS prevention. Formal analysis as well as comparative study show that OnDroid offers a good tradeoff between security efficiency and usability. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
17. Pulmonary Artery Dissection In A Patient With Heartmate 3 Left Ventricular Assist Device.
- Author
-
Rao, Roopa, Saleem, Kashif, Guglin, Maya, Onyedika, Ilonze, Jones, Mark, and Ballut, Kareem
- Abstract
56-year-old Caucasian male with Heartmate 3 Left Ventricular Assist Device (LVAD) presented with intense sudden onset of "muscle tearing chest pain". Chest CT scan with contrast showed acute dissection of left main pulmonary artery (Figure 1). On examination patient was mostly symptom free with minimal pain. He was hemodynamically stable with heart rate of 76 bpm, mean arterial pressure of 76mmHg and oxygenating 96% on room air and stable LVAD parameters (flow 4.3L/min, rpms 5600, PA 3.9, power 4.5). Past Medical History- Patient had presented 2 years prior in cardiogenic shock. He was initially supported on Impella 5.0 and then underwent LVAD placement due to further deterioration. Peri operative course was complicated by acute right heart failure requiring Protec Duo placement. Unfortunately, patient also suffered acute embolic stroke around the same time and was left with residual left hemiparesis. Patient was supported on Protec Duo for nearly 3 weeks prior to recovery of right heart function and underwent successful decannulation without any complications. Management- Patient was evaluated by surgical team and was deemed not a good surgical candidate due to underlying co-morbidities. He was evaluated by Interventional radiology and elected to manage conservatively as patient was hemodynamically stable with resolved symptoms. Repeat chest CT scan 3 days later showed stable dissection. Patient was discharged home in stable condition. Discussion This is the first case reported in the literature of pulmonary artery dissection (PAD) in a patient with LVAD. PAD is very rare with less than 200 reported cases in the literature with no clear direction as to the management of the condition. It is usually seen in patients with known pulmonary artery disease like pulmonary hypertension and in congenital heart disease patients with dilated pulmonary artery. It is also reported as a procedural complication of pulmonary valve intervention. Although we cannot say conclusively, we hypothesize that placement of Protec Duo might have caused damage to the pulmonary artery previously. With increasing use of percutaneous circulatory support, one must be cautious of this potential complication. Figure 1 :Dissection flap of the left pulmonary artery originates immediately distal to the main pulmonary artery bifurcation, extending through the length of the left pulmonary artery to the level of the left lower interlobar pulmonary artery, no definite segmental extension is identified. The maximal diameter of the dissection flap is 1.1 cm: at this level the true lumen of the main pulmonary artery measures 5 mm. No significant associated thrombus is seen. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Secure transfer of environmental data to enhance human decision accuracy.
- Author
-
Saleem, Kashif, Derhab, Abdelouahid, Al-Muhtadi, Jalal, Shahzad, Basit, and Orgun, Mehmet A.
- Subjects
- *
ENVIRONMENTAL monitoring equipment , *ALGORITHMS , *DECISION making , *INFORMATION resources management , *INFORMATION technology , *MEDICAL ethics , *PRIVACY , *DATA security - Abstract
A critical issue in environmental decision making is how to trust the monitoring information gathered by a multitude of devices at remote locations. The accuracy of information helps in enhancing the effectiveness of decisions, whether it is made by human beings or by an intelligent system. The researchers and practitioners from disciplines such as climatology, agriculture, and meteorology, which depend on the environmental data, are heavily affected in the case of inaccurate information. In order to deal with the above problem, in this paper a data encryption algorithm inspired by the blood brain barrier (BBB) system. A real scenario to irrigate a remote location based on a wireless sensor network (WSN) is simulated in network simulator 2 (ns-2) to study the performance of the encryption algorithm. Our result and analysis show that the proposed encryption mechanism can efficiently protect the data communication from brute-force search or exhaustive key search, eavesdropping, spoofed, altered or replayed routing information, selective forwarding, acknowledgement spoofing, sybil and hello flood attacks. Hence, the proposed data encryption algorithm ensures the confidentiality of critical information from source to a given destination, which ultimately helps in enhancing the human decision accuracy and learning environmental conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
19. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
- Author
-
Saleem, Kashif, Derhab, Abdelouahid, Al-Muhtadi, Jalal, and Shahzad, Basit
- Subjects
- *
ALGORITHMS , *CLINICAL medicine , *ELECTRONIC security systems , *INFORMATION storage & retrieval systems , *MEDICAL databases - Abstract
In this paper, we propose a Machine to Machine (M2M) Low Cost and Secure (LCS) communication system for e-Healthcare society. The system is designed to take into consideration the psychological issues related to all actors in the e-Healthcare society such as: stress due to high workload, anxiety, and loneliness. The system is capable of performing most of the tasks in an autonomous and intelligent manner, which minimizes the workload of medical staffs, and consequently minimizes the associated psychological stress and improves the quality of patient care as well as the system performance. We show how the different actors in the e-Healthcare society can interact with each other in a secure manner. To ensure data privacy, the mechanism involves intelligent authentication based on random distributive key management, electronic certificate distribution, and modified realm Kerberos. The system handles dynamic assignments of doctors to specific patients. It also addresses the need for patients to share their health information with strangers while dealing with the privacy preservation issue. Finally, the simulation type implementation is performed on Visual Basic .net 2013 that shows the success of the proposed Low Cost and Secure (LCS) algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
20. Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience.
- Author
-
Saleem, Kashif, Derhab, Abdelouahid, Al-Muhtadi, Jalal, and Orgun, Mehmet A.
- Subjects
- *
COMMUNICATION , *SYSTEMS design , *USER interfaces - Abstract
This paper investigates the ant colony optimization (ACO) based routing protocol against holes (or voids) to address user’s connectivity via Pervasive Wireless Sensor Networks (PWSNs). A hole is an area that has no active sensors, which makes a connection between one side of the network and the other side impossible. To avoid such holes, prior works detected them only when packets reached nodes near the hole, called dead-ends. In this case, the packets need to be rerouted, which results in additional communication cost. The ant colony optimization (ACO) approach is known to be suitable for dynamic environments, which makes it a good choice to deal with the hole problem. We study the capability of an ACO-based routing protocol, called the biologically inspired secure autonomous routing protocol (BIOSARP), for resolving this issue. Because of its routing criteria, BIOSARP does not try to detect the holes after their appearance, but rather avoids them. Network simulator 2 (ns-2) is utilized to perform an analysis by adopting a flag-based feedback mechanism in BIOSARP and is further compared with on-demand routing with the void avoidance (ODVA) protocol in terms of the delivery ratio and energy consumption. Findings clearly demonstrate that BIOSARP can efficiently maintain the network prior to any possible hole problems, by switching data forwarding to the most optimal neighboring node. Thus, it can self-adapt to faults appearing in PWSN and efficiently maintains the network communication. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
21. A lightweight cyber security framework with context-awareness for pervasive computing environments.
- Author
-
Al-Muhtadi, Jalal, Saleem, Kashif, Al-Rabiaah, Sumayah, Imran, Muhammad, Gawanmeh, Amjad, and Rodrigues, Joel J.P.C.
- Subjects
UBIQUITOUS computing ,INTERNET security ,CONTEXT-aware computing ,CYBERTERRORISM ,DATA encryption ,COMPUTER crime prevention ,ACCESS control - Abstract
• Smart environments should protect sensitive information from exposure or monitoring. • A lightweight cyber security framework with context-awareness for pervasive computing environment is proposed. • Symmetric key encryption leverages the data confidentiality and digital signature-based hash function ensures the integrity. • Implementation of the proposed framework is performed in a real cloud environment. • Experimental results demonstrate the effectiveness of the proposed framework. Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the physical world and transmit it to receivers as per requirements or in case of environmental changes, such as temperature and humidity. However, the combination of dynamic operation and the need to handle sensitive and private data make the pervasive computing environment and IoT devices vulnerable to numerous attacks. Smart environments require a maximum level of safety assurance, such as trusted context producers and customers, which should protect sensitive information from exposure or monitoring. This paper discusses the major cyber threats in smart environments and proposes a novel lightweight security framework that authenticates and maintains the context providers and receivers. The cloud environment is adopted for user authentication at the user layer to implement access control and role assignment. Finally, the proposed security framework is implemented in the IBM cloud platform with six devices to evaluate its efficiency, sustainability, and secure communication. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
22. Towards energy-aware fog-enabled cloud of things for healthcare.
- Author
-
Mahmoud, Mukhtar M.e., Rodrigues, Joel J.p.c., Saleem, Kashif, Al-Muhtadi, Jalal, Kumar, Neeraj, and Korotaev, Valery
- Subjects
- *
INTERNET of things , *RESOURCE allocation , *CLOUD computing , *ENERGY consumption , *QUALITY of service - Abstract
The Internet-of-Things (IoT) represents the next groundbreaking change in information and communication technology (ICT) after the Internet. IoT is concerned with making everything connected and accessible through the Internet. However, IoT objects (things) are characterized by constrained computing and storage resources. Therefore, the Cloud of Things (CoT) paradigm that integrates the Cloud with IoT is proposed to meet the IoT requirements. In CoT, the IoT capabilities (e.g., sensing) are provisioned as services. Unfortunately, the two-tier CoT model is not efficient in the use cases sensitive to delays and energy consumption (e.g., in healthcare). Consequently, Fog Computing is proposed to support such IoT services and applications. This paper reviews the most relevant Fog-enabled CoT system models and proposes an energy-aware allocation strategy for placing application modules (tasks) on Fog devices. Finally, the performance of the proposed strategy is evaluated in comparison with the default allocation and Cloud-only policies, using the iFogSim simulator. The proposed solution was observed to be more energy-efficient, saving approximately 2.72% of the energy compared to Cloud-only and approximately 1.6% of the energy compared to the Fog-default. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
23. SPINAL CORD INFARCTION IN PATIENTS RECEIVING ECMO THERAPY.
- Author
-
Bain, Eric R., Guglin, Maya E., Saleem, Kashif, and Rao, Roopa Akkadka
- Subjects
- *
SPINAL cord , *INFARCTION - Published
- 2023
- Full Text
- View/download PDF
24. An intelligent computing methodology for two-phase flow performance assessment of electrical submersible pump using artificial neural network and synthetic minority over-sampling technique.
- Author
-
Ali, Asad, Yuan, Jianping, Iqbal, Shahzad, Si, Qiaorui, Raza Shah Naqvi, Syed Muhammad, Hussain, Saddam, Shah, Faisal, Ghith, Ehab seif, and Saleem, Kashif
- Subjects
- *
ARTIFICIAL neural networks , *COMPUTATIONAL fluid dynamics , *MULTIPHASE flow , *FLUID mechanics , *SUBMERSIBLE pumps - Abstract
• A smart computing method for two-phase flow performance assessment of ESP. • Broad applications of SMOTE algorithm and BP-ANN model for fluid mechanics. • SMOTE algorithm is good tool for interpolating the multi-phase flow experimental data. To construct a reasonable model for forecasting the air–water two-phase performance of an electrical submersible pump (ESP), it is essential to accurately identify the air–water multiphase flow performance and internal flow pattern within the ESP impeller. Experimental research was done to determine the effects of inlet gas void fractions (IGVF), and liquid flow rate, on the ESP's flow characteristics. A back-propagated artificial neural network (BP-ANN) model with two hidden layers was selected after performing its comparison with the one-step secant (OSS) and scaled conjugate gradient (SCG) algorithms. The test data was expanded and oversampled to a reasonable extent using the SMOTE (Synthetic Minority Over-sampling Technique) algorithm, which has shown precision until 10 decimal points, showing that the SMOTE algorithm is a useful tool for increasing the artificial neural network model's accuracy. Additionally, the important parameters of the constructed BP-ANN model were validated as well, which shows that the distribution of oversampled data for testing and training procedures is 20% and 80%, respectively, yielding the lowest MSE (mean square error) of 0.025 and maximum R2 of 0.988. The best values of neurons and hidden layer after validation are 2 and 1, respectively. Furthermore, the statistical analysis performed on the oversampled data showed that the newly added BP-ANN model developed in this study is best at predicting the performance of ESP under multiphase flow circumstances. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
25. Aero-thermodynamic responses of a novel FGM sector disks using mathematical modeling and deep neural networks.
- Author
-
Han, Shaoyong, Wang, Zhen, El-Meligy, Mohammed, and Saleem, Kashif
- Subjects
- *
ARTIFICIAL neural networks , *MACH number , *DIFFERENTIAL quadrature method , *PARTIAL differential equations , *THERMAL resistance - Abstract
• Presenting aero-thermodynamic responses MD-FG sector disk in supersonic airflow, for the first time. • Presenting quasi-3D new refined theory to present the displacement fields of the MD-FG sector disk in higher-order shapes. • Presenting flutter and frequency response of the temperature-dependent MD-FG sector disk for different parameters. • Presenting the GDQ method to solve the governing equations of the current higher-order structure. • Presenting deep neural networks model with related parameters to simulate the current applicable structure with low computational cost. Composite sector disks have extensive applications in aerospace industries, particularly when exposed to challenging conditions such as supersonic airflow and thermal environments. These applications leverage the superior properties of composite materials, including high strength-to-weight ratios, enhanced durability, and excellent thermal resistance, to meet the stringent requirements of aerospace operations. Multi-directional functionally graded (MD-FG) materials due to high-temperature resistance and other amazing properties in each direction have gotten plenty of attention recently. So, in this research, a thermoelasticity solution has been presented to study fundamental frequency traits of an MD-FG sector disk in supersonic airflow via both mathematics simulation and deep neural networks technique. For obtaining exact displacement fields, along with defining the changes of transverse shear strains along the system's thickness, the refined zigzag hypothesis is utilized. For obtaining the temperature-dependent equations, heat conduction relation and thermal boundary conditions of the MD-FG structure are presented. A coupled quasi-3D new refined theory (Q3D-NRT) and generalized differential quadrature method (GDQM) are presented for obtaining and solving the partial differential equations in the time-displacement domain. After obtaining the mathematics results, appropriate datasets are made for testing, training, and validation of the deep neural networks technique. Finally, the results have shown that aerodynamic pressure, temperature changes, Mach number, free stream speed, and air yaw angle have a major role in the stability/instability analyses of the thermally affected MD-FG sector disk in supersonic airflow. As an amazing outcome, increasing the sector angle, FG indexes, and temperature change lead to the reduction of the critical Mach number, and aerodynamic pressure associated with the flutter phenomenon. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Don't Break My Heart: A Case Report of Takotsubo Syndrome in a Transplanted Heart.
- Author
-
Damera, Nihanth, Bangalore, Bhavana Siddegowda, Rao, Roopa A., and Saleem, Kashif
- Subjects
- *
CARDIOGENIC shock , *TAKOTSUBO cardiomyopathy , *CORONARY disease , *INTRA-aortic balloon counterpulsation , *HEART transplantation , *SEIZURES (Medicine) , *MYOCARDIAL ischemia - Abstract
• A patient may develop Takotsubo syndrome, which leads to cardiogenic shock, within a year after heart transplant. • Stress cardiomyopathy must be considered if a patient has heart failure after heart transplant, especially if the biopsy is negative for rejection. • Within a year after transplant, there may be partial autonomic reinnervation developing in a transplanted denervated heart. Cardiogenic shock after heart transplant, could be due to acute rejection, cardiac allograft vasculopathy, or myocarditis. Stress cardiomyopathy (CM) in a denervated transplanted heart is unusual. A 56-year-old man with a history of ischemic heart disease and a seizure disorder underwent orthotropic heart transplant. He had breakthrough seizures posttransplant while on levetiracetam (Keppra) and was admitted for status epilepticus. A transthoracic echocardiogram (TTE) was done for hypotension (BP 90/60). TTE showed a severely reduced left ventricular ejection fraction (LVEF) of 15%, hyperkinetic base, and apical ballooning that are consistent with stress CM. Electrocardiogram with T wave inversion in precordial leads. Troponin was elevated to 1.77. The patient had cardiogenic shock and needed an intra-aortic balloon pump and multiple pressors. He was treated for status epilepticus and the LVEF completely recovered in 1 week. The patient had a normal TTE, coronary angiography, and biopsy with no rejection 8 days before admission. Stress CM was the diagnosis of exclusion, confirmed with a complete recovery of the LVEF. There are only 5 case reports of stress CM after heart transplant, with most presenting 9 to 10 years afterwards. We describe an unusual case of cardiogenic shock from stress CM triggered by status epilepticus in a denervated heart only 1 year posttransplant. The mechanism is elusive, and some hypotheses suggest exaggerated sensitivity to a plasma catecholamine surge from parasympathetic denervation. In a denervated heart, autonomic re-innervation can be seen as early as 1 year posttransplant. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. A mutual exclusion algorithm for flying Ad Hoc networks.
- Author
-
Khanna, Ashish, Rodrigues, Joel J.P.C., Gupta, Naman, Swaroop, Abhishek, Gupta, Deepak, Saleem, Kashif, and de Albuquerque, Victor Hugo C.
- Subjects
- *
AD hoc computer networks , *DRONE aircraft , *DISTRIBUTED computing , *COMPUTER systems , *ALGORITHMS - Abstract
• The presented exposition introduces mobile resource Mutual exclusion (MRME) problem in FANET. • A novel token-based algorithm to solve the MRME problem has also been proposed. • The proposed algorithm is fault-tolerant as it handles token-loss. • The paper proves the correctness properties of the problem. • The static and dynamic performance analysis of the procedure has also been provided. Mutual exclusion (ME) is a highly researched problem in distributed computing systems. In the mutual exclusion problem, no two nodes can use critical resource simultaneously. Numerous protocols have been proposed for various types of static as well as mobile distributed systems, namely, Mobile Ad Hoc Networks (MANET), Vehicular Ad Hoc Networks (VANET) and cellular networks. The flying ad hoc networks (FANET) is an interesting variant of distributed systems and, to the best of our knowledge, no protocol exists in the literature for mutual exclusion in FANETs. In FANETs, the critical resource is mounted on an unmanned aerial vehicle (UAV) and user nodes are assumed in the transmission range of the UAV. Ours is the first algorithm to ensure ME in FANETs. The algorithm is token-based and we name it Mobile Resource Mutual Exclusion (MRME) algorithm. Unlike other ad hoc networks, due to swift mobility of nodes as well as resource, the FANETs topology is highly dynamic and fault prone. The MRME algorithm handles it successfully. Further, we present the correctness proof, complexity analysis and simulation results. The worst-case complexity of MRME is O(n) and synchronization delay is T, where T is message propagation delay. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
28. Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency.
- Author
-
Santos, Diego A.A., Rodrigues, Joel J.P.C., Furtado, Vasco, Saleem, Kashif, and Korotaev, Valery
- Subjects
- *
DISEASE vectors , *INFECTIOUS disease transmission , *MOSQUITO vectors , *MICROPHONES , *OPTICAL sensors - Abstract
Abstract The knowledge of flying insects wing-beat acoustical properties supported the progress of sensing disease vectors mosquitoes in free flight. The classification of individual flying insects species' through wing-beat frequencies and respective harmonics is the principle of frequency spectrum analysis method both in acoustical and optical sensors approaches for disease vectors mosquitoes. Investigations based on acoustic devices, microphones, amplifiers, and recorders have produced extensive scientific contributions to behavioral and biological insects' knowledge. Moreover, the researches based on acoustical approach are accountable for the massive available database on flying insects species and gender classification. However, it was the advent of the optical sensing approach for flying insects detection that allowed sensor devices to become smaller, cheaper, faster, self-triggered, and further reliable and energy efficient. These benefits enabled the state of the art on mosquitoes monitoring to move towards smarter devices that automatically process data and have greater autonomy in inaccessible locations. Consequently, it becomes plausible to break geographic, economic and social boundaries for the flying insects sensing, allowing the ubiquitous monitoring of disease-vector mosquito populations. This paper reviews the related literature on automated electronic approaches for disease vectors mosquitoes monitoring and identifies open issues and opportunities for further researches in expanding scenarios considering new data processing and emerging transmission technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
29. DON'T GO BREAKING MY HEART, ITS NEW!
- Author
-
Bangalore, Bhavana Siddegowda, Damera, Nihanth, Ilonze, Onyedika, Saleem, Kashif, Ballut, Kareem, Guglin, Maya, and Rao, Roopa
- Subjects
- *
HEART - Published
- 2022
- Full Text
- View/download PDF
30. IATROGENIC MITRAL REGURGITATION FROM IMPELLA IN VIRAL MYOCARDITIS.
- Author
-
Torabi, Asad J., Sinha, Anjan, Guglin, Maya, Everett, Jeffrey, Saleem, Kashif, and Rao, Roopa
- Subjects
- *
MITRAL valve insufficiency , *IATROGENIC diseases , *MYOCARDITIS - Published
- 2021
- Full Text
- View/download PDF
31. Clustering formation in cognitive radio networks using machine learning.
- Author
-
Bhatti, Dost Muhammad Saqib, Ahmed, Saleem, Chan, Abdul Sattar, and Saleem, Kashif
- Subjects
- *
COGNITIVE radio , *RADIO networks , *MACHINE learning , *ENERGY consumption , *ARTIFICIAL intelligence - Abstract
The goal of spectrum sensing is to elevate the detection performance of secondary users (SUs) in a cognitive radio network (CRN). In cooperative spectrum sensing, all secondary users (SUs) of the network deliver their sensing measurement to the fusion center (FC) for the final decision regarding the activity of primary user (PU). The collaboration among large number of SUs might create overhead for the FC. To improve the performance of cooperative spectrum sensing, a novel method is proposed, which segregates the network into clusters. We have used artificial intelligence to make the clusters. The formation of clusters is made based on machine learning affinity propagation algorithm. Using proposed method, SUs share local messages with their neighbors until a highest class of cluster heads are chosen and a corresponding clustering configuration is made. The messages are evaluated depend on measures of similarity between the SUs, which are selected based on the objective of the clustering process. The sensing message of delimited number of SUs is shared with their cluster heads, which is ultimately shared with the FC for final decision. The proposed approach obtains the highest energy and performance efficiency in comparison with conventional clustering schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.