213 results on '"Shafiullah Khan"'
Search Results
202. An improved quantum particle swarm optimizer for electromagnetic design problem.
- Author
-
Ur Rehman, Obaid, Shiyou Yang, and Shafiullah Khan
- Subjects
PARTICLE swarm optimization ,ELECTROMAGNETISM ,ALGORITHMS ,QUANTUM mechanics ,MATHEMATICS - Abstract
The expansion of global optimum methods for electromagnetic design optimization has been successful in the last few years. However, there is no any universal algorithm to be equally successful for all engineering inverse problems. In this regard, inspired from the classical particle swarm optimization (PSO) method and quantum mechanics, this paper presents an improved quantum particle swarm optimizer (MQPSO) by using a tournament selection strategy. Also, a new index, called the torment best (tbest), is incorporated into the QPSO to further enrich its performance. In addition, a new parameter updating strategy is proposed to tradeoff between the exploration and exploitation searches. The feasibility and merit of the proposed approach are verified by the numerical results on mathematic test functions and an electromagnetic inverse problem, namely the TEAM workshop problem 22. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
203. New antioxidant and cholinesterase inhibitory constituents from Lonicera quinquelocularis
- Author
-
Dilfaraz, Khan, primary, Wang, Zhao, additional, Saeed, Ahmad, additional, and Shafiullah, Khan, additional
- Published
- 2014
- Full Text
- View/download PDF
204. Latent natural product and their potential application as anti-infective agents
- Author
-
Fatima, Syed, primary, Raheela, Taj, additional, Nusrat, Shaheen, additional, Musarat, Norin, additional, and Shafiullah, Khan, additional
- Published
- 2014
- Full Text
- View/download PDF
205. Correction to Macrocyclic β-Sheet Peptides That Inhibit the Aggregation of a Tau-Protein-Derived Hexapeptide
- Author
-
R. Jeremy Woods, Michael R. Sawaya, James S. Nowick, Shafiullah Khan, Jing Zheng, Balraju Vadla, Cong Liu, Warren J. Goux, and David Eisenberg
- Subjects
Colloid and Surface Chemistry ,biology ,Chemistry ,Stereochemistry ,Tau protein ,biology.protein ,Beta sheet ,General Chemistry ,Fibril ,Biochemistry ,Catalysis ,Addition/Correction - Abstract
The captions for Figure 2C,D have several minor errors numbering of the residues of Aβ. The corrected captions should read: (C) NMR-based structural model of Aβ1–40 fibrils showing central residues K16–D22 and A30–V36.1b,14 (D) NMR-based structural model of Aβ1–42 fibrils showing central residues L17–I41.2a These errors are peripheral to this paper and do not affect the results or conclusions in any way.
- Published
- 2012
206. Multi-Channel Distributed Coordinated Function over Single Radio in Wireless Sensor Networks.
- Author
-
Campbell, Carlene E.-A., Kok-Keong Loo, Gemikonakli, Orhan, Shafiullah Khan, and Dhananjay Singh
- Subjects
MULTICHANNEL communication ,WIRELESS sensor networks ,RADIO (Medium) ,ALGORITHMS ,IEEE 802.11 (Standard) ,SIMULATION methods & models - Abstract
Multi-channel assignments are becoming the solution of choice to improve performance in single radio for wireless networks. Multi-channel allows wireless networks to assign different channels to different nodes in real-time transmission. In this paper, we propose a new approach, Multi-channel Distributed Coordinated Function (MC-DCF) which takes advantage of multi-channel assignment. The backoff algorithm of the IEEE 802.11 distributed coordination function (DCF) was modified to invoke channel switching, based on threshold criteria in order to improve the overall throughput for wireless sensor networks (WSNs) over 802.11 networks. We presented simulation experiments in order to investigate the characteristics of multi-channel communication in wireless sensor networks using an NS2 platform. Nodes only use a single radio and perform channel switching only after specified threshold is reached. Single radio can only work on one channel at any given time. All nodes initiate constant bit rate streams towards the receiving nodes. In this work, we studied the impact of non-overlapping channels in the 2.4 frequency band on: constant bit rate (CBR) streams, node density, source nodes sending data directly to sink and signal strength by varying distances between the sensor nodes and operating frequencies of the radios with different data rates. We showed that multi-channel enhancement using our proposed algorithm provides significant improvement in terms of throughput, packet delivery ratio and delay. This technique can be considered for WSNs future use in 802.11 networks especially when the IEEE 802.11n becomes popular thereby may prevent the 802.15.4 network from operating effectively in the 2.4 GHz frequency band. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
207. Dissociative recombination in low-energy e-H2+and e-H3+collisions
- Author
-
Shafiullah Khan, Deepak Mathur, and J.B. Hasted
- Subjects
Physics ,Range (particle radiation) ,Cross section (physics) ,Low energy ,Electron ,Atomic physics ,Atomic and Molecular Physics, and Optics ,Dissociative recombination ,Energy (signal processing) ,Recombination ,Ion - Abstract
A new technique for the measurement of dissociative-recombination cross section functions using an ion-trap apparatus has been applied to the recombination of H2+ and H3+ in the energy range 0.3-1.0 eV. The energy dependence of the dissociative-recombination cross section is measured to be E-1.15 and E-0.74 for e-H2+ and e-H3+ collisions, respectively. Good agreement is obtained with results from earlier experiments utilising inclined electron and ion beams.
- Published
- 1978
- Full Text
- View/download PDF
208. ChemInform Abstract: THE BROMINATION OF SOME CHOLEST-5-EN-7-ONES
- Author
-
E. A. SHAFIULLAH KHAN, H. OGURA, and H. TAKAYANAGI
- Subjects
General Medicine - Published
- 1980
- Full Text
- View/download PDF
209. Enhancement of mechanical and electrical properties for in-situ compatibilization of immiscible polypropylene/polystyrene blends.
- Author
-
Qudrat Ullah Khan, Muhammad Asim Mushtaq, Sayed Ali Khan, Maryam Kiani, Fakhar Zaman, Karim Khan, Ikhtesham Mehmood, Kamran Tahir, Ayesha Khan Tareen, Ubaid Khan, Noor Zamin Khan, Zhu Ling, and Shafiullah Khan
- Published
- 2019
- Full Text
- View/download PDF
210. ChemInform Abstract: THE BROMINATION OF SOME CHOLEST‐5‐EN‐7‐ONES
- Author
-
SHAFIULLAH KHAN, E. A., primary, OGURA, H., additional, and TAKAYANAGI, H., additional
- Published
- 1980
- Full Text
- View/download PDF
211. Energy-centric simulation and design space exploration for wireless sensor networks
- Author
-
MIEYEVILLE, Fabien, Navarro, David, Du, Wan, Galos, Mihai, Mieyeville, Fabien, Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali Alrajeh, Institut des Nanotechnologies de Lyon (INL), École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École supérieure de Chimie Physique Electronique de Lyon (CPE)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil Ali Alrajeh
- Subjects
[SPI.NANO] Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems ,[INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation ,[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation ,ComputingMilieux_MISCELLANEOUS ,[SPI.TRON] Engineering Sciences [physics]/Electronics ,[SPI.TRON]Engineering Sciences [physics]/Electronics ,[INFO.INFO-ES] Computer Science [cs]/Embedded Systems - Abstract
International audience
- Published
- 2012
212. Green Home Network based on an Overlay Energy Control Network
- Author
-
Yan, Han, Gueguen, Cédric, Cousin, Bernard, Vuichard, Jean-Paul, Mardon, Gil, Advanced Technolgy in Networking (ATNET), RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES (IRISA-D2), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA), Orange Labs [Cesson-Sévigné], Orange Labs, Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES), DIWEL, Jaime Lloret Mauri, Shafiullah Khan, Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Université de Rennes (UR), and Yan, Han
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] - Abstract
International audience; Today, reducing global greenhouse gas emissions has become a crucial issue for protecting the earth's environment. This requires the reduction of energy consumption in as many sectors as possible, including home networks. Indeed, in the home environment, networked devices consume a large proportion of household energy. There are three reasons that can explain the high energy consumption of home network devices. Firstly, devices are in idle state for hours when they are not in operation. Secondly, they cannot go to an ultra-low power consumption state when they are not needed. And last but not least, there is an increasing number of home network devices with soaring power consumption in our homes. These home network devices have a long switching time from idle state to sleeping state. Moreover, explicit user commands are required to switch the device from idle state to soft-off state. We can certainly gain energy if the device stays in sleeping state or soft-off state instead of idle state. We propose an Overlay Energy Control Network (OECN) which can switch devices from idle state to sleeping state much more quickly and from idle state to soft-off state automatically. The Overlay Energy Control Network (OECN) is formed by at least one overlay energy control node connected to each home network device. The OECN power management coordinates the power states of all home network devices. The overlay energy control nodes can exchange energy control messages. The devices can be turned on or turned off, or can return to their power states when they receive the OECN messages. So that the OECN can be adaptive to our home network devices, the OECN is developed in two ways: (i) all overlay energy control nodes in the home network are ZigBee nodes. This is a ZigBee Mandatory OECN Solution (ZMS); (ii) one or more devices become the overlay energy control nodes where there are no ZigBee modules on that device. This is a ZigBee Optional OECN Solution (ZOS). In our simulation, we will evaluate our overlay energy-saving solutions with a self-controlled energy solution in three metrics: energy consumption, delay and cost. In the self-controlled solution, the device controls its own power state. The proposed Overlay Energy Control Network provides an efficient energy-saving solution for home network devices. In our use case, the ZigBee Mandatory Solution can gain 21.79% energy on average compared to the self-controlled solution. It is an efficient energy-saving solution, but it has a relatively high delay compared to the ZigBee Optional Solution and the self-controlled solution.
- Published
- 2014
213. Capacity-Approaching Channel Codes for Discrete Variable Quantum Key Distribution (QKD) Applications
- Author
-
Fred Daneshgaran, Inam Bari, Marina Mondin, Fabio Mesiti, Maria Teresa Delgado Alizo, Francesca Vatta, Khan Shafiullah, Khan Pathan, Al-Sakib, Delgado Alizo, M. T., Bari, I., Daneshgaran, F., Mesiti, F., Mondin, M., and Vatta, Francesca
- Subjects
Wireless Networks ,Theoretical computer science ,Wireless Networks Security ,business.industry ,Computer science ,channel coding ,Key distribution ,quantum communications ,Cryptography ,Quantum capacity ,Quantum key distribution ,Computer security ,computer.software_genre ,Public-key cryptography ,Wireless Network ,Cipher ,Quantum cryptography ,Quantum information science ,business ,computer - Abstract
Secure communications and cryptography is as old as civilization itself. The Greek Spartans for instance would cipher their military messages and, for Chinese, just the act of writing the message constituted a secret message since almost no-one could read or write Chinese. Modern public key Cryptography until the mid 1980’s was founded on computational complexity of certain trap-door one-way functions that are easy to compute in one direction, but very difficult in the opposite direction. To a large extent computational complexity is still the lynchpin of modern cryptography, but the whole paradigm was revolutionized by introduction of Quantum Key Distribution (QKD) which is founded on fundamental laws of Physics. Indeed, to date, QKD is de-facto the most successful branch of Quantum Information Science (QIS) encompassing such areas as quantum computing which is still in its infancy. Modern QKD is fundamentally composed of a series of three steps that shall be explained later in the chapter: 1) data transmission over the error-prone quantum channel; 2) information reconciliation to allow the parties engaged in communication to have two identical copies of a message that may not be as secure as desired; and 3) privacy amplification that ensures the parties possess copies of messages about which the information that could have possibly be gleaned by the eavesdropper is below a desirable threshold. It is this sufficiently private and often much shorter message that can be used as the secret key to allow exchange of longer messages between the legitimate parties. Step-1 must be based on the laws of quantum physics, whereas step-2 and -3 either necessitate the use of quantum error correcting codes which are often complex or as is often done in practice, based on information exchange over a classical public channel. Objective of this chapter is to give a tutorial presentation and evaluation of QKD protocols at the systems level based on classical error-correcting codes. The QKD systems can provide perfect security (from the viewpoint of information theory) in the distribution of a cryptographic key. QKD systems and related protocols, under particular conditions, can use the classic channel coding techniques instead of quantum error-correcting codes, both for correcting errors that occurred during the exchange of a cryptographic key between two authorized users, and to allow privacy amplification, in order to make completely vain a possible intruder attempt. The secret key is transmitted over a quantum, and thus safe channel, characterized by very low transmission rates and high error rates. This channel is safe given the properties of a quantum system, where each measurement on the system perturbs the system itself, allowing the authorized users to detect the presence of any intruder. Moreover, as shown by accurate experimental studies, the communication channel used for quantum key exchange is not able to reach high levels of reliability (the Quantum Bit Error Rate - QBER - may have a high value), both because of the inherent characteristics of the system, and of the presence of a possible attacker. In order to obtain acceptable residual error rates, it is necessary to use a parallel classical and public channel, characterized by high transmission rates and low error rates, on which to transmit only the redundancy bits of systematic channel codes with performance possibly close to the capacity limit. Furthermore, since the more redundancy is added by the channel code, the more the corresponding information can be used to decipher the private message itself, it becomes necessary to design high-rate codes obtained by puncturing a low-rate mother code, possibly achieving a redundancy such that elements of the secret message cannot be uniquely determined from the redundancy itself.
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.