SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Sari Ismail) ;spr:eng"

Sökning: WFRF:(Sari Ismail) > Engelska

  • Resultat 1-8 av 8
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Akkoc, Nurullah, et al. (författare)
  • Increased Prevalence of M694V in Patients With Ankylosing Spondylitis : Additional Evidence for a Link With Familial Mediterranean Fever
  • 2010
  • Ingår i: Arthritis and Rheumatism. - : Wiley. - 0004-3591 .- 1529-0131. ; 62:10, s. 3059-3063
  • Tidskriftsartikel (refereegranskat)abstract
    • Objective. To assess whether there is a statistically significant difference in the frequency of common MEFV allele variants in patients with ankylosing spondylitis (AS) as compared with control patients with rheumatoid arthritis (RA) and with healthy control subjects. Methods. Sixty-two patients with AS, 50 healthy control subjects, and 46 patients with RA were assessed for the presence of MEFV variants. Exon 10 was analyzed by direct sequencing. E148Q was analyzed by restriction endonuclease enzyme digestion (REED) or by direct sequencing when REED analysis failed. Results. The allele frequency of all MEFV variants in the AS group was significantly higher than that in the pooled control group of healthy subjects plus RA patients (15.3% versus 6.8%; P = 0.021). M694V was the only variant that was significantly more common in the AS group than in the combined or individual control groups (P = 0.026 for AS patients versus healthy controls, P = 0.046 for AS patients versus RA patient controls, and P = 0.008 for AS patients versus healthy and RA patient control groups). The carriage rate of M694V was also significantly higher in the AS patient group than in the combined control group (odds ratio 7.0, P = 0.014). Neither M694V nor any other MEFV variant showed a correlation with most of the disease-related measures examined. Conclusion. We found an increased frequency of MEFV variants in AS patients as compared with healthy controls and with RA patient controls. This was primarily due to the presence of M694V. The roles of other exon 10 variants, as well as the relationship between the variant status and the severity and clinical course of the disease, need to be explored in further studies that include sufficiently large sample sizes.
  •  
2.
  • Butun, Ismail, 1981, et al. (författare)
  • Hardware security of fog end-devices for the internet of things
  • 2020
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 20:20, s. 1-28
  • Forskningsöversikt (refereegranskat)abstract
    • The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
  •  
3.
  • Butun, Ismail, et al. (författare)
  • Security Implications of Fog Computing on the Internet of Things
  • 2019
  • Ingår i: International Conference on Consumer Electronics (ICCE). - : IEEE. - 9781538679104
  • Konferensbidrag (refereegranskat)abstract
    • Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications. Index Terms—IoT, IIoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability.
  •  
4.
  • Sari, Alparslan, et al. (författare)
  • A case study of decision support system and warehouse management system integration
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. - : IGI Global. ; , s. 111-138
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • A warehouse is an indispensable part of the logistics. A warehouse management system (WMS) is designed to improve efficiency in warehouses to increase their throughput and potential. The rise of IoT and its commercialization enabled 'smart things' to be widely adopted by hobbyists and companies. Cheap sensors and smart devices triggered better automation opportunities. Many devices and sensors that are being deployed in the industry and warehousing are affected by this trend. A well-designed WMS is needed to connect devices and humans in a heterogenous warehouse environment. This chapter introduces a prototype of a WMS powered by a decision support system (DSS) based on real-life requirements. In order to have fast, reliable, and efficient decision making in warehousing, the importance of employing DSS in the WMS is emphasized. Warehouse-related IoT technology is briefly introduced, and its security considerations are discussed thoroughly. The main contribution of this chapter is to show how warehouse operations can be modeled in business process model notation and executed in a DSS.
  •  
5.
  • Sari, Alparslan, et al. (författare)
  • A Highly Scalable Instruction Scheduler Design based on CPU Stall Elimination
  • 2021
  • Ingår i: 2021 Zooming Innovation in Consumer Technologies Conference, ZINC 2021. ; , s. 105-110
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, by targeting low-level code optimization, an instruction scheduler is designed and experimented with a synergistic processor unit (SPU) to show its effectiveness on a basic block and data dependency graph (DDG) called compiler instruction scheduler (CIS). In our methodology, a source C/C++ file is converted to an assembly file via spu-gcc to detect stalls in basic code blocks and CIS generates the DDG of executable code to eliminate stalls to find optimization opportunities and increase the program performance. The CIS simply shuffles the instruction sequences of the assembly code to eliminate CPU stalls in a given basic instruction block. Random and sliding window schedulers are implemented to generate a new assembly code sequence based on DDG and a basic block in parallel. Finally, this paper describes how CIS finds the optimized code sequence for a given file without any conflicts and hazards. Compared to the original code compilation process, we have shown that CIS improves the code execution metrics, and also our evaluated speedup results are found to be promising.
  •  
6.
  • Sari, Alparslan, et al. (författare)
  • Designing a Distributed Multi-agent System for Compiler Optimization
  • 2021
  • Ingår i: 2021 Zooming Innovation in Consumer Technologies Conference, ZINC 2021. ; , s. 269-274
  • Konferensbidrag (refereegranskat)abstract
    • This paper explores the run time performance improvements using different GCC optimization flags in program compilation. As multi-core microprocessor systems replacing legacy single-core ones, tremendous effort is needed to address to optimize the associated compilers for newly designed architectures in order to suit them for running parallel programming on multiple cores. Therefore, the aim of this paper is to address this challenge by designing an optimum distributed multi-agent system to perform compiler optimization. A multi-agent framework is adopted to utilize random and genetic algorithm-based search algorithm to find the best GCC optimization flags for a given program. The framework is highly scalable and can be extended with distributed system concept to perform code compilation in parallel to find the best-optimized code sequence in a short amount of time. The initial performance results have promising indicators which clearly show that the performance improvement is achieved.
  •  
7.
  • Sari, Alparslan, et al. (författare)
  • Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
  • 2021
  • Ingår i: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities. - Hershey, PA, USA : IGI Global. ; , s. 91-110
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • The internet of things (IoT) has recently brought major technological advances in many domains, including the smart grid. Despite the simplicity and efficiency that IoT brings, there are also underlying risks that are slowing down its adoption. These risks are caused by the presence of legacy systems inside existing infrastructures that were built with no security in mind. In this chapter, the authors propose a method for early-stage detection of cyber-security incidents and protection against them through applicable security measures. This chapter introduces security techniques such as anomaly detection, threat investigation through a highly automated decision support system (DSS), as well as incident response and recovery for smart grid systems. The introduced framework can be applied to industrial environments such as cyber-threats targeting the production generator as well as the electricity smart meters, etc. The chapter also illustrates the framework's cyber-resilience against zero-day threats and its ability to distinguish between operational failures as well as cyber-security incidents.
  •  
8.
  • Sari, Alparslan, et al. (författare)
  • Industrial networks and IIoT: Now and future trends
  • 2020
  • Ingår i: Industrial IoT: Challenges, Design Principles, Applications, and Security. - Cham : Springer International Publishing. ; , s. 3-55
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Connectivity is the one word summary for Industry 4.0 revolution. The importance of Internet of Things (IoT) and Industrial IoT (IIoT) have been increased dramatically with the rise of industrialization and industry 4.0. As new opportunities bring their own challenges, with the massive interconnected devices of the IIoT, cyber security of those networks and privacy of their users have become an important aspect. Specifically, intrusion detection for industrial networks (IIoT) has great importance. For instance, it is a key factor in improving the safe operation of the smart grid systems yet protecting the privacy of the consumers at the same time. In the same manner, data streaming is a valid option when the analysis is to be pushed from the cloud to the fog for industrial networks to provide agile response, since it brings the advantage of fast action on intrusion detection and also can buy time for intrusion mitigation. In order to dive deep in industrial networks, basic ground needs to be settled. Hence, this chapter serves in this manner, by presenting basic and emerging technologies along with ideas and discussions: First, an introduction of semiconductor evolution is provided along with the up-to-date hi-tech wired/wireless communication solutions for industrial networks. This is followed by a thorough representation of future trends in industrial environments. More importantly, enabling technologies for industrial networks is also presented. Finally, the chapter is concluded with a summary of the presentations along with future projections of IIoT networks.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-8 av 8

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy