SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Kumar Pardeep) "

Sökning: WFRF:(Kumar Pardeep)

  • Resultat 1-20 av 20
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Bessa, Agustina, et al. (författare)
  • Unmet needs in sexual health in bladder cancer patients : a systematic review of the evidence
  • 2020
  • Ingår i: BMC Urology. - : BioMed Central (BMC). - 1471-2490. ; 20:1
  • Forskningsöversikt (refereegranskat)abstract
    • Background: Bladder cancer (BC) treatment can have a detrimental effect on the sexual organs of patients and yet assessment of sexual health needs has been greatly overlooked for these patients compared to those who have undergone other cancer therapies.Methods: This review was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) guidelines in July 2019. Studies were identified by conducting searches for Medline (using the PubMed interface), the Cochrane Central Register of Controlled Trials (CENTRAL) and Ovid Gateway (Embase and Ovid) using a list of defined search terms.Results: 15 out of 37 studies included men only, 10 studies women only and 11 both sexes. Most participants were aged 50 to 65 years. Most studies (n = 34) focused on muscle invasive BC and only three on non-muscle invasive BC. Measurements of sexual dysfunction, including erection, ejaculation, firmness and desire, were the most commonly used measurements to report sexual health in men. In women, lubrification/dryness, desire, orgasm and dyspareunia were the most commonly reported. Twenty-one studies evaluated sexual dysfunction based on validated questionnaires, two with a non-validated questionnaire and through interviewing participants.Conclusion: While recognition of the importance of the inclusion of psychometric measurements to assess sexual health is growing, there is a lack of consistent measures to assess sexual health in BC. With the focus on QoL arising in cancer survivorship, further studies are needed to develop, standardize and implement use of sexual health questionnaires with appropriate psychometrics and social measures to evaluate QoL in BC patients.
  •  
2.
  • Bhargava, Cherry, et al. (författare)
  • An intelligent model for residual life prediction of thyristor
  • 2019
  • Ingår i: International Journal of Engineering and Advanced Technology. - 2249-8958. ; 8:5, s. 1862-1866
  • Tidskriftsartikel (refereegranskat)abstract
    • Modern age is the age of integration, where millions of electronic components are integrated and installed on a single chip, to minimize the size of device and automatically increases the speed. But, as a greater number of components are placed on a single device, reliability becomes a concern issue, as failure of one component can degrade the complete device. From dimmer to high voltage power transmission, thyristors are widely used. The failure of thyristor can be proven dangerous for mankind, so the reliability prediction of thyristor is highly desirable. This paper is based on the accelerated life testing based experimental technique for reliability assessment. An intelligent model is designed using artificial intelligence techniques i.e. ANN, Fuzzy and ANFIS and comparative analysis is conducted to estimate the most accurate technique. Fuzzy based Graphical User Interface (GUI) is framed which informs the user about the live status of thyristor under various environmental conditions. The intelligent techniques are validated using experimental technique. An error analysis is conducted to predict the most accurate and reliable system for residual life prediction of thyristor. Out of all prediction techniques, ANFIS has the highest accuracy i.e. 95.3%, whereas ANN and Fuzzy inference system has accuracy range 86.1% and 89.2% respectively.
  •  
3.
  • Borhani, Mohammad, 1993-, et al. (författare)
  • Secure and resilient communications in the industrial internet
  • 2020
  • Ingår i: Guide to disaster-resilient communication networks. - Cham : Springer. - 9783030446840 ; , s. 219-242
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • The Industrial Internet brings the promise of increased efficiency through on-demand manufacturing and maintenance, combining sensors data from engines and industrial devices with big data analysis in the cloud. In this chapter, we survey the main challenges that the Industrial Internet faces from a networking viewpoint. We especially focus on security, as critical industrial components could be exposed over the Internet, affecting resilience. We describe two approaches, Identity-Defined Networking and Software-Defined Virtual Private LAN Services as potential network architectures for the Industrial Internet.
  •  
4.
  • Gaba, Gurjot Singh, et al. (författare)
  • MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
  • 2020
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 20:18, s. 1-21
  • Tidskriftsartikel (refereegranskat)abstract
    • Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deployed to resource constrained network devices. Therefore, we have proposed a strong mutual authentication and secret key exchange protocol to address the vulnerabilities of the existing schemes. We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. Performance and security analysis clearly demonstrates that the proposed work is energy efficient (computation and communication inexpensive) and more robust against the attacks in comparison to the traditional schemes
  •  
5.
  • Khan, Suleman, et al. (författare)
  • A SECURITY MODEL FOR CONTROLLER-PILOT DATA COMMUNICATION LINK
  • 2021
  • Ingår i: 2021 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS). - : IEEE. - 9781665435840
  • Konferensbidrag (refereegranskat)abstract
    • Communication systems in aviation tend to focus on safety rather than security. Protocols such as ADS-B are known to use plain-text, unauthenticated messages and thus are open to various attacks. Controller-Pilot Data Communication Link is no exception and was shown vulnerable also in practice. In this paper, we propose a cryptographic mechanism to provide secure mobility for CPDLC that can enable data encryption and authentication. The protocol is formally verified with the Proverif tool. We also estimate the byte overhead in CPDLC use.
  •  
6.
  • Khan, Suleman, et al. (författare)
  • AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications
  • 2023
  • Ingår i: International Journal of Critical Infrastructure Protection. - : ELSEVIER. - 1874-5482 .- 2212-2087. ; 42
  • Tidskriftsartikel (refereegranskat)abstract
    • Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly resilient and bandwidth efficient, which makes it the best choice for traffic-congested airports. Although CPDLC initially seems to be a perfect solution for modern-day ATC operations, it suffers from serious security issues. For instance, eavesdropping, spoofing, man-in-the-middle, message replay, impersonation attacks, etc. Cyber attacks on the aviation communication network could be hazardous, leading to fatal aircraft incidents and causing damage to individuals, service providers, and the aviation industry. Therefore, we propose a new security model called AKAASH, enabling several paramount security services, such as efficient and robust mutual authentication, key establishment, and a secure handover approach for the CPDLC-enabled aviation communication network. We implement the approach on hardware to examine the practicality of the proposed approach and verify its computational and communication efficiency and efficacy. We investigate the robustness of AKAASH through formal (proverif) and informal security analysis. The analysis reveals that the AKAASH adheres to the CPDLC standards and can easily integrate into the CPDLC framework.
  •  
7.
  • Khan, Suleman, et al. (författare)
  • POSTER: FL-Guard: A Federated Learning Based Ground-AirSecure Communication Model For Future Aviation Network
  • 2022
  • Konferensbidrag (refereegranskat)abstract
    • L-band Digital Aeronautical Communication System (LDACS) is a newly proposed modern state-of-the-art system that will enable communication, navigation, and surveillance in the future aviation network. The current LDACS system does not prevent and detect intrusion within the LDACS domain. Therefore, it may suffer from various cyber-attacks, including spoofing, injection and many more attacks. To the best of our knowledge, this paper proposes the first federated learning-based attack detection model, called FL-Guard, for LDACS. Our proposed model exploits a federated learning environment and uses a deep neural network (DNN) to detect possible attacks on LDACS-based Air-Ground communication. FL-Guardis was simulated on a network of four aeroplanes, and the preliminary results show that the proposed model can detect attacks with 89 % accuracy.
  •  
8.
  • Kumar, Pardeep, et al. (författare)
  • Access Control Protocol With Node Privacy in Wireless Sensor Networks
  • 2016
  • Ingår i: IEEE Sensors Journal. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1530-437X .- 1558-1748. ; 16:22, s. 8142-8150
  • Tidskriftsartikel (refereegranskat)abstract
    • For preventing malicious nodes joining wireless sensor networks (WSNs), an access control mechanism is necessary for the trustworthy cooperation between the nodes. In addition to access control, recently, privacy has been an important topic regarding how to achieve privacy without disclosing the real identity of communicating entities in the WSNs. Based on elliptic curve cryptography, in this paper, we present an access control protocol with node privacy (called ACP) for the WSN. The proposed scheme not only accomplishes the node authentication but also provides the identity privacy (i.e., source to destination and vice-versa) for the communicating entities. Compared with the current state of the art, the proposed solution can defend actively against attacks. The efficacy and the efficiency of the proposed ACP are confirmed through the test bed analysis and performance evaluations.
  •  
9.
  • Kumar, Pardeep, et al. (författare)
  • Anonymous Secure Framework in Connected Smart Home Environments
  • 2017
  • Ingår i: IEEE Transactions on Information Forensics and Security. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1556-6013 .- 1556-6021. ; 12:4, s. 968-979
  • Tidskriftsartikel (refereegranskat)abstract
    • The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. As the homes become smarter, more complex, and technology dependent, the need for an adequate security mechanism with minimum individuals intervention is growing. The recent serious security attacks have shown how the Internet-enabled smart homes can be turned into very dangerous spots for various ill intentions, and thus lead the privacy concerns for the individuals. For instance, an eavesdropper is able to derive the identity of a particular device/appliance via public channels that can be used to infer in the life pattern of an individual within the home area network. This paper proposes an anonymous secure framework (ASF) in connected smart home environments, using solely lightweight operations. The proposed framework in this paper provides efficient authentication and key agreement, and enables devices (identity and data) anonymity and unlinkability. One-time session key progression regularly renews the session key for the smart devices and dilutes the risk of using a compromised session key in the ASF. It is demonstrated that computation complexity of the proposed framework is low as compared with the existing schemes, while security has been significantly improved.
  •  
10.
  • Kumar, Pardeep, et al. (författare)
  • Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks
  • 2019
  • Ingår i: IEEE Transactions on Smart Grid. - : Institute of Electrical and Electronics Engineers (IEEE). - 1949-3053 .- 1949-3061. ; 10:4, s. 4349-4359
  • Tidskriftsartikel (refereegranskat)abstract
    • Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart energy networks. Smart meter is a digital device that makes use of twoway communication between consumer and utility to exchange, manage and control energy consumptions within a home. However, despite all the features, a smart meter raises several securityrelated concerns. For instance, how to exchange data between the legal entities (e.g., smart meter and utility server) while maintaining privacy of the consumer. To address these concerns, authentication and key agreement in SMI can provide important security properties that not only to maintain a trust between the legitimate entities but also to satisfy other security services. This work presents a lightweight authentication and key agreement (LAKA) that enables trust, anonymity, integrity and adequate security in the domain of smart energy network. The proposed scheme employs hybrid cryptography to facilitate mutual trust (authentication), dynamic session key, integrity, and anonymity. We justify the feasibility of the proposed scheme with a testbed using 802.15.4 based device (i.e., smart meter). Moreover, through the security and performance analysis, we show that the proposed scheme is more effective and energy efficient compared to the previous schemes.
  •  
11.
  • Liyanage, Madhusanka, et al. (författare)
  • Securing the Communication of Industrial Internet
  • 2020
  • Ingår i: Guide to Disaster-resilient Communication Networks. - : Springer. - 9783030446840
  • Bokkapitel (refereegranskat)abstract
    • The popularity of new cyber-physical systems such as Industrial Internetor Industrial Internet of Things (IIoT) in new applications is creating new requirementssuch as high security, enhanced scalability, and optimal utilization of networkresources, efficient energy management and low operational cost. Specifically, theincreasing number of connected devices and new services will result in the increasingcapacity requirements for the cyber-physical systems. Thus, accommodating thesecure connectivity for this expected traffic growth is an imminent requirement offuture cyber-physical systems. Although the existing secure communication architecturesare able to provide a sufcient level of security, they are suffering from limitationssuch as limited scalability, over utilization of network resources and highoperational cost, mainly due to the complex and static security management procedures.On these grounds, SDN and NFV are promising technologies which areexpected to solve the limitations in current communication networks. The pursuit ofa cohesive cyber security strategy will minimize the risks and enable society to take advantage of the opportunities associated with the IIoT. In this chapter, we presentsthe possible secure connectivity solutions for IIoT/Industrial Internet.
  •  
12.
  • Masud, Mehedi, et al. (författare)
  • A user-centric privacy-preserving authentication protocol for IoT-AmI environments
  • 2022
  • Ingår i: Computer Communications. - : Elsevier. - 0140-3664 .- 1873-703X. ; 196, s. 45-54
  • Tidskriftsartikel (refereegranskat)abstract
    • Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has improved patient engagement and gratification as doctors interactions have become more comfortable and efficient. However, the benefits of the AmI-IoT-based healthcare applications are not availed entirely due to the adversarial threats. IoT networks are prone to cyber attacks due to vulnerable wireless mediums and the absentia of lightweight and robust security protocols. This paper introduces computationally-inexpensive privacy-assuring authentication protocol for AmI-IoT healthcare applications. The use of blockchain & fog computing in the protocol guarantees unforgeability, non-repudiation, transparency, low latency, and efficient bandwidth utilization. The protocol uses physically unclonable functions (PUF), biometrics, and Ethereum powered smart contracts to prevent replay, impersonation, and cloning attacks. Results prove the resource efficiency of the protocol as the smart contract incurs very minimal gas and transaction fees. The Scyther results validate the robustness of the proposed protocol against cyber-attacks. The protocol applies lightweight cryptography primitives (Hash, PUF) instead of conventional public-key cryptography and scalar multiplications. Consequently, the proposed protocol is better than centralized infrastructure-based authentication approaches.
  •  
13.
  • Porambage, Pawani, et al. (författare)
  • CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things
  • 2017
  • Ingår i: Wireless personal communications. - : SPRINGER. - 0929-6212 .- 1572-834X. ; 96:1, s. 421-440
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.
  •  
14.
  • Porambage, Pawani, et al. (författare)
  • Quest for Privacy in the Internet of Things
  • 2016
  • Ingår i: I E E E Cloud Computing. - 2325-6095. ; 3:2, s. 36-45
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Things (IoT) is the current evolutionary paradigm of networking and the key driving force toward a smart world. Although privacy in the IoT is highly regarded to ensure the protection of users and personal information from the perspective of individual or cooperative users, it's insufficiently studied. As members of the always-connected paradigm of the massive IoT world, people can scarcely control the disclosure of their personal information. The biggest challenge is to allow users to experience the best utilization of IoT-based products and services with the fewest privacy threats and failures. This article provides a holistic view of the challenges of and issues related to preserving IoT privacy, as well as the existing solutions. Privacy by design (PbD) is identified as the key solution for many IoT privacy issues. The article also discusses hot topics in IoT privacy and future research directions.
  •  
15.
  • Russell, Beth, et al. (författare)
  • A mediation analysis to explain socio-economic differences in bladder cancer survival
  • 2020
  • Ingår i: Cancer Medicine. - : John Wiley & Sons. - 2045-7634. ; 9:20, s. 7477-7487
  • Tidskriftsartikel (refereegranskat)abstract
    • Introduction: This study aims to disentangle heterogeneity in the survival of bladder cancer (BC) patients of different socioeconomic status (SES) by identifying potential mediators of the relationship.Methods: The Bladder Cancer Database Sweden (BladderBaSe) was used to select patients diagnosed between 1997 and 2014 with Tis/Ta-T4 disease. The education level was used as a proxy for SES. Accelerated failure time models were used to investigate the association between SES and survival. Mediation analysis was used to investigate potential mediators of the association also accounting for interaction.Results: The study included 37 755 patients from the BladderBaSe. Patients diagnosed with both non-muscle invasive bladder cancer (NMIBC) and muscle-invasive bladder cancer (MIBC) who had high SES were found to have increased overall and BC-specific survival, when compared to those with low SES. In the NMIBC patients, Charlson Comorbidity Index was found to mediate this relationship by 10% (percentage of the total effect explained by the mediator) and hospital type by 4%. The time from referral to TURBT was a considerable mediator (14%) in the MIBC patients only.Conclusions: Mediation analysis suggests that the association between SES and BC survival can be explained by several factors. The mediators identified were not, however, able to fully explain the theoretical causal pathway between SES and survival, therefore, future studies should also include the investigation of other possible mediators to help explain this relationship further. These results highlight the importance of standardization of clinical care across SES groups.
  •  
16.
  • Russell, Beth, et al. (författare)
  • A Systematic Review and Meta-analysis of Delay in Radical Cystectomy and the Effect on Survival in Bladder Cancer Patients
  • 2020
  • Ingår i: European Urology Oncology. - : Elsevier BV. - 2588-9311. ; 3:2, s. 239-249
  • Forskningsöversikt (refereegranskat)abstract
    • CONTEXT: The complexity of bladder cancer diagnosis and staging results in delays in definitive treatment of muscle-invasive bladder cancer by radical cystectomy. OBJECTIVE: This systematic review and meta-analyses aim to assess the impact of delays in radical cystectomy. EVIDENCE ACQUISITION: A systematic review was conducted by searching Medline and Ovid Gateway using protocol-driven search terms in August 2019, with no time limit on the studies included. The identified studies were assessed according to strict criteria and using the Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) checklist and Risk of Bias in Non-randomised Studies-of Interventions (ROBINS-I) tool. Meta-analyses were conducted based on the type of delay. Random-effect models were used whereby the presence of a delay was the exposure variable and overall survival was the outcome of interest, for which pooled hazard ratios were calculated. EVIDENCE SYNTHESIS: Nineteen studies were eligible for inclusion (17 532 patients), of which 10 were included in the meta-analyses. A longer delay between bladder cancer diagnosis and radical cystectomy resulted in a pooled hazard ratio of 1.34 (95% confidence interval [CI]: 1.18-1.53) for overall death. For a delay between transurethral resection and cystectomy, we found a pooled hazard ratio of 1.18 (95% CI: 0.99-1.41) for overall death. A pooled hazard ratio of 1.04 (95% CI: 0.93-1.16) was calculated for a longer delay between neoadjuvant chemotherapy and radical cystectomy. CONCLUSIONS: A delay in radical cystectomy after diagnosis was found to have a significantly detrimental effect on overall survival for bladder cancer patients. However, there was huge heterogeneity in how a delay was defined. PATIENT SUMMARY: In this review, we investigated the effect of a delay in radical treatment on survival. This review highlights the importance of scheduling radical cystectomies in a timely manner whilst monitoring factors such as comorbidities and scheduling, in order to treat patients requiring radical cystectomy without delay.
  •  
17.
  • Russell, Beth, et al. (författare)
  • Neoadjuvant chemotherapy for muscle invasive bladder cancer : a nationwide investigation on survival
  • 2019
  • Ingår i: Scandinavian journal of urology. - : Taylor & Francis. - 2168-1805 .- 2168-1813. ; 53:4, s. 206-212
  • Tidskriftsartikel (refereegranskat)abstract
    • Objectives: Randomised controlled trials (RCTs) have investigated the use of neoadjuvant chemotherapy (NAC) and its effect on survival patients with non-metastatic muscle-invasive bladder cancer (MIBC). However, these RCTs have limited external validity and generalisability and, therefore, the current study aims to use real world evidence in the form of observational data to identify the effect that NAC may have on survival, compared to the use of radical cystectomy (RC) alone.Materials and methods: The study cohort (consisting of 944 patients) was selected as a target trial from the Bladder Cancer Data Base Sweden (BladderBaSe). This study calculated 5-year survival and risk of bladder cancer (BC)-specific and overall death by Cox proportional hazard models for the study cohort and a propensity score (PS) matched cohort.Results: Those who had received NAC had higher 5-year survival proportions and decreased risk of both overall and BC specific death (HR = 0.71, 95% CI = 0.52-0.97 and HR = 0.67, 95% CI = 0.48-0.94), respectively, as compared to patients who did not receive NAC. The PS matched cohort showed similar estimates, but with larger statistical uncertainty (Overall death: HR = 0.76, 95% CI = 0.53-1.09 and BC-specific death: HR = 0.73, 95% CI = 0.50-1.07).Conclusion: Results from the current observational study found similar point estimates for 5-year survival and of relative risks as previous studies. However, the results based on real world evidence had larger statistical variability, resulting in a non-statistically significant effect of NAC on survival. Future studies with detailed validated data can be used to further investigate the effect of NAC in narrower patient groups.
  •  
18.
  • Russell, Beth, et al. (författare)
  • Systematic review of the association between socioeconomic status and bladder cancer survival with hospital type, comorbidities, and treatment delay as mediators
  • 2021
  • Ingår i: BJUI Compass. - : John Wiley & Sons. - 2688-4526. ; 2:3, s. 140-158
  • Forskningsöversikt (refereegranskat)abstract
    • ObjectivesTo review the current evidence on the relationship between three proposed mediators (comorbidities, hospital type, and treatment delays) for the relationship between socioeconomic status (SES) and bladder cancer survival.Materials and methodsSix different searches using OVID (Medline and Embase) were carried out to collate information available between the proposed mediators with both SES and survival in bladder cancer. This systematic review was conducted according to a pre-defined protocol and in line with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines.ResultsA total of 49 studies were included in the review across the six searches (one appeared in two searches). There was a wealth of studies investigating the relationship between each of the proposed mediators with survival in bladder cancer patients. In general, a higher SES, lower comorbidities, and a larger hospital volume were all found to be associated with a decreased risk of death in bladder cancer patients. There was, however, a paucity of studies investigating the associations between these mediators and SES in bladder cancer patients.ConclusionsTo gain a deeper understanding of the relationship between SES and survival identified in several observational studies, further investigations into the relationship between the proposed mediators and SES are warranted. Moreover, modifiable mediators, eg, treatment delay, highlight the importance of the standardization of clinical care across SES groups for all bladder cancer patients.
  •  
19.
  • Sharma, Sandeep, et al. (författare)
  • A non-classical route of efficient plant uptake verified with fluorescent nanoparticles and root adhesion forces investigated using AFM
  • 2020
  • Ingår i: Scientific Reports. - : Springer Science and Business Media LLC. - 2045-2322. ; 10:1
  • Tidskriftsartikel (refereegranskat)abstract
    • Classical plant uptake is limited to hydrophilic or water-dispersible material. Therefore, in order to test the uptake behaviour of hydrophobic particles, here, we tested the fate of hydrophobic particles (oleylamine coated Cu2-xSe NPs (CS@OA)) in comparison to hydrophilic particles (chitosan-coated Cu2-xSe NPs (CS@CH)) by treatment on the plant roots. Surprisingly, hydrophobic CS@OA NPs have been found to be ~ 1.3 times more efficient than hydrophilic CS@CH NPs in tomato plant root penetration. An atomic force microscopy (AFM) adhesion force experiment confirms that hydrophobic NPs experience non-spontaneous yet energetically favorable root trapping and penetration. Further, a relative difference in the hydrophobic vs. hydrophilic NPs movement from roots to shoots has been observed and found related to the change in protein corona as identified by two dimensional-polyacrylamide gel electrophoresis (2D-PAGE) analysis. Finally, the toxicity assays at the give concentration showed that Cu2-xSe NPs lead to non-significant toxicity as compared to control. This technology may find an advantage in fertilizer application.
  •  
20.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-20 av 20
Typ av publikation
tidskriftsartikel (13)
forskningsöversikt (3)
konferensbidrag (2)
bokkapitel (2)
Typ av innehåll
refereegranskat (19)
övrigt vetenskapligt/konstnärligt (1)
Författare/redaktör
Kumar, Pardeep (17)
Gurtov, Andrei (6)
Gurtov, Andrei, 1979 ... (5)
Häggström, Christel (4)
Van Hemelrijck, Miek ... (4)
Russell, Beth (4)
visa fler...
Khan, Suleman (3)
Liedberg, Fredrik (2)
Gårdmark, Truls (2)
Holmberg, Lars (2)
Liyanage, Madhusanka (2)
Ylianttila, Mika (2)
Porambage, Pawani (2)
Khan, Muhammad Shami ... (2)
Malde, Sachin (2)
Nair, Rajesh (2)
Thurairaja, Ramesh (2)
Bryan, Richard T (2)
Sodhro, Ali Hassan, ... (2)
Jurcut, Anca Delia (2)
Sherif, Amir (1)
Singh, Manish (1)
Vasilakos, Athanasio ... (1)
Malmström, Per-Uno (1)
Singh, Pardeep (1)
Sachdeva, Divya (1)
Butun, Ismail, 1981 (1)
Masud, Mehedi (1)
Kanagarajan, Selvara ... (1)
Martin, Andrew (1)
Josephs, Debra (1)
Bellavia, Andrea (1)
Martin, Rebecca (1)
Bessa, Agustina (1)
Enting, Deborah (1)
Amery, Suzanne (1)
Cahill, Fidelma (1)
Wylie, Harriet (1)
Chatterton, Kathryn (1)
Haire, Anna (1)
Green, Saran (1)
Broadhead, Samantha (1)
Northover, Margaret (1)
Briggs, Karen (1)
Bhargava, Cherry (1)
Singh, Jagdeep (1)
Sharma, Pardeep Kuma ... (1)
Singh, Gurjot (1)
Borhani, Mohammad, 1 ... (1)
Gaba, Gurjot Singh (1)
visa färre...
Lärosäte
Linköpings universitet (10)
Umeå universitet (5)
Uppsala universitet (4)
Lunds universitet (3)
Karolinska Institutet (2)
Luleå tekniska universitet (1)
visa fler...
Chalmers tekniska högskola (1)
Sveriges Lantbruksuniversitet (1)
visa färre...
Språk
Engelska (20)
Forskningsämne (UKÄ/SCB)
Teknik (10)
Medicin och hälsovetenskap (6)
Naturvetenskap (5)
Lantbruksvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy