SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Hamdy Mohamed) "

Search: WFRF:(Hamdy Mohamed)

  • Result 1-10 of 13
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Hegazy, Mohamed-Elamir F., et al. (author)
  • Cytotoxic Cembranoids from the Red Sea Soft Coral Sarcophyton glaucum
  • 2011
  • In: Natural Product Communications. - 1934-578X .- 1555-9475. ; 6:12, s. 1809-1812
  • Journal article (peer-reviewed)abstract
    • One new cembrane diterpene, 2R,7R,8R-dihydroxydeepoxysarcophine (1), together with three known compounds, 7 alpha,8 beta-dihydroxydecpoxysarcophine (2), 7 beta-acetoxy-8 alpha-hydroxydeepoxysarcophine (3), and sarcophine (4), have been isolated from the Red Sea soft coral Sarcophyton glaucum. Their structures were determined using 1D and 2D NMR spectroscopy. 7 beta-Acetoxy-8 alpha-hydroxydeepoxysarcophine (3) exhibits cytotoxic activity against HepG2, HCT-116, and HeLa cells with IC(50) values of 3.6, 2.3, and 6.7 mu g/mL, respectively.
  •  
2.
  • Swed, Sarya, et al. (author)
  • Parents' acceptance to vaccinate children against COVID-19 : A Syrian online survey
  • 2022
  • In: Frontiers In Public Health. - : Frontiers Media SA. - 2296-2565. ; 10
  • Journal article (peer-reviewed)abstract
    • After the widespread of COVID-19 virus worldwide, vaccination targeted reducing spread of cases and mortality rates. However, vaccination hesitancy was observed among the communities worldwide. Vaccination hesitancy involved parents regarding the decision of vaccinating their children- After obtaining ethical approval, an online cross-sectional study was conducted from 1 March to 22 April 2021 to evaluate the parents' acceptance of vaccinating their children against the COVID-19 virus in Syria. Data were analyzed using descriptive and multivariate logistic regression analysis in IBM, SPSS V. 28.0 package program (IBM Corporation, Armonk, NY, USA). Among 283 participants, 105 participants agreed to vaccinate their children, and 178 were not. A significant correlation between age and vaccine willingness was found (P-value < 0.0001*), especially in the age group between 18 and 30 years old (45.2%). Parents who accepted vaccinating themselves were more willing to vaccinate their children (34.6%). According to our results, there is a greater need to enhance awareness and knowledge programs about the vaccine's effectiveness and encourage parents to accept giving the vaccine to their children.
  •  
3.
  • 2021
  • swepub:Mat__t
  •  
4.
  • Abdelshafy, Alaaeldin M., et al. (author)
  • Optimized energy management strategy for grid connected double storage (pumped storage-battery) system powered by renewable energy resources
  • 2020
  • In: Energy. - : PERGAMON-ELSEVIER SCIENCE LTD. - 0360-5442 .- 1873-6785. ; 192
  • Journal article (peer-reviewed)abstract
    • This paper presents a grid-connected double storage system (DSS) consisting of pumped-storage hydropower (PSH) and battery. The system is supplied by photovoltaics and wind turbines. In the proposed hybrid system, batteries absorb excess renewable energy that cannot be stored in PSH and they cover loads that cannot be supplied from the water turbine. To improve the system performance, a novel energy management strategy for the DSS is proposed. The strategy is based on an optimized factor that governs the charging process of the DSS. The problem of the optimal system design is solved by a non-dominated sorting genetic algorithm (NSGA-II). The multi-objective function considers simultaneously the minimal investment cost and minimal CO2 emissions. A comparative study of photovoltaic/wind/pumped-storage hydropower and photovoltaic/wind/double storage system is performed to show the effectiveness of the proposed strategy in terms of system economic and environmental performance. The considered location of the PSH station is on Attaqa Mountain at Suez (Egypt). The results indicate the effectiveness of the proposed energy management strategy for the storage system from economic and environmental perspectives. Coupling the battery with the PSH reduces the electricity cost by 22.2% and results in minimal energy exchange with the national grid (5% of the annual demand). A sensitivity analysis shows the largest variation of the electricity cost with changing the capital cost of the solar and wind generators. Also, it is observed that when the load increases, the optimal size of the system components increases, but it isn't proportional with the demand increase as could be expected. (C) 2019 Elsevier Ltd. All rights reserved.
  •  
5.
  • Aboelwafa, Mariam M. N., et al. (author)
  • A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT
  • 2020
  • In: IEEE Internet of Things Journal. - Piscataway : Institute of Electrical and Electronics Engineers (IEEE). - 2327-4662. ; 7:9, s. 8462-8471
  • Journal article (peer-reviewed)abstract
    • The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far as security is concerned. One of the IIoT affecting critical security threats is what is termed as the false data injection (FDI) attack. The FDI attacks aim to mislead the industrial platforms by falsifying their sensor measurements. FDI attacks have successfully overcome the classical threat detection approaches. In this article, we present a novel method of FDI attack detection using autoencoders (AEs). We exploit the sensor data correlation in time and space, which in turn can help identify the falsified data. Moreover, the falsified data are cleaned using the denoising AEs (DAEs). Performance evaluation proves the success of our technique in detecting FDI attacks. It also significantly outperforms a support vector machine (SVM)-based approach used for the same purpose. The DAE data cleaning algorithm is also shown to be very effective in recovering clean data from corrupted (attacked) data. © 2014 IEEE.
  •  
6.
  • Amin, Mohammed A., et al. (author)
  • Non-Covalent Functionalization of Graphene Oxide-Supported 2-Picolyamine-Based Zinc(II) Complexes as Novel Electrocatalysts for Hydrogen Production
  • 2022
  • In: Catalysts. - : MDPI AG. - 2073-4344. ; 12:4
  • Journal article (peer-reviewed)abstract
    • Three mononuclear 2-picolylamine-containing zinc(III) complexes viz [(2-PA)2ZnCl]2(ZnCl4)] (Zn1), [(2-PA)2Zn(H2O)](NO3)2] (Zn2) and [Zn(2-PA)2(OH)]NO3] (Zn3) were synthesized and fully characterized. Spectral and X-ray structural characteristics showed that the Zn1 complex has a square-pyramidal coordination environment around a zinc(II) core. The hydroxide complex Zn3 was non-covalently functionalized with few layers of graphene oxide (GO) sheets, formed by exfoliation of GO in water. The resulting Zn3/GO hybrid material was characterized by FT-IR, TGA-DSC, SEM-EDX and X-ray powder diffraction. The way of interaction of Zn3 with GO has been established through density functional theory (DFT) calculations. Both experimental and theoretical findings indicate that, on the surface of GO, the complex Zn3 forms a complete double-sided adsorption layer. Zn3 and its hybrid form Zn3/GO have been individually investigated as electrocatalysts for the hydrogen evolution reaction. The hybrid heterogenized form Zn3/GO was supported on glassy carbon (GC) with variable loading densities of Zn3 (0.2, 0.4 and 0.8 mg cm−2) to form electrodes. These electrodes have been tested as molecular electrocatalysts for the hydrogen evolution reaction (HER) using linear sweep voltammetry (LSV) and electrochemical impedance spectroscopy (EIS) in 0.1 M KOH. Results showed that both GC-Zn3 and GC-Zn3/GO catalysts for the HER are highly active, and with increase of the catalyst’s loading density, this catalytic activity enhances. The high catalytic activity of HER with a low onset potential of −140 mV vs. RHE and a high exchange current density of 0.22 mA cm−2 is achieved with the highest loading density of Zn3 (0.8 mg cm−2). To achieve a current density of 10 mA cm−2, an overpotential of 240 mV was needed.
  •  
7.
  • Attia, Shady, et al. (author)
  • Overheating calculation methods, criteria, and indicators in European regulation for residential buildings
  • 2023
  • In: Energy and Buildings. - : Elsevier. - 0378-7788 .- 1872-6178. ; 292
  • Journal article (peer-reviewed)abstract
    • With the ongoing significance of overheating calculations in the residential building sector, building codes such as the European Energy Performance of Building Directive (EPBD) are essential for harmonizing the indicators and performance thresholds. This paper investigates Europe's overheating calculation methods, indicators, and thresholds and evaluates their ability to address climate change and heat events. e study aims to identify the suitability of existing overheating calculation methods and propose recommendations for the EPBD. The study results provide a cross-sectional overview of twenty-six European countries. The most influential overheating calculation criteria are listed the best approaches are ranked. The paper provides a thorough comparative assessment and recommendations to align current calculations with climate-sensitive metrics. The results suggest a framework and key performance indicators that are comfort-based, multi-zonal, and time-integrated to calculate overheating and modify the EU's next building energy efficiency regulations. The results can help policymakers and building professionals to develop the next overheating calculation framework and approach for the future development of climate-proof and resilient residential buildings.
  •  
8.
  • Gebremichael, Teklay, 1985-, et al. (author)
  • Security and Privacy in the Industrial Internet of Things : Current Standards and Future Challenges
  • 2020
  • In: IEEE Access. - Piscataway, N.J. : IEEE. - 2169-3536. ; 8, s. 152351-152366
  • Journal article (peer-reviewed)abstract
    • The Internet of Things (IoT) is rapidly becoming an integral component of the industrial market in areas such as automation and analytics, giving rise to what is termed as the Industrial IoT (IIoT). The IIoT promises innovative business models in various industrial domains by providing ubiquitous connectivity, efficient data analytics tools, and better decision support systems for a better market competitiveness. However, IIoT deployments are vulnerable to a variety of security threats at various levels of the connectivity and communications infrastructure. The complex nature of the IIoT infrastructure means that availability, confidentiality and integrity are difficult to guarantee, leading to a potential distrust in the network operations and concerns of loss of critical infrastructure, compromised safety of network end-users and privacy breaches on sensitive information. This work attempts to look at the requirements currently specified for a secure IIoT ecosystem in industry standards, such as Industrial Internet Consortium (IIC) and OpenFog Consortium, and to what extent current IIoT connectivity protocols and platforms hold up to the standards with regard to security and privacy. The paper also discusses possible future research directions to enhance the security, privacy and safety of the IIoT.
  •  
9.
  • Pankaczi, Lilla, 1991-, et al. (author)
  • Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis
  • 2023
  • In: 2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023. - : IEEE. - 9798350346473 - 9798350346480
  • Conference paper (peer-reviewed)abstract
    • Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission protocols in high-frequency RFID smart-card and reader communication. The communication has been modeled, and two experiments have been performed using a security protocol ana-lyzer tool called Scyther. The protocol verification results shows that implementing Random UID can prevent many RFID attacks, such as eavesdropping and replay attacks and successfully protect the cardholder's privacy. © 2023 IEEE.
  •  
10.
  • Tirumaladass, Virinchi, et al. (author)
  • Deep learning-based Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices
  • 2020
  • In: Proceedings of the 2nd International Conference on Inventive Research in Computing Applications, ICIRCA 2020. - Piscataway : IEEE. - 9781728153742 ; , s. 150-156
  • Conference paper (peer-reviewed)abstract
    • The boom of Internet of Things (IoT) devices has brought along new security concerns which earlier were not thought of. This has expanded the potential for digital forensic investigators to gather rich evidence from these sources. The data on these IoT devices is not easily accessible due to the lack of proper techniques to investigate such devices. This paper presents a sophisticated non-invasive method to investigate IoT devices. The software activities running on a device can be inspected by observing the electromagnetic radiation emitted from the devices during the process. The objective of this project is to evaluate if it is possible to classify the software activities being run on an IoT device by performing an electromagnetic side-channel analysis (EM-SCA). This paper presents a methodology for analyzing the EM side-channels and classifying encryption algorithms being run on a Raspberry Pi 4. This work demonstrates that the cryptographic encryptions can be classified with over 95% accuracy by using deep neural network-based classifiers. © 2020 IEEE.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 13

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view