Wound Healing of Different Molecular Weight of Hyaluronan; In-Vivo Study

Recruitment of cells and mediators is altered during impaired wound healing, thereby delaying this process. To overcome this problem, the correlation of wound healing in older rats, and the impact of different molecular weight of hyaluronan without silver nanoparticles; (low-HA1), (High-HA2), (Medium- HA3) and with silver nanoparticles (High-HA4) is investigated. The superior HA were selected to be further investigated onto diabetic wounds. Our results pointed to a marked deficiency in wounds granulation in older rats, which was accompanied with impairment of healing process.

Probabilistic uniformization and probabilistic metrization of probabilistic convergence groups

We define probabilistic convergence groups based on Tardiff's neighborhood systems for probabilistic metric spaces and develop the basic theory. We study, as natural examples, probabilistic metric groups and probabilistic normed groups as well as probabilistic limit groups under a $t$-norm as defined earlier by the authors. We further show that a probabilistic convergence group induces a natural probabilistic uniform convergence structure and give a result on probabilistic metrization.

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices

In this paper, we propose OnDroid  , a prevention system to defend against outgoing malicious SMSs in Android devices. OnDroid is user-friendly as it considers the user's little understanding of the Android system. It also considers multiple threat scenarios and requires less interaction with the user. For each SMS-sending operation, OnDroid first checks if the mobile device state mismatches the user's behavior. If so, the operation is blocked. Otherwise, it is delayed for a while and the user is notified to confirm or reject the operation.

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes.

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges

Industrial systems always prefer to reduce their operational expenses. To support such reductions, they need solutions that are capable of providing stability, fault tolerance, and flexibility. One such solution for industrial systems is cyber physical system (CPS) integration with the Internet of Things (IoT) utilizing cloud computing services. These CPSs can be considered as smart industrial systems, with their most prevalent applications in smart transportation, smart grids, smart medical and eHealthcare systems, and many more.

Multiple ECG Fiducial Points based Random Binary Sequence Generation for Securing Wireless Body Area Networks

Generating random binary sequences is a fundamental requirement in cryptography. A binary sequence (BS) is a sequence of N bits and each bit has a value of 0 or 1. For securing sensors within Wireless Body Area Networks (WBANs), electrocardiogram (ECG) based BS generation methods have been widely investigated in which Inter-pulse Intervals (IPIs) from each heartbeat cycle are processed to produce BSes. Using these IPI-based methods to generate a 128-bit BS in real-time normally takes around half a minute.

Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices

In this paper, we propose MinDroid, a user-centric preventive policy enforcement system against SMS malware in Android devices. The design of MinDroid takes into consideration the user’s little understanding of the Android permission system. This can be done by deriving the policy rules from the behavioral model of the malicious SMS applications rather than adopting user-defined rules. MinDroid requires user intervention only during the first T time units from the application installation time.

الصفحات

اشترك ب KSU Faculty آر.إس.إس