Mehreen Afzal
YOU?
Author Swipe
View article: Assessment of carbapenem-resistant Klebsiella pneumoniae from clinical isolates of hospitalized patients
Assessment of carbapenem-resistant Klebsiella pneumoniae from clinical isolates of hospitalized patients Open
Objective: Klebsiella pneumoniae, a non-motile, Gram-negative rod of the Enterobacteriaceae family, is an opportunistic pathogen commonly associated with nosocomial infections and community-acquired diseases in both patients and healthy in…
View article: Evaluation and characterization of framycetin sulphate loaded hydrogel dressing for enhanced wound healing
Evaluation and characterization of framycetin sulphate loaded hydrogel dressing for enhanced wound healing Open
Background Hydrogels loaded with antibiotics can be an effective drug delivery systemfor treating skin diseases or conditions such asinburns and wound healing. Objectives The current research work was planned to preparea hydrogel dressing …
View article: Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024
Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024 Open
View article: Comparison of Outcomes of Topical Anesthesia with Peribulbar Anesthesia in Vitrectomy for Unresolving Vitreous Hemorrhage
Comparison of Outcomes of Topical Anesthesia with Peribulbar Anesthesia in Vitrectomy for Unresolving Vitreous Hemorrhage Open
OBJECTIVES: To compare the Surgeon's ease level and duration of surgery in topical anesthesia with peribulbar anesthesia for vitrectomy without sedation in patients with unresolving vitreous hemorrhage of duration greater than 3 months. ME…
View article: FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs Open
Internet of Things (IoT) is a system of interconnected devices that have the ability to monitor and transfer data to peers without human intervention. Authentication, Authorization and Audit Logs (AAA) are prime features of Network Securit…
View article: Comparison of visual acuity and post-operative inflammation in phacoemulsification and removal of silicone oil with and without injection of Enoxaparin Sodium (40mg/0.04ml)
Comparison of visual acuity and post-operative inflammation in phacoemulsification and removal of silicone oil with and without injection of Enoxaparin Sodium (40mg/0.04ml) Open
Background: Phacoemulsification and removal of silicone oil (ROSO) is a combined, frequently done procedure in retina theatre. A common problem in this procedure is the post inflammation that affects the recovery of the patients. Thus to c…
View article: Encryption and Re-Randomization Techniques for Malware Propagation
Encryption and Re-Randomization Techniques for Malware Propagation Open
Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected. Encryption of malicious payload is used by malware aut…
View article: Enhanced Metamorphic Techniques-A Case Study Against Havex Malware
Enhanced Metamorphic Techniques-A Case Study Against Havex Malware Open
Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques in their variety of malware with the aim of bypassing detection by…
View article: Behavioral Based Insider Threat Detection Using Deep Learning
Behavioral Based Insider Threat Detection Using Deep Learning Open
The most detrimental cyber attacks are usually not originated by malicious outsiders or malware but from trusted insiders. The main advantage insider attackers have over external elements is their ability to bypass security checks and rema…
View article: A report on the contemporary assessment of occupational therapy research in the UK
A report on the contemporary assessment of occupational therapy research in the UK Open
Executive Summary
The purpose of this report is to offer a Contemporary Assessment of Occupational Therapy Research in the
UK. It is over a decade since Building the evidence for occupational therapy: Priorities for research (College
of…
View article: Image Steganography: Critical Findings through Some Novel Techniques
Image Steganography: Critical Findings through Some Novel Techniques Open
Word ’Steganography’ is originated from Greekand has been used in several forms for 2500 years which is a art of hiding confidential data in any digital manner in such a way that no one can concealed it. It has found practise in various se…
View article: Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols Open
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography. Different stu…
View article: Survey on Finding of Admissible Information and Influential Users
Survey on Finding of Admissible Information and Influential Users Open
Influential users perform a crucial aspect in online media since users serve to have a strike to each other. In this paper, Influential's originate relevant information which satisfies the information needs of a compelling dissemination in…
View article: Algebraic Side Channel Attack on Trivium and Grain Ciphers
Algebraic Side Channel Attack on Trivium and Grain Ciphers Open
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic …