Abid Khan
YOU?
Author Swipe
View article: Phylogenetic analysis of bla NDM genes of carbapenem resistant uropathogens isolated from federal tertiary care hospital, Pakistan: insights into the evolution and dissemination of drug resistance
Phylogenetic analysis of bla NDM genes of carbapenem resistant uropathogens isolated from federal tertiary care hospital, Pakistan: insights into the evolution and dissemination of drug resistance Open
Background and Objectives: Global health is seriously threatened by the rise of carbapenem-resistant Enterobacterales (CRE). The bla NDM gene, a key carbapenemase coding gene, causes global health concern due to its multidrug resistance an…
View article: IoT-Enabled Fog-Based Secure Aggregation in Smart Grids Supporting Data Analytics
IoT-Enabled Fog-Based Secure Aggregation in Smart Grids Supporting Data Analytics Open
The Internet of Things (IoT) has transformed multiple industries, providing significant potential for automation, efficiency, and enhanced decision-making. The incorporation of IoT and data analytics in smart grid represents a groundbreaki…
View article: SAT-780 From Bone Density to Bone Death: Osteonecrosis of the Jaw in a Patient with Minimal Risk Factors
SAT-780 From Bone Density to Bone Death: Osteonecrosis of the Jaw in a Patient with Minimal Risk Factors Open
Disclosure: A. Zaidi: None. W. Akhter: None. J.L. Gilden: Novartis Pharmaceuticals. A. Khan: None. Background: Bisphosphonate-related osteonecrosis of the jaw (BRONJ) is a rare but serious complication associated with the use of bisphospho…
View article: Classical Benchmarks for Variational Quantum Eigensolver Simulations of the Hubbard Model
Classical Benchmarks for Variational Quantum Eigensolver Simulations of the Hubbard Model Open
Simulating the Hubbard model is of great interest to a wide range of applications within condensed matter physics, however its solution on classical computers remains challenging in dimensions larger than one. The relative simplicity of th…
View article: Tensor networks for quantum computing
Tensor networks for quantum computing Open
In the rapidly evolving field of quantum computing, tensor networks serve as an important tool due to their multifaceted utility. In this paper, we review the diverse applications of tensor networks and show that they are an important inst…
View article: Rehabilitation of an Atrophied Upper Maxillary Arch With an Implant-Supported Hybrid Prosthesis
Rehabilitation of an Atrophied Upper Maxillary Arch With an Implant-Supported Hybrid Prosthesis Open
View article: EXISTENCE OF FIXED POINT VIA SELF-MAPPING OF ENRICHED G_B-CONTRACTION IN G_B-METRIC SPACES
EXISTENCE OF FIXED POINT VIA SELF-MAPPING OF ENRICHED G_B-CONTRACTION IN G_B-METRIC SPACES Open
In the present work we show here, we prove some fixed point results on enriched G_b-complete metric space for a novel contraction and produce some enriching fixed point results utilising Banach G_b-contraction enriching G_b-metric spaces. …
View article: Acoustic Voice Analysis of Normal Versus Pathological Voices Using PRAAT Software
Acoustic Voice Analysis of Normal Versus Pathological Voices Using PRAAT Software Open
Background: Voice is a fundamental component of human communication, and disturbances in its quality can adversely impact social, professional, and emotional well-being. Acoustic voice analysis using PRAAT software provides an objective, n…
View article: A robust Internet of Drones security surveillance communication network based on IOTA
A robust Internet of Drones security surveillance communication network based on IOTA Open
Drones are increasingly utilized for a variety of purposes, spanning military to civilian applications. The rise in drone usage underscores privacy and security challenges concerning flight boundaries, data collection in public and private…
View article: Preparing quantum many-body scar states on quantum computers
Preparing quantum many-body scar states on quantum computers Open
Quantum many-body scar states are highly excited eigenstates of many-body systems that exhibit atypical entanglement and correlation properties relative to typical eigenstates at the same energy density. Scar states also give rise to infin…
View article: Data Provenance in Healthcare: Approaches, Challenges, and Future Directions
Data Provenance in Healthcare: Approaches, Challenges, and Future Directions Open
Data provenance means recording data origins and the history of data generation and processing. In healthcare, data provenance is one of the essential processes that make it possible to track the sources and reasons behind any problem with…
View article: Impact of antimicrobial resistance on health and economy: A comprehensive review
Impact of antimicrobial resistance on health and economy: A comprehensive review Open
Antibiotics have historically revolutionized medical science; however, the rise of multidrug-resistant pathogenic bacteria puts their worth at risk. The problem of antibiotic resistance has been attributed to both the excessive use of alre…
View article: Leveraging generative adversarial networks to create realistic scanning transmission electron microscopy images
Leveraging generative adversarial networks to create realistic scanning transmission electron microscopy images Open
The rise of automation and machine learning (ML) in electron microscopy has the potential to revolutionize materials research through autonomous data collection and processing. A significant challenge lies in developing ML models that rapi…
View article: Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger Open
View article: Preparing quantum many-body scar states on quantum computers
Preparing quantum many-body scar states on quantum computers Open
question. We present protocols both for individual scar states in a particular model, as well as superpositions of them that give rise to coherent dynamics. For superpositions of scar states, we present both a system-size-linear depth unit…
View article: Peer Review #1 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.2)"
Peer Review #1 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.2)" Open
With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development.However, an…
View article: Peer Review #2 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.2)"
Peer Review #2 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.2)" Open
With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development.However, an…
View article: Peer Review #2 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.1)"
Peer Review #2 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.1)" Open
With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development.However, an…
View article: Improved angelization technique against background knowledge attack for 1:M microdata
Improved angelization technique against background knowledge attack for 1:M microdata Open
With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, a…
View article: Peer Review #1 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.1)"
Peer Review #1 of "Improved angelization technique against background knowledge attack for 1:M microdata (v0.1)" Open
With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development.However, an…
View article: A Privacy-Enabled, Blockchain-Based Smart Marketplace
A Privacy-Enabled, Blockchain-Based Smart Marketplace Open
Advancements in sensor-enabled devices led to the emergence of resource trading models for smart communities, such as the smart marketplace (SMP). Most of the proposed SMP architectures are based on blockchain technology, which has a publi…
View article: Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home Open
Smart home devices are vulnerable to a variety of attacks. The matter gets more complicated when a number of devices collaborate to launch a colluding attack (e.g., Distributed-Denial-of-Service (DDoS)) in a network (e.g., Smart home). To …
View article: Preparing quantum many-body scar states on quantum computers
Preparing quantum many-body scar states on quantum computers Open
Quantum many-body scar states are highly excited eigenstates of many-body systems that exhibit atypical entanglement and correlation properties relative to typical eigenstates at the same energy density. Scar states also give rise to infin…
View article: Knee problems and possible support for rehabilitation - a review
Knee problems and possible support for rehabilitation - a review Open
View article: Secure and Collusion Free Data Collection Protocol for Privacy- Preservation in Iot
Secure and Collusion Free Data Collection Protocol for Privacy- Preservation in Iot Open
View article: Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends
Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends Open
Secure data aggregation is an important process that enables a smart meter to perform efficiently and accurately. However, the fault tolerance and privacy of the user data are the most serious concerns in this process. While the security i…
View article: Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches Open
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS, SLAMSA, (p, k)-Angelization, and (p, l)-Angelization, but these wer…
View article: Dataset and code for Article: Improved angelization technique against background knowledge attack for 1:M microdata
Dataset and code for Article: Improved angelization technique against background knowledge attack for 1:M microdata Open
Modern technologies, such as the Internet of Things (IoT) and BigData are the key enablers to revolutionizing today’s modern society in different fields, for example, Electronic Health Records (EHRs). The government or private organization…
View article: Leveraging Industry 4.0 -- Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System
Leveraging Industry 4.0 -- Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System Open
Industry 4.0 targets the conversion of the traditional industries into intelligent ones through technological revolution. This revolution is only possible through innovation, optimization, interconnection, and rapid decision-making capabil…
View article: Prevalence of Antibiotic Resistant Bacteria among the Clinical Samples from Different Hospitals of Peshawar, Pakistan
Prevalence of Antibiotic Resistant Bacteria among the Clinical Samples from Different Hospitals of Peshawar, Pakistan Open
Background: Majority of the microorganisms are responsible for causing diseases which can be fatal if left untreated. In Pakistan this might be very critical because of the misuse and/or improper use of antibiotics. Objective: The current …