scispace - formally typeset
Search or ask a question

Showing papers by "S. M. Riazul Islam published in 2019"


OtherDOI
29 Dec 2019
TL;DR: An overview of non-orthogonal multiple access principles and applications is provided and several opportunities and challenges associated with the compatibility of NOMA with other advanced communication paradigms such as heterogeneous networks and millimeter wave communications are addressed.

59 citations


Journal ArticleDOI
TL;DR: A systematic multiomic analysis to determine whether glutaminases function as prognostic biomarkers in human cancers suggested that GLS and GLS2 expression differentially modulate the clinical outcomes of cancers.
Abstract: Kidney-type glutaminase (GLS) and liver-type glutaminase (GLS2) are dysregulated in many cancers, making them appealing targets for cancer therapy. However, their use as prognostic biomarkers is controversial and remains an active area of cancer research. Here, we performed a systematic multiomic analysis to determine whether glutaminases function as prognostic biomarkers in human cancers. Glutaminase expression and methylation status were assessed and their prominent functional protein partners and correlated genes were identified using various web-based bioinformatics tools. The cross-cancer relationship of glutaminases with mutations and copy number alterations was also investigated. Gene ontology (GO) and pathway analysis were performed to assess the integrated effect of glutaminases and their correlated genes on various cancers. Subsequently, the prognostic roles of GLS and GLS2 in human cancers were mined using univariate and multivariate survival analyses. GLS was frequently over-expressed in breast, esophagus, head-and-neck, and blood cancers, and was associated with a poor prognosis, whereas GLS2 overexpression implied poor overall survival in colon, blood, ovarian, and thymoma cancers. Both GLS and GLS2 play oncogenic and anti-oncogenic roles depending on the type of cancer. The varying prognostic characteristics of glutaminases suggest that GLS and GLS2 expression differentially modulate the clinical outcomes of cancers.

50 citations


Journal ArticleDOI
TL;DR: The progress toward editable nuclease-based therapies and the minimization of off-target mutagenesis are described and the future prospects of this challenging scientific field are discussed.
Abstract: Targeted genome editing is an advanced technique that enables precise modification of the nucleic acid sequences in a genome. Genome editing is typically performed using tools, such as molecular scissors, to cut a defined location in a specific gene. Genome editing has impacted various fields of biotechnology, such as agriculture; biopharmaceutical production; studies on the structure, regulation, and function of the genome; and the creation of transgenic organisms and cell lines. Although genome editing is used frequently, it has several limitations. Here, we provide an overview of well-studied genome-editing nucleases, including single-stranded oligodeoxynucleotides (ssODNs), transcription activator-like effector nucleases (TALENs), zinc-finger nucleases (ZFNs), and CRISPR-Cas9 RNA-guided nucleases (CRISPR-Cas9). To this end, we describe the progress toward editable nuclease-based therapies and discuss the minimization of off-target mutagenesis. Future prospects of this challenging scientific field are also discussed.

36 citations


Journal ArticleDOI
TL;DR: The performance improvement of the proposed DU-CNOMA over the conventional CRS using NOMA is proved through analysis and computer simulation, and the correctness of the author's analysis is provedthrough a strong agreement between simulation and analytical results.

31 citations


Journal ArticleDOI
17 Jul 2019-Sensors
TL;DR: The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems and includes a secure encryption process that enables health data anonymity.
Abstract: In the age of the Internet of Things, connected devices are changing the delivery system in the healthcare communication environment. With the integration of IoT in healthcare, there is a huge potential for improvement of the quality, safety, and efficiency of health care in addition to promising technological, economical, and social prospects. Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. In addition, the patient valuable data can be disclosed when the perspective devices are compromised since they are connected to the internet. Hence, security has become an essential part of today’s computing world regarding the ubiquitous nature of the IoT entities in general and IoT-based healthcare in particular. In this paper, research on the algorithm for anonymizing sensitive information about health data set exchanged in the IoT environment using a wireless communication system has been presented. To preserve the security and privacy, during the data session from the users interacting online, the algorithm defines records that cannot be revealed by providing protection to user’s privacy. Moreover, the proposed algorithm includes a secure encryption process that enables health data anonymity. Furthermore, we have provided an analysis using mathematical functions to valid the algorithm’s anonymity function. The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems.

29 citations


Journal ArticleDOI
31 Aug 2019-Sensors
TL;DR: This paper defines the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes and presents the different architectures and their underlying system models for LTE-V2X communications.
Abstract: There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could be avoided by adopting Cellular Vehicle-to-Everything (C-V2X) technology with the possibility to re-use the existing mobile network infrastructure. More and more, with the emergence of Software Defined Networks, the flexibility and the programmability of the network have not only impacted the design of new vehicular network architectures but also the implementation of V2X services in future intelligent transportation systems. In this paper, we define the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes. We first overview the current studies available in the literature on C-V2X technology in support of V2X applications. We then present the different architectures and their underlying system models for LTE-V2X communications. We later describe the key ideas of software-defined networks and their concepts for V2X services. Lastly, we provide a comparative analysis of existing SDN-based vehicular network system grouped according to their modeling and simulation concepts. We provide a discussion and highlight vehicular ad-hoc networks’ challenges handled by SDN-based vehicular networks.

25 citations


Journal ArticleDOI
TL;DR: An analysis of the results indicated that the proposed ensemble framework significantly outperforms all other classifiers, which is a successful step towards constructing a personalized decision support system, which could help physicians in daily clinical practice.
Abstract: Early diagnosis of diabetes mellitus (DM) is critical to prevent its serious complications. An ensemble of classifiers is an effective way to enhance classification performance, which can be used to diagnose complex diseases, such as DM. This paper proposes an ensemble framework to diagnose DM by optimally employing multiple classifiers based on bagging and random subspace techniques. The proposed framework combines seven of the most suitable and heterogeneous data mining techniques, each with a separate set of suitable features. These techniques are k-nearest neighbors, naive Bayes, decision tree, support vector machine, fuzzy decision tree, artificial neural network, and logistic regression. The framework is designed accurately by selecting, for every sub-dataset, the most suitable feature set and the most accurate classifier. It was evaluated using a real dataset collected from electronic health records of Mansura University Hospitals (Mansura, Egypt). The resulting framework achieved 90% of accuracy, 90.2% of recall = 90.2%, and 94.9% of precision. We evaluated and compared the proposed framework with many other classification algorithms. An analysis of the results indicated that the proposed ensemble framework significantly outperforms all other classifiers. It is a successful step towards constructing a personalized decision support system, which could help physicians in daily clinical practice.

20 citations


Journal ArticleDOI
TL;DR: This data-driven study demonstrates the correlation of C1QBP expression with patient survival and identifies possible C1 QBP-involved pathways, which may serve as targets of a novel therapeutic modality for various human cancers.
Abstract: C1QBP (Complement Component 1 Q Subcomponent-Binding Protein), a multicompartmental protein, participates in various cellular processes, including mRNA splicing, ribosome biogenesis, protein synthesis in mitochondria, apoptosis, transcriptional regulation, and infection processes of viruses. The correlation of C1QBP expression with patient survival and molecular function of C1QBP in relation to cancer progression has not been comprehensively studied. Therefore, we sought to systematically investigate the expression of C1QBP to evaluate the change of C1QBP expression and the relationship with patient survival and affected pathways in breast, lung, colon, and bladder cancers as well as lymphoma. Relative expression levels of C1QBP were analyzed using the Oncomine, Gene Expression Across Normal and Tumor Tissue (GENT), and The Cancer Genome Atlas (TCGA) databases. Mutations and copy number alterations in C1QBP were also analyzed using cBioPortal, and subsequently, the relationship between C1QBP expression and survival probability of cancer patients was explored using the PrognoScan database and the R2: Kaplan Meier Scanner. Additionally, the relative expression of C1QBP in other cancers, and correlation of C1QBP expression with patient survival were investigated. Gene ontology and pathway analysis of commonly differentially coexpressed genes with C1QBP in breast, lung, colon, and bladder cancers as well as lymphoma revealed the C1QBP-correlated pathways in these cancers. This data-driven study demonstrates the correlation of C1QBP expression with patient survival and identifies possible C1QBP-involved pathways, which may serve as targets of a novel therapeutic modality for various human cancers.

19 citations


Posted Content
TL;DR: In this paper, the authors provide an overview of NOMA principles and applications and discuss the fundamental principles of power and code-domain NOMAs with single and multiple antennas in uplink and downlink settings.
Abstract: Due to massive connectivity and increasing demands of various services and data-hungry applications, a full-scale implementation of the fifth generation (5G) wireless systems requires more effective radio access techniques. In this regard, non-orthogonal multiple access (NOMA) has recently gained ever-growing attention from both academia and industry. Compared to orthogonal multiple access (OMA) techniques, NOMA is superior in terms of spectral efficiency and is thus appropriate for 5G and Beyond. In this article, we provide an overview of NOMA principles and applications. Specifically, the article discusses the fundamentals of power-domain NOMA with single and multiple antennas in both uplink and downlink settings. In addition, the basic principles of code-domain NOMA are elaborated. Further, the article explains various resource allocation techniques such as user pairing and power allocation for NOMA systems; discusses the basic form of cooperative NOMA and its variants; and addresses several opportunities and challenges associated with the compatibility of NOMA with other advanced communication paradigms such as heterogeneous networks and millimeter wave communications.

9 citations


Journal ArticleDOI
19 Sep 2019-Sensors
TL;DR: The integration of the special fitness function with the new key distribution approach enables the AEF to adapt the underlying dynamic network conditions, and the simulation experiments under different settings show significant improvements in network lifetime.
Abstract: Static sink-based wireless sensor networks (WSNs) suffer from an energy-hole problem. This incurs as the rate of energy consumption on sensor nodes around sinks and on critical paths is considerably faster. State-of-the-art en-routing filtering schemes save energy by countering false report injection attacks. In addition to their unique limitations, these schemes generally do not examine energy awareness in underlying routing. Mostly, these security methods are based on a fixed filtering capacity, unable to respond to changes in attack intensity. Therefore, these limitations cause network partition(s), exhibiting adverse effects on network lifetime. Extending network lifetime while preserving energy and security thus becomes an interesting challenge. In this article, we address the aforesaid shortcomings with the proposed adaptive en-route filtering (AEF) scheme. In energy-aware routing, the fitness function, which is used to select forwarding nodes, considers residual energy and other factors as opposed to distance only. In pre-deterministic key distribution, keys are distributed based on the consideration of having paths with a different number of verification nodes. This, consequently, permits us to have multiple paths with different security levels that can be exploited to counter different attack intensities. Taken together, the integration of the special fitness function with the new key distribution approach enables the AEF to adapt the underlying dynamic network conditions. The simulation experiments under different settings show significant improvements in network lifetime.

8 citations


Journal ArticleDOI
TL;DR: In this article, the authors define the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes and provide a comparative analysis of existing SDN-based vehicle-to-vehicle network system grouped according to their modelling and simulation concepts.
Abstract: There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could be avoided by adopting Cellular Vehicle-to-Everything (C-V2X) technology with the possibility to re-use the existing mobile network infrastructure. More and more, with the emergence of Software Defined Networks, the flexibility and the programmability of the network have not only impacted the design of new vehicular network architectures but also the implementation of V2X services in future intelligent transportation systems. In this paper, we define the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes. We first overview the current studies available in the literature on C-V2X technology in support of V2X applications. We then present the different architectures and their underlying system models for LTE-V2X communications. We later describe the key ideas of software-defined networks and their concepts for V2X services. Lastly, we provide a comparative analysis of existing SDN-based vehicular network system grouped according to their modeling and simulation concepts. We provide a discussion and highlight vehicular ad-hoc networks' challenges handled by SDN-based vehicular networks.

Proceedings ArticleDOI
23 Feb 2019
TL;DR: In this paper, the authors proposed an en-route filtering scheme to counter false report injection attacks on designated verification nodes, which improves the network lifetime and energy efficiency while having comparable false report filtering efficiency.
Abstract: Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and verification nodes are also fixed. In this paper, we cater these limitations in our proposed scheme. Simulation experiments results show that proposed schemes outperforms existing en-route filtering schemes in networks lifetime. We employed a Fuzzy Logic System to select forwarding nodes from candidate nodes based on current network conditions. Proposed scheme gains in network lifetime, and energy-efficiency while having comparable false report filtering efficiency.

Posted Content
TL;DR: The paper proposes an integrated holistic framework for PM motivating informatics researchers to design their relevant research work in an appropriate context and provides some guidelines for future research for a seamless implementation and a wide-scale deployment of PM.
Abstract: Precision Medicine (PM) is an emerging approach that appears with the impression of changing the existing paradigm of medical practice. Recent advances in technological innovations and genetics, and the growing availability of health data have set a new pace of the research and imposes a set of new requirements on different stakeholders. To date, some studies are available that discuss about different aspects of PM. Nevertheless, a holistic representation of those aspects deemed to confer the technological perspective, in relation to applications and challenges, is mostly ignored. In this context, this paper surveys advances in PM from informatics viewpoint and reviews the enabling tools and techniques in a categorized manner. In addition, the study discusses how other technological paradigms including big data, artificial intelligence, and internet of things can be exploited to advance the potentials of PM. Furthermore, the paper provides some guidelines for future research for seamless implementation and wide-scale deployment of PM based on identified open issues and associated challenges. To this end, the paper proposes an integrated holistic framework for PM motivating informatics researchers to design their relevant research works in an appropriate context.

Proceedings ArticleDOI
01 Jan 2019
TL;DR: This paper proposes a hop-by-hop best relay selection for the multihop ad-hoc wireless network consisting several relays at each hop in presence of an eavesdropper such that a secure routing scheme to transmit a confidential message from transmitter to legitimate receiver is achieved.
Abstract: Physical layer (PHY) security that is based on information-theoretic secrecy has recently emerged as an alternative option for traditional cryptographic techniques to secure wireless networks. In this paper, we study the problems related to routing scheme along with PHY security for a multihop wireless network so that full diversity can be achieved at each hop. We propose a hop-by-hop best relay selection for the multihop ad-hoc wireless network consisting several relays at each hop in presence of an eavesdropper such that a secure routing scheme to transmit a confidential message from transmitter to legitimate receiver is achieved. The selection is performed considering the instantaneous channel conditions of relay as well as eavesdropper at each hop. We derive a closed form expressions for the probability of non-zero secrecy capacity along with end to end probability of secrecy outage at a normalized secrecy rate. Moreover, we provide an asymptotic expression to gain insights on the diversity gain.

Proceedings ArticleDOI
01 Oct 2019
TL;DR: The paper provides some insights into how the required four key building blocks, namely, terahertz to molecular (T2M) relay interface, molecular to terAhertz (M2T) interface, Molecular to neural (M1N) relay, and neural to molecular(N2M), can be designed to implement the HNC system.
Abstract: In this paper, we propose a hybrid nano communication (HNC) system that integrates three possible modes of nano communications: terahertz communication (TC), molecular communication (MC), and neural communication (NC). The paper provides some insights into how the required four key building blocks, namely, terahertz to molecular (T2M) relay interface, molecular to terahertz (M2T) interface, molecular to neural (M2N) relay, and neural to molecular (N2M) interface can be designed to implement the HNC system. In addition, the capacity analysis for the hybrid channel is provided. Sub-channels’ capacities are also calculated. Finally, numerical results are presented to comprehend the data transmission capacity of the proposed HNC system.

Posted Content
TL;DR: In this paper, a hybrid nano communication (HNC) system that integrates three possible modes of nano communications: terahertz communication (TC), molecular communication (MC), and neural communication (NC) is proposed.
Abstract: In this paper, we propose a hybrid nano communication (HNC) system that integrates three possible modes of nano communications: terahertz communication (TC), molecular communication (MC), and neural communication (NC). The paper provides some insights into how the required four key building blocks, namely, terahertz to molecular (T2M) relay interface, molecular to terahertz (M2T) interface, molecular to neural (M2N) relay, and neural to molecular (N2M) interface can be designed to implement the HNC system. In addition, the capacity analysis for the hybrid channel is provided. Sub-channels' capacities are also calculated. Finally, numerical results are presented to comprehend the data transmission capacity of the proposed HNC system.