RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Designing and modification of bismuth oxyhalides BiOX (X = Cl, Br and I) photocatalysts for improved photocatalytic performance

        Irshad Ahmad,Shazia Shukrullah,Muhammad Yasin Naz,Sami Ullah,Mohammed Ali Assiri 한국공업화학회 2022 Journal of Industrial and Engineering Chemistry Vol.105 No.-

        Photocatalysis has emerged as a promising technology for solving global environmental and energy challenges. The selectivity of low-cost, non-toxic and thermochemically stable materials for photocatalyticapplications is crucial to meet the industrial standards. Despite of owing unique layered structure, distinctelectronic band structure and tunable optical properties, the bismuth oxyhalides BiOX (X = Cl, Brand I) photocatalytic materials suffer from rapid recombination of charge carriers and limited lightabsorption issues. These limitations restrict the photocatalytic efficiency and industrial applications ofBiOX materials. The focus of this critical review is to discuss recent developments in the design and modificationof existing and new BiOX materials for getting optimum photocatalytic response from thesematerials. The key elements of the review are BiOX synthesis methods, BiOX driven water splitting, singleand double stage hydrogen evolution systems, degradation of organic pollutants and trends of boostingthe photocatalytic efficiency of the BiOX materials. Finally, this insight discusses the existing issues andfuture perspectives of BiOX photocatalysts.

      • KCI등재

        Fault detection of composite beam by using the modal parameters and RBFNN technique

        Irshad Ahmad Khan,Dayal Ramakrushna Parhi 대한기계학회 2015 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.29 No.4

        The detection of transverse cracks in terms of their location and intensity by using the radial basis function neural network (RBFNN)technique is analyzed in the current research and validated with experimental investigation. The glass fiber-reinforced epoxy composite isused in this research because of its valuable features, such as high stiffness and strength-to-weight ratios, good fatigue and wear resistance,and damage tolerance capability compared with isotropic material. The theoretical and numerical investigations are performed toobtain a relationship between the change in natural frequencies and mode shapes for the cracked and noncracked composite beam. Numericalanalysis is performed by using the finite element software ANSYS on cracked and noncracked composite beams to measure themodal parameters, such as natural frequencies and mode shapes. These parameters are used to design an artificial intelligent controllerbased on the RBFNN-type neural network for predicting crack severity and its intensity. The relative natural frequencies and modeshapes (First, second, and third modes) of vibration are used as input data to the RBFNN controller, and the relative crack locations andcrack depths are the output of RBFNN. Results from theoretical and numerical analysis are compared with the experimental results, and agood agreement is observed between them.

      • SCIESCOPUSKCI등재

        An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

        Irshad, Azeem,Ahmad, Hafiz Farooq,Alzahrani, Bander A.,Sher, Muhammad,Chaudhry, Shehzad Ashraf Korean Society for Internet Information 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12

        Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

      • SCIESCOPUSKCI등재

        An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

        Irshad, Azeem,Sher, Muhammad,Ahmad, Hafiz Farooq,Alzahrani, Bander A.,Chaudhry, Shehzad Ashraf,Kumar, Rahul Korean Society for Internet Information 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12

        Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

      • KCI등재

        Experimental and Electromagnetic Field Approach for the Development of Modifed Building Protection System

        Irshad Ullah,M. N. R. Baharom,H. Ahmad,B. Das,H. M. Luqman,Jawad Ali,Zainab Zainal 대한전기학회 2020 Journal of Electrical Engineering & Technology Vol.15 No.1

        During the lightning activities every air terminal has the equal chances to be hit by the lightning fashes and it produce electric feld in the surrounding. Therefore, with the passage of time when the lightning air terminals become aged due to acidic rain and chemical contamination, lightning air terminal (LAT) bypasses on side edges takes place which has not been given much attention by the researchers. A modifed lightning protection system (LPS) was proposed in this paper using experimental and electromagnetic feld approach. One of the LAT on diferent geometrical structure was selected as sacrifcial point in order to reduce the chances of LAT bypasses. The modifed protection system can be referred by diferent standard to make sure buildings protection. All the experimental work was done using high voltage impulse and ANSYS/MAXWELL was used as a simulation tool. The modifed protection technique will help diferent standards to provide comprehensive protective measures against lightning.

      • KCI등재

        An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

        ( Azeem Irshad ),( Muhammad Sher ),( Hafiz Farooq Ahmad ),( Bander A. Alzahrani ),( Shehzad Ashraf Chaudhry ),( Rahul Kumar ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12

        Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

      • KCI등재

        An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

        ( Azeem Irshad ),( Hafiz Farooq Ahmad ),( Bander A. Alzahrani ),( Muhammad Sher ),( Shehzad Ashraf Chaudhry ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12

        Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu`s protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

      • KCI등재

        Characteristics of Sustainable Concrete with Partial Substitutions of Glass Waste as a Binder Material

        Jawad Ahmad,Rebeca Martinez-Garcia,Salem Algarni,Jesús de-Prado-Gil,Talal Alqahtani,Kashif Irshad 한국콘크리트학회 2022 International Journal of Concrete Structures and M Vol.16 No.3

        Manufacturing waste has been quickly increasing over time as a result of the fast-rising population as well as the consumption of foods that are thrown away dishonestly, resulting in environmental contamination. As a result, it has been suggested that industrial waste disposal may be considerably reduced if it could be integrated into cement concrete manufacturing. The aim of this study is to analyze the properties of concrete employing waste glass (WG) as a binding material in proportions of 5%, 10%, 15%, 20%, 25%, and 30% by weight of cement. The fresh property was assessed using a slump cone test, while mechanical performance was assessed using flexural, compressive, splitting tensile, and pull-out strength after 7, 28, and 56 days. Furthermore, microstructure analysis was studied by scan electronic microscopic (SEM), Fourier-transform infrared spectroscopy (FTIR) and thermo-gravimetric analysis (TGA) test. The results reveal that the addition of discarded glass reduces the workability of concrete. Furthermore, mechanical performance was increased up to a 20% substitution of waste glass and then gradually declined. Waste glass can be employed as a micro filler or pozzolanic material without affecting the mechanical performance of concrete, according to microstructure research.

      • SCOPUSKCI등재

        On Zeros of Polynomials with Restricted Coefficients

        RASOOL, TAWHEEDA,AHMAD, IRSHAD,LIMAN, AB Department of Mathematics 2015 Kyungpook mathematical journal Vol.55 No.4

        Let $P(z)={\limits\sum_{j=0}^{n}}a_jz^j$ be a polynomial of degree n and Re $a_j={\alpha}_j$, Im $a_j=B_j$. In this paper, we have obtained a zero-free region for polynomials in terms of ${\alpha}_j$ and ${\beta}_j$ and also obtain the bound for number of zeros that can lie in a prescribed region.

      • KCI등재

        Fabrication of highly effective aramid fiber-based polypropylene composite membranes for desalination

        Mustafa Kiran,Iqbal Nadeem,Ahmad Sajjad,Hussain Irshad,Musaddiq Sara 한국화학공학회 2023 Korean Journal of Chemical Engineering Vol.40 No.11

        Water is essential for human survival and existence. Although everyone acknowledges the importance of water reserves, increasing industrialization and other human activities are drastically reducing the quality of the water. Polymeric composite membranes provide a dependable answer for removing water pollutants and thus improving its quality. In this study, polypropylene composite membranes with Aramid support (PM1 membranes) were fabricated using thermally induced phase separation (TIPS) for water purification and characterized using SEM. Numerous membrane characteristics, including polymer concentration, oil for dissolving polymer, nucleating agent, water immersion time and organic solvent were all adjusted for the production of extremely efficient PM1 membranes. The PM1-WC membrane, which was the best membrane, was fabricated by combining 0.1 g PP with soyabean oil, adipic acid as a nucleating agent, and n-hexane as an organic solvent (PP membranes submerged in water for 40 minutes). In a water filtering system developed in the lab, the PM1 membranes’ desalination capacities were tested. The desalination capacity of the PP membranes showed a salt rejection of between 70% and 75%.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼