Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Kashif Ashraf"'
Autor:
Sujay Chadran, Alisdair Ryding, Natasha Corballis, Kashif Ashraf, Neil Mangrolia, Toomas Sarev
Publikováno v:
Oxford Medical Case Reports
A chronically persistent left atrial pseudoaneurysm is a rare complication of valvular surgery, trauma, myocardial infarction and endocaritis but this is the first known description of a chronic pseudoaneurysm as a complication of coronary rupture du
Autor:
Sardar Kashif Ashraf Khan, Humaira Sardar, Muhammad Adeel, Muhammad Awais Azam, Aboubaker Lasebae, Jonathan Loo, Rehana Kausar
Publikováno v:
International Journal of Pervasive Computing and Communications. 10:481-496
Purpose – This paper aims to propose an algorithm, location-aware opportunistic content forwarding (LOC), to improve message directivity using direction vectors in opportunistic networks. The LOC is based on the assumption that if approximate locat
Publikováno v:
Proceedings of the Institution of Civil Engineers - Structures and Buildings. 165:127-138
The paper describes a study carried out to examine the effect of self-compacting concrete (SCC) on the lateral pressure on formwork. This comprised two series: (a) control tests, with SCC and comparative concretes (Portland cement (PC) and superplast
Autor:
Khan, Sardar Kashif Ashraf
These days, most of the mobile phones are smart enough with computer like intelligence and equipped with multiple communication technologies such as Bluetooth, wireless LAN, GPRS and GSM. Different communication medium on single device have unlocked
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=core_ac_uk__::7aded0bd5b76098f7423579bcf8cc886
https://eprints.mdx.ac.uk/17327/1/SKhanThesis.pdf
https://eprints.mdx.ac.uk/17327/1/SKhanThesis.pdf
Autor:
Laurissa Tokarchuk, Sardar Kashif Ashraf Khan, Muhammad Adeel, Muhammad Awais Azam, M.A. Khalil
Publikováno v:
ITNG
Viral propagation modelling acts as sandbox for testing intensity of malware, understand patterns adopted for malware propagation and consequently help device strategies for malware detection. Success of P2P networks has encouraged mobile vendors to
Publikováno v:
2013 IEEE Symposium on Computers & Informatics (ISCI).
In opportunistic networks, nodes do not have prior knowledge of the routes to their intended destinations. The major challenge is to keep the communication cost minimum during the transfer of information towards intended destinations. An improvement
Publikováno v:
ITNG
To improve the functional decline among elderly people, understanding the human behaviour is a substantial approach. Human behaviour is complex in nature and a challenging task to understand by monitoring the daily life activities. A tiered approach
Publikováno v:
WCNC
Being able to understand human behaviour and monitoring daily life activities is seen as a significant approach for alleviating functional decline among elderly people. The aim of the research work presented in this paper is to investigate a mechanis
Publikováno v:
PerCom Workshops
The profusion of wireless enabled mobile devices in daily life routine and advancement in pervasive computing has opened new horizons to analyse and model the contextual information. This contextual information (for example, proximity data and locati
Publikováno v:
PerCom Workshops
In opportunistic networks, nodes have no prior knowledge of the routes to forward the information to its intended destination. Message transfer without generating excessive traffic poses a challenge in these networks. Improvements in message routing/