Filters








1,445 Hits in 1.3 sec

Dengue Fever in Perspective of Clustering Algorithms [article]

Kamran Shaukat, Nayyer Masood, Ahmed Bin Shafaat, Kamran Jabbar, Hassan Shabbir, Shakir Shabbir
2015 arXiv   pre-print
Shafique Ahmed et al showed a statistical study of those countries in which dengue fever has effected certainly with the help of annotated maps.  ... 
arXiv:1511.07353v1 fatcat:wxgtkgien5dhrbzi2zdb2chjke

EFFECTIVENESS OF HAEMORRHOIDAL ARTERY LIGATION VIA PALPATORY

Hassan Shabbir, Farhan Ahmed Majeed, Ahmed Raza, Umar Bashir, Mohsin Saleem Cheema, Ayema Shabbir, Saad-Ur-Rehman Khan
2020 Pakistan Armed Forces Medical Journal  
Objective: To determine the effectiveness of the haemorrhoidal artery ligation via palpatory method among patients with grade II and III hemorrhoids. Study Design: Observational prospective study. Place and Duration of Study: The study was conducted at Combined Military Hospital Multan where with hemorrhoids were operated between May to Nov2018. Methodology: A total of 121 patients participated in this study. Patients included in the study were aged between 20-60 years of age with grade II and
more » ... II hemorrhoids. Patients were selected from out-patient department. They were explained the purpose of the study and those who consented to participate in the study were enrolled through a written consent form. Digital rectal examination was done under spinal anesthesia followed by proctoscopy and hemorrhoids were identified. Split proctoscope was passed and hemorrhoids were isolated one by one. Haemorrhoidal artery was palpated sutured with vicral 3/0. Follow up at 3weeks and 8 weeks. Results: Male respondents accounted for 50 (41.3%) whereas their female counterparts comprised 71 (58.7%). The mean age of the male and female respondents was 43.76 ± 10.08 and 44.52 ± 10.59 years respectively. Out of 121 patients that underwent haemorrhoidal artery ligation, only 33 (27.3%) had post-operative complications. Most of the patients had rectal bleeding followed by post-operative defecation pain, anal fissure, fistula in ano and recurrence. Conclusion: In conclusion, palpatory method is painless, less invasive, has less complications and is safe alternative to open hemorrhoidectomy where Doppler guided haemorrhoidal ligation equipment is not available.
doaj:e1e6cae25e214f3e810d181215d23251 fatcat:aztieumxnfejvozwy442iyll2e

Forbidden vertices [article]

Gustavo Angulo, Shabbir Ahmed, Santanu S. Dey, Volker Kaibel
2014 arXiv   pre-print
In this work, we introduce and study the forbidden-vertices problem. Given a polytope P and a subset X of its vertices, we study the complexity of linear optimization over the subset of vertices of P that are not contained in X. This problem is closely related to finding the k-best basic solutions to a linear problem. We show that the complexity of the problem changes significantly depending on the encoding of both P and X. We provide additional tractability results and extended formulations
more » ... n P has binary vertices only. Some applications and extensions to integral polytopes are discussed.
arXiv:1309.2545v2 fatcat:5macvq65dbdmbmemjkpvefrqlu

Multipurpose Tactical Robot

Md. Taher-Uz-Zaman, Md. Sazzad Ahmed, Shabbir Hossain, Shakhawat Hossain, G. R. Ahmed Jamal
2014 Engineering International  
This paper presents a general framework for planning a multipurpose robot which can be used in multiple fields (both civil and military). The framework shows the assembly of multiple sensors, mechanical arm, live video streaming and high range remote control and so on in a single robot. The planning problem is one of five fundamental challenges to the development of a real robotic system able to serve both purposes related to military and civil like live surveillance(both auto and manual),
more » ... ing under natural disaster aftermath, firefighting, object picking, hazard like ignition, volatile gas detection, exploring underground mine or even terrestrial exploration. Each of the four other areas -hardware design, programming, controlling and artificial intelligence are also discussed.
doi:10.18034/ei.v2i1.127 fatcat:wmpbbza3bfadtfd2ak4yvrek4i

Multipurpose Tactical Robot

Md. Taher-Uz-Zaman, UAP, Md. Sazzad Ahmed, Shabbir Hossain, Shakhawat Hossain, G. R. Ahmed Jamal
2014 Engineering International  
This paper presents a general framework for planning a multipurpose robot which can be used in multiple fields (both civil and military). The framework shows the assembly of multiple sensors, mechanical arm, live video streaming and high range remote control and so on in a single robot. The planning problem is one of five fundamental challenges to the development of a real robotic system able to serve both purposes related to military and civil like live surveillance(both auto and manual),
more » ... ing under natural disaster aftermath, firefighting, object picking, hazard like ignition, volatile gas detection, exploring underground mine or even terrestrial exploration. Each of the four other areas -hardware design, programming, controlling and artificial intelligence are also discussed.
doi:10.18034/ei.v2i1.204 fatcat:2n5bi5wcirhfxiiuiqohe4kigi

Prostaglandin catabolism in Spodoptera exigua, a lepidopteran insect [article]

Yonggyun Kim, Shabbir Ahmed
2020 bioRxiv   pre-print
Several physiological processes mediated by PGs have been observed in S. exigua, 213 including PO activation (Shrestha and Kim, 2008), egg-laying behavior (Ahmed et al., 2018), 214 oocyte development (  ... 
doi:10.1101/2020.07.13.201608 fatcat:i6yclpqkwrf6zcz2tyc2ldmdgm

Consensus-Based Dantzig-Wolfe Decomposition [article]

Mohamed El Tonbari, Shabbir Ahmed
2021 arXiv   pre-print
Dantzig-Wolfe decomposition (DWD) is a classical algorithm for solving large-scale linear programs whose constraint matrix involves a set of independent blocks coupled with a set of linking rows. The algorithm decomposes such a model into a master problem and a set of independent subproblems that can be solved in a distributed manner. In a typical implementation, the master problem is solved centrally. In certain settings, solving the master problem centrally is undesirable or infeasible, such
more » ... s in the case of decentralized storage of data, or when independent agents who are responsible for the subproblems desire privacy of information. In this paper, we propose a fully distributed DWD algorithm which relies on solving the master problem using a consensus-based Alternating Direction Method of Multipliers (ADMM) method. We derive error bounds on the optimality gap and feasibility violation of the proposed approach. We provide preliminary computational results for our algorithm using a Message Passing Interface (MPI) implementation on cutting stock instances from the literature and synthetic instances where we obtain high quality solutions.
arXiv:1905.03309v2 fatcat:wryr6m2ewngsxizbvwuj2iihza

EFFECTS OF PULMONARY TELE-REHABILITATION IN HOME CONFINED PATIENTS WITH COVID-19

Dr Kinza Idrees, Dr Hafiz Abdul Basit Shabbir, Dr. Hafiza Aqsa Shabbir, Dr Ayesha Niaz, Dr Khadija Ahmed
2020 Zenodo  
Corona virus was first identified in mid-1960 and consisted of seven classes. Human corona virus first appeared in December, 2019 in China then this outbreak affected most of the world on its peak till April, 2020. It is known to be highly contagious droplet infection. The incubation period of this virus is average 5 days and then it reacts or stays for 14 days in human body. This is an upper respiratory tract infection which later involves lungs. People go through different symptoms including
more » ... yperthermia, non-productive cough, myalgia, body pain, fatigue, headache and diarrhea. Aims & Objectives: The main aim of our study is to analyze the therapeutic effects of pulmonary rehabilitation that will be provided by Tele-communication in patients with COVID-19 who will be home-confined and having mild to moderate symptoms, we will be maintaining the social distancing and following SOPs to prevent exposure. Methodology: From the preliminary survey that we conducted through Google form we came to know that; respiratory complication is the most prevalent among the patients with COVID-19. For interventional purpose We will select a sample size forty (40) patients, who will meet the inclusion and exclusion criteria of our research. They will be further divided into two groups Group A and Group B, which will be allocated through Computer generative randomization, experimental group and control group respectively. Statistical analysis: In this study we will use SPSS version 20. Keywords: COVID-19, Respiratory Complications, Physical Therapy, Pulmonary Rehabilitation, Tele rehabilitation. Results: Pulmonary Tele-Rehabilitation shows significant results in home-confined COVID-19 patients. Conclusion: It is concluded that the most prevalent complication in COVID-19 patients, which is respir [...]
doi:10.5281/zenodo.4032716 fatcat:nw7j4ivk4zbn5a262dfd5voaxm

Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks [article]

Shabbir Ahmed
2021 arXiv   pre-print
Automotive systems continuously increase their dependency on Electronic Control Units (ECUs) and become more interconnected to improve safety, comfort and Advanced Driving Assistance Systems (ADAS) functions to passengers and drivers. As a consequence of that trend, there is an expanding attack surface which may potentially expose vehicle's critical functions to cyberattacks. It is possible for an adversary to reach the underlying Control Area Network (CAN) through a compromised node or
more » ... -facing network interface, and launch masquerading attacks that can compromise road and passenger safety. Due to lack of native authentication in the CAN protocol, an approach to detect masquerading attacks is to use ECU voltage fingerprinting schemes to verify that the messages are sent by authentic ECUs. Though effective against simple masquerading attacks, prior work is unable to detect attackers such as hardware Trojans, which can mimic ECU voltages in addition to spoofing messages. We introduce a novel Two-point ECU Fingerprinting scheme and demonstrate efficacy in a controlled lab setting and on a moving vehicle. Our results show that our proposed two-point fingerprinting scheme is capable of an overall F1-score over 99.4%. The proposed approach raises the bar for attackers trying to compromise automotive security both remotely and physically, therefore improving security and safety of autonomous vehicles.
arXiv:2102.10128v1 fatcat:hloynsnfercr7crajjovagso7i

The inverse optimal value problem

Shabbir Ahmed, Yongpei Guan
2004 Mathematical programming  
This paper considers the following inverse optimization problem: given a linear program, a desired optimal objective value, and a set of feasible cost coefficients, determine a cost-coefficient vector such that the corresponding optimal objective value of the linear program is closest to the given value. The above problem, referred here as the inverse optimal value problem, is significantly different from standard inverse optimization problems that involve determining a cost coefficient vector
more » ... or a linear program such that a prespecified solution vector is optimal. In this paper, we show that the inverse optimal value problem is NP-hard in general. We identify conditions under which the problem reduces to a concave maximization or a concave minimization problem. We provide sufficient conditions under which the associated concave minimization problem and, correspondingly, the inverse optimal value problem is polynomially solvable. For the case when the set of feasible cost coefficients is polyhedral, we describe an algorithm for the inverse optimal value problem based on solving linear and bilinear programming problems. Some preliminary computational experience is reported.
doi:10.1007/s10107-004-0515-x fatcat:g3kh645rlfd4vp54r5lqyqwcru

SAFETY OF HASSON`S TECHNIQUE IN LAPAROSCOPIC CHOLECYSTECTOMY

Farhan Ahmed Majeed, Hassan Shabbir, Tehmina Rehman, Muhammad Nadeem, Ch Muhammad Qamar-ul-Haq, Umar Bashir, Ayema Shabbir
2020 Pakistan Armed Forces Medical Journal  
Objective: To evaluate the safety profile of Hasson's technique of laparoscopic port access in patients undergoing laparoscopic cholecystectomy. Study Design: Cross-sectional study. Place and Duration of Study: Department of general surgery, Combined Military Hospital Lahore, from Oct 2014 to Aug 2018. Methodology: A total of 1037 patients with acute or chronic cholecystitis who were scheduled for laparoscopic cholecystectomy were included. Hasson (open) technique was used to insert first
more » ... scopy port for creation of pneumoperitoneum. Following laparoscopic cholecystectomy, data of intra-operative and post-operative complications was noted. Patients were followed during hospital stay to evaluate any procedure related injury. Follow-up was done at up-to six months to determine wound infections and formation of umbilical hernia. Results: Mean age of the patients was 44.65 ± 8.98 years. Out of 1037 patients, procedure was simple in 655 (63.16%) patients and complex in 382 (36.83%) patients due to the presence of inflammatory adhesions and anatomic access. There was no intra-abdominal injury, omental injury, vascular injury or gut perforation. Port-site infections were diagnosed in 6 (0.57%) patients during 06 months' follow-up. Umbilical hernia was diagnosed in only 1 (0.09%) patient. Conclusion: We found that Hasson technique of first laparoscopy port access for creation of pneumoperitoneum was a safe technique with minimum number access related complications.
doaj:62c91fc0fb95477db7682dd32f5f9091 fatcat:27553kvywjhmpmm66ngxhzehl4

Probabilistic Set Covering with Correlations

Shabbir Ahmed, Dimitri J. Papageorgiou
2013 Operations Research  
Acknowledgments Shabbir Ahmed was partially supported by the National Science Foundation Grant CMMI 1129871.  ...  Ahmed and Papageorgiou: Probabilistic Set Covering with Correlations Article submitted to Operations Research; manuscript no. OPRE-2011-07-370.R2  ...  All experiments used the MILP Table 2 2 = 0.02, k = 10 Probabilistic Set Covering with Correlations Shabbir Ahmed and Dimitri J.  ... 
doi:10.1287/opre.1120.1135 fatcat:jlcw6zxlhbdv3hpissmnyg4sou

Stochastic Lipschitz Dynamic Programming [article]

Shabbir Ahmed, Filipe Goulart Cabral, Bernardo Freitas Paulo da Costa
2019 arXiv   pre-print
Also note that all those times, and especially the ALD times, are much larger than the ones reported in [Ahmed et al., 2004] .  ...  A 2-dimensional example We also study another example, taken from [Carøe and Schultz, 1997 ] and further adapted in [Ahmed et al., 2004] .  ... 
arXiv:1905.02290v2 fatcat:stwd32rol5ehbob75hyctwspqy

Distributionally robust simple integer recourse

Weijun Xie, Shabbir Ahmed
2018 Computational Management Science  
The simple integer recourse (SIR) function of a decision variable is the expectation of the integer roundup of the shortage/surplus between a random variable with a known distribution and the decision variable. It is the integer analogue of the simple (continuous) recourse function in two stage stochastic linear programming. Structural properties and approximations of SIR functions have been extensively studied in the seminal works of van der Vlerk and coauthors. We study a distributionally
more » ... st SIR function (DR-SIR) that considers the worst-case expectation over a given family of distributions. Under the assumption that the distribution family is specified by its mean and support, we derive a closed form analytical expression for the DR-SIR function. We also show that this nonconvex DR-SIR function can be represented using a mixed integer second-order conic program. *
doi:10.1007/s10287-018-0313-1 fatcat:zikcr5y5xvh43csj3zlwahhfmi

A Simpler NP-Hardness Proof for Familial Graph Compression [article]

Ammar Ahmed, Zohair Raza Hassan, Mudassir Shabbir
2020 arXiv   pre-print
This document presents a simpler proof showcasing the NP-hardness of Familial Graph Compression.
arXiv:2009.02945v1 fatcat:grzrxnzbmvfphbaicxh47m3wga
« Previous Showing results 1 — 15 out of 1,445 results