Papers by Sayed Ahmad Shah

Molecules
In the current study, the anti-inflammatory and analgesic potential of Alnus nitida (leaves and f... more In the current study, the anti-inflammatory and analgesic potential of Alnus nitida (leaves and fruits) was evaluated in the Sprague-Dawley rat. Traditionally, A. nitida was used for the treatment of inflammatory ailments. However, A. nitida leaves and fruits have not been yet reported regarding any potential medicinal effects. Leaves/fruits of A. nitida were extracted with methanol and fractionated to attain n-hexane, chloroform, ethyl acetate and aqueous fractions. These extracts were then evaluated for in vivo analgesic and anti-inflammatory potential. For in vivo anti-inflammatory activity, carrageenan-induced paw edema assay, Freunds’ complete adjuvant-induced edema, xylene-induced ear edema and histamine-induced paw edema models were used in rats, which showed significant (p < 0.01) reduction (70–80%) in edema in comparison of inflammatory controls. On other hand, for the analgesic assessment, hot plate assay and acetic acid-induced writhing tests were used, which showed a ...
Bosch Creates the First Surreal Painting of Hell The Garden of Earthly delights was painted somew... more Bosch Creates the First Surreal Painting of Hell The Garden of Earthly delights was painted somewhere in between 1490-1510. It is hard to tell exactly when the painting was painted because Bosch never dated any of his work. Bosch was between the age of 40-60 when he created this masterpiece. The painting was done on an oak panel by early Dutch master Hieronymus Bosch. The triptych is a little over 7 feet tall and almost 13 feet long. The painting now resides in the Museo del Prado in Madrid and has been there since 1939 thanks to the Spanish Civil War and King Philip II. The central theme of the triptych is the corruption of the Word of

Plants, 2022
Ilex dipyrena Wall (Aquifoliaceae), is a traditional medicinal plant abundantly found in India an... more Ilex dipyrena Wall (Aquifoliaceae), is a traditional medicinal plant abundantly found in India and Pakistan. In the current research work, initially, the anatomical characteristics were recorded through microscopic examination of selected plant parts, such as leaf, petiole, and midrib. Then, the quantitative phytochemical screening was performed using standard tests reported in literature. The whole-plant powdered sample was then soaked in methanol to obtain crude extract, which was then fractionated into solvents of different polarities to obtain ethyl acetate, chloroform, butanol, hexane, and aqueous extracts. The phytochemical composition of the crude ethyl acetate and chloroform extracts (being the most active fractions) was then confirmed through HPLC analyses, where the possible phytochemical present were predicted through comparison of retention time of a given compound peak with the available standards. The extracts were also evaluated for their in vitro antioxidant and ani-...

It is vital to test the response, reliability and to determine image artifacts produced by the nu... more It is vital to test the response, reliability and to determine image artifacts produced by the nuclear medicine tomography systems due to some systemic limitations before their use in clinical studies. That cannot be reliably achieved by scanning patients. Different types of test phantoms are commercially available with accurately/precisely known composition, which helps in acquiring prior knowledge about the capability and drawbacks of a nuclear medicine tomography system. A cold regions insert, that can be placed into a cylindrical tank of a commercially provided PET/SPECT phantom has been developed (for R A Carlson’s phantom - which consists, hot, cold and linearity inserts where the hot regions insert is comprised on a “V” shaped eight pairs of various sized holes with a cold background). The new produced cold regions insert, consists solid plastic rods, 5 cm long (each) with same diameters and exactly the same arrangement as hot region holes pairs insert of R A Carlson’s phantom. Both inserts have been attached with each other by aligning hot and cold regions for similar cross sectional views. The data acquired by this arrangement provides a simple way for measurement and comparison of the performance of a system i.e., image resolution in terms of position and size of hot and cold regions in the phantom, region(s) detectability. Also the accuracy of scatter, attenuation correction and image reconstruction techniques in nuclear medicine tomography may be tested.
African Journal of Business Management, Jun 30, 2011
Punjabi Society is full of various social groups which are further divided into several castes or... more Punjabi Society is full of various social groups which are further divided into several castes or clans living together for centuries. Although they speak Punjabi language, no matter how much different their dialects are, yet their prejudice, bias and social status have created ...

Information technology and control
Two key components contribute to task completion time: execution cost and communication cost. The... more Two key components contribute to task completion time: execution cost and communication cost. The communication cost is induced by data transfers between tasks residing on separate nodes. The communication is always expensive and unreliable in mobile ad hoc Grids and therefore plays a critical role in application performance. To reduce communication cost, interdependent tasks are allocated to nodes located close to one another. However, once the tasks have been allocated, nodes can move within a Grid. The movement of nodes within a Grid may result in multi-hop communication between nodes executing dependent tasks. In order to deal with node mobility within a Grid, an effective resource allocation scheme is required, but the design of such a scheme for mobile ad hoc computational Grids is challenging due to the constrained communication environment, node mobility, and infrastructure-less network environment. In this paper, we have developed an adaptive and distance-based resource all...

2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014
Three resource allocation schemes are described for allocation of data-intensive dependent tasks ... more Three resource allocation schemes are described for allocation of data-intensive dependent tasks on mobile ad hoc computational Grid. The first resource scheme exploits transmission power control mechanism in order to improve energy efficiency and network capacity while the second resource allocation scheme takes into account the connection quality and network traffic in order to reduce data transfer time. To balance the trade-off between first two schemes a network-aware and power-based resource allocation scheme is proposed which takes into account transmission power and network characteristics in order to make allocation decisions. The relationship between data transfer time and transmission energy consumption has also been investigated in detail. The schemes are validated in a simulated environment using various workloads and parameters.

Concurrency and Computation: Practice and Experience, 2014
A mobile ad hoc computational grid is a distributed computing infrastructure that allows mobile n... more A mobile ad hoc computational grid is a distributed computing infrastructure that allows mobile nodes to share computing resources in a mobile ad hoc environment. Compared to traditional distributed systems such as grids and clouds, resource allocation in mobile ad hoc computational grids is not straightforward because of node mobility, limited battery power and an infrastructure‐less network environment. The existing schemes are either based on a decentralized architecture that results in poor allocation decisions or assume independent tasks. This paper presents a scheme that allocates interdependent tasks and aims to reduce task completion time and the amount of energy consumed in transmission of data. This scheme comprises two key algorithms: resource selection and resource allocation. The resource selection algorithm is designed to select nodes that remain connected for a longer period, whereas the resource assignment or allocation algorithm is developed to allocate interdependent tasks to the nodes that are accessible at the minimum transmission power. The scheme is based on a hybrid architecture that results in effective allocation decisions, reduces the communication cost associated with the exchange of control information, and distributes the processing burden among the nodes. The paper also investigates the relationship between the data transfer time and transmission energy consumption and presents a power‐based routing protocol to reduce data transfer costs and transmission energy consumption. Copyright © 2014 John Wiley & Sons, Ltd.
2010 International Conference on Intelligent Networking and Collaborative Systems, 2010
Page 1. Resource Allocation Scheme to Minimize Communication Cost in Mobile Ad Hoc Computational ... more Page 1. Resource Allocation Scheme to Minimize Communication Cost in Mobile Ad Hoc Computational Grids Sayed Chhattan Shah and Myong-Soon Park Department of Computer Science and Engineering Korea University, South Korea {shah,myongsp}@korea.ac.kr ...

MILCOM 2013 - 2013 IEEE Military Communications Conference, 2013
Computational Grids and Clusters have been extensively deployed and widely used to solve complex ... more Computational Grids and Clusters have been extensively deployed and widely used to solve complex and challenging problems in science and engineering areas. These systems consist of powerful computing nodes connected through high-performance communication networks. Due to recent advances in mobile computing and communication technologies, it has become feasible to use mobile nodes as a contributing entity to Grid. Recently several approaches have been proposed to integrate mobile nodes with Grid computing systems, but in these approaches mobile nodes are mostly used as terminals either to submit jobs or access services. The approaches in which mobile nodes can share computing resources are restricted to infrastructure-based communication systems such as cellular network, and therefore cannot be used in mobile ad hoc environments. In this paper we propose a distributed computing infrastructure named mobile ad hoc computational Grid which allows mobile nodes to share computing resources in mobile ad hoc environment. Compared to traditional parallel and distributed computing systems such as Grid and Cluster mobile ad hoc computational Grid is characterized by shared and unreliable communication medium, low bandwidth, high latency, node mobility, and infrastructure-less network environment, so it introduces numerous opportunities as well as challenges. This paper describes the applications and architecture of mobile ad hoc computational Grid, and discusses the potential research issues and future research directions.
Journal of Physics: Conference Series, 2014
IJOMS, 2011
Is peripheral alcohol injection of value in the treatment of trigeminal neuralgia? An analysis of... more Is peripheral alcohol injection of value in the treatment of trigeminal neuralgia? An analysis of 100 cases.
Politics in South Asia, 2014
The withdrawal of US and NATO combat troops from Afghanistan is a settled matter and already unde... more The withdrawal of US and NATO combat troops from Afghanistan is a settled matter and already under way. However, while this fait accompli has been welcomed by many, especially by the governments and publics of troop contributing nations, a growing sense of uneasiness and uncertainty about the future stability and developments in Afghanistan is taking root. The role of the Taliban and their willingness to re-enter the political process lie at the heart of Afghan, regional and international concerns about the security and stability of the region. Under the auspices of the US government, the Doha talks are meant to open a dialogue between the Afghan government and the Taliban. Due to the complexity and entanglement of the regional security situation, it is argued that the importance of Pakistan for successful negotiations and solutions has to be realized.

KSII Transactions on Internet and Information Systems, 2012
Recent research in MEMS (Micro-Electro-Mechanical Systems) and wireless communication has enabled... more Recent research in MEMS (Micro-Electro-Mechanical Systems) and wireless communication has enabled tracking of continuous objects, including fires, nuclear explosions and bio-chemical material diffusions. This paper proposes an energy-efficient scheme that detects and tracks different dynamic shapes of a continuous object (i.e., the inner and outer boundaries of a continuous object). EBCO (Efficient Boundary detection and tracking of Continuous Objects in WSNs) exploits the sensing capabilities of sensor nodes by automatically adjusting the sensing range to be either a boundary sensor node or not, instead of communicating to its neighboring sensor nodes because radio communication consumes more energy than adjusting the sensing range. The proposed scheme not only increases the tracking accuracy by choosing the bordering boundary sensor nodes on the phenomenon edge, but it also minimizes the power consumption by having little communication among sensor nodes. The simulation result shows that our proposed scheme minimizes the energy consumption and achieves more precise tracking results than existing approaches.

Lecture Notes in Computer Science, 2013
Mobile ad hoc computational Grids are characterized by unreliable and dynamic communication envir... more Mobile ad hoc computational Grids are characterized by unreliable and dynamic communication environment. The bandwidth at different network portions varies over the time and different nodes often experience different connection quality at the same time due to traffic load and constrained communication environment. Therefore, an effective and robust resource allocation scheme should consider connection quality between nodes in addition to other factors such as transmission power, processing speed and task size. In this paper, two resource allocation schemes are described with their pros and cons. The first resource scheme exploits transmission power control mechanism in order to improve energy efficiency and network capacity whereas the second resource allocation scheme takes into account the connection quality and traffic load in order to reduce data transfer time. The relationship between data transfer time and transmission energy consumption has also been investigated in detail. The schemes are validated in a simulated environment using various workloads and parameters.
2009 International Conference on Future Computer and Communication, 2009
Abstract: We are not far from the time when environments will be smart and intelligent having cap... more Abstract: We are not far from the time when environments will be smart and intelligent having capability to compute and communicate with other environments and artifacts. These environments and everyday objects will be equipped with small, inexpensive, and low power devices ...
2009 International Conference on Future Networks, 2009
Abstract - Speckled computing is an emerging technology in which data will be sensed in a minute,... more Abstract - Speckled computing is an emerging technology in which data will be sensed in a minute, ultimately around one cubic millimeter, semi conductor grain called speck. Wireless network of thousands of specks called SpeckNet and distributed processing of information on ...

IEEE Potentials, 2011
Radio Frequency Identification (RFID) is a technology that automatically identifies the objects i... more Radio Frequency Identification (RFID) is a technology that automatically identifies the objects in its vicinity by incorporating readers, tags and backend servers all together, forming a system that has been proved to be a versatile system having applications in many areas, a lot has been revealed and rest is yet to be explored. As RFID is that new paradigm which is very vulnerable to unauthorized attacks thus strict security measures have to be adopted. Laws have been made whose violation may result in total chaos only. The system using RFID needs proper and efficient scanning. RFID technology is mainly evidently foreseeable due to low cost RFID tags but sometimes cost is paid in the form of compromised privacy. Within less than a decade, quite a number of research papers that happens to deal the security issues RFID technology is facing, have appeared. In this paper we attempt to summarize current research works that has been done in the area of RFID security right from where it started and some of their open issues are also discussed. The paper is finally concluded with some suggestions for future work. Firstly, we outline some of the research work done so far, security risks faced to RFID and then we review some of the major applications of RFID.

Information Technology And Control, 2012
Two key components contribute to task completion time: execution cost and communication cost. The... more Two key components contribute to task completion time: execution cost and communication cost. The communication cost is induced by data transfers between tasks residing on separate nodes. The communication is always expensive and unreliable in mobile ad hoc Grids and therefore plays a critical role in application performance. To reduce communication cost, interdependent tasks are allocated to nodes located close to one another. However, once the tasks have been allocated, nodes can move within a Grid. The movement of nodes within a Grid may result in multi-hop communication between nodes executing dependent tasks. In order to deal with node mobility within a Grid, an effective resource allocation scheme is required, but the design of such a scheme for mobile ad hoc computational Grids is challenging due to the constrained communication environment, node mobility, and infrastructure-less network environment. In this paper, we have developed an adaptive and distance-based resource allocation scheme which takes into account the characteristics of an application and nodes and applies migration heuristics to address the local node mobility problem. The scheme is validated in a simulated environment using various workloads and parameters.

Journal of Parallel and Distributed Computing, 2012
This paper addresses the problem of resource allocation to interdependent tasks in mobile ad hoc ... more This paper addresses the problem of resource allocation to interdependent tasks in mobile ad hoc computational Grids. Dependencies between tasks imply that there can be heavy communication induced by data transfers between tasks executed on separate nodes. The communication in mobile ad hoc Grids is always expensive and unreliable, and therefore plays a critical role in application performance. There are several factors that contribute to communication cost. Unreliable and short-term connectivity can increase communication cost due to frequent failure and activation of links, and ineffective resource allocation can increase communication cost due to multi hop communication between dependent tasks. To reduce communication cost, an effective and robust resource allocation scheme is required. However, the design of such a scheme for mobile ad hoc computational Grids exhibits numerous difficulties due to the constrained communication environment, node mobility, and lack of pre-existing network infrastructure. In this paper, we propose a two-phase resource allocation scheme to reduce communication cost between dependent tasks. The scheme is divided into two phases. The first phase exploits the history of user mobility patterns to select nodes that provide long-term connectivity and the second phase takes into account the task and dependency types, and uses the distance information among the nodes selected in the first phase to reduce communication costs. The scheme is validated in a simulation environment using various workloads and parameters.
Uploads
Papers by Sayed Ahmad Shah