http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Kaleem Raza Kazmi,Faizan Ahmad Khan,Naeem Ahmad 대한수학회 2009 대한수학회지 Vol.46 No.6
In this paper, using proximal-point mappings technique of R-accretive mappings and the property of the fixed point set of set-valued contractive mappings, we study the behavior and sensitivity analysis of the solution set of the system of parametric generalized quasi-variational inclusions involving R-accretive mappings in real uniformly smooth Banach space. Further under suitable conditions, we discuss the Lipschitz continuity of the solution set with respect to parameters. The technique and results presented in this paper can be viewed as extension of the techniques and corresponding results given in [3, 23, 24, 32, 33, 34].
TWO STEP ALGORITHM FOR SOLVING REGULARIZED GENERALIZED MIXED VARIATIONAL INEQUALITY PROBLEM
Kaleem Raza Kazmi,Faizan Ahmad Khan,Mohammad Shahza 대한수학회 2010 대한수학회보 Vol.47 No.4
In this paper, we consider a new class of regularized (nonconvex)generalized mixed variational inequality problems in real Hilbert space. We give the concepts of partially relaxed strongly mixed monotone and partially relaxed strongly Θ-pseudomonotone mappings, which are extension of the concepts given by Xia and Ding [19], Noor [13] and Kazmi et al. [9]. Further we use the auxiliary principle technique to suggest a two-step iterative algorithm for solving regularized (nonconvex)generalized mixed variational inequality problem. We prove that the convergence of the iterative algorithm requires only the continuity, partially relaxed strongly mixed monotonicity and partially relaxed strongly Θ-pseudomonotonicity. The theorems presented in this paper represent improvement and generalization of the previously known results for solving equilibrium problems and variational inequality problems involving the nonconvex (convex) sets, see for example Noor [13], Pang et al. [14],and Xia and Ding [19].
Chronic Myeloid Leukemia - Prognostic Value of Mutations
Kaleem, Bushra,Shahab, Sadaf,Ahmed, Nuzhat,Shamsi, Tahir Sultan Asian Pacific Journal of Cancer Prevention 2015 Asian Pacific journal of cancer prevention Vol.16 No.17
Chronic myeloid leukemia (CML) is a stem cell disorder characterized by unrestricted proliferation of the myeloid series that occurs due to the BCR-ABL fusion oncogene as a result of reciprocal translocation t(9;22) (q34;q11). This discovery has made this particular domain a target for future efforts to cure CML. Imatinib revolutionized the treatment options for CML and gave encouraging results both in case of safety as well as tolerability profile as compared to agents such as hydroxyurea or busulfan given before Imatinib. However, about 2-4% of patients show resistance and mutations have been found to be one of the reasons for its development. European Leukemianet gives recommendations for BCR-ABL mutational analysis along with other tyrosine kinase inhibitors (TKIs) that should be administered according to the mutations harbored in a patient. The following overview gives recommendations for monitoring patients on the basis of their mutational status.
Composition and diversity of plants in Sibuti mangrove forest, Sarawak, Malaysia
Kaleem Shah,Abu Hena Mustafa Kamal,Zamri Rosli,Khalid Rehman Hakeem,Mohammed Muzammel Hoque 한국산림과학회 2016 Forest Science And Technology Vol.12 No.2
Sarawak is endowed with numerous pristine and estuarine mangroves. However, information pertaining to the species composition and diversity of pristine mangroves of Sarawak is scanty. Hence, this study was carried out to assess the plant composition and diversity of Sibuti mangrove forest, Miri, Sarawak to investigate the current status and diversity of vegetation. Nine mangrove plant species were recorded employing the line transect (100240 m) survey method. Major mangrove species were Rhizophora apiculata, Xylocarpus granatum, and Nypa fruticans. The stand density was recorded as 1938.46 § 482.24 trees ha ¡1, 1722.22 § 254.58 saplings ha ¡1, and 6222.22 § 384.90 seedlings ha ¡1. The mean diameter, height, and basal area for the whole forest stand were 20.83 § 13.79 cm, 13.53 § 5.55 m, and 201.83 § 12.68 m2 ha ¡1, respectively. The mean diameter of the dominant species R. apiculata was 24.10 § 13.90 cm, height 15.18 § 5.09 m, and basal area 176.13 § 12.73 m2 ha ¡1. The importance value index (IVI) of R. apiculata was 202.24 followed by 63.85 for X. granatum. Shannon diversity indices (H0), Margalef richness (D), and Peilou evenness (J0) of the forest stand were 1.18, 1.41, and 0.54, respectively. Similarity of species composition showed two major clusters for the whole forest stand. The findings of this study suggest that Sibuti mangrove forest stand is undisturbed and healthy. This forest could be managed and conserved for multi-sectoral uses such as ecotourism, biodiversity, research, and education rather than solely as a wildlife sanctuary.
Kaleem, Zeeshan,Li, Yunpeng,Chang, KyungHi IET 2016 IET COMMUNICATIONS Vol.10 No.15
<P>A device-to-device (D2D) discovery scheme is key enabler for proximity-based services in third generation partnership project long-term evolution-advanced systems for public safety (PS) and general LTE scenarios. The deployment of D2D networks results in severe co-channel interference between conventional cellular users and D2D users, and faces proximity interference management challenges because of the co-existence of multiple D2D users. We propose a time and energy-efficient contention-resolving device discovery resource allocation (TEECR-DDRA) scheme that has the capability to enhance the success ratio for discovery of D2D users by reducing collisions among users. Moreover, the proposed TEECR-DDRA scheme has the ability to prioritise PS users to meet their QoS and latency requirements. Furthermore, multi-channel slotted ALOHA with energy sensing can be used to increase the probability of successful discovery of non-PS users. This ability helps to reduce the discovery time of PS users under disaster scenarios, and also reduces the energy consumption of non-PS users by minimising the number of beacon retransmissions. System-level simulations show that the proposed TEECR-DDRA scheme performs remarkably well under D2D network. Compared with the conventional random access scheme, the proposed scheme almost doubles the discovery range and significantly improves the success ratio for discovery of D2D users.</P>
Ensuring Data Confidentiality and Authentication through Encryption at Application Layer
Kaleem Ullah,M.N.A. Khan 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.11
Cloud computing has emerged as a powerful and viable architecture to meet large-scale and complex computational needs of the organizations. It extends the IT capability by providing on-demand access to computer resources for dedicated use. Data security and privacy are the major concerns over the cloud from user perspective. Consequently, the organizations which deal with cloud computing should amicably address the key data security risks. In this paper, a generic scheme of user authentication and data confidentiality has been introduced. We introduce a tool that encrypts/decrypts the user data at application layer using public key infrastructure. The information security experts of both the sides i.e. cloud users and service providers must comprehend and address the risk and security issues in detail before actually benefiting high-end computing power offered by the cloud computing paradigm.
Zeeshan Kaleem,KyungHi Chang 한국통신학회 2012 한국통신학회 학술대회논문집 Vol.2012 No.6
The cloud radio access network (C-RAN) architecture has made possible to use the concept of clusters by combining hundred’ s of base stations by using remote radio heads (RRH), and thus enable us to use the properties of base station cooperative transmission technique, i.e., CoMP. In this paper, we proposed a procedure related to DL/UL CoMP which has fully exploited the cloud architecture and CoMP techniques to mitigate the inter cell interference (ICI), and proposed the method of selecting the proper CoMP technique which not only maximizes the throughput performance for the cell edge users but also keeps in front the throughput of other users in the cooperating set.