SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES)

Introduction: The BMI and sit and reach test are the most common assessment in health related physical fitness. Major aims were analyzed to explore the comparatively same age and gender BMI and flexibility status and dissimilarity of diverse nation's young adults of 18-23 years gender group of Tsinghua University Beijing China (TUBC) and University of Sindh Pakistan (UOSP) male and female students. In this study we were compared the BMI and flexibility of identical age and masculinity group of two diverse nations china and Pakistan young adults students of bilateral Universities. Method: An experimental method was used to collect the normative data of TUBC and UOSP students. All the procedures were applied by ACSM health related fitness assessment battery, gauging BMI by Quetelet procedure and sit and reach in cm and three trails were administered of 150 male and 150 female of each university students during 2013 spring semester. Result: The mean of male TUBC and UOSP BMI (M=22.63, SD =2.99, lower than UOSP M=23.3, SD= 4.15, t= -1.64, p > 0.05 and female, M =21.22, SD =2.80, lower than UOSP M=22.22, SD= 3.41, t= -2.79, p < 0.05 significance. SRT mean of male TUBC M=9.60+ SD =5.95 UOSP M=9.14+ SD= 8.61, t= 0.54, p <0.05 and female TUBC M=11.05+ SD =5.84, UOSP M=10.87+ SD= 4.32, t= 0.30, p < 0.05. Conclusion: The study magnitudes discovered that the selected age group 10% overweight and 5% obese of UOSP male and female students were higher than TUBC and in flexibility TUBC both gender were better than UOSP. However, the numerical information disclosed TUBC both gender students obesity and flexibility status were recovering than UOSP students. The null hypothesis rejected expressively p<0.05 significantly except male obesity ratio.. Keyword: BMI, flexibility, Fitness, status, assessment, physical activity Sindh Univ. Res. Jour. (Sci. Ser.) Vol.47 (2) 327-330 (2015)

[2]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[3]  M. Madalena Martins Note on irreducible diagonally dominant matrices and the convergence of the AOR iterative method , 1981 .

[4]  Andrew J. Viterbi,et al.  On the capacity of a cellular CDMA system , 1991 .

[5]  F. Stagnari,et al.  Effects of N fertilizers and rates on yield, safety and nutrients in processing spinach genotypes , 2007 .

[6]  Ching Y. Suen,et al.  Thinning Methodologies - A Comprehensive Survey , 1992, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  E. P. Papadopoulou,et al.  Block AOR iterative schemes for large-scale least-squares problems , 1989 .

[8]  Serge Galam The September 11 attack: A percolation of individual passive support , 2002 .

[9]  Parveen Kakkar,et al.  Traffic Pattern based performance comparison of Reactive and Proactive protocols of Mobile Ad-hoc Networks , 2010 .

[10]  Jaydip Sen,et al.  Security and Privacy Issues in Cloud Computing , 2013, ArXiv.

[11]  R. S. Sawhney,et al.  Metrics improvement of MANET using reactive protocols approach , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[12]  A. Kumaravel,et al.  Introducing an Efficient Programming Paradigm for Object-oriented Distributed Systems , 2013 .

[13]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[14]  J. Owen,et al.  Transitional flow between contra-rotating disks , 1994, Journal of Fluid Mechanics.

[16]  John C. Batchelor,et al.  Covert dual-band wearable button antenna , 2006 .

[17]  Liadh Kelly,et al.  The Role Of Places And Spaces In Lifelog Retrieval , 2009 .

[18]  David L. Hicks,et al.  How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks , 2007, ADMA.

[19]  Yongik Yoon,et al.  Intelligent Smart Cloud Computing for Smart Service , 2010, FGIT-GDC/CA.

[20]  A. Morse Application of a Low Reynolds Number k–ε Turbulence Model to High-Speed Rotating Cavity Flows , 1991 .

[21]  Anindo Banerjea,et al.  Network support for multimedia: a discussion of the Tenet approach , 1994 .

[22]  Sewan Choi,et al.  An Improved Current-Fed ZVS Isolated Boost Converter for Fuel Cell Applications , 2010, IEEE Transactions on Power Electronics.

[23]  Roger W. Hill,et al.  Direct numerical simulations of turbulent forced convection between counter-rotating disks , 1999 .

[24]  Superposed flow between two discs contrarotating at differential speeds , 1994 .

[25]  T. Vincenty DIRECT AND INVERSE SOLUTIONS OF GEODESICS ON THE ELLIPSOID WITH APPLICATION OF NESTED EQUATIONS , 1975 .

[26]  Shao-Yi Chien,et al.  Algorithm and Architecture Design of Perception Engine for Video Coding Applications , 2011, IEEE Transactions on Multimedia.

[27]  Hyun-il Lim,et al.  Detecting code theft via a static instruction trace birthmark for Java methods , 2008, 2008 6th IEEE International Conference on Industrial Informatics.

[28]  Shahram Izadi,et al.  SenseCam: A Retrospective Memory Aid , 2006, UbiComp.

[29]  Ruowei Zhou,et al.  A novel single-pass thinning algorithm and an effective set of performance criteria , 1995, Pattern Recognit. Lett..

[30]  Yang Xiang,et al.  Software Similarity and Classification , 2012, SpringerBriefs in Computer Science.

[31]  Tony Wong,et al.  Optimum sectorization for CDMA 1900 base stations , 1997, 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion.

[32]  Syed Irfan Hyder,et al.  Efficiency and Performance Analysis of On-demand Routing Protocols in Autonomous System , 2011 .

[33]  T. Mishima,et al.  Boost-Half Bridge Single Power Stage PWM DC-DC Converter for Small Scale Fuel Cell Stack , 2006, 2006 IEEE International Power and Energy Conference.

[34]  Yongzhong Song,et al.  Modified AOR methods for linear complementarity problem , 2003, Appl. Math. Comput..

[35]  Philippe Poignet,et al.  Dermarob: A safe robot for reconstructive surgery , 2003, IEEE Trans. Robotics Autom..

[36]  A. Sari,et al.  Biosorption of As(III) and As(V) from aqueous solution by macrofungus (Inonotus hispidus) biomass: equilibrium and kinetic studies. , 2009, Journal of hazardous materials.

[37]  M. Madalena Martins,et al.  On an accelerated overrelaxation iterative method for linear systems with strictly diagonally dominant matrix , 1980 .

[38]  Yunhao Liu,et al.  ANDMARC: Indoor Location Sensing Using Active RFID , 2003, PerCom.

[39]  Hyun-il Lim,et al.  Detecting Java Theft Based on Static API Trace Birthmark , 2008, IWSEC.

[40]  Ayyoub Akbari-Moghanjoughi,et al.  A Review and Performance Analysis of Reactive and Proactive Routing Protocols on MANET , 2012, Netw. Commun. Technol..

[41]  Apostolos Hadjidimos,et al.  Accelerated overrelaxation method , 1978 .

[42]  Zhang Yi,et al.  A class of binary images thinning using two PCNNs , 2007, Neurocomputing.

[43]  P. Zetterberg Performance of three, six, nine and twelve sector sites in CDMA - based on measurements , 2004, Eighth IEEE International Symposium on Spread Spectrum Techniques and Applications - Programme and Book of Abstracts (IEEE Cat. No.04TH8738).

[44]  P.D. Ziogas,et al.  Analysis and design of a three-phase offline DC-DC converter with high frequency isolation , 1988, Conference Record of the 1988 IEEE Industry Applications Society Annual Meeting.

[45]  Young-June Choi,et al.  Interference-based capacity analysis in CDMA cellular systems , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[46]  E. Niemela,et al.  Feature modelling of component-based embedded software , 1997, Proceedings Eighth IEEE International Workshop on Software Technology and Engineering Practice incorporating Computer Aided Software Engineering.

[47]  Huang-Cheng Kuo,et al.  An efficient incremental mining algorithm-QSD , 2007, Intell. Data Anal..

[48]  Peter J. Brown,et al.  Context-aware applications: from the laboratory to the marketplace , 1997, IEEE Wirel. Commun..

[49]  Sa'adah Hassan,et al.  Feasibility Study of Aspect Mining at Requirement Level , 2014 .

[50]  Yu Sun,et al.  Video transcoding: an overview of various techniques and research issues , 2005, IEEE Transactions on Multimedia.

[51]  S. Riter,et al.  Automatic vehicle location—An overview , 1977, IEEE Transactions on Vehicular Technology.

[52]  P. Salonen,et al.  A novel fabric WLAN antenna for wearable applications , 2003, IEEE Antennas and Propagation Society International Symposium. Digest. Held in conjunction with: USNC/CNC/URSI North American Radio Sci. Meeting (Cat. No.03CH37450).

[53]  Abdel-Ouahab Boudraa,et al.  Speech Enhancement via EMD , 2008, EURASIP J. Adv. Signal Process..

[54]  Norihiro Hagita,et al.  Collaborative capturing, interpreting, and sharing of experiences , 2006, Personal and Ubiquitous Computing.

[55]  N. Chaubey,et al.  Performance evaluation of DSR, OLSR and ZRP protocols in MANETs , 2012, 2012 International Conference on Computer Communication and Informatics.

[56]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[57]  Senglee Foo,et al.  On higher-order-sectorization cellular arrays , 2014, 2014 IEEE Antennas and Propagation Society International Symposium (APSURSI).

[58]  Peter A. Rogerson,et al.  Cellular network configuration with co-channel and adjacent-channel interference constraints , 2008, Comput. Oper. Res..

[59]  M. Sajid,et al.  Impact of nitrogen and phosphorus on seed yield and yield components of okra cultivars. , 2012 .

[60]  Bradford W. Parkinson,et al.  Global Positioning System (GPS) , 2003 .

[61]  Sewan Choi,et al.  Multiphase DC–DC Converters Using a Boost-Half-Bridge Cell for High-Voltage and High-Power Applications , 2011, IEEE Transactions on Power Electronics.

[62]  B. P. Lathi,et al.  Modern Digital and Analog Communication Systems , 1983 .

[63]  Bhat.M Subramanya,et al.  A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator , 2011 .

[64]  David Hilley,et al.  Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings , 2009 .

[65]  Dan Cosley,et al.  Pensieve: supporting everyday reminiscence , 2010, CHI.

[66]  Somchai Jitapunkul,et al.  Automatic face color segmentation based rate control for low bit-rate video coding , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[67]  Pascal Frossard,et al.  Joint source/FEC rate selection for quality-optimal MPEG-2 video delivery , 2001, IEEE Trans. Image Process..

[68]  Constantine A. Balanis,et al.  Antenna Theory: Analysis and Design , 1982 .

[69]  Hadjer Ykhlef,et al.  A smoothed Minimum Mean-Square Error Log-Spectral Amplitude estimator for speech enhancement , 2014, 2014 International Conference on Multimedia Computing and Systems (ICMCS).

[70]  Sewan Choi,et al.  A Three-Phase Zero-Voltage and Zero-Current Switching DC–DC Converter for Fuel Cell Applications , 2010, IEEE Transactions on Power Electronics.

[71]  I. P. Castro,et al.  Studies in numerical computations of recirculating flows , 1987 .

[72]  Marios S. Pattichis,et al.  Wireless telemedicine systems: an overview , 2002 .

[73]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[74]  Tanzeem Choudhury,et al.  The Sociometer: A Wearable Device for Understanding Human Networks , 2002 .

[75]  K. Ball,et al.  Chebyshev Collocation Analysis of Axisymmetric Flow and Heat Transfer Between Counter-Rotating Disks , 1997 .

[76]  Z. Firoz Impact of nitrogen and phosphorus on the growth and yield of okra [ Abelmoschus esculentus (L.) Moench] in hill slope condition , 2010 .

[77]  Mohamed Tayeb Laskri,et al.  Modularization of Crosscutting Concerns in Requirements Engineering , 2008, Int. Arab J. Inf. Technol..

[78]  Catherine E. Lewis,et al.  Tactile Feedback Induces Reduced Grasping Force in Robot-Assisted Surgery , 2009, IEEE Transactions on Haptics.

[79]  Basel Kikhia,et al.  Reminiscence processes using life-log entities for persons with mild dementia , 2009 .

[80]  Ronald H. Perrott,et al.  An improved parallel thinning algorithm , 1987, CACM.

[81]  Sencun Zhu,et al.  Behavior based software theft detection , 2009, CCS.

[82]  J. M. Owen,et al.  Heat Transfer From Air-Cooled Contrarotating Disks , 1997 .

[83]  A novel polarization rotating frequency selective surface based on substrate integrated waveguide technology , 2009, 2009 European Microwave Conference (EuMC).

[84]  S. H. Hasan,et al.  Biosorption of arsenic from aqueous solution using agricultural residue 'rice polish'. , 2009, Journal of hazardous materials.

[85]  Yukio Ohsawa,et al.  Analyzing covert social network foundation behind terrorism disaster , 2007, ArXiv.

[86]  P. Kuppusamy,et al.  A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[87]  R. Leigh,et al.  Effect of potassium fertilizer on the yield, quality and potassium offtake of sugar beet crops grown on soils of different potassium status , 2000, The Journal of Agricultural Science.

[88]  Jeng-Shin Sheu,et al.  Cell sectorization and power management for inter-cell interference coordination in OFDMA-based network MIMO systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[89]  Harvey Cohn,et al.  Introduction to the construction of class fields , 1985 .

[90]  William E. Lorensen,et al.  Object-Oriented Modeling and Design , 1991, TOOLS.

[91]  Remi Manceau,et al.  Recent progress in the development of the Elliptic Blending Reynolds-stress model , 2015 .

[92]  John Abraham,et al.  Distributed Semantic Web Data Management in HBase and MySQL Cluster , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[93]  Véronique Vèque,et al.  A Medium Access Delay MAC aware metric for Multihop Wireless Networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[94]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[95]  Daniele Trinchero,et al.  Concealable, low-cost paper-printed antennas for WISP-based RFIDs , 2011, 2011 IEEE International Conference on RFID.

[96]  Trang Dinh Dang,et al.  Fractal analysis and modeling of VoIP traffic , 2004, 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,.

[97]  Meenakshi Sharma,et al.  Network traffic based assessment of reactive, proactive and hybrid MANET protocols , 2014 .

[98]  A Rossi,et al.  A telerobotic haptic system for minimally invasive stereotactic neurosurgery , 2005, The international journal of medical robotics + computer assisted surgery : MRCAS.

[99]  A. Abdel-Mawgoud,et al.  Effect of Plant Density and Nitrogen Application on the Growth, Yield and Quality of Radish (Raphanus sativus L.) , 2005 .

[100]  Zakir Ali,et al.  Performance analysis of first iteration koch curve fractal log periodic antenna of varying flare angles , 2012 .

[101]  Kangchan Lee Security Threats in Cloud Computing Environments 1 , 2012 .

[102]  Kai-Uwe Schmidt,et al.  Bounds on the PMEPR of Translates of Binary Codes , 2010, IEEE Communications Letters.

[103]  Rodney A. Brooks,et al.  Symbolic Reasoning Among 3-D Models and 2-D Images , 1981, Artif. Intell..

[104]  Muhsin Kilic,et al.  Flow Between Contrarotating Disks , 1995 .

[105]  Edmund Lai,et al.  Practical digital signal processing for engineers and technicians , 2004 .

[106]  Jyrki Hoisko Context triggered visual episodic memory prosthesis , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.

[107]  S. MacGregor,et al.  Experimental study of the flow in the cavity between rotating disks , 1993 .

[108]  F. Montemurro,et al.  Effect of nitrogen fertilisation reduction on yield, quality and N utilisation of processing spinach , 2008 .

[109]  P. Struik,et al.  Effects of nitrogen on accumulation and partitioning of dry matter and nitrogen of vegetables. 3. Spinach , 1995 .

[110]  John Daly,et al.  Increasing throughput in cellular networks with higher-order sectorization , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[111]  A. Rezaee,et al.  Removal of Arsenic Using Acetobacter xylinum Cellulose , 2008 .

[112]  Damith Chinthana Ranasinghe,et al.  Framework for preventing falls in acute hospitals using passive sensor enabled radio frequency identification technology , 2012, 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[113]  S. Barak,et al.  Mild salinity stimulates a stress-induced morphogenic response in Arabidopsis thaliana roots , 2009, Journal of experimental botany.

[114]  Matthew L. Lee,et al.  Using lifelogging to support recollection for people with episodic memory impairment and their caregivers , 2008, HealthNet '08.

[115]  James Bret Michael,et al.  Cloud to cloud interoperability , 2011, 2011 6th International Conference on System of Systems Engineering.

[116]  I. Barbi,et al.  A three-phase ZVS PWM DC/DC converter with asymmetrical duty cycle associated with a three-phase version of the hybridge rectifier , 2005, IEEE Transactions on Power Electronics.

[117]  William R. Raun,et al.  Improving Nitrogen Use Efficiency for Cereal Production , 1999 .

[118]  Allison M. Okamura,et al.  Friction Compensation for Enhancing Transparency of a Teleoperator With Compliant Transmission , 2007, IEEE Transactions on Robotics.

[119]  Venkata Sravan Kumar Maddineni,et al.  Security Techniques for protecting data in Cloud Computing , 2012 .

[120]  Weiping Li,et al.  Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..

[121]  David L. Donoho,et al.  De-noising by soft-thresholding , 1995, IEEE Trans. Inf. Theory.

[122]  Kwan-Hee Yoo,et al.  A Content Oriented Smart Education System based on Cloud Computing , 2013, MUE 2013.

[123]  Jack H. Winters,et al.  Smart antennas for wireless systems , 1998, IEEE Wirel. Commun..

[124]  P. Enjeti,et al.  A Three-Phase Current-Fed DC/DC Converter With Active Clamp for Low-DC Renewable Energy Sources , 2008, IEEE Transactions on Power Electronics.

[125]  Toyotaro Suzumura,et al.  Elastic Stream Computing with Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[126]  Panagiotis Kanellis,et al.  Digital Crime And Forensic Science in Cyberspace (N/A) , 2006 .

[127]  Yangfeng Wu Overweight and obesity in China , 2006, BMJ : British Medical Journal.

[128]  Myoungjin Kim,et al.  Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSE , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[129]  Md. Tanvir Hasan,et al.  Performance evaluation of various vocoders in mobile ad hoc network (MANET) , 2010, International Conference on Electrical & Computer Engineering (ICECE 2010).

[130]  Jon Crowcroft,et al.  A case for dynamic sender-based reservations in the Internet , 1998, J. High Speed Networks.

[131]  C. Pfeiffer,et al.  Millimeter-Wave Transmitarrays for Wavefront and Polarization Control , 2013, IEEE Transactions on Microwave Theory and Techniques.

[132]  Hajo Hippner,et al.  Text Mining , 2006, Informatik-Spektrum.

[133]  Z. Czaplicki,et al.  Selecting method and test conditions for accurate determination of yarn twist , 2000 .

[134]  Y. Saridakis,et al.  On exact convergence of the accelerated overrelaxation method when applied to consistently ordered systems , 1990 .

[135]  P. A. Funk,et al.  Summary of cyclone research at two USDA-ARS ginning laboratories. , 2000 .

[136]  K.P. Esselle,et al.  A novel absorb/transmit FSS for secure indoor wireless networks with reduced multipath fading , 2006, IEEE Microwave and Wireless Components Letters.

[137]  Mohamed Ould-Khaoua,et al.  Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar Traffic , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[138]  Ben A. Munk,et al.  Frequency Selective Surfaces: Theory and Design , 2000 .

[139]  Christian S. Collberg,et al.  Software theft detection through program identification , 2006 .

[140]  M. A. Malana,et al.  Groundwater pollution with special focus on arsenic, Dera Ghazi Khan-Pakistan , 2011 .

[141]  Hyun-il Lim,et al.  Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software Thefts , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.

[142]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[143]  J. Gillis,et al.  Matrix Iterative Analysis , 1961 .

[144]  Mikhail Belkin,et al.  Automatic Annotation of Daily Activity from Smartphone-Based Multisensory Streams , 2012, MobiCASE.

[145]  Anindya Sengupta,et al.  Crime Analyses Using R , 2014 .

[146]  R H Taylor,et al.  System for robotically assisted percutaneous procedures with computed tomography guidance. , 2001, Computer aided surgery : official journal of the International Society for Computer Aided Surgery.

[147]  Pritam Singh,et al.  Arsenic removal from contaminated water by natural iron ores , 2004 .

[148]  T. Nakajima,et al.  Adsorption and removal of arsenic(V) from drinking water by aluminum-loaded Shirasu-zeolite. , 2002, Journal of hazardous materials.

[149]  D.Vijayakumar V. Saravanan Performance Of Reactive And Proactive MANET Routing Protocols With Trajectories , 2012 .

[150]  S. Boll,et al.  Suppression of acoustic noise in speech using spectral subtraction , 1979 .

[151]  V. J. Garg,et al.  Application of adaptive array antenna to a TDMA cellular/PCS system , 1997 .

[152]  Ch. V. Rama Rao,et al.  Speech enhancement using perceptual Wiener filter combined with unvoiced speech — A new Scheme , 2011 .

[153]  David G. Lowe,et al.  Three-Dimensional Object Recognition from Single Two-Dimensional Images , 1987, Artif. Intell..

[154]  R. M. C. So,et al.  On near-wall turbulent flow modelling , 1990, Journal of Fluid Mechanics.

[155]  Beresford N. Parlett,et al.  On generalized successive overrelaxation methods for augmented linear systems , 2005, Numerische Mathematik.

[156]  R. Neil Braithwaite Using Walsh code selection to reduce the power variance of band-limited forward-link CDMA waveforms , 2000, IEEE Journal on Selected Areas in Communications.

[157]  Ivo Barbi,et al.  A three-phase ZVS PWM DC/DC converter with asymmetrical duty cycle for high power applications , 2005 .

[158]  Cong Jin,et al.  Software Defect Prediction Scheme Based on Feature Selection , 2012, 2012 Fourth International Symposium on Information Science and Engineering.

[159]  Herbert Hamers,et al.  On Heterogeneous Covert Networks , 2008 .

[160]  G. Wickens,et al.  Agricultural Innovation in the Early Islamic World , 1986 .

[161]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[162]  Chao Mei,et al.  CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy , 2011, 2011 Proceedings IEEE INFOCOM.

[163]  Anita M. McGahan,et al.  Jacob N. Shapiro: The Terrorist’s Dilemma: Managing Violent Covert Organizations , 2015 .

[164]  Kyo Chul Kang,et al.  Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .

[165]  Derek McAuley,et al.  The desk area network , 1991, OPSR.

[166]  S. Patankar Numerical Heat Transfer and Fluid Flow , 2018, Lecture Notes in Mechanical Engineering.

[167]  Chung-Yuen Won,et al.  A novel power conversion circuit for cost-effective battery-fuel cell hybrid systems , 2005 .

[168]  Xiaobao Chen,et al.  RSSP: RSVP Session Set-Up Protocol for RSVP-Incapable Multimedia Applications , 1999, Broadband Communications.

[169]  Damith Chinthana Ranasinghe,et al.  Towards falls prevention: A wearable wireless and battery-less sensing and automatic identification tag for real time monitoring of human movements , 2012, 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[170]  Sam Manthorpe,et al.  Buffering and Packet Loss in the DQDB to ATM Interworking Unit , 1993, Integrated Broadband Communications.

[171]  Sanjay Ghemawat,et al.  MapReduce: simplified data processing on large clusters , 2008, CACM.

[172]  Kimmo Roimela,et al.  Experience Explorer: A Life-Logging Platform Based on Mobile Context Collection , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.

[173]  Uwe Glässer,et al.  Modeling Criminal Activity in Urban Landscapes , 2009 .

[174]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[175]  M. Lalli,et al.  COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MANETS , 2014 .

[176]  Roger S. Pressman,et al.  Software Engineering: A Practitioner's Approach (McGraw-Hill Series in Computer Science) , 2004 .

[177]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[178]  Kai-Uwe Schmidt,et al.  On the peak-to-mean envelope power ratio of phase-shifted binary codes , 2006, IEEE Transactions on Communications.

[179]  G. Jiang,et al.  Remediation of organic and inorganic arsenic contaminated groundwater using a nanocrystalline TiO2-based adsorbent. , 2009, Environmental pollution.

[180]  Clive Best,et al.  Open Source Intelligence , 2007, NATO ASI Mining Massive Data Sets for Security.

[181]  Dongwook Lim,et al.  Performance evaluation of DSDV and AODV routing protocols in Mobile Ad-hoc Networks , 2010, 4th International Conference on New Trends in Information Science and Service Science.

[182]  Ching Y. Suen,et al.  A fast parallel algorithm for thinning digital patterns , 1984, CACM.

[183]  D. Spalding,et al.  A calculation procedure for heat, mass and momentum transfer in three-dimensional parabolic flows , 1972 .

[185]  Takayoshi Nakai,et al.  Noise reduction using modified phase spectra and Wiener Filter , 2011, 2011 IEEE International Workshop on Machine Learning for Signal Processing.

[186]  M. Stuchly,et al.  Frequency selective surface as a polarisation transformer , 2002 .

[187]  Mehdi Dehghan,et al.  Solution of the fully fuzzy linear systems using iterative techniques , 2007 .

[188]  G. K. Chan Effects of sectorization on the spectrum efficiency of cellular radio systems , 1992 .

[189]  Kenneth S. Williams,et al.  Introductory Algebraic Number Theory , 2003 .

[190]  Odysseas Papapetrou,et al.  Aspect Oriented Programming for a component-based real life application: a case study , 2004, SAC '04.

[191]  Computation of Flow Between Two Disks Rotating at Different Speeds , 2003 .

[192]  Mehran Sahami,et al.  Text Mining: Classification, Clustering, and Applications , 2009 .

[193]  Xiaoyue Zhang,et al.  Portable, non-invasive fall risk assessment in end stage renal disease patients on hemodialysis , 2010, Wireless Health.

[194]  Fenlin Liu,et al.  A Method Based on Feature Matching to Identify Steganography Software , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[195]  James B. Y. Tsui,et al.  Fundamentals of global positioning system receivers , 2000 .

[196]  Xin Zhang,et al.  Comparison of birefringent metamaterials and meanderline structure as quarter-wave plates at terahertz frequencies , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[197]  Mehdi Dehghan,et al.  Iterative solution of fuzzy linear systems , 2006, Appl. Math. Comput..

[198]  G. Troster,et al.  Design and Characterization of Purely Textile Patch Antennas , 2006, IEEE Transactions on Advanced Packaging.

[199]  S. Mafakheri,et al.  Response of spinach (Spinacia oleracea) yield and nutrient uptake to urea and manure , 2012 .

[200]  Tzu-Chuan Chou,et al.  Life is sharable: blogging life experience with RFID embedded mobile phones , 2005, Mobile HCI.

[201]  Yasir Arfat Malkani,et al.  Location aware device discovery for physically constrained environments , 2009, 2009 2nd International Conference on Computer, Control and Communication.

[202]  Ashutosh Sabharwal,et al.  Sector beam synthesis for cellular systems using phased antenna arrays , 2000, IEEE Trans. Veh. Technol..

[203]  Katsutoshi Inoue,et al.  Adsorptive removal of As(V) and As(III) from water by a Zr(IV)-loaded orange waste gel. , 2008, Journal of hazardous materials.

[204]  T. Kazi,et al.  Evaluation of arsenic and other physico-chemical parameters of surface and ground water of Jamshoro, Pakistan. , 2009, Journal of hazardous materials.

[205]  I. Barbi,et al.  A Three-Phase Current-Fed Push–Pull DC–DC Converter , 2009, IEEE Transactions on Power Electronics.

[206]  Sewan Choi,et al.  A Three-Phase Current-Fed Push–Pull DC–DC Converter With Active Clamp for Fuel Cell Applications , 2011, IEEE Transactions on Power Electronics.

[207]  Kin K. Leung,et al.  A high-capacity wireless network by quad-sector cell and interleaved channel assignment , 2000, IEEE Journal on Selected Areas in Communications.

[208]  N. Fageria,et al.  The Role of Mineral Nutrition on Root Growth of Crop Plants , 2011 .

[209]  M. Sajid,et al.  How nitrogen and phosphorus influence the phenology of okra , 2013 .

[210]  Qiang Huang,et al.  Maxillofacial surgical robotic manipulator controlled by haptic device with force feedback , 2013, 2013 ICME International Conference on Complex Medical Engineering.

[211]  Santosh Kumar,et al.  Simulation of Co-channel Interference Ratio (CCIR) for Directional Antenna in Mobile Computing , 2012 .

[212]  Xingming Sun,et al.  Dynamic K-Gram Based Software Birthmark , 2008 .

[213]  Calvin B. Parnell,et al.  Performance Characteristics of Cyclones in Cotton-Gin Dust Removal , 2002 .

[214]  A. Jackson,et al.  The Relationship of the Sit and Reach Test to Criterion Measures of Hamstring and Back Flexibility in Young Females. , 1986 .

[215]  Rudinei Goularte,et al.  A Model to Estimate Transcoding Costs Applied in Live-Video Transmissions , 2007 .

[216]  Xingguang Duan,et al.  Design and Implementation of Probe Driver Teleoperative Force Feedback System , 2014 .

[217]  Abdullah Zawawi Talib,et al.  MULTILINGUAL TEXT IMAGE DATABASE FOR OCR , 2016 .

[218]  R. S. Meena,et al.  Design of a Novel Compact Dualband Patch Antenna with Microstrip-Fed for Wireless Communication Bands , 2014 .

[219]  V. Fineberg,et al.  A practical architecture for implementing end-to-end QoS in an IP network , 2002, IEEE Commun. Mag..

[220]  Hari Kalva,et al.  Cloud transcoding for mobile video content delivery , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[221]  J.-S. Lai,et al.  A high-performance V6 converter for fuel cell power conditioning system , 2005, 2005 IEEE Vehicle Power and Propulsion Conference.

[222]  Jiro Tanaka,et al.  Restrain from pervasive logging employing geo-temporal policies , 2012, APCHI '12.

[223]  Cheng Sun,et al.  Removal of Cr(VI) from aqueous solutions by low-cost biosorbents: marine macroalgae and agricultural by-products. , 2008, Journal of hazardous materials.

[224]  Louis A. Hageman,et al.  Iterative Solution of Large Linear Systems. , 1971 .

[225]  Apostolos Hadjidimos,et al.  Some theoretical and computational results concerning the Accelerated Overrelaxation (AOR) method , 1980 .

[226]  Elias Stipidis,et al.  Investigation for a global AVL system , 2001, IEEE Trans. Intell. Transp. Syst..

[227]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[228]  Generalized consistent orderings and the Accelerated Overrelaxation method , 1986 .

[229]  Borko Furht,et al.  A study of transcoding on cloud environments for video content delivery , 2010, MCMC '10.

[230]  S. Čerňanský,et al.  Removal of arsenic (V) from aqueous solutions using chemically modified sawdust of spruce (Picea abies): Kinetics and isotherm studies , 2009 .

[231]  Jothy Rosenberg,et al.  The Cloud at Your Service , 2010 .

[232]  Simson L. Garfinkel,et al.  An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .

[233]  Jiang Zhu,et al.  Mobile Lifelogger - Recording, Indexing, and Understanding a Mobile User's Life , 2010, MobiCASE.

[234]  Christian Hidber,et al.  Association Rule Mining , 2017 .

[235]  Muhammad Fraz,et al.  Design and implementation of real time vehicle tracking system , 2009, 2009 2nd International Conference on Computer, Control and Communication.

[236]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[237]  D. J. Evans,et al.  On the Convergence of Some Generalized Preconditioned Iterative Methods , 1981 .

[238]  Wang Jian,et al.  Speech signal enhancement through wavelet domain MMSE filtering , 2010, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering.

[239]  P. Albrecht,et al.  Extrapolated Iterative Methods for Linear Systems Approximation , 1984 .

[240]  C. Soong,et al.  Flow structure between two co-axial disks rotating independently , 2003 .

[241]  Sang-Kyoo Han,et al.  Voltage Doubler Rectified Boost-Integrated Half Bridge (VDRBHB) Converter for Digital Car Audio Amplifiers , 2007, IEEE Transactions on Power Electronics.

[242]  Ying Zeng,et al.  Abstract interpretation-based semantic framework for software birthmark , 2012, Comput. Secur..

[243]  J. P. V. Doormaal,et al.  ENHANCEMENTS OF THE SIMPLE METHOD FOR PREDICTING INCOMPRESSIBLE FLUID FLOWS , 1984 .

[244]  Christian S. Collberg,et al.  Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.

[245]  Thomas Chapman,et al.  Alternative concepts of antenna deployment and cell layout in mobile communications , 2012, 2012 IEEE International Conference on Communications (ICC).

[246]  Ashish Shrestha,et al.  On MANET Routing Protocols for Mobility and Scalability , 2009, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[247]  W. Niethammer On Different Splittings and the Associated Iteration Methods , 1979 .

[248]  Olivia Sanchez-Graillet,et al.  Identifying the impact of G-Quadruplexes on Affymetrix 3' Arrays using Cloud Computing , 2010, J. Integr. Bioinform..

[249]  F. Harlow,et al.  Numerical Calculation of Time‐Dependent Viscous Incompressible Flow of Fluid with Free Surface , 1965 .

[250]  Hiroyuki Seki,et al.  Capacity enhancement in quad-sector cell architecture with interleaved channel and polarization assignments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[251]  Sharma Shelja,et al.  Performance improvement of OLSR protocol by modifying the Routing Table construction mechanism , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).

[252]  Abigail Sellen,et al.  Now let me see where i was: understanding how lifelogs mediate memory , 2010, CHI.

[253]  John Zic,et al.  Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.

[254]  Imran Raza,et al.  Mobile Ad-hoc Network Routing Protocols: A Simulation and Performance Analysis Using Multimedia Traffic , 2012 .

[255]  David Malah,et al.  Speech enhancement using a minimum mean-square error log-spectral amplitude estimator , 1984, IEEE Trans. Acoust. Speech Signal Process..

[256]  H. Cha,et al.  A new three-phase interleaved isolated boost converter with active clamp for fuel cells , 2008, 2008 IEEE Power Electronics Specialists Conference.

[257]  Robert David Steele Open source intelligence , 2006 .

[258]  P. O. Asagba,et al.  A Comparative Analysis of Structured and Object-Oriented Programming Methods , 2010 .

[259]  Arie van Deursen,et al.  Crosscutting concerns in J2EE applications , 2005, Seventh IEEE International Symposium on Web Site Evolution.

[260]  Jianhong Zeng,et al.  A novel DC/DC ZVS converter for battery input application , 2002, APEC. Seventeenth Annual IEEE Applied Power Electronics Conference and Exposition (Cat. No.02CH37335).

[261]  D. Cosley,et al.  Using technologies to support reminiscence , 2009 .

[262]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[263]  N. Fageria,et al.  Enhancing Nitrogen Use Efficiency in Crop Plants , 2005 .

[264]  Alexander Papaspyrou,et al.  Open Cloud Computing Interface in Data Management-Related Setups , 2011, Grid and Cloud Database Management.

[265]  C. Parnell,et al.  Design of pre-separators for cyclone collectors , 1993 .

[266]  Huaming Guo,et al.  Adsorption of arsenic species from water using activated siderite-hematite column filters. , 2008, Journal of hazardous materials.

[267]  Nasrullah Memon,et al.  Semantic Analysis of FBI News Reports , 2012, ICONIP.

[268]  I. Barbi,et al.  A three-phase step-up DC-DC converter with a three-phase high frequency transformer , 2005, ISIE 2005.

[269]  Mona Sharma,et al.  Advancement in GSM and Wi-Fi technology Using Smart Antenna , 2014 .

[270]  S. Gupta,et al.  Performance Evaluation of Mobility Models on MANET Routing Protocols , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[271]  J. Jakicic,et al.  Fitness, Fatness, and Cardiovascular Disease Risk and Outcomes , 2011 .

[272]  Ali Hassan Sodhro,et al.  Integration of Inter-Connectivity of Information System (i3) using Web Services , 2014, ArXiv.

[273]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[274]  J. Lempiainen,et al.  Impact of the base station antenna beamwidth on capacity in WCDMA cellular networks , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[275]  A. Sherin OBESITY: HOW TO PREVENT PAKISTANI PEOPLE FROM GETTING HEAVIER? , 2013 .

[276]  C. Niu,et al.  Biosorption of arsenic (V) with acid-washed crab shells. , 2007, Water research.

[277]  A. Jagna NEW PARALLEL BINARY IMAGE THINNING ALGORITHM , 2010 .

[278]  Leon Moonen,et al.  An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW , 2007, Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007).

[279]  Su Yang Research on recovering early aspects in aspect-oriented software reserve engineering , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[280]  W. C. Y. Lee,et al.  Overview of cellular CDMA , 1991 .

[281]  Akito Monden,et al.  Design and evaluation of birthmarks for detecting theft of java programs , 2004, IASTED Conf. on Software Engineering.

[282]  Ig-Jae Kim,et al.  Automatic Lifelog media annotation based on heterogeneous sensor fusion , 2008, 2008 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems.

[283]  Ch. V. Rama Rao,et al.  A novel two stage single channel speech enhancement technique , 2011, 2011 Annual IEEE India Conference.

[284]  Michael W. Berry,et al.  Text mining : applications and theory , 2010 .

[285]  K. Wallstedt,et al.  High capacity with limited spectrum in cellular systems , 1997 .

[286]  H. Sherman,et al.  A quasi-topological method for the recognition of line patterns , 1959, IFIP Congress.

[287]  Yin Zhang,et al.  Solving a low-rank factorization model for matrix completion by a nonlinear successive over-relaxation algorithm , 2012, Mathematical Programming Computation.

[288]  Paul Holleis,et al.  Studying mobile context-aware social services in the wild , 2010, NordiCHI.

[289]  Rong Zheng,et al.  Crime Data Mining: An Overview and Case Studies , 2003, DG.O.

[290]  Abhishek Swaroop,et al.  A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols , 2011, ArXiv.

[291]  D. Spalding A novel finite difference formulation for differential expressions involving both first and second derivatives , 1972 .

[292]  Han-Joon Kim,et al.  News Keyword Extraction for Topic Tracking , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[293]  H. Watanabe,et al.  A novel high-efficient DC-DC converter with 1V/20A DC output , 2002, 24th Annual International Telecommunications Energy Conference.