Zubair Khan

Learn More
Single-photon emission-computed tomography (SPECT) may potentially contribute to the diagnostic work up of patients with neurodegenerative dementia. This systematic review aims to establish the diagnostic utility of 99mTc-hexamethylpropyleneamine (99mTc-HMPAO) and 99mTc-ethylcysteine dimer SPECT in distinguishing between Alzheimer's disease (AD) and(More)
Over the next ten years, air traffic management in the world will change dramatically, bringing both challenges and opportunities. The biggest of those challenges is the continuing rise in traffic volumes and will increase the movement of airbuses around the airport due to busy runways. This air traffic congestion will increase the running cost of flights(More)
Although intensive work has been done in the area of load balancing, the measure of success of load balancing is the net execution time achieved by applying the load balancing algorithms. This paper deals with the problem of load balancing conditions of parallel and distributed applications. Parallel and distributed computers have multiple-CPU architecture,(More)
CRM is a kind of implemented model for managing a company's interactions with their customers. CRM involves the customer classification to understand the behavior of the customer. There is a vital role of the data mining techniques for the classification. This paper presents the concept of one of the data mining technique ART for the customer classification(More)
Mobile Ad-hoc Network (MANET) has emerged as the self organized wire less interconnection for the various applications in random topology. As most of the multimedia applications require strict QoS guarantee during the communication between a single source and multiple destinations. How ever, achieving reliable multicast transmission in MANET is crucial due(More)
In this paper, we consider variational inequality problem over the product of sets which is equivalent to the problem of system of variational inequalities. These two problems are studied for single valued maps as well as for multivalued maps. New concept of pseudomono-tonicity in the sense of Brézis is introduced to prove the existence of a solution of our(More)
Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional intrusion detection methods based on pattern matching techniques cannot cope with the need for faster speed to manually update those patterns. Anomaly detection(More)
BACKGROUND Amyloid imaging using fluorine 18-labeled tracers florbetapir, florbetaben, and flutemetamol has recently been reported in Alzheimer's disease (AD). METHODS We systematically searched MEDLINE and EMBASE for relevant studies published from January 1980 to March 2014. Studies comparing imaging findings in AD and normal controls (NCs) were pooled(More)
The latest technology that provide broadband access with large coverage area is Worldwide Interoperability for Microwave Access (WiMAX), Since Mobile WiMAX has an important advantage to serve large coverage areas per base station, Mobile WiMAX has become a popular technology for handling mobile users. As we know that for serving a large number of Mobile(More)