Journal of Research & Opinion peer-reviewed open access journal

Adopting Proactive Measures for Academic Activities During Pandemic

Shahzad Ashraf
a:1:{s:5:"en_US";s:17:"Fista University ";}
Share:

How to Cite

1.
Adopting Proactive Measures for Academic Activities During Pandemic. Journal of Research and Opinion [Internet]. 2022 Sep. 19 [cited 2024 Apr. 29];9(7):3141-5. Available from: http://researchopinion.in/index.php/jro/article/view/136
  • Articles
  • Submited: December 28, 2021
  • Published: September 19, 2022

Abstract

During the course of pandemic fistula, the education is facing numerous challenges and this viewpoint suggests a measure by which practitioners and policymakers can cope with various crisis that has affected academic activities in the world and particularly in Pakistan. Moreover, a reflective view of this development is necessary to provoke adaptation and adjustment as a result of this new ecosystem of practice. More so, that reflective practice is an ongoing process that practitioners in every profession should adopt in order to build resilience to overcome challenging circumstances in such practices. Therefore, this view is a pragmatic discourse of; 1. Adaptation to the new realities 2. Pandemic Pedagogy.

References

[1] W. Park, “A Study on Analytical Visualization of Deep Web,” in 2020 22nd International Conference on Advanced Communication Technology (ICACT), Feb. 2020, pp. 81–83. doi: 10.23919/ICACT48636.2020.9061283.
[2] S. Ashraf, D. Muhammad, and Z. Aslam, “Analyzing challenging aspects of IPv6 over IPv4,” J. Ilm. Tek. Elektro Komput. Dan Inform., vol. 6, no. 1, p. 54, Jul. 2020, doi: 10.26555/jiteki.v16i1.17105.
[3] S. Ashraf et al., “Bodacious-Instance Coverage Mechanism for Wireless Sensor Network,” Wirel. Commun. Mob. Comput., vol. 2020, pp. 1–11, Nov. 2020, doi: 10.1155/2020/8833767.
[4] X. Du, Q. Le, and M. Scanlon, “Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events,” in 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Jun. 2020, pp. 1–8. doi: 10.1109/CyberSecurity49315.2020.9138874.
[5] S. Ashraf, S. Saleem, A. H. Chohan, Z. Aslam, and A. Raza, “‎Challenging strategic trends in green supply chain ‎management,” J. Res. Eng. Appl. Sci., vol. 05, no. 02, pp. 71–74, Apr. 2020, doi: 10.46565/jreas.2020.v05i02.006.
[6] S. Saleem, S. Ashraf, and M. K. Basit, “CMBA - A Candid Multi-Purpose Biometric Approach,” ICTACT J. Image Video Process., vol. 11, no. 01, p. 6, 2020, doi: 10.21917/ijivp.2020.0317.
[7] S. Ashraf, S. Saleem, T. Ahmed, Z. Aslam, and D. Muhammad, “Conversion of adverse data corpus to shrewd output using sampling metrics,” Vis. Comput. Ind. Biomed. Art, vol. 3, no. 1, p. 19, Dec. 2020, doi: 10.1186/s42492-020-00055-9.
[8] S. Ashraf, “Culminate Coverage for Sensor Network through Bodacious-Instance Mechanism,” -Manag. J. Wirel. Commun. Netw., vol. 8, no. 3, p. 9, 2019.
[9] S. Ashraf, T. Ahmed, Z. Aslam, D. Muhammad, A. Yahya, and M. Shuaeeb, “Depuration‎ based Efficient Coverage Mechanism for ‎Wireless Sensor Network,” J. Electr. Comput. Eng. Innov. JECEI, vol. 8, no. 2, pp. 145–160, 2020, doi: 10.22061/jecei.2020.6874.344.
[10] Pratibha, A. Gahalot, Uprant, S. Dhiman, and L. Chouhan, “Crime Prediction and Analysis,” in 2nd International Conference on Data, Engineering and Applications (IDEA), Feb. 2020, pp. 1–6. doi: 10.1109/IDEA49133.2020.9170731.
[11] S. Ashraf, T. Ahmed, A. Raza, and H. Naeem, “Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells,” Smart Cities, vol. 3, no. 1, pp. 74–92, Feb. 2020, doi: 10.3390/smartcities3010005.
[12] S. Ashraf, D. Muhammad, M. Shuaeeb, and Z. Aslam, “Development of Shrewd Cosmetology Model Through Fuzzy Logic,” J. Res. Eng. Appl. Sci., vol. 5, no. 3, pp. 93–99, Jul. 2020, doi: 10.46565/jreas.2020.v05i03.003.
[13] S. Ashraf, T. Ahmed, S. Saleem, and Z. Aslam, “Diverging Mysterious in Green Supply Chain Management,” Orient. J. Comput. Sci. Technol., vol. 13, no. 1, pp. 22–28, May 2020, doi: 10.13005/ojcst13.01.02.
[14] A. Shahzad and A. Tauqeer, “Dual-nature biometric recognition epitome,” Trends Comput. Sci. Inf. Technol., vol. 5, no. 1, pp. 008–014, Jun. 2020, doi: 10.17352/tcsit.000012.
[15] S. Ashraf, M. Gao, Z. Chen, S. Kamran, and Z. Raza, “Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, 2017, doi: 10.14569/IJACSA.2017.081152.
[16] S. Ashraf, S. Saleem, and S. Afnan, “FTMCP: Fuzzy based Test Metrics for Cosmetology Paradigm,” Adv. Comput. Intell. Int. J. ACII, vol. 4, no. 7, pp. 1–13, 2020, doi: 10.5121/acii.2020.7401.
[17] S. Ashraf, D. Muhammad, M. A. Khan, and T. Ahmed, “Fuzzy based efficient Cosmetology Paradigm,” vol. 8, pp. 513–520, doi: 10.14741/ijmcr/v.8.4.3.
[18] S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, “Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach,” IEEE Access, vol. 8, pp. 171796–171819, 2020, doi: 10.1109/ACCESS.2020.3024198.
[19] S. Ashraf, S. Saleem, T. Ahmed, Z. Aslam, and M. Shuaeeb, “Iris and Foot based Sustainable Biometric Identification Approach,” in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Hvar, Croatia, Sep. 2020, pp. 1–6. doi: 10.23919/SoftCOM50211.2020.9238333.
[20] S. Ashraf and T. Ahmed, “Machine Learning Shrewd Approach For An Imbalanced Dataset Conversion Samples,” J. Eng. Technol. JET, vol. 11, no. 1, Art. no. 1, Jun. 2020, Accessed: Nov. 27, 2020. [Online]. Available: https://journal.utem.edu.my/index.php/jet/article/view/5896
[21] S. Ashraf, Z. Aslam, S. Saleem, S. Afnan, and M. Aamer, “Multi-biometric Sustainable Approach for Human Appellative,” CRPASE Trans. Electr. Electron. Comput. Eng., vol. 06, no. 3, pp. 146–152, 2020.
[22] S. Ashraf, T. Ahmed, and S. Saleem, “NRSM: node redeployment shrewd mechanism for wireless sensor network,” Iran J. Comput. Sci., Oct. 2020, doi: 10.1007/s42044-020-00075-x.
[23] S. Ashraf, S. Saleem, and T. Ahmed, “Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network,” Int. J. Wirel. Microw. Technol., vol. 10, no. 4, pp. 22–33, Aug. 2020, doi: 10.5815/ijwmt.2020.04.03.
[24] S. Ashraf and T. Ahmed, “Sagacious Intrusion Detection Strategy in Sensor Network,” in 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, United Kingdom, Aug. 2020, pp. 1–4. doi: 10.1109/UCET51115.2020.9205412.
[25] S. Ashraf, Z. A. Arfeen, M. A. Khan, and T. Ahmed, “SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture,” Int. J. Mod. Trends Sci. Technol., vol. 6, no. 5, pp. 162–167, May 2020, doi: 10.46501/IJMTST060525.
[26] A. Shahzad, “Towards Shrewd Object Visualization Mechanism,” Trends Comput. Sci. Inf. Technol., pp. 097–102, Nov. 2020, doi: 10.17352/tcsit.000030.
[27] S. Ashraf, M. Gao, Z. Chen, H. Naeem, A. Ahmad, and T. Ahmed, “Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism,” IEEE Access, vol. 8, pp. 163091–163114, 2020, doi: 10.1109/ACCESS.2020.3022565.
[28] S. Ashraf, A. Raza, Z. Aslam, H. Naeem, and T. Ahmed, “Underwater Resurrection Routing Synergy using Astucious Energy Pods,” J. Robot. Control JRC, vol. 1, no. 5, Art. no. 5, Apr. 2020, doi: 10.18196/jrc.1535.
[29] S. Ashraf et al., “Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies,” Int. J. Sci. Res. Comput. Sci. Eng., vol. 8, no. 2, pp. 1–9, Apr. 2020, doi: 10.26438/ijsrcse/v8i2.19.
[30] S. Ashraf et al., “Underwater routing protocols: Analysis of link selection challenges,” AIMS Electron. Electr. Eng., vol. 4, no. 3, pp. 234–248, 2020, doi: 10.3934/ElectrEng.2020.3.234.
[31] S. Ashraf, M. Gao, Z. Mingchen, T. Ahmed, A. Raza, and H. Naeem, “USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time,” Wirel. Commun. Mob. Comput., vol. 2020, pp. 1–12, Mar. 2020, doi: 10.1155/2020/9625974.
[32] S. Ashraf, “A proactive role of IoT devices in building smart cities,” Internet Things Cyber-Phys. Syst., vol. 1, pp. 8–13, 2021, doi: 10.1016/j.iotcps.2021.08.001.
How to Cite
1.
Adopting Proactive Measures for Academic Activities During Pandemic. Journal of Research and Opinion [Internet]. 2022 Sep. 19 [cited 2024 Apr. 29];9(7):3141-5. Available from: http://researchopinion.in/index.php/jro/article/view/136

Send mail to Author


Send Cancel

Custom technologies based on your needs

Journal of Research and Opinion  invites original research and review articles not published/submitted for publications anywhere. The journal accepts review articles only if author (s) has included his/her own research work and is an authority in the particular field. Invited or submitted review articles on current medical research developments will also be included. Medical practitioners are encouraged to contribute interesting case reports.

 

  • Manuscript template
  • Make a submission
  • Beta visitors

Why publish with us?

Open Access and Free

Full open-access. No processing & publication fees for authors

Refereed

The journal has rigorous peer-reviews

Indexed

The journal is indexed in DOAJ, SINTA and under review by ERIC