Adopting Proactive Measures for Academic Activities During Pandemic
- Articles
- Submited: December 28, 2021
-
Published: September 19, 2022
Abstract
During the course of pandemic fistula, the education is facing numerous challenges and this viewpoint suggests a measure by which practitioners and policymakers can cope with various crisis that has affected academic activities in the world and particularly in Pakistan. Moreover, a reflective view of this development is necessary to provoke adaptation and adjustment as a result of this new ecosystem of practice. More so, that reflective practice is an ongoing process that practitioners in every profession should adopt in order to build resilience to overcome challenging circumstances in such practices. Therefore, this view is a pragmatic discourse of; 1. Adaptation to the new realities 2. Pandemic Pedagogy.
Article Metrics Graph
References
[2] S. Ashraf, D. Muhammad, and Z. Aslam, “Analyzing challenging aspects of IPv6 over IPv4,” J. Ilm. Tek. Elektro Komput. Dan Inform., vol. 6, no. 1, p. 54, Jul. 2020, doi: 10.26555/jiteki.v16i1.17105.
[3] S. Ashraf et al., “Bodacious-Instance Coverage Mechanism for Wireless Sensor Network,” Wirel. Commun. Mob. Comput., vol. 2020, pp. 1–11, Nov. 2020, doi: 10.1155/2020/8833767.
[4] X. Du, Q. Le, and M. Scanlon, “Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events,” in 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Jun. 2020, pp. 1–8. doi: 10.1109/CyberSecurity49315.2020.9138874.
[5] S. Ashraf, S. Saleem, A. H. Chohan, Z. Aslam, and A. Raza, “Challenging strategic trends in green supply chain management,” J. Res. Eng. Appl. Sci., vol. 05, no. 02, pp. 71–74, Apr. 2020, doi: 10.46565/jreas.2020.v05i02.006.
[6] S. Saleem, S. Ashraf, and M. K. Basit, “CMBA - A Candid Multi-Purpose Biometric Approach,” ICTACT J. Image Video Process., vol. 11, no. 01, p. 6, 2020, doi: 10.21917/ijivp.2020.0317.
[7] S. Ashraf, S. Saleem, T. Ahmed, Z. Aslam, and D. Muhammad, “Conversion of adverse data corpus to shrewd output using sampling metrics,” Vis. Comput. Ind. Biomed. Art, vol. 3, no. 1, p. 19, Dec. 2020, doi: 10.1186/s42492-020-00055-9.
[8] S. Ashraf, “Culminate Coverage for Sensor Network through Bodacious-Instance Mechanism,” -Manag. J. Wirel. Commun. Netw., vol. 8, no. 3, p. 9, 2019.
[9] S. Ashraf, T. Ahmed, Z. Aslam, D. Muhammad, A. Yahya, and M. Shuaeeb, “Depuration based Efficient Coverage Mechanism for Wireless Sensor Network,” J. Electr. Comput. Eng. Innov. JECEI, vol. 8, no. 2, pp. 145–160, 2020, doi: 10.22061/jecei.2020.6874.344.
[10] Pratibha, A. Gahalot, Uprant, S. Dhiman, and L. Chouhan, “Crime Prediction and Analysis,” in 2nd International Conference on Data, Engineering and Applications (IDEA), Feb. 2020, pp. 1–6. doi: 10.1109/IDEA49133.2020.9170731.
[11] S. Ashraf, T. Ahmed, A. Raza, and H. Naeem, “Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells,” Smart Cities, vol. 3, no. 1, pp. 74–92, Feb. 2020, doi: 10.3390/smartcities3010005.
[12] S. Ashraf, D. Muhammad, M. Shuaeeb, and Z. Aslam, “Development of Shrewd Cosmetology Model Through Fuzzy Logic,” J. Res. Eng. Appl. Sci., vol. 5, no. 3, pp. 93–99, Jul. 2020, doi: 10.46565/jreas.2020.v05i03.003.
[13] S. Ashraf, T. Ahmed, S. Saleem, and Z. Aslam, “Diverging Mysterious in Green Supply Chain Management,” Orient. J. Comput. Sci. Technol., vol. 13, no. 1, pp. 22–28, May 2020, doi: 10.13005/ojcst13.01.02.
[14] A. Shahzad and A. Tauqeer, “Dual-nature biometric recognition epitome,” Trends Comput. Sci. Inf. Technol., vol. 5, no. 1, pp. 008–014, Jun. 2020, doi: 10.17352/tcsit.000012.
[15] S. Ashraf, M. Gao, Z. Chen, S. Kamran, and Z. Raza, “Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, 2017, doi: 10.14569/IJACSA.2017.081152.
[16] S. Ashraf, S. Saleem, and S. Afnan, “FTMCP: Fuzzy based Test Metrics for Cosmetology Paradigm,” Adv. Comput. Intell. Int. J. ACII, vol. 4, no. 7, pp. 1–13, 2020, doi: 10.5121/acii.2020.7401.
[17] S. Ashraf, D. Muhammad, M. A. Khan, and T. Ahmed, “Fuzzy based efficient Cosmetology Paradigm,” vol. 8, pp. 513–520, doi: 10.14741/ijmcr/v.8.4.3.
[18] S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, “Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach,” IEEE Access, vol. 8, pp. 171796–171819, 2020, doi: 10.1109/ACCESS.2020.3024198.
[19] S. Ashraf, S. Saleem, T. Ahmed, Z. Aslam, and M. Shuaeeb, “Iris and Foot based Sustainable Biometric Identification Approach,” in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Hvar, Croatia, Sep. 2020, pp. 1–6. doi: 10.23919/SoftCOM50211.2020.9238333.
[20] S. Ashraf and T. Ahmed, “Machine Learning Shrewd Approach For An Imbalanced Dataset Conversion Samples,” J. Eng. Technol. JET, vol. 11, no. 1, Art. no. 1, Jun. 2020, Accessed: Nov. 27, 2020. [Online]. Available: https://journal.utem.edu.my/index.php/jet/article/view/5896
[21] S. Ashraf, Z. Aslam, S. Saleem, S. Afnan, and M. Aamer, “Multi-biometric Sustainable Approach for Human Appellative,” CRPASE Trans. Electr. Electron. Comput. Eng., vol. 06, no. 3, pp. 146–152, 2020.
[22] S. Ashraf, T. Ahmed, and S. Saleem, “NRSM: node redeployment shrewd mechanism for wireless sensor network,” Iran J. Comput. Sci., Oct. 2020, doi: 10.1007/s42044-020-00075-x.
[23] S. Ashraf, S. Saleem, and T. Ahmed, “Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network,” Int. J. Wirel. Microw. Technol., vol. 10, no. 4, pp. 22–33, Aug. 2020, doi: 10.5815/ijwmt.2020.04.03.
[24] S. Ashraf and T. Ahmed, “Sagacious Intrusion Detection Strategy in Sensor Network,” in 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, United Kingdom, Aug. 2020, pp. 1–4. doi: 10.1109/UCET51115.2020.9205412.
[25] S. Ashraf, Z. A. Arfeen, M. A. Khan, and T. Ahmed, “SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture,” Int. J. Mod. Trends Sci. Technol., vol. 6, no. 5, pp. 162–167, May 2020, doi: 10.46501/IJMTST060525.
[26] A. Shahzad, “Towards Shrewd Object Visualization Mechanism,” Trends Comput. Sci. Inf. Technol., pp. 097–102, Nov. 2020, doi: 10.17352/tcsit.000030.
[27] S. Ashraf, M. Gao, Z. Chen, H. Naeem, A. Ahmad, and T. Ahmed, “Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism,” IEEE Access, vol. 8, pp. 163091–163114, 2020, doi: 10.1109/ACCESS.2020.3022565.
[28] S. Ashraf, A. Raza, Z. Aslam, H. Naeem, and T. Ahmed, “Underwater Resurrection Routing Synergy using Astucious Energy Pods,” J. Robot. Control JRC, vol. 1, no. 5, Art. no. 5, Apr. 2020, doi: 10.18196/jrc.1535.
[29] S. Ashraf et al., “Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies,” Int. J. Sci. Res. Comput. Sci. Eng., vol. 8, no. 2, pp. 1–9, Apr. 2020, doi: 10.26438/ijsrcse/v8i2.19.
[30] S. Ashraf et al., “Underwater routing protocols: Analysis of link selection challenges,” AIMS Electron. Electr. Eng., vol. 4, no. 3, pp. 234–248, 2020, doi: 10.3934/ElectrEng.2020.3.234.
[31] S. Ashraf, M. Gao, Z. Mingchen, T. Ahmed, A. Raza, and H. Naeem, “USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time,” Wirel. Commun. Mob. Comput., vol. 2020, pp. 1–12, Mar. 2020, doi: 10.1155/2020/9625974.
[32] S. Ashraf, “A proactive role of IoT devices in building smart cities,” Internet Things Cyber-Phys. Syst., vol. 1, pp. 8–13, 2021, doi: 10.1016/j.iotcps.2021.08.001.