IIUM Repository (IREP)

Asadullah Shah Syed

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Maher, Zulfikar Ahmad and Shah, Asadullah and Shaikh, Humaiz and Rahu, Ghulam Ali and Butt, Pinial Khan and Chandio, Shahmurad and Shaikh, Saima (2018) A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018, 19th-20th September 2018, Kuala Lumpur.
  2. Brohi, Imtiaz Ali and Shaikh, I. A and Katper, Naveeda Karim and Maher, Zulfikar Ahmad and Channar, Sheeba Hussain and Shah, Asadullah (2018) A review of near field communication process: how do it works? Sindh University Research Journal (Science Series), 50 (3D). pp. 237-240. ISSN 1813-1743
  3. Brohi, Imtiaz Ali and Ali, Najma Imtaiz and Koondhar, Muhammad Yaqoob and Shaikh, I. A and Katper, Naveeda Karim and Shah, Asadullah (2018) An assessment of proximity technology adoption from a user's perspective. Sindh University Research Journal (Science Series), 50 (3D). pp. 220-223.
  4. Khan, N. and Shah, Asadullah and Nusratullah, Kajal (2018) Identification of valued users to generate more telecom filigence. Sindh University Research Journal (Science Series), 50 (3D). pp. 224-226.
  5. Altaf, Sohaib and Shah, Asadullah and Imtiaz Ali, Najma and Shah, Abdul Salam and Ahmed, Syed Faiz (2018) Visualization representing benefits of pre-requirement specification traceability. International Journal of Engineering and Technology(UAE), 7 (2). pp. 44-52. ISSN 2227-524X
  6. Rauf, Abdul and Shaikh, Riaz Ahmed and Shah, Asadullah (2018) Security and privacy for IoT and fog computing paradigm. In: 15th Learning and Technology Conference (L&T) 2018, 25th-28th Feb. 2018, Jeddah, Saudi Arabia.
  7. Nusratullah, Kajal and Shah, Asadullah and Akram, Muhammad Usman and Ahmad Khan, Shoab (2018) Detecting change from social networks using temporal analysis of email data. In: 14th International Conference on Information Technology - New Generations (ITNG 2017), 10th-12th April 2017, Las Vegas.
  8. Noor, Fozia and Shah, Asadullah and Gill, Waris and Ahmad Khan, Shoab (2018) Using web crawlers for feature extraction of social nets for analysis. In: 14th International Conference on Information Technology - New Generations (ITNG 2017), 10th-12th April 2017, Las Vegas.
  9. Solangi, Zulfiqar Ali and Solangi, Yasir Ali and Chandio, Shahmurad and S. Abd. Aziz, Madihah and Hamzah, Mohd Syarqawy and Shah, Asadullah (2018) The future of data privacy and security concerns in Internet of things. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD), 11th-12th May 2018, Bangkok, Thailand.
  10. Khan, Nusratullah and Akram, M. Usman and Shah, Asadullah and Ahmed Khan, Shoab (2018) Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD), 11th-12th May 2018, Bangkok,Thailand.
  11. Ataie, Farib and Shah, Asadullah and Bagheri, Fatemeh and Imtiaz Ali, Najma and Mohammadgholipour, Maryam and Rezaie, Behzad and Shaikh, Humaiz (2018) Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies. International Journal of Engineering & Technology, 7 (2.34 (Special issue 34)). pp. 89-92. ISSN 2227524X
  12. Imtiaz Ali, Najma and Samsuri, Suhaila and Abu Seman, Muhamad Sadry and Brohi, Imtiaz Ali and Shah, Asadullah (2018) Preliminary study for customer’s online shopping satisfaction from security perspective. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)). pp. 64-68. ISSN 2227-524X
  13. Brohi, Imtiaz Ali and Imtiaz Ali, Najma and Shah, Asadullah and S. Abd. Aziz, Madihah and Mohd. Tamrin, Mohd. Izzuddin (2018) Near field communication enabled mobile payments: preliminary study. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)). pp. 60-63. ISSN 2227-524X
  14. Ahmed, Syed Faiz and Joyo, Muhammad Kamran and Ali, Athar and Mohd Ali, Abdul Malik and Abdul Kadir, Kushsairy and Naqvi, Yarooq R. and Abu Bakar, Badri and Shah, Asadullah (2018) Robotic exoskeleton control for lower limb rehabilitation of knee joint. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)). pp. 56-59. ISSN 2227-524X
  15. Ataie, Farib and Shah, Asadullah and Imtiaz Ali, Najma (2018) An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)). pp. 16-21. ISSN 2227-524X
  16. Ataie, Fariba and Shah, Asadullah and Imtiaz Ali, Najma (2018) Integration social media technology and ethical collaborative learning. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)). pp. 12-15. ISSN 2227-524X
  17. Shaikh, Humaiz and Jokhio, Muhammad Uzair and Ahmed Mahir, Zulfikar and Chandio, Shahmurad and Abdullah, Mirza Manirajah and Raza, Ali and Salam, Shah and Shah, Asadullah (2018) Beyond traditional audits: the implications of information technology on auditing. International Journal of Engineering & Technology (UAE), 7 (2.34). pp. 5-11. ISSN 2227-524X
  18. Ahmed Khatri, Naveed and Shaikh, Humaiz and Ahmed Mahir, Zulfikar and Shah, Asadullah and Ahmed, Syed Faiz (2018) A review on optimization of vehicle frontal crashworthiness for passenger safety. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)). ISSN 2227-524X
  19. Khosravi, Mohsen and Imtiaz Ali, Najma and Karbasi, Mostafa and Brohi, Imtiaz Ali and Ahmed Shaikh, Irfan and Shah, Asadullah (2018) Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation. International Journal of Advanced Computer and Applications, 9 (4). pp. 221-229. ISSN 2158-107X
  20. Fayaz, Muhammad and Arshad,, Shakeel and Shah,, Abdul Salam and Shah, Asadullah (2018) Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem. International Journal of control and Automation, 11 (3). pp. 35-44. ISSN 2005-4297

Most Viewed Items

Item titleViews
1Internet banking in Pakistan: finding complexities1903
2Forward and Inverse Kinematics Seamless Matching using Jacobian1440
3Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia1420
4A 10 C’s of social networking, interconnections and the impact on social networking1397
5Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN1374
6Command based line following robot using RF technology1315
7Internal structure of computer systems1267
8Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation1214
9Selecting a mentor: guide for a Protégé1209
10Green IT based energy efficiency model for data centers to reduce energy consumption & CO2 emissions1134
11Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation 1132
12EloPSO: energy aware elephant swarm optimization for mobile adhoc networks 1123
13Critical insight for MAPReduce optimization in Hadoop1099
1410 c’s of social networking, interconnections and the impact on social networking1080
15Differential image compression for telemedicine: a novel approach1062
16Measuring efficiency of tier level data centers to implement green energy efficient data centers1061
17Research methodologies: a practical approach1061
18Low bit rate speech multiplexer tools1052
19NoMadCar: the interactive design using human computer interaction techniques1044
20Revisiting far/near infrared pyramid-based fusion types for night vision using matlab1032
21A review of slicing techniques in software engineering1011
22Building wireless sensor networks application using Sun SPOTs997
23Analyzing the weighted dark networks using scale-free network approach994
24Analysis of SNS popularity from different perspectives among users977
25Inculcating ethical values in the students through e-Learning platform972
26Ethical perspective of students in Global Learning Environment970
27Node status detection and information diffusion in router network using scale-free network963
28Power usage effectiveness metrics to measure efficiency and performance of data centers959
29Packet loss and frame substitution techniques959
30Widget based automated rigging of bipedal character with custom manipulators 938