default search action
Asadullah Shah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j15]Ammar Arbaaeen, Asadullah Shah:
Ontology-Based Approach to Semantically Enhanced Question Answering for Closed Domain: A Review. Inf. 12(5): 200 (2021) - [j14]Ammar Arbaaeen, Asadullah Shah:
A Knowledge-Based Sense Disambiguation Method to Semantically Enhanced NL Question for Restricted Domain. Inf. 12(11): 452 (2021) - [j13]Nusratullah Khan, Muhammad Usman Akram, Asadullah Shah, Norah Saleh Alghamdi, Shoab Ahmed Khan:
Capturing the real customer experience based on the parameters in the call detail records. Multim. Tools Appl. 80(18): 28439-28461 (2021) - 2020
- [j12]Kamran Khowaja, Bilikis Banire, Dena Al-Thani, Mohammed Tahri Sqalli, Aboubakr Aqle, Asadullah Shah, Siti Salwah Salim:
Augmented Reality for Learning of Children and Adolescents With Autism Spectrum Disorder (ASD): A Systematic Review. IEEE Access 8: 78779-78807 (2020) - [j11]Abdul Salam Shah, Haidawati Nasir, Muhammad Fayaz, Adidah Lajis, Israr Ullah, Asadullah Shah:
Dynamic User Preference Parameters Selection and Energy Consumption Optimization for Smart Homes Using Deep Extreme Learning Machine and Bat Algorithm. IEEE Access 8: 204744-204762 (2020) - [j10]Muhammad Shuaib Qureshi, Muhammad Bilal Qureshi, Muhammad Fayaz, Wali Khan Mashwani, Samir Brahim Belhaouari, Saima Hassan, Asadullah Shah:
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems. Int. J. Distributed Sens. Networks 16(8): 155014772093275 (2020) - [j9]Kamran Khowaja, Siti Salwah Salim, Adeleh Asemi, Sumbul Ghulamani, Asadullah Shah:
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder (ASD). Univers. Access Inf. Soc. 19(2): 213-243 (2020) - [c12]Kamran Khowaja, Dena Al-Thani, Asma Osman Hassan, Asadullah Shah, Siti Salwah Salim:
Mobile Augmented Reality App for Children with Autism Spectrum Disorder (ASD) to Learn Vocabulary (MARVoc): From the Requirement Gathering to Its Initial Evaluation. HCI (31) 2020: 424-437 - [c11]M. Aqeel Iqbal, Asadullah Shah:
A Novel RE Teams Selection Process For User-Centric Requirements Elicitation Frameworks Based On Big-Five Personality Assessment Model. ICIIS 2020: 522-527 - [c10]M. Aqeel Iqbal, Asadullah Shah:
Process Hierarchy for GSD Based User-Centric Requirements Elicitation Frameworks. ICIIS 2020: 528-533
2010 – 2019
- 2019
- [j8]Abdul Salam Shah, Haidawati Nasir, Muhammad Fayaz, Adidah Lajis, Asadullah Shah:
A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments. Inf. 10(3): 108 (2019) - [j7]Fozia Noor, Muhammad Usman Akram, Asadullah Shah, Shoab Ahmad Khan:
Key individual identification using dimensional relevance in the stratum of networks. J. Intell. Fuzzy Syst. 37(2): 2153-2167 (2019) - [j6]Fozia Noor, Asadullah Shah, M. Usman Akram, Shoab Ahmad Khan:
Deployment of social nets in multilayer model to identify key individuals using majority voting. Knowl. Inf. Syst. 58(1): 113-137 (2019) - [i4]Abdul Salam Shah, Haidawati Nasir, Muhammad Fayaz, Adidah Lajis, Asadullah Shah:
A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments. CoRR abs/1904.09821 (2019) - 2017
- [j5]Noorulhasan Naveed Quadri, AbulHafeez Muhammed, Sumaya Sanober, Mohamed Rafik N. Qureshi, Asadullah Shah:
Barriers Effecting Successful Implementation of E-Learning in Saudi Arabian Universities. Int. J. Emerg. Technol. Learn. 12(6): 94-107 (2017) - [j4]Fida Hussain Chandio, Zahir Irani, Akram M. Zeki, Asadullah Shah, Sayed Chhattan Shah:
Online Banking Information Systems Acceptance: An Empirical Examination of System Characteristics and Web Security. Inf. Syst. Manag. 34(1): 50-64 (2017) - [c9]Naeem A. Nawaz, Ahmad Waqas, Zulkefli Muhammed Yusof, Asadullah Shah:
A framework for smart estimation of demand-supply for crowdsource management using WSN. ICC 2017: 92:1-92:5 - 2016
- [c8]Nusratullah Khan, Asadullah Shah, Shoab Ahmad Khan, Ali Raza Anjum:
Proactive Business Intelligence to Give Best Customer Experience to Valued Social Networks in Telecoms. IntelliSys (1) 2016: 678-686 - 2015
- [j3]AbdulHafeez Muhammad, Farooq Ahamd, Asadullah Shah:
Resolving Ethical Dilemma in Technology Enhanced Education through smart mobile devices. Int. Arab. J. e Technol. 4(1): 25-31 (2015) - [j2]Nusratullah Khan, Asadullah Shah, Kajal Nusratullah:
Adoption of Virtualization in Cloud Computing: A Foundation Step towards Green Computing. Int. J. Green Comput. 6(1): 40-47 (2015) - [i3]Zeeshan Bhatti, Asadullah Shah, Ahmad Waqas, Nadeem Mahmood:
Analysis of Design Principles and Requirements for Procedural Rigging of Bipeds and Quadrupeds Characters with Custom Manipulators for Animation. CoRR abs/1502.06419 (2015) - 2014
- [c7]Abdul Waheed Mahesar, Azeddin Messikh, Asadullah Shah, Mohamed Ridza Wahiddin:
Node status detection and information diffusion in router network using Scale-free network. INC 2014: 95-105 - [i2]Zeeshan Bhatti, Asadullah Shah, Farruh Shahidi, Mostafa Karbasi:
Forward and Inverse Kinematics Seamless Matching Using Jacobian. CoRR abs/1401.1488 (2014) - [i1]Zeeshan Bhatti, Asadullah Shah, Mustafa Karabasi, Waheed Mahesar:
Expression driven Trignometric based Procedural Animation of Quadrupeds. CoRR abs/1404.2053 (2014) - 2013
- [j1]AbdulHafeez Muhammad, Arockiasamy Clementking, Asadullah Shah, Farooq Ahmad:
Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia. Int. J. Emerg. Technol. Learn. 8(3): 8-12 (2013) - [c6]M. M. Hafizur Rahman, Asadullah Shah, Masaru Fukushi, Yasushi Inoguchi:
Hierarchical Tori Connected Mesh Network. ICCSA (5) 2013: 197-210 - [c5]Zeeshan Bhatti, Asadullah Shah, Farruh Shahidi:
Procedural model of horse simulation. VRCAI 2013: 139-146 - 2012
- [c4]M. M. Hafizur Rahman, Asadullah Shah, Yasushi Inoguchi:
On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network. NPC 2012: 180-187 - [c3]Zeeshan Bhatti, Asadullah Shah:
Widget based automated rigging of bipedal character with custom manipulators. VRCAI 2012: 337-340
2000 – 2009
- 2008
- [c2]Razia Nisar Noorani, Asma Ansari, Kamran Khowaja, Sham-ul-Arfeen Laghari, Asadullah Shah:
Analysis of MANET Routing Protocols under TCP Vegas with Mobility Consideration. IMTIC 2008: 227-234 - 2007
- [c1]Quratul-ain Mahesar, Asadullah Shah:
Securing XML Web Services by using a Proxy Web Service Model. SCSS (1) 2007: 410-415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 19:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint