Search

Your search keyword '"Asadullah Shah"' showing total 103 results

Search Constraints

Start Over You searched for: Author "Asadullah Shah" Remove constraint Author: "Asadullah Shah" Topic computer science Remove constraint Topic: computer science
103 results on '"Asadullah Shah"'

Search Results

1. Capturing the real customer experience based on the parameters in the call detail records

2. Challenges and limitations in secure software development adoption - A qualitative analysis in Malaysian software industry prospect

3. A Knowledge-Based Sense Disambiguation Method to Semantically Enhanced NL Question for Restricted Domain

4. Dynamic User Preference Parameters Selection and Energy Consumption Optimization for Smart Homes Using Deep Extreme Learning Machine and Bat Algorithm

5. Agile Methods Acceptance Model: Understanding Factors for Implementing Agile Methods in Pakistan

7. Investigating the usage of E-learning: An Integrated model of TAM and IS Success

8. Ontology-Based Approach to Semantically Enhanced Question Answering for Closed Domain: A Review

9. Stakeholder’s Training Process for GSD Based Requirements Elicitation Frameworks

10. Smart Assistance for Disables using Bluetooth and Arduino

11. Pre-Elicitation Processes Hierarchy For GSD Based Requirements Elicitation Frameworks

12. Natural Language Processing based Question Answering Techniques: A Survey

13. A Novel RE Teams Selection Process For User-Centric Requirements Elicitation Frameworks Based On Big-Five Personality Assessment Model

14. Process Hierarchy for GSD Based User-Centric Requirements Elicitation Frameworks

15. Time and cost efficient cloud resource allocation for real-time data-intensive smart systems

16. Deployment of social nets in multilayer model to identify key individuals using majority voting

17. Approximate Methods for Minimum Vertex Cover Fail to Provide Optimal Results on Small Graph Instances: A Review

18. Building Spatio-Temporal Database Model Based on Ontological Approach using Relational Database Environment

19. Predicting Most Effective Software Development Teams by Mapping MBTI Personality Traits with Software Lifecycle Activities

20. An integrated model for Acceptance of QR code Mobile Payment System in Pakistan

21. Review on Sliding Mode Controller and Its Modified Types for Rehabilitation Robots

22. Smart Mirror for Home and Work Environment

23. Building Most Effective Requirements Engineering Teams by Evaluating Their Personality Traits Using Big-Five Assessment Model

24. Risk Aware k-Min Search Algorithm

25. A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments

26. Forensic Analysis of Offline Signatures Using Multilayer Perceptron and Random Forest

27. Transitional Approaches for PERN Migration to SDN

28. An Offline Signature Verification Technique Using Pixels Intensity Levels

29. Evaluating critical success factors in implementing E-learning system using multi-criteria decision-making

30. Competitive Algorithms for Online Conversion Problem with Interrelated Prices

31. Visualization: A Tool to Study Nodes in Multi-dimensional Networks

32. Factors Affecting Secure Software Development Practices Among Developers - An Investigation

33. Review on Natural Language Processing (NLP) and Its Toolkits for Opinion Mining and Sentiment Analysis

34. Prediction-based Resource Allocation Model for Real-time Tasks

35. Offline-printed Sindhi Optical Text Recognition: Survey

36. A Review of Programming Code Assessment Approaches

37. Disparity between Theory & Practice: Beyond the Worst-Case Competitive Analysis

38. A Methodology for Modeling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases

39. The future of data privacy and security concerns in Internet of Things

40. Security and privacy for IoT and fog computing paradigm

41. HTM: a new hierarchical interconnection network for future generation parallel computers

42. Transaction Management Techniques and Practices in Current Cloud Computing Environments : A Survey

43. Comparison between NFC/RFID and Bar Code Systems for Halal Tags Identification: Paired Sample T-Test Evaluation

44. Assimilating E-Learning barriers using an interpretive structural modeling (ISM)

45. Prioritizing barriers of E-Learning for effective teaching-learning using fuzzy analytic hierarchy process (FAHP)

46. Towards an accurate speaker-independent Holy Quran acoustic model

47. Development of a game for history course of secondary school students

48. Proactive Business Intelligence to Give Best Customer Experience to Valued Social Networks in Telecoms

49. Near field communication enabled payment system adoption: A proposed framework

50. Detecting Change from Social Networks using Temporal Analysis of Email Data

Catalog

Books, media, physical & digital resources