Asadullah Shah

Orcid: 0000-0002-9149-328X

According to our database1, Asadullah Shah authored at least 30 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Capturing the real customer experience based on the parameters in the call detail records.
Multim. Tools Appl., 2021

A Knowledge-Based Sense Disambiguation Method to Semantically Enhanced NL Question for Restricted Domain.
Inf., 2021

Ontology-Based Approach to Semantically Enhanced Question Answering for Closed Domain: A Review.
Inf., 2021

2020
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder (ASD).
Univers. Access Inf. Soc., 2020

A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems.
Int. J. Distributed Sens. Networks, 2020

Dynamic User Preference Parameters Selection and Energy Consumption Optimization for Smart Homes Using Deep Extreme Learning Machine and Bat Algorithm.
IEEE Access, 2020

Augmented Reality for Learning of Children and Adolescents With Autism Spectrum Disorder (ASD): A Systematic Review.
IEEE Access, 2020

Process Hierarchy for GSD Based User-Centric Requirements Elicitation Frameworks.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020

A Novel RE Teams Selection Process For User-Centric Requirements Elicitation Frameworks Based On Big-Five Personality Assessment Model.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020

Mobile Augmented Reality App for Children with Autism Spectrum Disorder (ASD) to Learn Vocabulary (MARVoc): From the Requirement Gathering to Its Initial Evaluation.
Proceedings of the HCI in Games, 2020

2019
Deployment of social nets in multilayer model to identify key individuals using majority voting.
Knowl. Inf. Syst., 2019

Key individual identification using dimensional relevance in the stratum of networks.
J. Intell. Fuzzy Syst., 2019

A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments.
Inf., 2019

2017
Online Banking Information Systems Acceptance: An Empirical Examination of System Characteristics and Web Security.
Inf. Syst. Manag., 2017

Barriers Effecting Successful Implementation of E-Learning in Saudi Arabian Universities.
Int. J. Emerg. Technol. Learn., 2017

A framework for smart estimation of demand-supply for crowdsource management using WSN.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

2016
Proactive Business Intelligence to Give Best Customer Experience to Valued Social Networks in Telecoms.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

2015
Adoption of Virtualization in Cloud Computing: A Foundation Step towards Green Computing.
Int. J. Green Comput., 2015

Resolving Ethical Dilemma in Technology Enhanced Education through smart mobile devices.
Int. Arab. J. e Technol., 2015

Analysis of Design Principles and Requirements for Procedural Rigging of Bipeds and Quadrupeds Characters with Custom Manipulators for Animation.
CoRR, 2015

2014
Forward and Inverse Kinematics Seamless Matching Using Jacobian.
CoRR, 2014

Expression driven Trignometric based Procedural Animation of Quadrupeds.
CoRR, 2014

Node status detection and information diffusion in router network using Scale-free network.
Proceedings of the Tenth International Network Conference, 2014

2013
Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia.
Int. J. Emerg. Technol. Learn., 2013

Procedural model of horse simulation.
Proceedings of the 12th ACM International Conference on Virtual Reality Continuum and Its Applications in Industry, 2013

Hierarchical Tori Connected Mesh Network.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
Widget based automated rigging of bipedal character with custom manipulators.
Proceedings of the Virtual Reality Continuum and its Applications in Industry, 2012

On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

2008
Analysis of MANET Routing Protocols under TCP Vegas with Mobility Consideration.
Proceedings of the Wireless Networks, 2008

2007
Securing XML Web Services by using a Proxy Web Service Model.
Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007


  Loading...