Search Results - "Shaikh, Asadullah"

Refine Results
  1. 1

    Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society by Asadullah Shaikh

    “…The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in…”
    Get full text
    Journal Article
  2. 2

    Evaluating critical success factors in implementing E-learning system using multi-criteria decision-making by Naveed, Quadri Noorulhasan, Qureshi, Mohamed Rafik Noor, Tairan, Nasser, Mohammad, AbdulHafeez, Shaikh, Asadullah, Alsayed, Alhuseen O, Shah, Asadullah, Alotaibi, Fahad Mazaed

    Published in PloS one (04-05-2020)
    “…Learning using the Internet or training through E-Learning is growing rapidly and is increasingly favored over the traditional methods of learning and…”
    Get full text
    Journal Article
  3. 3

    UMobileNetV2 model for semantic segmentation of gastrointestinal tract in MRI scans by Sharma, Neha, Gupta, Sheifali, Gupta, Deepali, Gupta, Punit, Juneja, Sapna, Shah, Asadullah, Shaikh, Asadullah

    Published in PloS one (08-05-2024)
    “…Gastrointestinal (GI) cancer is leading general tumour in the Gastrointestinal tract, which is fourth significant reason of tumour death in men and women. The…”
    Get full text
    Journal Article
  4. 4

    Transfer Learning Approach for Classification of Histopathology Whole Slide Images by Ahmed, Shakil, Shaikh, Asadullah, Alshahrani, Hani, Alghamdi, Abdullah, Alrizq, Mesfer, Baber, Junaid, Bakhtyar, Maheen

    Published in Sensors (Basel, Switzerland) (09-08-2021)
    “…The classification of whole slide images (WSIs) provides physicians with an accurate analysis of diseases and also helps them to treat patients effectively…”
    Get full text
    Journal Article
  5. 5

    Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT by Alshahrani, Hani, Anjum, Mohd, Shahab, Sana, Al Reshan, Mana Saleh, Sulaiman, Adel, Shaikh, Asadullah

    Published in Scientific reports (05-08-2024)
    “…The intrusion detection process is important in various applications to identify unauthorized Internet of Things (IoT) network access. IoT devices are accessed…”
    Get full text
    Journal Article
  6. 6

    Artificial Intelligence-Based Secured Power Grid Protocol for Smart City by Sulaiman, Adel, Nagu, Bharathiraja, Kaur, Gaganpreet, Karuppaiah, Pradeepa, Alshahrani, Hani, Reshan, Mana Saleh Al, AlYami, Sultan, Shaikh, Asadullah

    Published in Sensors (Basel, Switzerland) (22-09-2023)
    “…Due to the modern power system’s rapid development, more scattered smart grid components are securely linked into the power system by encircling a wide…”
    Get full text
    Journal Article
  7. 7

    Weighted Average Ensemble Deep Learning Model for Stratification of Brain Tumor in MRI Images by Anand, Vatsala, Gupta, Sheifali, Gupta, Deepali, Gulzar, Yonis, Xin, Qin, Juneja, Sapna, Shah, Asadullah, Shaikh, Asadullah

    Published in Diagnostics (Basel) (01-04-2023)
    “…Brain tumor diagnosis at an early stage can improve the chances of successful treatment and better patient outcomes. In the biomedical industry, non-invasive…”
    Get full text
    Journal Article
  8. 8

    Secure Telemedicine System Design for COVID-19 Patients Treatment Using Service Oriented Architecture by Shaikh, Asadullah, Al Reshan, Mana Saleh, Sulaiman, Adel, Alshahrani, Hani, Asiri, Yousef

    Published in Sensors (Basel, Switzerland) (26-01-2022)
    “…The coronavirus pandemic, also known as the COVID-19 pandemic, is an ongoing virus. It was first identified on December 2019 in Wuhan, China, and later spread…”
    Get full text
    Journal Article
  9. 9

    Attention based UNet model for breast cancer segmentation using BUSI dataset by Sulaiman, Adel, Anand, Vatsala, Gupta, Sheifali, Rajab, Adel, Alshahrani, Hani, Al Reshan, Mana Saleh, Shaikh, Asadullah, Hamdi, Mohammed

    Published in Scientific reports (28-09-2024)
    “…Breast cancer, a prevalent and life-threatening disease, necessitates early detection for the effective intervention and the improved patient health outcomes…”
    Get full text
    Journal Article
  10. 10

    An intelligent LinkNet-34 model with EfficientNetB7 encoder for semantic segmentation of brain tumor by Sulaiman, Adel, Anand, Vatsala, Gupta, Sheifali, Al Reshan, Mana Saleh, Alshahrani, Hani, Shaikh, Asadullah, Elmagzoub, M. A.

    Published in Scientific reports (16-01-2024)
    “…A brain tumor is an unnatural expansion of brain cells that can’t be stopped, making it one of the deadliest diseases of the nervous system. The brain tumor…”
    Get full text
    Journal Article
  11. 11

    U-Net Model with Transfer Learning Model as a Backbone for Segmentation of Gastrointestinal Tract by Sharma, Neha, Gupta, Sheifali, Koundal, Deepika, Alyami, Sultan, Alshahrani, Hani, Asiri, Yousef, Shaikh, Asadullah

    Published in Bioengineering (Basel) (14-01-2023)
    “…The human gastrointestinal (GI) tract is an important part of the body. According to World Health Organization (WHO) research, GI tract infections kill 1.8…”
    Get full text
    Journal Article
  12. 12

    Heart patient health monitoring system using invasive and non-invasive measurement by Mastoi, Qurat-ul-Ain, Alqahtani, Ali, Almakdi, Sultan, Sulaiman, Adel, Rajab, Adel, Shaikh, Asadullah, Alqhtani, Samar M.

    Published in Scientific reports (26-04-2024)
    “…The abnormal heart conduction, known as arrhythmia, can contribute to cardiac diseases that carry the risk of fatal consequences. Healthcare professionals…”
    Get full text
    Journal Article
  13. 13

    Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction by Hussain, Shumaila, Nadeem, Muhammad, Baber, Junaid, Hamdi, Mohammed, Rajab, Adel, Al Reshan, Mana Saleh, Shaikh, Asadullah

    Published in Scientific reports (28-03-2024)
    “…Software vulnerabilities pose a significant threat to system security, necessitating effective automatic detection methods. Current techniques face challenges…”
    Get full text
    Journal Article
  14. 14

    Factors Affecting Academic Integrity in E-Learning of Saudi Arabian Universities. An Investigation Using Delphi and AHP by Muhammad, Abdulhafeez, Shaikh, Asadullah, Naveed, Quadri Noorulhasan, Qureshi, Mohamed Rafik Noor

    Published in IEEE access (2020)
    “…In the last few years, most of the public universities in the Kingdom of Saudi Arabia (KSA) have adopted electronic learning (e-learning) as an evolutionary…”
    Get full text
    Journal Article
  15. 15

    Hybrid feature selection and classification technique for early prediction and severity of diabetes type 2 by Talari, Praveen, N, Bharathiraja, Kaur, Gaganpreet, Alshahrani, Hani, Al Reshan, Mana Saleh, Sulaiman, Adel, Shaikh, Asadullah

    Published in PloS one (18-01-2024)
    “…Diabetes prediction is an ongoing study topic in which medical specialists are attempting to forecast the condition with greater precision. Diabetes typically…”
    Get full text
    Journal Article
  16. 16

    BBSF: Blockchain-Based Secure Weather Forecasting Information through Routing Protocol in Vanet by Sohail, Hamza, Hassan, Mahmood Ul, Elmagzoub, M A, Rajab, Adel, Rajab, Khairan, Ahmed, Adeel, Shaikh, Asadullah, Ali, Abid, Jamil, Harun

    Published in Sensors (Basel, Switzerland) (01-06-2023)
    “…A vehicular ad hoc network (VANET) is a technique that uses vehicles with the ability to sense data from the environment and use it for their safety measures…”
    Get full text
    Journal Article
  17. 17

    Smart Agriculture Cloud Using AI Based Techniques by Junaid, Muhammad, Shaikh, Asadullah, Hassan, Mahmood Ul, Alghamdi, Abdullah, Rajab, Khairan, Al Reshan, Mana Saleh, Alkinani, Monagi

    Published in Energies (Basel) (01-08-2021)
    “…This research proposes a generic smart cloud-based system in order to accommodate multiple scenarios where agriculture farms using Internet of Things (IoTs)…”
    Get full text
    Journal Article
  18. 18

    Ternion: An Autonomous Model for Fake News Detection by Islam, Noman, Shaikh, Asadullah, Qaiser, Asma, Asiri, Yousef, Almakdi, Sultan, Sulaiman, Adel, Moazzam, Verdah, Babar, Syeda Aiman

    Published in Applied sciences (01-10-2021)
    “…In recent years, the consumption of social media content to keep up with global news and to verify its authenticity has become a considerable challenge. Social…”
    Get full text
    Journal Article
  19. 19

    Overview of Slicing and Feedback Techniques for Efficient Verification of UML/OCL Class Diagrams by Shaikh, Asadullah, Wiil, Uffe Kock

    Published in IEEE access (01-01-2018)
    “…Model-driven engineering is a methodology for software development that focuses on the use of models in the software development process. These models can be…”
    Get full text
    Journal Article
  20. 20

    Sustainability in Blockchain: A Systematic Literature Review on Scalability and Power Consumption Issues by Alshahrani, Hani, Islam, Noman, Syed, Darakhshan, Sulaiman, Adel, Al Reshan, Mana Saleh, Rajab, Khairan, Shaikh, Asadullah, Shuja-Uddin, Jaweed, Soomro, Aadar

    Published in Energies (Basel) (01-02-2023)
    “…Blockchain is a peer-to-peer trustless network that keeps records of digital assets without any central authority. With the passage of time, the sustainability…”
    Get full text
    Journal Article