


Остановите войну!
for scientists:
Asadullah Shaikh
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Asadullah Shaikh
, Mana Saleh Al Reshan
, Adel Sulaiman
, Hani Alshahrani
, Yousef Asiri
:
Secure Telemedicine System Design for COVID-19 Patients Treatment Using Service Oriented Architecture. Sensors 22(3): 952 (2022) - 2021
- [j15]Fayaz A. Memon
, Umair Ali Khan
, Asadullah Shaikh
, Abdullah Alghamdi
, Pardeep Kumar
, Mesfer Alrizq
:
Predicting Actions in Videos and Action-Based Segmentation Using Deep Learning. IEEE Access 9: 106918-106932 (2021) - [j14]Asadullah Shaikh
, Abdul Hafeez
, Asif Ali Wagan
, Mesfer Alrizq
, Abdullah Alghamdi
, Mana Al Reshan
:
More Than Two Decades of Research on Verification of UML Class Models: A Systematic Literature Review. IEEE Access 9: 142461-142474 (2021) - [j13]Shakil Ahmed, Asadullah Shaikh, Hani Alshahrani
, Abdullah Alghamdi
, Mesfer Alrizq
, Junaid Baber, Maheen Bakhtyar:
Transfer Learning Approach for Classification of Histopathology Whole Slide Images. Sensors 21(16): 5361 (2021) - 2020
- [j12]Asadullah Shaikh, Khairan D. Rajab:
Editorial: Special Issue on New Frontiers in Data Sciences and Data Analytics Tools and Applications. Adv. Data Sci. Adapt. Anal. 12(2): 2002001:1-2002001:3 (2020) - [j11]AbdulHafeez Muhammad
, Asadullah Shaikh
, Noorulhasan Naveed Quadri
, Mohamed Rafik N. Qureshi
:
Factors Affecting Academic Integrity in E-Learning of Saudi Arabian Universities. An Investigation Using Delphi and AHP. IEEE Access 8: 16259-16268 (2020) - [j10]Asadullah Shaikh
, Mueen Uddin
, Mohamed A. Elmagzoub, Abdullah Alghamdi
:
PEMC: Power Efficiency Measurement Calculator to Compute Power Efficiency and CO₂ Emissions in Cloud Data Centers. IEEE Access 8: 195216-195228 (2020) - [j9]Asadullah Shaikh:
Advances in Deep Learning in Mobile Interactive Algorithms and Learning Technologies. Int. J. Interact. Mob. Technol. 14(10): 4-6 (2020)
2010 – 2019
- 2019
- [j8]Noorulhasan Naveed Quadri, Mohamed Rafik N. Qureshi
, Asadullah Shaikh
, Alhuseen Omar Alsayed
, Sumaya Sanober
, Khalid Mohiuddin:
Evaluating and Ranking Cloud-Based E-Learning Critical Success Factors (CSFs) Using Combinatorial Approach. IEEE Access 7: 157145-157157 (2019) - [j7]Muhammad Ali Memon, Zaira Hassan, Kamran Dahri, Asadullah Shaikh, Muhammad Ali Nizamani:
Aspect Oriented UML to ECORE Model Transformation. ISC Int. J. Inf. Secur. 11(3): 97-103 (2019) - 2018
- [j6]Abdul Hafeez Khan, Sayed Hyder Abbas Musavi, Aqeel-ur Rehman, Asadullah Shaikh
:
Ontology-Based Finite Satisfiability of UML Class Model. IEEE Access 6: 3040-3050 (2018) - [j5]Asadullah Shaikh
, Uffe Kock Wiil
:
Overview of Slicing and Feedback Techniques for Efficient Verification of UML/OCL Class Diagrams. IEEE Access 6: 23864-23882 (2018) - 2015
- [j4]Ahmad Taleb, Asadullah Shaikh
, Todd Eavis, Nasser M. Taleb
:
High performance framework for mining association rules from hierarchical data cubes. Int. J. Bus. Intell. Data Min. 10(3): 233-252 (2015) - [j3]Asadullah Shaikh
:
The impact of SOA on a system design for a telemedicine healthcare system. Netw. Model. Anal. Health Informatics Bioinform. 4(1): 15 (2015) - 2014
- [j2]Asadullah Shaikh
, Uffe Kock Wiil
:
A feedback technique for unsatisfiable UML/OCL class diagrams. Softw. Pract. Exp. 44(11): 1379-1393 (2014) - 2012
- [c7]Asadullah Shaikh
, Uffe Kock Wiil:
UMLtoCSP (UOST): a tool for efficient verification of UML/OCL class diagrams through model slicing. SIGSOFT FSE 2012: 37 - 2011
- [j1]Asadullah Shaikh
, Uffe Kock Wiil
, Nasrullah Memon:
Evaluation of Tools and Slicing Techniques for Efficient Verification of UML/OCL Class Diagrams. Adv. Softw. Eng. 2011: 370198:1-370198:18 (2011) - 2010
- [c6]Asadullah Shaikh
, Robert Clarisó
, Uffe Kock Wiil, Nasrullah Memon:
Verification-driven slicing of UML/OCL models. ASE 2010: 185-194 - [c5]Asadullah Shaikh
, Uffe Kock Wiil
, Nasrullah Memon:
UOST: UML/OCL Aggressive Slicing Technique for Efficient Verification of Models. SAM 2010: 173-192 - [p1]Asadullah Shaikh, Shccraz Ali, Nasrullah Memon, Panagiotis Karampelas
:
SOA Security Aspects in Web-based Architectural Design. From Sociology to Computing in Social Networks 2010: 415-430
2000 – 2009
- 2009
- [c4]Asadullah Shaikh
, Muniba Shoukat Memon, Nasrullah Memon, Muhammad Misbahuddin:
The Role of Service Oriented Architecture in Telemedicine Healthcare System. CISIS 2009: 208-214 - [c3]Asadullah Shaikh
, Ashfaq Ahmed, Nasrullah Memon, Muniba Shoukat Memon:
Strengths and Weaknesses of Maturity Driven Process Improvement Effort. CISIS 2009: 481-486 - [c2]Asadullah Shaikh
, Aijaz Soomro, Sheeraz Ali, Nasrullah Memon:
The Security Aspects in Web-Based Architectural Design Using Service Oriented Architecture. IV 2009: 461-466 - 2008
- [c1]Asadullah Shaikh, Muhammad Misbahuddin, Muniba Shoukat Memon:
A System Design for a Telemedicine Health Care System. IMTIC 2008: 295-305
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-03-20 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint