Follow
Awad Ali
Title
Cited by
Cited by
Year
Towards secure big data analysis via fully homomorphic encryption algorithms
R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani, TM Tawfeeg, A Yousif
Entropy 24 (4), 519, 2022
442022
Cloud dynamic load balancing and reactive fault tolerance techniques: a systematic literature review (SLR)
TM Tawfeeg, A Yousif, A Hassan, SM Alqhtani, R Hamza, MB Bashir, A Ali
IEEE Access 10, 71853-71873, 2022
242022
Greedy firefly algorithm for optimizing job scheduling in iot grid computing
A Yousif, SM Alqhtani, MB Bashir, A Ali, R Hamza, A Hassan, TM Tawfeeg
Sensors 22 (3), 850, 2022
202022
Intelligent multi-objective classifier for breast cancer diagnosis based on multilayer perceptron neural network and differential evolution
AO Ibrahim, SM Shamsuddin, A yahya Saleh, A Abdelmaboud, A Ali
2015 International Conference on Computing, Control, Networking, Electronics …, 2015
172015
Technique for Early Reliability Predictionof Software Components Using Behaviour Models
A Ali
Plos One, 2016
122016
Using Naïve Bayes and Bayesian network for prediction of potential problematic cases in tuberculosis
A Ali, DNA Jawawi, ME Yahia
International Journal of Informatics and Communication Technology, and …, 2012
92012
The impact of intervention strategies and prevention measurements for controlling COVID-19 outbreak in Saudi Arabia
A Yousif, A Ali
Math. Biosci. Eng 17 (6), 8123-8137, 2020
82020
Antitumor activity of berberine against breast cancer: a review
A Raza, B Aslam, MU Naseer, A Ali, W Majeed, SU Hassan
Int Res J Pharm 6 (2), 81-85, 2015
72015
Modeling and calculation of scenarios reliability in component-based software systems
A Ali, DNA Jawawi, MA Isa
2014 8th. Malaysian Software Engineering Conference (MySEC), 160-165, 2014
72014
Scalable scenario specifications to synthesize component-centric behaviour models
A Ali, DN Jawawi, MA Isa
International Journal of Software Engineering and Its Applications 9 (9), 79-106, 2015
62015
Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques
RR Irshad, Z Hussain, I Hussain, S Hussain, E Asghar, IM Alwayle, ...
IEEE Access 12, 25917-25932, 2024
52024
COVID-19 outbreak: current scenario of Pakistan. New Microbes and New Infections, 2020, 35: 100681
A Waris, AU Khan, M Ali, A Ali, A Baset
52020
Green fabrication of Co and Co 3 O 4 nanoparticles and their biomedical applications: a review, Open Life Sci. 16 (2021) 14–30
A Waris, M Din, A Ali, S Afridi, A Baset, AU Khan, M Ali
5
An Evolutionary Algorithm for Task Clustering and Scheduling in IoT Edge Computing
A Yousif, MB Bashir, A Ali
Mathematics 12 (2), 281, 2024
42024
A Discrete Prey–Predator Algorithm for Cloud Task Scheduling
DA Abdulgader, A Yousif, A Ali
Applied Sciences 13 (20), 11447, 2023
42023
A comparative evaluation of state-of-the-art integration testing techniques of component-based software
A Elsafi, DNA Jawawi, A Abdelmaboud, A Ali
Journal of Theoretical and Applied Information Technology 71 (2), 257-267, 2015
42015
Data Reliability and Sensors Lifetime in Bridge Health Monitoring using LoRaWAN-Zigbee.
A Ali, RR Irshad, AA Alattaab, A Fatahayab
Computers, Materials & Continua 73 (2), 2022
32022
Design-time reliability prediction model for component-based software systems
A Ali, MB Bashir, A Hassan, R Hamza, SM Alqhtani, TM Tawfeeg, A Yousif
Sensors 22 (7), 2812, 2022
32022
Deriving behavioural models of component-based software systems from requirements specifications
A Ali, DNA Jawawi, MA Isa, AO Ibrahim
2015 International Conference on Computing, Control, Networking, Electronics …, 2015
32015
Economic Development of Great Britain
A Ali, A Baset, E Jāmāna
Ideal Library, 1967
21967
The system can't perform the operation now. Try again later.
Articles 1–20