Towards secure big data analysis via fully homomorphic encryption algorithms R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani, TM Tawfeeg, A Yousif Entropy 24 (4), 519, 2022 | 44 | 2022 |
Cloud dynamic load balancing and reactive fault tolerance techniques: a systematic literature review (SLR) TM Tawfeeg, A Yousif, A Hassan, SM Alqhtani, R Hamza, MB Bashir, A Ali IEEE Access 10, 71853-71873, 2022 | 24 | 2022 |
Greedy firefly algorithm for optimizing job scheduling in iot grid computing A Yousif, SM Alqhtani, MB Bashir, A Ali, R Hamza, A Hassan, TM Tawfeeg Sensors 22 (3), 850, 2022 | 20 | 2022 |
Intelligent multi-objective classifier for breast cancer diagnosis based on multilayer perceptron neural network and differential evolution AO Ibrahim, SM Shamsuddin, A yahya Saleh, A Abdelmaboud, A Ali 2015 International Conference on Computing, Control, Networking, Electronics …, 2015 | 17 | 2015 |
Technique for Early Reliability Predictionof Software Components Using Behaviour Models A Ali Plos One, 2016 | 12 | 2016 |
Using Naïve Bayes and Bayesian network for prediction of potential problematic cases in tuberculosis A Ali, DNA Jawawi, ME Yahia International Journal of Informatics and Communication Technology, and …, 2012 | 9 | 2012 |
The impact of intervention strategies and prevention measurements for controlling COVID-19 outbreak in Saudi Arabia A Yousif, A Ali Math. Biosci. Eng 17 (6), 8123-8137, 2020 | 8 | 2020 |
Antitumor activity of berberine against breast cancer: a review A Raza, B Aslam, MU Naseer, A Ali, W Majeed, SU Hassan Int Res J Pharm 6 (2), 81-85, 2015 | 7 | 2015 |
Modeling and calculation of scenarios reliability in component-based software systems A Ali, DNA Jawawi, MA Isa 2014 8th. Malaysian Software Engineering Conference (MySEC), 160-165, 2014 | 7 | 2014 |
Scalable scenario specifications to synthesize component-centric behaviour models A Ali, DN Jawawi, MA Isa International Journal of Software Engineering and Its Applications 9 (9), 79-106, 2015 | 6 | 2015 |
Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques RR Irshad, Z Hussain, I Hussain, S Hussain, E Asghar, IM Alwayle, ... IEEE Access 12, 25917-25932, 2024 | 5 | 2024 |
COVID-19 outbreak: current scenario of Pakistan. New Microbes and New Infections, 2020, 35: 100681 A Waris, AU Khan, M Ali, A Ali, A Baset | 5 | 2020 |
Green fabrication of Co and Co 3 O 4 nanoparticles and their biomedical applications: a review, Open Life Sci. 16 (2021) 14–30 A Waris, M Din, A Ali, S Afridi, A Baset, AU Khan, M Ali | 5 | |
An Evolutionary Algorithm for Task Clustering and Scheduling in IoT Edge Computing A Yousif, MB Bashir, A Ali Mathematics 12 (2), 281, 2024 | 4 | 2024 |
A Discrete Prey–Predator Algorithm for Cloud Task Scheduling DA Abdulgader, A Yousif, A Ali Applied Sciences 13 (20), 11447, 2023 | 4 | 2023 |
A comparative evaluation of state-of-the-art integration testing techniques of component-based software A Elsafi, DNA Jawawi, A Abdelmaboud, A Ali Journal of Theoretical and Applied Information Technology 71 (2), 257-267, 2015 | 4 | 2015 |
Data Reliability and Sensors Lifetime in Bridge Health Monitoring using LoRaWAN-Zigbee. A Ali, RR Irshad, AA Alattaab, A Fatahayab Computers, Materials & Continua 73 (2), 2022 | 3 | 2022 |
Design-time reliability prediction model for component-based software systems A Ali, MB Bashir, A Hassan, R Hamza, SM Alqhtani, TM Tawfeeg, A Yousif Sensors 22 (7), 2812, 2022 | 3 | 2022 |
Deriving behavioural models of component-based software systems from requirements specifications A Ali, DNA Jawawi, MA Isa, AO Ibrahim 2015 International Conference on Computing, Control, Networking, Electronics …, 2015 | 3 | 2015 |
Economic Development of Great Britain A Ali, A Baset, E Jāmāna Ideal Library, 1967 | 2 | 1967 |