An empirical study of investigating mobile applications development challenges A Ahmad, K Li, C Feng, SM Asim, A Yousif, S Ge IEEE Access 6, 17711-17728, 2018 | 135 | 2018 |
A survey on sentiment analysis of scientific citations A Yousif, Z Niu, JK Tarus, A Ahmad Artificial Intelligence Review 52 (3), 1805-1838, 2017 | 120 | 2017 |
News Recommendation Systems - Accomplishments, Challenges & Future Directions C Feng, M Khan, AU Rahman, A Ahmad IEEE Access 8 (1), 16702-16725, 2020 | 98 | 2020 |
A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems A Tahir, F Chen, HU Khan, Z Ming, A Ahmad, S Nazir, M Shafiq Sensors 20 (18), 2020 | 86 | 2020 |
A survey on mining stack overflow: question and answering (Q&A) community A Ahmad, C Feng, S Ge, A Yousif Data Technologies and Applications 52 (2), 190-247, 2018 | 73 | 2018 |
ABioNER: A BERT‐Based Model for Arabic Biomedical Named‐Entity Recognition N Boudjellal, H Zhang, A Khan, A Ahmad, R Naseem, J Shang, L Dai Complexity 2021 (1), 6633213, 2021 | 63 | 2021 |
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Health Care Applications A Ahmad, A Ullah, C Khan, Feng, M Khan, S Ashraf, M Adnan, S Nazir, ... Security and Communication Networks 2020, 2020 | 49 | 2020 |
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow A Ahmad, C Feng, M Khan, A Khan, A Ullah, S Nazir, A Tahir Security and Communication Networks, 19, 2020 | 49 | 2020 |
A review on data preprocessing methods for class imbalance problem H Ali, MNM Salleh, K Hussain, A Ahmad, A Ullah, A Muhammad, ... International Journal of Engineering & Technology 8 (3), 390-397, 2019 | 47 | 2019 |
Bodacious‐instance coverage mechanism for wireless sensor network S Ashraf, O Alfandi, A Ahmad, AM Khattak, B Hayat, KH Kim, A Ullah Wireless Communications and Mobile Computing 2020 (1), 8833767, 2020 | 46 | 2020 |
Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic approach AW Khan, MU Khan, JA Khan, A Ahmad, K Khan, M Zamir, W Kim, MF Ijaz IEEE Access 9, 107309-107332, 2021 | 40 | 2021 |
Energy Harvested and Cooperative Enabled Efficient Routing Protocol (EHCRP) for IoT-WBAN MD Khan, Z Ullah, A Ahmad, B Hayat, A Almogren, KH Kim, M Ilyas, M Ali Sensors 20 (21), 6267, 2020 | 39 | 2020 |
Requirements understanding: a challenge in global software development, industrial surveys in Kingdom of Saudi Arabia MA Alnuem, A Ahmad, H Khan 2012 IEEE 36th Annual Computer Software and Applications Conference, 297-306, 2012 | 35 | 2012 |
Underwater routing protocols: Analysis of link selection challenges S Ashraf, A Ahmad, A Yahya, T Ahmed AIMS Electronics and Electrical Engineering 4 (3), 234-248, 2020 | 33 | 2020 |
A systematic mapping study of predictive maintenance in SMEs M Khan, A Ahmad, F Sobieczky, M Pichler, BA Moser, I Bukovský IEEE Access 10, 88738-88749, 2022 | 32 | 2022 |
Underwater Pragmatic Routing Approach through Packet Reverberation Mechanism S ASHRAF, M GAO, Z CHEN, H NAEEM, A AHMAD, T AHMED IEEE Access 8, 163091 - 163114, 2020 | 32 | 2020 |
Predicting Politician’s Supporters’ Network on Twitter Using Social Network Analysis and Semantic Analysis A Khan, H Zhang, J Shang, N Boudjellal, A Ahmad, A Ali Scientific Programming 2020, 2020 | 31 | 2020 |
Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions C Feng, M Adnan, A Ahmad, A Ullah, HU Khan Scientific Programming 2020, 2020 | 27 | 2020 |
Toward Empirically Investigating Non-Functional Requirements of iOS Developers on Stack Overflow A Ahmad, F Chong, K Li, S Asim, T Sun IEEE Access 7 (1), 61145 - 61169, 2019 | 27 | 2019 |
Empirical assessment of machine learning techniques for software requirements risk prediction R Naseem, Z Shaukat, M Irfan, MA Shah, A Ahmad, F Muhammad, ... Electronics 10 (2), 168, 2021 | 25 | 2021 |