This page has only limited features, please log in for full access.
In the higher education sector, there is a growing trend to offer academic information to users through websites. Contemporarily, the users (i.e., students/teachers, parents, and administrative staff) greatly rely on these websites to perform various academic tasks, including admission, access to learning management systems (LMS), and links to other relevant resources. These users vary from each other in terms of their technological competence, objectives, and frequency of use. Therefore, academic websites should be designed considering different dimensions, so that everybody can be accommodated. Knowing the different dimensions with respect to the usability of academic websites is a multi-criteria decision-making (MCDM) problem. The fuzzy analytic hierarchy process (FAHP) approach has been considered to be a significant method to deal with the uncertainty that is involved in subjective judgment. Although a wide range of usability factors for academic websites have already been identified, most of them are based on the judgment of experts who have never used these websites. This study identified important factors through a detailed literature review, classified them, and prioritized the most critical among them through the FAHP methodology, involving relevant users to propose a usability evaluation framework for academic websites. To validate the proposed framework, five websites of renowned higher educational institutes (HEIs) were evaluated and ranked according to the usability criteria. As the proposed framework was created methodically, the authors believe that it would be helpful for detecting real usability issues that currently exist in academic websites.
Abdulhafeez Muhammad; Ansar Siddique; Quadri Naveed; Uzma Khaliq; Ali Aseere; Mohd Hasan; Mohamed Qureshi; Basit Shehzad. Evaluating Usability of Academic Websites through a Fuzzy Analytical Hierarchical Process. Sustainability 2021, 13, 2040 .
AMA StyleAbdulhafeez Muhammad, Ansar Siddique, Quadri Naveed, Uzma Khaliq, Ali Aseere, Mohd Hasan, Mohamed Qureshi, Basit Shehzad. Evaluating Usability of Academic Websites through a Fuzzy Analytical Hierarchical Process. Sustainability. 2021; 13 (4):2040.
Chicago/Turabian StyleAbdulhafeez Muhammad; Ansar Siddique; Quadri Naveed; Uzma Khaliq; Ali Aseere; Mohd Hasan; Mohamed Qureshi; Basit Shehzad. 2021. "Evaluating Usability of Academic Websites through a Fuzzy Analytical Hierarchical Process." Sustainability 13, no. 4: 2040.
The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To identify the most important quality criteria, a survey was conducted. An instrument was deployed among 157 subjects, including e-learning designers, developers, students, teachers, and educational administrators. Finally, a second instrument was distributed among 51 participants to make a pairwise comparison among the criteria and rank them according to their relative importance. The identified and prioritized factors were classified into four main categories. Among these four factors, content was identified as the most important factor, whereas design was found to be the least important factor.
Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability 2020, 12, 4071 .
AMA StyleAbdul Hafeez Muhammad, Ansar Siddique, Ahmed E. Youssef, Kashif Saleem, Basit Shahzad, Adnan Akram, Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability. 2020; 12 (10):4071.
Chicago/Turabian StyleAbdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. 2020. "A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems." Sustainability 12, no. 10: 4071.
Sign language is a medium of communication for people with hearing disabilities. Static and dynamic gestures are identified in a video-based sign language recognition and translated them into humanly understandable phrases to achieve the communication objective. However, videos contain redundant Key-frames which require additional processing. Number of such Key-frames can be reduced. The selection of particular Key-frames without losing the required information is a challenging task. The Key-frame extraction algorithm is used which helps to speed-up the sign language recognition process by extracting essential key-frames. The proposed framework eliminates the computation overhead by picking up the distinct Key-frames for the recognition process. Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Histograms of Oriented Gradient (HOG) are used for unique features extraction. We used the bagged tree, boosted tree ensemble method, Fine KNN, and SVM for classification. We tested methodology on video-based datasets of Pakistani Sign Language. It achieved an overall 97.5% accuracy on 37 Urdu alphabets and 95.6% accuracy on 100 common words.
Fakhar Ullah Mangla; Aysha Bashir; Ikram Lali; Ahmad Chan Bukhari; Basit Shahzad. A novel key-frame selection-based sign language recognition framework for the video data. The Imaging Science Journal 2020, 68, 156 -169.
AMA StyleFakhar Ullah Mangla, Aysha Bashir, Ikram Lali, Ahmad Chan Bukhari, Basit Shahzad. A novel key-frame selection-based sign language recognition framework for the video data. The Imaging Science Journal. 2020; 68 (3):156-169.
Chicago/Turabian StyleFakhar Ullah Mangla; Aysha Bashir; Ikram Lali; Ahmad Chan Bukhari; Basit Shahzad. 2020. "A novel key-frame selection-based sign language recognition framework for the video data." The Imaging Science Journal 68, no. 3: 156-169.
A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of security breaches to information have an increasing possibility. In this paper, we propose a symmetric encryption algorithm for color images by extending the current encryption/decryption techniques. Our encryption algorithm is based on three chaotic systems (PWLCM, Lorenz and 4D Lorenz-type), a Secure Hash Algorithm, a scrambler, a chaotic generator and DNA sequence based Linear Feedback Shift Register. We introduce multilevel security to increase the degree of diffusion and confusion. Through experiments, we present security analysis for key irreproducibility and sensitivity, Gray Level Co-occurrence Matrix based analysis, maximum deviation, irregular deviation, entropy, histogram, variance and correlation, number of pixel change rate, unified average cipher intensity, known/chosen-plaintext attacks, mean absolute error, robustness against noises of various types using PSNR and occlusion attacks. It is demonstrated that mostly our proposed encryption algorithm has enhanced performance as compared to contemporary works in information security, while comparable in other cases.
Muhammad Samiullah; Waqar Aslam; Hira Nazir; M. IkramUllah Lali; Basit Shahzad; Muhammad Rafiq Mufti; Humaira Afzal. An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems. IEEE Access 2020, 8, 25650 -25663.
AMA StyleMuhammad Samiullah, Waqar Aslam, Hira Nazir, M. IkramUllah Lali, Basit Shahzad, Muhammad Rafiq Mufti, Humaira Afzal. An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems. IEEE Access. 2020; 8 (99):25650-25663.
Chicago/Turabian StyleMuhammad Samiullah; Waqar Aslam; Hira Nazir; M. IkramUllah Lali; Basit Shahzad; Muhammad Rafiq Mufti; Humaira Afzal. 2020. "An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems." IEEE Access 8, no. 99: 25650-25663.
The electronic voting has emerged over time as a replacement to the paper based voting to reduce the redundancies and inconsistencies. The historical perspective presented in last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using the effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing are introduced in this paper. The introduction of block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested that ensures that the blockchain is owned by a governing body (e.g. election commission) and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This research claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.
Basit Shahzad; Jon Crowcroft. Trustworthy Electronic Voting Using Adjusted Blockchain Technology. IEEE Access 2019, 7, 24477 -24488.
AMA StyleBasit Shahzad, Jon Crowcroft. Trustworthy Electronic Voting Using Adjusted Blockchain Technology. IEEE Access. 2019; 7 (99):24477-24488.
Chicago/Turabian StyleBasit Shahzad; Jon Crowcroft. 2019. "Trustworthy Electronic Voting Using Adjusted Blockchain Technology." IEEE Access 7, no. 99: 24477-24488.
Social online marketing is expanding fast with evolution and recent development in Information and Communication Technology (ICT). Investigating how companies are exploiting social media for marketing, advertisement and consumer’s engagement is gaining more and more interest. In this article, brands/companies data on Twitter is collected and analyzed to compute the overall company response on Twitter. Responsiveness of a company is inferred from three features: company popularity, average company replies and average followers’ replies. Twitter network features are used in calculating posting frequency for companies and their followers. It is shown that the proposed approach can be used in finding the responsiveness of companies and their followers. Furthermore, useful links for a brand consumer is extracted and the posting behavior of brands and their followers is determined with the help of Twitter network features such as retweet count and geolocation. This study contributes to the literature on how Twitter data and its network structure features can be exploited in finding responsiveness and posting behavior of companies and their followers. We believe that this approach can be used effectively in developing prediction and information-filtering systems, particularly the personalized-recommendation systems.
Basit Shahzad; Kinza Mehr Awan; Abdullatif M. Abdullatif; M. IkramUllah Lali; M. Saqib Nawaz; Ume Ayesha; Muzafar Khan. Quantification of Productivity of the Brands on Social Media With Respect to Their Responsiveness. IEEE Access 2019, 7, 9531 -9539.
AMA StyleBasit Shahzad, Kinza Mehr Awan, Abdullatif M. Abdullatif, M. IkramUllah Lali, M. Saqib Nawaz, Ume Ayesha, Muzafar Khan. Quantification of Productivity of the Brands on Social Media With Respect to Their Responsiveness. IEEE Access. 2019; 7 (99):9531-9539.
Chicago/Turabian StyleBasit Shahzad; Kinza Mehr Awan; Abdullatif M. Abdullatif; M. IkramUllah Lali; M. Saqib Nawaz; Ume Ayesha; Muzafar Khan. 2019. "Quantification of Productivity of the Brands on Social Media With Respect to Their Responsiveness." IEEE Access 7, no. 99: 9531-9539.
Software Requirements Engineering has paved its roots in both industry and academia, as today’s complex systems are programmed to provide efficient user-centric functionalities. This also refers to the emergence of challenges in Requirements Elicitation techniques, approaches and tools while performing them. Particularly, in the area of Requirements Engineering for software development, a number of techniques and approaches have been observed in literature but for mobile application development, which is different from the traditional software development, has not been discussed much in past studies. Short development cycle, device limitations and less development time for mobile application development are some of the issues to which there is no ‘silver bullet’ available. Therefore, the Requirement Analysts are in dire need of defined guidelines for Requirement Elicitation in mobile application development. With this study, we aim to provide detailed overview of Requirements Elicitation techniques and its challenges. We have conducted a systematic literature review by surveying 4507 initial and 36 primary studies. A comprehensive set of 22 elicitation techniques were measured based on quality assessment criteria including time and cost factors, resource effectiveness and domain understanding. Furthermore, challenges in Requirements Elicitation were also grouped into 8 different categories based on their applicability. Our study effectively contributes in highlighting Software Requirements Elicitation Techniques and its challenges in mobile application development.
A. Hafsa Dar; B. Muhammad Ikram Ullah Lali; C. Humaira Ashraf; D. Muhammad Ramzan; E. Tehmina Amjad; F. Basit Shahzad. A Systematic Study on Software Requirements Elicitation Techniques and its Challenges in Mobile Application Development. IEEE Access 2018, 6, 63859 -63867.
AMA StyleA. Hafsa Dar, B. Muhammad Ikram Ullah Lali, C. Humaira Ashraf, D. Muhammad Ramzan, E. Tehmina Amjad, F. Basit Shahzad. A Systematic Study on Software Requirements Elicitation Techniques and its Challenges in Mobile Application Development. IEEE Access. 2018; 6 (99):63859-63867.
Chicago/Turabian StyleA. Hafsa Dar; B. Muhammad Ikram Ullah Lali; C. Humaira Ashraf; D. Muhammad Ramzan; E. Tehmina Amjad; F. Basit Shahzad. 2018. "A Systematic Study on Software Requirements Elicitation Techniques and its Challenges in Mobile Application Development." IEEE Access 6, no. 99: 63859-63867.
In data publishing, privacy and utility are essential for data owners and users respectively, which cannot coexist well. This incompatibility puts the data privacy researchers under an obligation to find newer and reliable privacy preserving tradeofftechniques. Data providers like many public and private organizations (e.g. hospitals and banks) publish microdata of individuals for various research purposes. Publishing microdata may compromise the privacy of individuals. To prevent the privacy of individuals, data must be published after removing personal identifiers like name and social security numbers. Removal of the personal identifiers appears as not enough to protect the privacy of individuals. Κ-anonymity model is used to publish microdata by preserving the individual’s privacy through generalization. There exist many state-of-the-arts generalizationbased techniques, which deal with pre-defined attacks like background knowledge attack, similarity attack, probability attack and so on. However, existing generalization-based techniques compromise the data utility while ensuring privacy. It is an open question to find an efficient technique that is able to set a trade-off between privacy and utility. In this paper, we discussed existing generalization hierarchies and their limitations in detail. We have also proposed three new generalization techniques including Conventional Generalization Hierarchies (CGH), Divisors Based Generalization Hierarchies (DBGH) and Cardinality-Based Generalization Hierarchies (CBGH). Extensive experiments on the real-world dataset acknowledges that our technique outperforms among the existing techniques in terms of better utility.
Saba Yaseen; Syed M. Ali Abbas; Adeel Anjum; Tanzila Saba; Abid Khan; Saif Ur Rehman Malik; Naveed Ahmad; Basit Shahzad; Ali Kashif Bashir. Improved Generalization for Secure Data Publishing. IEEE Access 2018, 6, 27156 -27165.
AMA StyleSaba Yaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Basit Shahzad, Ali Kashif Bashir. Improved Generalization for Secure Data Publishing. IEEE Access. 2018; 6 (99):27156-27165.
Chicago/Turabian StyleSaba Yaseen; Syed M. Ali Abbas; Adeel Anjum; Tanzila Saba; Abid Khan; Saif Ur Rehman Malik; Naveed Ahmad; Basit Shahzad; Ali Kashif Bashir. 2018. "Improved Generalization for Secure Data Publishing." IEEE Access 6, no. 99: 27156-27165.
Makerspace is an innovative concept of working in a community based, semi-organized groups working to tinker, design, fabricate or develop, and market the ideas. The involvement of the community is vital to the success of every application of the makerspace concept. Some areas, like Science, Technology, Engineering, and Management (STEM) are among the extremely popular areas in the makerspace, while other popular areas include programming, and curriculum development. In such areas, where the community involvement is expected to be high, it is possible that the makerspace can’t accommodate all the individuals along with their equipment, at one place. Since the cost to develop the makerspace is high, we will be interested to see that how the small makerspaces can interact with the central makerspace to share the ideas and resources. In this paper, we investigate the popular areas of community involvement, opportunities and challenges in forming the distributed makerspaces, and also provide the analyses of their productivity in terms of problems solving, fabrication of small components, and software development. A model is proposed that provides a framework of conducting activities in distributed makerspaces and integrating the activities (project components) to form a product.
Basit Shahzad; Kashif Saleem. Benefits of Establishing Makerspaces in Distributed Development Environment. Robotics in Education 2018, 621 -625.
AMA StyleBasit Shahzad, Kashif Saleem. Benefits of Establishing Makerspaces in Distributed Development Environment. Robotics in Education. 2018; ():621-625.
Chicago/Turabian StyleBasit Shahzad; Kashif Saleem. 2018. "Benefits of Establishing Makerspaces in Distributed Development Environment." Robotics in Education , no. : 621-625.
Software-defined network (SDN) offers a very advantageous feature of programming the network at run time by decoupling the control plane from data plane to have centralized and better forwarding decisions. To attain the maximum throughput and relatively less latency within a large network, we have captured the real-time big data produced by the network. Big data is revolutionizing the modern computer science world to analyze the extremely large datasets to predict the future requirements. Therefore, it would be useful to embed intelligence in the systems. With the power of SDN, we programmed our network at run time using Ryu controller to dump the network traffic and engineer it accordingly. We proposed a methodology for taking intelligent decisions with traffic engineering in SDN. Results have shown that SDN leverages the big data to decrease the latency time by adding programs in the controller of SDN. An algorithm is presented to maximize the bandwidth utilization to possess higher throughput after shaping the traffic. It is found through the results that our proposed methodology of applying intelligence on traffic management in SDN outperforms those without intelligence decision making.
Shafaan Khaliq Bhatti; M. Ikram Ullah Lali; Basit Shahzad; Farooq Javid; Fakhar Ullah Mangla; Muhammad Ramzan. Leveraging the Big Data Produced by the Network to Take Intelligent Decisions on Flow Management. IEEE Access 2018, 6, 12197 -12205.
AMA StyleShafaan Khaliq Bhatti, M. Ikram Ullah Lali, Basit Shahzad, Farooq Javid, Fakhar Ullah Mangla, Muhammad Ramzan. Leveraging the Big Data Produced by the Network to Take Intelligent Decisions on Flow Management. IEEE Access. 2018; 6 ():12197-12205.
Chicago/Turabian StyleShafaan Khaliq Bhatti; M. Ikram Ullah Lali; Basit Shahzad; Farooq Javid; Fakhar Ullah Mangla; Muhammad Ramzan. 2018. "Leveraging the Big Data Produced by the Network to Take Intelligent Decisions on Flow Management." IEEE Access 6, no. : 12197-12205.
Biasness is defined as the inclined feelings of a person about any event. It can be positive or negative. Biasness identification of TV talk show's host is an attractive topic to look into due to the influence of these media groups upon the opinion making. We are using twitter tweets upon different TV hosts's talk shows to find biasness. Twitter is a widely used microblog service and social network, where people tweet mostly about current events. Here, we use sentiments analysis to judge the biasness of talk show's host. The nature of the tweets can be judged by the sentiments analysis. We use Support Vector Machine and Naïve Bayes over user's tweets for biasness identification of the host. Furthermore, emoticons are widely used in sentiments over social media. Therefore, we study the frequency of emoticons from the recent Twitter data set. Then, we carry out analysis to examine the biasness through emoticons and sentiment polarity.
Sidra Ijaz; M. IkramUllah Lali; Basit Shahzad; Azhar Imran; Salman Tiwana. Biasness identification of talk show's host by using twitter data. 2017 13th International Conference on Emerging Technologies (ICET) 2017, 1 -6.
AMA StyleSidra Ijaz, M. IkramUllah Lali, Basit Shahzad, Azhar Imran, Salman Tiwana. Biasness identification of talk show's host by using twitter data. 2017 13th International Conference on Emerging Technologies (ICET). 2017; ():1-6.
Chicago/Turabian StyleSidra Ijaz; M. IkramUllah Lali; Basit Shahzad; Azhar Imran; Salman Tiwana. 2017. "Biasness identification of talk show's host by using twitter data." 2017 13th International Conference on Emerging Technologies (ICET) , no. : 1-6.
Software development is a set of activities which time, budget, and effort of the human resource. Over the years, the software development process has matured to enable the adaptation and integration of commercially available components. The availability of commercially-off-the-shelf and modifiable-off-the-shelf components has transferred the complexity from development and design phases to the integration phase and we can observe large- application development by integrating the available components. Often, due to the limitation of technological and other resources, developing a software application in-house may be less beneficial. In such circumstances, development firms opt to either buy software or outsource the development. In this paper, we identify the factors that govern the decision of making software applications in-house, outsourcing them, or buying them from the market. Since the concept of component integration is more common in large scale applications, in this paper we consider this case.
Basit Shahzad; Abdullatif M. Abdullatif; Naveed Ikram; Atif Mashkoor. Build Software or Buy: A Study on Developing Large Scale Software. IEEE Access 2017, 5, 24262 -24274.
AMA StyleBasit Shahzad, Abdullatif M. Abdullatif, Naveed Ikram, Atif Mashkoor. Build Software or Buy: A Study on Developing Large Scale Software. IEEE Access. 2017; 5 ():24262-24274.
Chicago/Turabian StyleBasit Shahzad; Abdullatif M. Abdullatif; Naveed Ikram; Atif Mashkoor. 2017. "Build Software or Buy: A Study on Developing Large Scale Software." IEEE Access 5, no. : 24262-24274.
Purpose Twitter users’ generated data, known as tweets, are now not only used for communication and opinion sharing, but they are considered an important source of trendsetting, future prediction, recommendation systems and marketing. Using network features in tweet modeling and applying data mining and deep learning techniques on tweets is gaining more and more interest. Design/methodology/approach In this paper, user interests are discovered from Twitter Trends using a modeling approach that uses network-based text data (tweets). First, the popular trends are collected and stored in separate documents. These data are then pre-processed, followed by their labeling in respective categories. Data are then modeled and user interest for each Trending topic is calculated by considering positive tweets in that trend, average retweet and favorite count. Findings The proposed approach can be used to infer users’ topics of interest on Twitter and to categorize them. Support vector machine can be used for training and validation purposes. Positive tweets can be further analyzed to find user posting patterns. There is a positive correlation between tweets and Google data. Practical implications The results can be used in the development of information filtering and prediction systems, especially in personalized recommendation systems. Social implications Twitter microblogging platform offers content posting and sharing to billions of internet users worldwide. Therefore, this work has significant socioeconomic impacts. Originality/value This study guides on how Twitter network structure features can be exploited in discovering user interests using tweets. Further, positive correlation of Twitter Trends with Google Trends is reported, which validates the correctness of the authors’ approach.
Basit Shahzad; Ikramullah Lali; M. Saqib Nawaz; Waqar Aslam; Raza Mustafa; Atif Mashkoor. Discovery and classification of user interests on social media. Information Discovery and Delivery 2017, 45, 130 -138.
AMA StyleBasit Shahzad, Ikramullah Lali, M. Saqib Nawaz, Waqar Aslam, Raza Mustafa, Atif Mashkoor. Discovery and classification of user interests on social media. Information Discovery and Delivery. 2017; 45 (3):130-138.
Chicago/Turabian StyleBasit Shahzad; Ikramullah Lali; M. Saqib Nawaz; Waqar Aslam; Raza Mustafa; Atif Mashkoor. 2017. "Discovery and classification of user interests on social media." Information Discovery and Delivery 45, no. 3: 130-138.
Mobility is among the most popular phenomena of this era. Through the use of portable devices, such as smartphones, tablets and notebooks, computing is widely emerging on mobile phones. Since smartphones are the most available, popular, and useful portable device, they have gained unprecedented acceptability compared to other devices. Furthermore, hundreds of applications are added to the Play Store and iTunes daily, and the number of smartphone applications has long surpassed one billion. With recent smartphones, a focus on healthcare is being emphasized. Due to the emergence of mobile applications and the software engineering principles applied to mobile computing are not prominent or mature, it is important to identify the common risks that hinder mobile application development, especially healthcare applications. Thus, this paper addresses the risks faced by mobile application developments, particularly eHealth applications. The paper results include a description for selecting risks and proposes a mitigation strategy for overcoming development risks to ensure the construction of effective, secure, standard, and results-oriented healthcare applications beneficial to humanity.
Basit Shahzad; AbdullatifM. Abdullatif; Kashif Saleem; Wasif Jameel. Socio-Technical Challenges and Mitigation Guidelines in Developing Mobile Healthcare Applications. Journal of Medical Imaging and Health Informatics 2017, 7, 704 -712.
AMA StyleBasit Shahzad, AbdullatifM. Abdullatif, Kashif Saleem, Wasif Jameel. Socio-Technical Challenges and Mitigation Guidelines in Developing Mobile Healthcare Applications. Journal of Medical Imaging and Health Informatics. 2017; 7 (3):704-712.
Chicago/Turabian StyleBasit Shahzad; AbdullatifM. Abdullatif; Kashif Saleem; Wasif Jameel. 2017. "Socio-Technical Challenges and Mitigation Guidelines in Developing Mobile Healthcare Applications." Journal of Medical Imaging and Health Informatics 7, no. 3: 704-712.
The current century has brought an unimaginable growth in information and communications technology (ICT) and needs of enormous computing. The advancements in computer hardware and software particularly helped fuel the requirements of human beings, and revolutionized the smart products as an outcome. The advent of wearable devices from their development till successful materialisation has only taken less than a quarter of a century. The huge benefits of these smart wearable technologies cannot be fully enjoyed until and unless the reliability of a complete system is ensured. The reliability can be increased by the consistent advancements in hardware and software in parallel. User expectations actually are the challenges that keep the advancements alive while improving at an unmatchable pace. The future of wearable and other smart devices depends on whether they can provide a timely solution that is reliable, richer in resources, smaller in size, and cheaper in price. This paper addresses the threats and opportunities in the development and the acceptance of immersive and wearable technologies. The hardware and software challenges for the purpose of development are discussed to demonstrate the bottlenecks of the current technologies and the limitations that impose those bottlenecks. For the purpose of adoption, social and commercial challenges related to innovation and acceptability are discussed. The paper proposes guidelines that are expected to be applicable in several considerable applications of wearable technologies, for example, social networks, healthcare, and banking.
Kashif Saleem; Basit Shahzad; Mehmet A. Orgun; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues; Mohammed Zakariah. Design and deployment challenges in immersive and wearable technologies. Behaviour & Information Technology 2017, 36, 687 -698.
AMA StyleKashif Saleem, Basit Shahzad, Mehmet A. Orgun, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues, Mohammed Zakariah. Design and deployment challenges in immersive and wearable technologies. Behaviour & Information Technology. 2017; 36 (7):687-698.
Chicago/Turabian StyleKashif Saleem; Basit Shahzad; Mehmet A. Orgun; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues; Mohammed Zakariah. 2017. "Design and deployment challenges in immersive and wearable technologies." Behaviour & Information Technology 36, no. 7: 687-698.
Search engines and social networks are two entirely different data sources that can provide valuable information about Influenza. While search engine hosts can deliver popular queries (or terms) used for searching the Influenza related information, the social networks contain useful links of information sources that people have found valuable. The authors hypothesize that such data sources can provide vital first-hand information. In this article, they have proposed a methodology for detecting the information sources from social networks, particularly Twitter. The data filtering and source finding tasks are posed as classification tasks. Search engine queries are used for extracting related dataset. Results have shown that propose approach can be beneficial for extracting useful information regarding side effects, medications and to track geographical location of epidemics affected area.
M. Ikram Ullah Lali; Raza Ul Mustafa; Kashif Saleem; M. Saqib Nawaz; Tehseen Zia; Basit Shahzad; Fahd Kalloubi; El Habib Nfaoui; Omar El Beqqali. Finding Healthcare Issues with Search Engine Queries and Social Network Data. International Journal on Semantic Web and Information Systems 2017, 13, 48 -62.
AMA StyleM. Ikram Ullah Lali, Raza Ul Mustafa, Kashif Saleem, M. Saqib Nawaz, Tehseen Zia, Basit Shahzad, Fahd Kalloubi, El Habib Nfaoui, Omar El Beqqali. Finding Healthcare Issues with Search Engine Queries and Social Network Data. International Journal on Semantic Web and Information Systems. 2017; 13 (1):48-62.
Chicago/Turabian StyleM. Ikram Ullah Lali; Raza Ul Mustafa; Kashif Saleem; M. Saqib Nawaz; Tehseen Zia; Basit Shahzad; Fahd Kalloubi; El Habib Nfaoui; Omar El Beqqali. 2017. "Finding Healthcare Issues with Search Engine Queries and Social Network Data." International Journal on Semantic Web and Information Systems 13, no. 1: 48-62.
Basit Shahzad; Mehmet A. Orgun; Christoph Thuemmler. Fundamental Issues in Mobile Healthcare Information Systems. Mobile Information Systems 2016, 2016, 1 -2.
AMA StyleBasit Shahzad, Mehmet A. Orgun, Christoph Thuemmler. Fundamental Issues in Mobile Healthcare Information Systems. Mobile Information Systems. 2016; 2016 ():1-2.
Chicago/Turabian StyleBasit Shahzad; Mehmet A. Orgun; Christoph Thuemmler. 2016. "Fundamental Issues in Mobile Healthcare Information Systems." Mobile Information Systems 2016, no. : 1-2.
Esraa Almajhad; Abdullatif M. AlAbdullatif; Esam Alwagait; Basit Shahzad. Modeling of User’s Tweet Behavior to Enhance Profile’s Influence. Transactions on Petri Nets and Other Models of Concurrency XV 2016, 104 -113.
AMA StyleEsraa Almajhad, Abdullatif M. AlAbdullatif, Esam Alwagait, Basit Shahzad. Modeling of User’s Tweet Behavior to Enhance Profile’s Influence. Transactions on Petri Nets and Other Models of Concurrency XV. 2016; ():104-113.
Chicago/Turabian StyleEsraa Almajhad; Abdullatif M. AlAbdullatif; Esam Alwagait; Basit Shahzad. 2016. "Modeling of User’s Tweet Behavior to Enhance Profile’s Influence." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 104-113.
Social networks are among the most popular interactive media today due to their simplicity and their ability to break down the barriers of community rules and their speed and because of the increasing pressures of work environments that make it more difficult for people to visit or call friends. There are many social networking products available and they are widely used for social interaction. As the amount of threading data is growing, producing analysis from this large volume of communications is becoming increasingly difficult for public and private organisations. One of the important applications of this work is to determine the trends in social networks that depend on identifying relationships between members of a community. This is not a trivial task as it has numerous challenges. Information shared between social members does not have a formal data structure but is transmitted in the form of texts, emoticons, and multimedia. The inspiration for addressing this area is that if a company is advertising a sports product, for example, it has a difficulty in identifying targeted samples of Arab people on social networks who are interested in sports. In order to accomplish this, an experiment oriented approach is adopted in this study. A goal for this company is to discover users who have been interacting with other users who have the same interests, so they can receive the same type of message or advertisement. This information will help a company to determine how to develop advertisements based on Arab people’s interests. Examples of such work include the timely advertisement of the utilities that can be effectively marketed to increase the audience; for example, on the weekend days, the effective market approaches can yield considerable results in terms of increasing the sales and profits. In addition, finding an efficient way to recommend friends to a user based on interest similarity, celebrity degree, and online behaviour is of interest to social networks themselves. This problem is explored to establish and apply an efficient and easy way to classify a social network of Arab users based on their interests using available types of information, whether textual or nontextual, and to try to increase the accuracy of interest classification. Since most of the social networking is done from the mobiles nowadays, the efficient and reliable algorithm can help in developing a robust app that can perform the tweet classification on mobile phones.
Abdullatif Alabdullatif; Basit Shahzad; Esam Alwagait. Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests. Mobile Information Systems 2016, 2016, 1 -11.
AMA StyleAbdullatif Alabdullatif, Basit Shahzad, Esam Alwagait. Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests. Mobile Information Systems. 2016; 2016 ():1-11.
Chicago/Turabian StyleAbdullatif Alabdullatif; Basit Shahzad; Esam Alwagait. 2016. "Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests." Mobile Information Systems 2016, no. : 1-11.
The quantitative study to explore the most popular amongst Saudi students.The study establishes relation among the social media usage and academic grades.Poor time management and football also have negative impact on academic grades.Normality tests are to find relationship among social media usage and GPA scores.The hypothesis about existence of relationship among GPA and SN is not satisfied. Social media is a popular method for communication amongst university students in Saudi Arabia. However excessive social media use can raise questions about whether academic performance is affected. This research explores this question by conducting a survey on university students in Saudi Arabia in regards to social media usage and their academic performance. The survey also explored which social network is the most popular amongst Saudi students, what students thought about their social media usage and factors besides social media usage which negatively affect academic performance.The survey received 108 responses and descriptive statistics including normality tests i.e. scatter plots were used to examine the relationship between the average number of hours students spent of social media a week and GPA scores of the students. The results demonstrated that there was no linear relationship between social media usage in a week and GPA score. Students highlighted that besides social media use, time management is a factor which affects students 'studies negatively.The findings of the paper can be used to propose the effective plans for improving the academic performance of the students in such a way that a balance in the leisure, information exchange and academic performance can be maintained.
Esam Alwagait; Basit Shahzad; Sophia Alim. Impact of social media usage on students academic performance in Saudi Arabia. Computers in Human Behavior 2015, 51, 1092 -1097.
AMA StyleEsam Alwagait, Basit Shahzad, Sophia Alim. Impact of social media usage on students academic performance in Saudi Arabia. Computers in Human Behavior. 2015; 51 ():1092-1097.
Chicago/Turabian StyleEsam Alwagait; Basit Shahzad; Sophia Alim. 2015. "Impact of social media usage on students academic performance in Saudi Arabia." Computers in Human Behavior 51, no. : 1092-1097.