This page has only limited features, please log in for full access.

Unclaimed
Basit Shahzad
Department of Software Engineering, National University of Modern Languages, Islamabad 44000, Pakistan

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 14 February 2021 in Sustainability
Reads 0
Downloads 0

In the higher education sector, there is a growing trend to offer academic information to users through websites. Contemporarily, the users (i.e., students/teachers, parents, and administrative staff) greatly rely on these websites to perform various academic tasks, including admission, access to learning management systems (LMS), and links to other relevant resources. These users vary from each other in terms of their technological competence, objectives, and frequency of use. Therefore, academic websites should be designed considering different dimensions, so that everybody can be accommodated. Knowing the different dimensions with respect to the usability of academic websites is a multi-criteria decision-making (MCDM) problem. The fuzzy analytic hierarchy process (FAHP) approach has been considered to be a significant method to deal with the uncertainty that is involved in subjective judgment. Although a wide range of usability factors for academic websites have already been identified, most of them are based on the judgment of experts who have never used these websites. This study identified important factors through a detailed literature review, classified them, and prioritized the most critical among them through the FAHP methodology, involving relevant users to propose a usability evaluation framework for academic websites. To validate the proposed framework, five websites of renowned higher educational institutes (HEIs) were evaluated and ranked according to the usability criteria. As the proposed framework was created methodically, the authors believe that it would be helpful for detecting real usability issues that currently exist in academic websites.

ACS Style

Abdulhafeez Muhammad; Ansar Siddique; Quadri Naveed; Uzma Khaliq; Ali Aseere; Mohd Hasan; Mohamed Qureshi; Basit Shehzad. Evaluating Usability of Academic Websites through a Fuzzy Analytical Hierarchical Process. Sustainability 2021, 13, 2040 .

AMA Style

Abdulhafeez Muhammad, Ansar Siddique, Quadri Naveed, Uzma Khaliq, Ali Aseere, Mohd Hasan, Mohamed Qureshi, Basit Shehzad. Evaluating Usability of Academic Websites through a Fuzzy Analytical Hierarchical Process. Sustainability. 2021; 13 (4):2040.

Chicago/Turabian Style

Abdulhafeez Muhammad; Ansar Siddique; Quadri Naveed; Uzma Khaliq; Ali Aseere; Mohd Hasan; Mohamed Qureshi; Basit Shehzad. 2021. "Evaluating Usability of Academic Websites through a Fuzzy Analytical Hierarchical Process." Sustainability 13, no. 4: 2040.

Journal article
Published: 15 May 2020 in Sustainability
Reads 0
Downloads 0

The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To identify the most important quality criteria, a survey was conducted. An instrument was deployed among 157 subjects, including e-learning designers, developers, students, teachers, and educational administrators. Finally, a second instrument was distributed among 51 participants to make a pairwise comparison among the criteria and rank them according to their relative importance. The identified and prioritized factors were classified into four main categories. Among these four factors, content was identified as the most important factor, whereas design was found to be the least important factor.

ACS Style

Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability 2020, 12, 4071 .

AMA Style

Abdul Hafeez Muhammad, Ansar Siddique, Ahmed E. Youssef, Kashif Saleem, Basit Shahzad, Adnan Akram, Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability. 2020; 12 (10):4071.

Chicago/Turabian Style

Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. 2020. "A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems." Sustainability 12, no. 10: 4071.

Research papers
Published: 02 April 2020 in The Imaging Science Journal
Reads 0
Downloads 0

Sign language is a medium of communication for people with hearing disabilities. Static and dynamic gestures are identified in a video-based sign language recognition and translated them into humanly understandable phrases to achieve the communication objective. However, videos contain redundant Key-frames which require additional processing. Number of such Key-frames can be reduced. The selection of particular Key-frames without losing the required information is a challenging task. The Key-frame extraction algorithm is used which helps to speed-up the sign language recognition process by extracting essential key-frames. The proposed framework eliminates the computation overhead by picking up the distinct Key-frames for the recognition process. Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Histograms of Oriented Gradient (HOG) are used for unique features extraction. We used the bagged tree, boosted tree ensemble method, Fine KNN, and SVM for classification. We tested methodology on video-based datasets of Pakistani Sign Language. It achieved an overall 97.5% accuracy on 37 Urdu alphabets and 95.6% accuracy on 100 common words.

ACS Style

Fakhar Ullah Mangla; Aysha Bashir; Ikram Lali; Ahmad Chan Bukhari; Basit Shahzad. A novel key-frame selection-based sign language recognition framework for the video data. The Imaging Science Journal 2020, 68, 156 -169.

AMA Style

Fakhar Ullah Mangla, Aysha Bashir, Ikram Lali, Ahmad Chan Bukhari, Basit Shahzad. A novel key-frame selection-based sign language recognition framework for the video data. The Imaging Science Journal. 2020; 68 (3):156-169.

Chicago/Turabian Style

Fakhar Ullah Mangla; Aysha Bashir; Ikram Lali; Ahmad Chan Bukhari; Basit Shahzad. 2020. "A novel key-frame selection-based sign language recognition framework for the video data." The Imaging Science Journal 68, no. 3: 156-169.

Journal article
Published: 31 January 2020 in IEEE Access
Reads 0
Downloads 0

A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of security breaches to information have an increasing possibility. In this paper, we propose a symmetric encryption algorithm for color images by extending the current encryption/decryption techniques. Our encryption algorithm is based on three chaotic systems (PWLCM, Lorenz and 4D Lorenz-type), a Secure Hash Algorithm, a scrambler, a chaotic generator and DNA sequence based Linear Feedback Shift Register. We introduce multilevel security to increase the degree of diffusion and confusion. Through experiments, we present security analysis for key irreproducibility and sensitivity, Gray Level Co-occurrence Matrix based analysis, maximum deviation, irregular deviation, entropy, histogram, variance and correlation, number of pixel change rate, unified average cipher intensity, known/chosen-plaintext attacks, mean absolute error, robustness against noises of various types using PSNR and occlusion attacks. It is demonstrated that mostly our proposed encryption algorithm has enhanced performance as compared to contemporary works in information security, while comparable in other cases.

ACS Style

Muhammad Samiullah; Waqar Aslam; Hira Nazir; M. IkramUllah Lali; Basit Shahzad; Muhammad Rafiq Mufti; Humaira Afzal. An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems. IEEE Access 2020, 8, 25650 -25663.

AMA Style

Muhammad Samiullah, Waqar Aslam, Hira Nazir, M. IkramUllah Lali, Basit Shahzad, Muhammad Rafiq Mufti, Humaira Afzal. An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems. IEEE Access. 2020; 8 (99):25650-25663.

Chicago/Turabian Style

Muhammad Samiullah; Waqar Aslam; Hira Nazir; M. IkramUllah Lali; Basit Shahzad; Muhammad Rafiq Mufti; Humaira Afzal. 2020. "An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems." IEEE Access 8, no. 99: 25650-25663.

Journal article
Published: 25 February 2019 in IEEE Access
Reads 0
Downloads 0

The electronic voting has emerged over time as a replacement to the paper based voting to reduce the redundancies and inconsistencies. The historical perspective presented in last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using the effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing are introduced in this paper. The introduction of block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested that ensures that the blockchain is owned by a governing body (e.g. election commission) and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This research claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.

ACS Style

Basit Shahzad; Jon Crowcroft. Trustworthy Electronic Voting Using Adjusted Blockchain Technology. IEEE Access 2019, 7, 24477 -24488.

AMA Style

Basit Shahzad, Jon Crowcroft. Trustworthy Electronic Voting Using Adjusted Blockchain Technology. IEEE Access. 2019; 7 (99):24477-24488.

Chicago/Turabian Style

Basit Shahzad; Jon Crowcroft. 2019. "Trustworthy Electronic Voting Using Adjusted Blockchain Technology." IEEE Access 7, no. 99: 24477-24488.

Journal article
Published: 07 January 2019 in IEEE Access
Reads 0
Downloads 0

Social online marketing is expanding fast with evolution and recent development in Information and Communication Technology (ICT). Investigating how companies are exploiting social media for marketing, advertisement and consumer’s engagement is gaining more and more interest. In this article, brands/companies data on Twitter is collected and analyzed to compute the overall company response on Twitter. Responsiveness of a company is inferred from three features: company popularity, average company replies and average followers’ replies. Twitter network features are used in calculating posting frequency for companies and their followers. It is shown that the proposed approach can be used in finding the responsiveness of companies and their followers. Furthermore, useful links for a brand consumer is extracted and the posting behavior of brands and their followers is determined with the help of Twitter network features such as retweet count and geolocation. This study contributes to the literature on how Twitter data and its network structure features can be exploited in finding responsiveness and posting behavior of companies and their followers. We believe that this approach can be used effectively in developing prediction and information-filtering systems, particularly the personalized-recommendation systems.

ACS Style

Basit Shahzad; Kinza Mehr Awan; Abdullatif M. Abdullatif; M. IkramUllah Lali; M. Saqib Nawaz; Ume Ayesha; Muzafar Khan. Quantification of Productivity of the Brands on Social Media With Respect to Their Responsiveness. IEEE Access 2019, 7, 9531 -9539.

AMA Style

Basit Shahzad, Kinza Mehr Awan, Abdullatif M. Abdullatif, M. IkramUllah Lali, M. Saqib Nawaz, Ume Ayesha, Muzafar Khan. Quantification of Productivity of the Brands on Social Media With Respect to Their Responsiveness. IEEE Access. 2019; 7 (99):9531-9539.

Chicago/Turabian Style

Basit Shahzad; Kinza Mehr Awan; Abdullatif M. Abdullatif; M. IkramUllah Lali; M. Saqib Nawaz; Ume Ayesha; Muzafar Khan. 2019. "Quantification of Productivity of the Brands on Social Media With Respect to Their Responsiveness." IEEE Access 7, no. 99: 9531-9539.

Journal article
Published: 29 October 2018 in IEEE Access
Reads 0
Downloads 0

Software Requirements Engineering has paved its roots in both industry and academia, as today’s complex systems are programmed to provide efficient user-centric functionalities. This also refers to the emergence of challenges in Requirements Elicitation techniques, approaches and tools while performing them. Particularly, in the area of Requirements Engineering for software development, a number of techniques and approaches have been observed in literature but for mobile application development, which is different from the traditional software development, has not been discussed much in past studies. Short development cycle, device limitations and less development time for mobile application development are some of the issues to which there is no ‘silver bullet’ available. Therefore, the Requirement Analysts are in dire need of defined guidelines for Requirement Elicitation in mobile application development. With this study, we aim to provide detailed overview of Requirements Elicitation techniques and its challenges. We have conducted a systematic literature review by surveying 4507 initial and 36 primary studies. A comprehensive set of 22 elicitation techniques were measured based on quality assessment criteria including time and cost factors, resource effectiveness and domain understanding. Furthermore, challenges in Requirements Elicitation were also grouped into 8 different categories based on their applicability. Our study effectively contributes in highlighting Software Requirements Elicitation Techniques and its challenges in mobile application development.

ACS Style

A. Hafsa Dar; B. Muhammad Ikram Ullah Lali; C. Humaira Ashraf; D. Muhammad Ramzan; E. Tehmina Amjad; F. Basit Shahzad. A Systematic Study on Software Requirements Elicitation Techniques and its Challenges in Mobile Application Development. IEEE Access 2018, 6, 63859 -63867.

AMA Style

A. Hafsa Dar, B. Muhammad Ikram Ullah Lali, C. Humaira Ashraf, D. Muhammad Ramzan, E. Tehmina Amjad, F. Basit Shahzad. A Systematic Study on Software Requirements Elicitation Techniques and its Challenges in Mobile Application Development. IEEE Access. 2018; 6 (99):63859-63867.

Chicago/Turabian Style

A. Hafsa Dar; B. Muhammad Ikram Ullah Lali; C. Humaira Ashraf; D. Muhammad Ramzan; E. Tehmina Amjad; F. Basit Shahzad. 2018. "A Systematic Study on Software Requirements Elicitation Techniques and its Challenges in Mobile Application Development." IEEE Access 6, no. 99: 63859-63867.

Journal article
Published: 07 May 2018 in IEEE Access
Reads 0
Downloads 0

In data publishing, privacy and utility are essential for data owners and users respectively, which cannot coexist well. This incompatibility puts the data privacy researchers under an obligation to find newer and reliable privacy preserving tradeofftechniques. Data providers like many public and private organizations (e.g. hospitals and banks) publish microdata of individuals for various research purposes. Publishing microdata may compromise the privacy of individuals. To prevent the privacy of individuals, data must be published after removing personal identifiers like name and social security numbers. Removal of the personal identifiers appears as not enough to protect the privacy of individuals. Κ-anonymity model is used to publish microdata by preserving the individual’s privacy through generalization. There exist many state-of-the-arts generalizationbased techniques, which deal with pre-defined attacks like background knowledge attack, similarity attack, probability attack and so on. However, existing generalization-based techniques compromise the data utility while ensuring privacy. It is an open question to find an efficient technique that is able to set a trade-off between privacy and utility. In this paper, we discussed existing generalization hierarchies and their limitations in detail. We have also proposed three new generalization techniques including Conventional Generalization Hierarchies (CGH), Divisors Based Generalization Hierarchies (DBGH) and Cardinality-Based Generalization Hierarchies (CBGH). Extensive experiments on the real-world dataset acknowledges that our technique outperforms among the existing techniques in terms of better utility.

ACS Style

Saba Yaseen; Syed M. Ali Abbas; Adeel Anjum; Tanzila Saba; Abid Khan; Saif Ur Rehman Malik; Naveed Ahmad; Basit Shahzad; Ali Kashif Bashir. Improved Generalization for Secure Data Publishing. IEEE Access 2018, 6, 27156 -27165.

AMA Style

Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Basit Shahzad, Ali Kashif Bashir. Improved Generalization for Secure Data Publishing. IEEE Access. 2018; 6 (99):27156-27165.

Chicago/Turabian Style

Saba Yaseen; Syed M. Ali Abbas; Adeel Anjum; Tanzila Saba; Abid Khan; Saif Ur Rehman Malik; Naveed Ahmad; Basit Shahzad; Ali Kashif Bashir. 2018. "Improved Generalization for Secure Data Publishing." IEEE Access 6, no. 99: 27156-27165.

Conference paper
Published: 13 April 2018 in Robotics in Education
Reads 0
Downloads 0

Makerspace is an innovative concept of working in a community based, semi-organized groups working to tinker, design, fabricate or develop, and market the ideas. The involvement of the community is vital to the success of every application of the makerspace concept. Some areas, like Science, Technology, Engineering, and Management (STEM) are among the extremely popular areas in the makerspace, while other popular areas include programming, and curriculum development. In such areas, where the community involvement is expected to be high, it is possible that the makerspace can’t accommodate all the individuals along with their equipment, at one place. Since the cost to develop the makerspace is high, we will be interested to see that how the small makerspaces can interact with the central makerspace to share the ideas and resources. In this paper, we investigate the popular areas of community involvement, opportunities and challenges in forming the distributed makerspaces, and also provide the analyses of their productivity in terms of problems solving, fabrication of small components, and software development. A model is proposed that provides a framework of conducting activities in distributed makerspaces and integrating the activities (project components) to form a product.

ACS Style

Basit Shahzad; Kashif Saleem. Benefits of Establishing Makerspaces in Distributed Development Environment. Robotics in Education 2018, 621 -625.

AMA Style

Basit Shahzad, Kashif Saleem. Benefits of Establishing Makerspaces in Distributed Development Environment. Robotics in Education. 2018; ():621-625.

Chicago/Turabian Style

Basit Shahzad; Kashif Saleem. 2018. "Benefits of Establishing Makerspaces in Distributed Development Environment." Robotics in Education , no. : 621-625.

Journal article
Published: 28 February 2018 in IEEE Access
Reads 0
Downloads 0

Software-defined network (SDN) offers a very advantageous feature of programming the network at run time by decoupling the control plane from data plane to have centralized and better forwarding decisions. To attain the maximum throughput and relatively less latency within a large network, we have captured the real-time big data produced by the network. Big data is revolutionizing the modern computer science world to analyze the extremely large datasets to predict the future requirements. Therefore, it would be useful to embed intelligence in the systems. With the power of SDN, we programmed our network at run time using Ryu controller to dump the network traffic and engineer it accordingly. We proposed a methodology for taking intelligent decisions with traffic engineering in SDN. Results have shown that SDN leverages the big data to decrease the latency time by adding programs in the controller of SDN. An algorithm is presented to maximize the bandwidth utilization to possess higher throughput after shaping the traffic. It is found through the results that our proposed methodology of applying intelligence on traffic management in SDN outperforms those without intelligence decision making.

ACS Style

Shafaan Khaliq Bhatti; M. Ikram Ullah Lali; Basit Shahzad; Farooq Javid; Fakhar Ullah Mangla; Muhammad Ramzan. Leveraging the Big Data Produced by the Network to Take Intelligent Decisions on Flow Management. IEEE Access 2018, 6, 12197 -12205.

AMA Style

Shafaan Khaliq Bhatti, M. Ikram Ullah Lali, Basit Shahzad, Farooq Javid, Fakhar Ullah Mangla, Muhammad Ramzan. Leveraging the Big Data Produced by the Network to Take Intelligent Decisions on Flow Management. IEEE Access. 2018; 6 ():12197-12205.

Chicago/Turabian Style

Shafaan Khaliq Bhatti; M. Ikram Ullah Lali; Basit Shahzad; Farooq Javid; Fakhar Ullah Mangla; Muhammad Ramzan. 2018. "Leveraging the Big Data Produced by the Network to Take Intelligent Decisions on Flow Management." IEEE Access 6, no. : 12197-12205.

Conference paper
Published: 01 December 2017 in 2017 13th International Conference on Emerging Technologies (ICET)
Reads 0
Downloads 0

Biasness is defined as the inclined feelings of a person about any event. It can be positive or negative. Biasness identification of TV talk show's host is an attractive topic to look into due to the influence of these media groups upon the opinion making. We are using twitter tweets upon different TV hosts's talk shows to find biasness. Twitter is a widely used microblog service and social network, where people tweet mostly about current events. Here, we use sentiments analysis to judge the biasness of talk show's host. The nature of the tweets can be judged by the sentiments analysis. We use Support Vector Machine and Naïve Bayes over user's tweets for biasness identification of the host. Furthermore, emoticons are widely used in sentiments over social media. Therefore, we study the frequency of emoticons from the recent Twitter data set. Then, we carry out analysis to examine the biasness through emoticons and sentiment polarity.

ACS Style

Sidra Ijaz; M. IkramUllah Lali; Basit Shahzad; Azhar Imran; Salman Tiwana. Biasness identification of talk show's host by using twitter data. 2017 13th International Conference on Emerging Technologies (ICET) 2017, 1 -6.

AMA Style

Sidra Ijaz, M. IkramUllah Lali, Basit Shahzad, Azhar Imran, Salman Tiwana. Biasness identification of talk show's host by using twitter data. 2017 13th International Conference on Emerging Technologies (ICET). 2017; ():1-6.

Chicago/Turabian Style

Sidra Ijaz; M. IkramUllah Lali; Basit Shahzad; Azhar Imran; Salman Tiwana. 2017. "Biasness identification of talk show's host by using twitter data." 2017 13th International Conference on Emerging Technologies (ICET) , no. : 1-6.

Journal article
Published: 26 October 2017 in IEEE Access
Reads 0
Downloads 0

Software development is a set of activities which time, budget, and effort of the human resource. Over the years, the software development process has matured to enable the adaptation and integration of commercially available components. The availability of commercially-off-the-shelf and modifiable-off-the-shelf components has transferred the complexity from development and design phases to the integration phase and we can observe large- application development by integrating the available components. Often, due to the limitation of technological and other resources, developing a software application in-house may be less beneficial. In such circumstances, development firms opt to either buy software or outsource the development. In this paper, we identify the factors that govern the decision of making software applications in-house, outsourcing them, or buying them from the market. Since the concept of component integration is more common in large scale applications, in this paper we consider this case.

ACS Style

Basit Shahzad; Abdullatif M. Abdullatif; Naveed Ikram; Atif Mashkoor. Build Software or Buy: A Study on Developing Large Scale Software. IEEE Access 2017, 5, 24262 -24274.

AMA Style

Basit Shahzad, Abdullatif M. Abdullatif, Naveed Ikram, Atif Mashkoor. Build Software or Buy: A Study on Developing Large Scale Software. IEEE Access. 2017; 5 ():24262-24274.

Chicago/Turabian Style

Basit Shahzad; Abdullatif M. Abdullatif; Naveed Ikram; Atif Mashkoor. 2017. "Build Software or Buy: A Study on Developing Large Scale Software." IEEE Access 5, no. : 24262-24274.

Journal article
Published: 21 August 2017 in Information Discovery and Delivery
Reads 0
Downloads 0

Purpose Twitter users’ generated data, known as tweets, are now not only used for communication and opinion sharing, but they are considered an important source of trendsetting, future prediction, recommendation systems and marketing. Using network features in tweet modeling and applying data mining and deep learning techniques on tweets is gaining more and more interest. Design/methodology/approach In this paper, user interests are discovered from Twitter Trends using a modeling approach that uses network-based text data (tweets). First, the popular trends are collected and stored in separate documents. These data are then pre-processed, followed by their labeling in respective categories. Data are then modeled and user interest for each Trending topic is calculated by considering positive tweets in that trend, average retweet and favorite count. Findings The proposed approach can be used to infer users’ topics of interest on Twitter and to categorize them. Support vector machine can be used for training and validation purposes. Positive tweets can be further analyzed to find user posting patterns. There is a positive correlation between tweets and Google data. Practical implications The results can be used in the development of information filtering and prediction systems, especially in personalized recommendation systems. Social implications Twitter microblogging platform offers content posting and sharing to billions of internet users worldwide. Therefore, this work has significant socioeconomic impacts. Originality/value This study guides on how Twitter network structure features can be exploited in discovering user interests using tweets. Further, positive correlation of Twitter Trends with Google Trends is reported, which validates the correctness of the authors’ approach.

ACS Style

Basit Shahzad; Ikramullah Lali; M. Saqib Nawaz; Waqar Aslam; Raza Mustafa; Atif Mashkoor. Discovery and classification of user interests on social media. Information Discovery and Delivery 2017, 45, 130 -138.

AMA Style

Basit Shahzad, Ikramullah Lali, M. Saqib Nawaz, Waqar Aslam, Raza Mustafa, Atif Mashkoor. Discovery and classification of user interests on social media. Information Discovery and Delivery. 2017; 45 (3):130-138.

Chicago/Turabian Style

Basit Shahzad; Ikramullah Lali; M. Saqib Nawaz; Waqar Aslam; Raza Mustafa; Atif Mashkoor. 2017. "Discovery and classification of user interests on social media." Information Discovery and Delivery 45, no. 3: 130-138.

Journal article
Published: 01 June 2017 in Journal of Medical Imaging and Health Informatics
Reads 0
Downloads 0

Mobility is among the most popular phenomena of this era. Through the use of portable devices, such as smartphones, tablets and notebooks, computing is widely emerging on mobile phones. Since smartphones are the most available, popular, and useful portable device, they have gained unprecedented acceptability compared to other devices. Furthermore, hundreds of applications are added to the Play Store and iTunes daily, and the number of smartphone applications has long surpassed one billion. With recent smartphones, a focus on healthcare is being emphasized. Due to the emergence of mobile applications and the software engineering principles applied to mobile computing are not prominent or mature, it is important to identify the common risks that hinder mobile application development, especially healthcare applications. Thus, this paper addresses the risks faced by mobile application developments, particularly eHealth applications. The paper results include a description for selecting risks and proposes a mitigation strategy for overcoming development risks to ensure the construction of effective, secure, standard, and results-oriented healthcare applications beneficial to humanity.

ACS Style

Basit Shahzad; AbdullatifM. Abdullatif; Kashif Saleem; Wasif Jameel. Socio-Technical Challenges and Mitigation Guidelines in Developing Mobile Healthcare Applications. Journal of Medical Imaging and Health Informatics 2017, 7, 704 -712.

AMA Style

Basit Shahzad, AbdullatifM. Abdullatif, Kashif Saleem, Wasif Jameel. Socio-Technical Challenges and Mitigation Guidelines in Developing Mobile Healthcare Applications. Journal of Medical Imaging and Health Informatics. 2017; 7 (3):704-712.

Chicago/Turabian Style

Basit Shahzad; AbdullatifM. Abdullatif; Kashif Saleem; Wasif Jameel. 2017. "Socio-Technical Challenges and Mitigation Guidelines in Developing Mobile Healthcare Applications." Journal of Medical Imaging and Health Informatics 7, no. 3: 704-712.

Original articles
Published: 17 January 2017 in Behaviour & Information Technology
Reads 0
Downloads 0

The current century has brought an unimaginable growth in information and communications technology (ICT) and needs of enormous computing. The advancements in computer hardware and software particularly helped fuel the requirements of human beings, and revolutionized the smart products as an outcome. The advent of wearable devices from their development till successful materialisation has only taken less than a quarter of a century. The huge benefits of these smart wearable technologies cannot be fully enjoyed until and unless the reliability of a complete system is ensured. The reliability can be increased by the consistent advancements in hardware and software in parallel. User expectations actually are the challenges that keep the advancements alive while improving at an unmatchable pace. The future of wearable and other smart devices depends on whether they can provide a timely solution that is reliable, richer in resources, smaller in size, and cheaper in price. This paper addresses the threats and opportunities in the development and the acceptance of immersive and wearable technologies. The hardware and software challenges for the purpose of development are discussed to demonstrate the bottlenecks of the current technologies and the limitations that impose those bottlenecks. For the purpose of adoption, social and commercial challenges related to innovation and acceptability are discussed. The paper proposes guidelines that are expected to be applicable in several considerable applications of wearable technologies, for example, social networks, healthcare, and banking.

ACS Style

Kashif Saleem; Basit Shahzad; Mehmet A. Orgun; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues; Mohammed Zakariah. Design and deployment challenges in immersive and wearable technologies. Behaviour & Information Technology 2017, 36, 687 -698.

AMA Style

Kashif Saleem, Basit Shahzad, Mehmet A. Orgun, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues, Mohammed Zakariah. Design and deployment challenges in immersive and wearable technologies. Behaviour & Information Technology. 2017; 36 (7):687-698.

Chicago/Turabian Style

Kashif Saleem; Basit Shahzad; Mehmet A. Orgun; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues; Mohammed Zakariah. 2017. "Design and deployment challenges in immersive and wearable technologies." Behaviour & Information Technology 36, no. 7: 687-698.

Journal article
Published: 01 January 2017 in International Journal on Semantic Web and Information Systems
Reads 0
Downloads 0

Search engines and social networks are two entirely different data sources that can provide valuable information about Influenza. While search engine hosts can deliver popular queries (or terms) used for searching the Influenza related information, the social networks contain useful links of information sources that people have found valuable. The authors hypothesize that such data sources can provide vital first-hand information. In this article, they have proposed a methodology for detecting the information sources from social networks, particularly Twitter. The data filtering and source finding tasks are posed as classification tasks. Search engine queries are used for extracting related dataset. Results have shown that propose approach can be beneficial for extracting useful information regarding side effects, medications and to track geographical location of epidemics affected area.

ACS Style

M. Ikram Ullah Lali; Raza Ul Mustafa; Kashif Saleem; M. Saqib Nawaz; Tehseen Zia; Basit Shahzad; Fahd Kalloubi; El Habib Nfaoui; Omar El Beqqali. Finding Healthcare Issues with Search Engine Queries and Social Network Data. International Journal on Semantic Web and Information Systems 2017, 13, 48 -62.

AMA Style

M. Ikram Ullah Lali, Raza Ul Mustafa, Kashif Saleem, M. Saqib Nawaz, Tehseen Zia, Basit Shahzad, Fahd Kalloubi, El Habib Nfaoui, Omar El Beqqali. Finding Healthcare Issues with Search Engine Queries and Social Network Data. International Journal on Semantic Web and Information Systems. 2017; 13 (1):48-62.

Chicago/Turabian Style

M. Ikram Ullah Lali; Raza Ul Mustafa; Kashif Saleem; M. Saqib Nawaz; Tehseen Zia; Basit Shahzad; Fahd Kalloubi; El Habib Nfaoui; Omar El Beqqali. 2017. "Finding Healthcare Issues with Search Engine Queries and Social Network Data." International Journal on Semantic Web and Information Systems 13, no. 1: 48-62.

Editorial
Published: 29 August 2016 in Mobile Information Systems
Reads 0
Downloads 0
ACS Style

Basit Shahzad; Mehmet A. Orgun; Christoph Thuemmler. Fundamental Issues in Mobile Healthcare Information Systems. Mobile Information Systems 2016, 2016, 1 -2.

AMA Style

Basit Shahzad, Mehmet A. Orgun, Christoph Thuemmler. Fundamental Issues in Mobile Healthcare Information Systems. Mobile Information Systems. 2016; 2016 ():1-2.

Chicago/Turabian Style

Basit Shahzad; Mehmet A. Orgun; Christoph Thuemmler. 2016. "Fundamental Issues in Mobile Healthcare Information Systems." Mobile Information Systems 2016, no. : 1-2.

Conference paper
Published: 22 June 2016 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0
ACS Style

Esraa Almajhad; Abdullatif M. AlAbdullatif; Esam Alwagait; Basit Shahzad. Modeling of User’s Tweet Behavior to Enhance Profile’s Influence. Transactions on Petri Nets and Other Models of Concurrency XV 2016, 104 -113.

AMA Style

Esraa Almajhad, Abdullatif M. AlAbdullatif, Esam Alwagait, Basit Shahzad. Modeling of User’s Tweet Behavior to Enhance Profile’s Influence. Transactions on Petri Nets and Other Models of Concurrency XV. 2016; ():104-113.

Chicago/Turabian Style

Esraa Almajhad; Abdullatif M. AlAbdullatif; Esam Alwagait; Basit Shahzad. 2016. "Modeling of User’s Tweet Behavior to Enhance Profile’s Influence." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 104-113.

Research article
Published: 05 May 2016 in Mobile Information Systems
Reads 0
Downloads 0

Social networks are among the most popular interactive media today due to their simplicity and their ability to break down the barriers of community rules and their speed and because of the increasing pressures of work environments that make it more difficult for people to visit or call friends. There are many social networking products available and they are widely used for social interaction. As the amount of threading data is growing, producing analysis from this large volume of communications is becoming increasingly difficult for public and private organisations. One of the important applications of this work is to determine the trends in social networks that depend on identifying relationships between members of a community. This is not a trivial task as it has numerous challenges. Information shared between social members does not have a formal data structure but is transmitted in the form of texts, emoticons, and multimedia. The inspiration for addressing this area is that if a company is advertising a sports product, for example, it has a difficulty in identifying targeted samples of Arab people on social networks who are interested in sports. In order to accomplish this, an experiment oriented approach is adopted in this study. A goal for this company is to discover users who have been interacting with other users who have the same interests, so they can receive the same type of message or advertisement. This information will help a company to determine how to develop advertisements based on Arab people’s interests. Examples of such work include the timely advertisement of the utilities that can be effectively marketed to increase the audience; for example, on the weekend days, the effective market approaches can yield considerable results in terms of increasing the sales and profits. In addition, finding an efficient way to recommend friends to a user based on interest similarity, celebrity degree, and online behaviour is of interest to social networks themselves. This problem is explored to establish and apply an efficient and easy way to classify a social network of Arab users based on their interests using available types of information, whether textual or nontextual, and to try to increase the accuracy of interest classification. Since most of the social networking is done from the mobiles nowadays, the efficient and reliable algorithm can help in developing a robust app that can perform the tweet classification on mobile phones.

ACS Style

Abdullatif Alabdullatif; Basit Shahzad; Esam Alwagait. Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests. Mobile Information Systems 2016, 2016, 1 -11.

AMA Style

Abdullatif Alabdullatif, Basit Shahzad, Esam Alwagait. Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests. Mobile Information Systems. 2016; 2016 ():1-11.

Chicago/Turabian Style

Abdullatif Alabdullatif; Basit Shahzad; Esam Alwagait. 2016. "Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests." Mobile Information Systems 2016, no. : 1-11.

Journal article
Published: 01 October 2015 in Computers in Human Behavior
Reads 0
Downloads 0

The quantitative study to explore the most popular amongst Saudi students.The study establishes relation among the social media usage and academic grades.Poor time management and football also have negative impact on academic grades.Normality tests are to find relationship among social media usage and GPA scores.The hypothesis about existence of relationship among GPA and SN is not satisfied. Social media is a popular method for communication amongst university students in Saudi Arabia. However excessive social media use can raise questions about whether academic performance is affected. This research explores this question by conducting a survey on university students in Saudi Arabia in regards to social media usage and their academic performance. The survey also explored which social network is the most popular amongst Saudi students, what students thought about their social media usage and factors besides social media usage which negatively affect academic performance.The survey received 108 responses and descriptive statistics including normality tests i.e. scatter plots were used to examine the relationship between the average number of hours students spent of social media a week and GPA scores of the students. The results demonstrated that there was no linear relationship between social media usage in a week and GPA score. Students highlighted that besides social media use, time management is a factor which affects students 'studies negatively.The findings of the paper can be used to propose the effective plans for improving the academic performance of the students in such a way that a balance in the leisure, information exchange and academic performance can be maintained.

ACS Style

Esam Alwagait; Basit Shahzad; Sophia Alim. Impact of social media usage on students academic performance in Saudi Arabia. Computers in Human Behavior 2015, 51, 1092 -1097.

AMA Style

Esam Alwagait, Basit Shahzad, Sophia Alim. Impact of social media usage on students academic performance in Saudi Arabia. Computers in Human Behavior. 2015; 51 ():1092-1097.

Chicago/Turabian Style

Esam Alwagait; Basit Shahzad; Sophia Alim. 2015. "Impact of social media usage on students academic performance in Saudi Arabia." Computers in Human Behavior 51, no. : 1092-1097.