


default search action
Safeeullah Soomro
Person information
- affiliation: University Bahrain
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j1]Mohammad Riyaz Belgaum
, Shahrulniza Musa
, Fuead Ali
, Muhammad Mansoor Alam
, Zainab Alansari
, Safeeullah Soomro
, Mazliham Mohd Su'ud
:
Self-Socio Adaptive Reliable Particle Swarm Optimization Load Balancing in Software-Defined Networking. IEEE Access 11: 101666-101677 (2023)
2010 – 2019
- 2019
- [i30]Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham Mohd Su'ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari:
Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks. CoRR abs/1904.01826 (2019) - [i29]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum:
Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics. CoRR abs/1904.09268 (2019) - [i28]Zainab Alansari, Safeeullah Soomro, Mohammad Riyaz Belgaum, Shahaboddin Shamshirband:
The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open research Issues. CoRR abs/1904.09270 (2019) - [i27]Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H. Miraz:
A Framework for Debugging Java Programs in a Bytecode. CoRR abs/1904.12501 (2019) - [i26]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing. CoRR abs/1905.03093 (2019) - [i25]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Shahrulniza Musa, Muhammad Alam, Mazliham Mohd Su'ud:
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing. CoRR abs/1905.03094 (2019) - [i24]Awais Khan Jumani, Mashooque Ahmed Memon, Fida Hussain Khoso, Anwar Ali Sanjrani, Safeeullah Soomro:
Named Entity Recognition System for Sindhi Language. CoRR abs/1910.03475 (2019) - 2018
- [i23]Nareena Soomro, Safeeullah Soomro:
Autism Children's App using PECS. CoRR abs/1801.03529 (2018) - [i22]Fahad Razaque, Nareena Soomro, Shoaib Ahmed Shaikh, Safeeullah Soomro, Javed Ahmed Samo, Natesh Kumar, Huma Dharejo:
Using Naive Bayes Algorithm to Students' bachelor Academic Performances Analysis. CoRR abs/1802.04845 (2018) - [i21]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam, Shahrulniza Musa, Mazliham Mohd Su'ud:
Challenges: Bridge between Cloud and IoT. CoRR abs/1803.02890 (2018) - [i20]Jissy Ann George, S. Veni, Safeeullah Soomro:
Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm. CoRR abs/1803.02891 (2018) - [i19]Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H. Miraz:
Fault Localization Models in Debugging. CoRR abs/1803.03673 (2018) - [i18]Anupama Prasanth, Sandhia Valsala, Safeeullah Soomro:
A Novel Approach in Calculating Stakeholder priority in Requirements Elicitation. CoRR abs/1803.05969 (2018) - [i17]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum, Mahdi H. Miraz, Jawdat Alshaer:
Challenges of Internet of Things and Big Data Integration. CoRR abs/1806.08953 (2018) - [i16]Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum, Jawdat Alshaer, Safeeullah Soomro, Mahdi H. Miraz:
Internet of Things: Infrastructure, Architecture, Security and Privacy. CoRR abs/1807.04087 (2018) - 2017
- [i15]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS. CoRR abs/1708.01639 (2017) - [i14]Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum:
Control and Data Flow Execution of Java Programs. CoRR abs/1708.07393 (2017) - [i13]Mashooque Ahmed Memon, Safeeullah Soomro, Awais Khan Jumani, Muneer Ahmed Kartio:
Big Data Analytics and Its Applications. CoRR abs/1710.04135 (2017) - [i12]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Ideal Node Enquiry Search Algorithm (INESH) in MANETS. CoRR abs/1710.10145 (2017) - 2016
- [i11]Abdul Ahad Abro, Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum, Abdul Baqi Khan Khakwani:
Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA). CoRR abs/1612.07685 (2016) - [i10]Nareena Soomro, Safeeullah Soomro, Zainab Alansari, Suhni Abbasi, Mohammad Riyaz Belgaum, Abdul Baqi Khan Khakwani:
Development of UMLS Based Health Care Web Services for Android Platform. CoRR abs/1612.07688 (2016) - 2015
- [i9]Sadaf Solangi, Safeeullah Soomro, Suhni Abbasi:
Analysis of SVN Repositories for Remote Access. CoRR abs/1511.06722 (2015) - [i8]Tanesh Kumar, Faizan Khan, Safeeullah Soomro, Areez Khalil Memon:
WLAN Specific IoT Enable Power Efficient RAM Design on 40nm FPGA. CoRR abs/1511.06759 (2015) - 2013
- [i7]Safeeullah Soomro, Zahid Hussain, Ayaz Keerio:
Path Conditions Help to Locate and Localize Faults from Programs. CoRR abs/1308.2468 (2013) - [i6]Haider Mehdi, Safeeullah Soomro, W. R. Khan, Abdul Ghafoor Memon, Abdul Hafeez:
Error-Rate Performance Analysis of Wireless Sensor Networks over Fading Channels. CoRR abs/1309.1818 (2013) - [i5]Syed Asif Ali, Safeeullah Soomro, Abdul Ghafoor Memon, Mashooque Ahmed:
Interactive Employment Model to Assimilate the Deaf persons in workplace by using ICT. CoRR abs/1310.5472 (2013) - [i4]Syed Asif Ali, Safeeullah Soomro, Abdul Ghafoor Memon, Abdul Baqi:
Implementation of Automata Theory to Improve the Learning Disability. CoRR abs/1310.5474 (2013) - [i3]Adnan Alam Khan, Safeeullah Soomro, Abdul Ghafoor Memon:
Flickers Forecasting In CRT Using Stochastic Analysis. CoRR abs/1310.5478 (2013) - [i2]Safeeullah Soomro, Adnan Alam Khan, Abdul Ghafoor Memon, Asim Iftikhar, Maree Mujeeb-u-Rehman:
An Operational Approach For Wimax At Ultra High Bandwidth With Spectrum 60 Ghz. CoRR abs/1310.5794 (2013) - 2012
- [i1]Adnan Alam Khan, Safeeullah Soomro, Irfan Hyder:
Fast Subsequent Color Iris Matching in large Database. CoRR abs/1207.2861 (2012) - 2011
- [c7]Abdul Baqi, Sajjad Ahmed Soomro, Safeeullah Soomro
:
Design and Realization of FH-CDMA Scheme for Multiple-Access Communication Systems. CSEE (1) 2011: 161-166 - [c6]Atiya Azmi, Nadia Ishaque, Ammar Abbas, Safeeullah Soomro
:
VCAN-Controller Area Network Based Human Vital Sign Data Transmission Protocol. CSEE (1) 2011: 290-296 - 2010
- [c5]Safeeullah Soomro
, Abdul Baqi:
Relationship between the Verification Based Model and the Functional Dependences Model Using Program Specification. ICIC (2) 2010: 535-542
2000 – 2009
- 2009
- [c4]Safeeullah Soomro
, Franz Wotawa
:
Detect and Localize Faults in Alias-Free Programs Using Specification Knowledge. IEA/AIE 2009: 379-388 - 2007
- [c3]Safeeullah Soomro:
Using abstract dependences to localize faults from procedural programs. Artificial Intelligence and Applications 2007: 200-205 - 2006
- [c2]Bernhard Peischl
, Safeeullah Soomro
, Franz Wotawa
:
Towards Lightweight Fault Localization in Procedural Programs. IEA/AIE 2006: 660-667 - 2005
- [c1]Franz Wotawa, Safeeullah Soomro
:
Fault Localization Based on Abstract Dependencies. IEA/AIE 2005: 357-359
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint