default search action
Asif Ali
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Asif Ali, Zhizhen Liu, Aamir Ali, Ghulam Abbas, Ezzeddine Touti, Waleed Nureldeen:
Dynamic Multi-Objective Optimization of Grid-Connected Distributed Resources Along With Battery Energy Storage Management via Improved Bidirectional Coevolutionary Algorithm. IEEE Access 12: 58972-58992 (2024) - [j25]Asif Ali, Asif Ali Laghari, Irfan Ahmed Kandhro, Kamlesh Kumar, Salman Younus:
Systematic analysis of on-premise and cloud services. Int. J. Cloud Comput. 13(3): 214-242 (2024) - [j24]Muhammad Umair Safdar, Tariq Shah, Asif Ali, Tanveer ul Haq:
Construction of algebraic complex 9-bit lookup tables using non-chain-ring and its applications in data security. Integr. 94: 102095 (2024) - [j23]Asif Ali, Yuanqing Xia, Qasim Umer, Mohamed Osman:
BERT based severity prediction of bug reports for the maintenance of mobile applications. J. Syst. Softw. 208: 111898 (2024) - [j22]Muhammad Umair Safdar, Tariq Shah, Asif Ali:
Enhancing image data security with chain and non-chain Galois ring structures. Math. Comput. Simul. 225: 659-694 (2024) - [j21]Tariq Shah, Dilawar Abbas Khan, Asif Ali:
Design of nonlinear component of block cipher using quaternion integers. Multim. Tools Appl. 83(9): 25657-25674 (2024) - [j20]Asif Ali, Mireya Fernández-Chimeno, Marco A. Azpurua:
Resilience of QPSK Radio Links Under Narrowband and Broadband Electromagnetic Interferences. IEEE Open J. Commun. Soc. 5: 2391-2400 (2024) - [j19]Asif Ali, Yuanqing Xia, Qamar Navid, Zohaib Ahmad Khan, Javed Ali Khan, Eman Abdullah Aldakheel, Doaa Sami Khafaga:
Mobile-UI-Repair: a deep learning based UI smell detection technique for mobile user interface. PeerJ Comput. Sci. 10: e2028 (2024) - [j18]Asif Ali, Thejaswini J. C, Rajeesh Kumar T. V:
Revitalising Public Libraries Through Digital Technologies and Social Networking Sites: The Case of Rural Libraries of Kerala, India During Covid Pandemic. Public Libr. Q. 43(5): 603-619 (2024) - [j17]Manthar Ali, Jiaxin He, Maria Muzamil Memon, Asif Ali, Xiaoming Zhou:
Multiphysics Coupling Modeling and Simulation of Electrostatic Sensors for Gas Path Monitoring. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - 2023
- [j16]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid:
An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques. Math. Comput. Simul. 209: 153-168 (2023) - [c5]Qasim Umer, Zunaira Naveed, Choonhwa Lee, Asif Ali, Malik Khizar Saeed:
Convolutional Neural Network Based Identification of Respiratory Disease (CNN-IRD). ICTC 2023: 65-70 - 2022
- [j15]Muhammad Tanveer, Tariq Shah, Asif Ali, Dawood Shah:
An Efficient Image Privacy-Preserving Scheme Based On Mixed Chaotic Map and Compression. Int. J. Image Graph. 22(2): 2250020:1-2250020:17 (2022) - [j14]Zeesham Abbas, Kisa Fatima, Syed Hassan Abbas Jaffery, Asif Ali, Hafiz Hamid Raza, Shabbir Muhammad, H. Algarni, Sajjad Hussain, Jongwan Jung:
Ab-initio study of Nb-based complex materials: A new class of materials for optoelectronic applications. J. Comput. Sci. 63: 101791 (2022) - [j13]Muhammad Imran Haider, Tariq Shah, Asif Ali, Dawood Shah, Ijaz Khalid:
Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security. Multim. Tools Appl. 81(17): 23709-23734 (2022) - 2021
- [j12]Muhammad Tanveer, Tariq Shah, Amjad Rehman, Asif Ali, Ghazanfar Farooq Siddiqui, Tanzila Saba, Usman Tariq:
Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box. IEEE Access 9: 73924-73937 (2021) - [j11]Muhammad Imran Haider, Asif Ali, Dawood Shah, Tariq Shah:
Block cipher's nonlinear component design by elliptic curves: an image encryption application. Multim. Tools Appl. 80(3): 4693-4718 (2021) - [j10]Muhammad Hussain, Woonyoung Jeong, Il-Suk Kang, Kyeong-Keun Choi, Syed Hassan Abbas Jaffery, Asif Ali, Tassawar Hussain, Muhammad Ayaz, Sajjad Hussain, Jongwan Jung:
Highly Fast Response of Pd/Ta2O5/SiC and Pd/Ta2O5/Si Schottky Diode-Based Hydrogen Sensors. Sensors 21(4): 1042 (2021) - [j9]Asif Ali, Tabasam Rashid:
Best-worst method for robot selection. Soft Comput. 25(1): 563-583 (2021) - [j8]Tabasam Rashid, Asif Ali, Juan Luis García Guirao, Adrián Valverde:
Comparative Analysis of Hybrid Fuzzy MCGDM Methodologies for Optimal Robot Selection Process. Symmetry 13(5): 839 (2021) - [c4]Nayab Bashir, Sanam Narejo, Bushra Naz, Asif Ali:
EEG Based Major Depressive Disorder (MDD) Detection Using Machine Learning. MedPRAI 2021: 172-183 - 2020
- [j7]Asif Ali, Tabasam Rashid:
Generalized interval-valued trapezoidal fuzzy best-worst multiple criteria decision-making method with applications. J. Intell. Fuzzy Syst. 38(2): 1705-1719 (2020) - [j6]Tariq Shah, Asif Ali, Majid Khan, Ghazanfar Farooq Siddiqui, Antonio Aparecido de Andrade:
Galois Ring $GR\left( {2^{3} , 8} \right)$ Dependent 24 ˟ 24 S-Box Design: An RGB Image Encryption Application. Wirel. Pers. Commun. 113(2): 1201-1224 (2020)
2010 – 2019
- 2019
- [j5]Asif Ali, Tabasam Rashid:
Hesitant fuzzy best-worst multi-criteria decision-making method and its applications. Int. J. Intell. Syst. 34(8): 1953-1967 (2019) - [j4]Yasir Naseer, Tariq Shah, Sadam Hussain, Asif Ali:
Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops. Wirel. Pers. Commun. 108(3): 1379-1392 (2019) - 2017
- [j3]Asif Ali, Gowhar Rasool, Anjali Pathania:
Antecedents for success of e-commerce platforms: an investigative approach. Int. J. Inf. Technol. Manag. 16(4): 376-390 (2017) - 2016
- [j2]Majid Ali Khan, Mohammad Nazeeruddin, Shahabuddin Muhammad, Asif Ali:
A mining-based approach for efficient enumeration of algebraic structures. Int. J. Data Sci. Anal. 1(2): 89-98 (2016) - 2015
- [c3]Majid Ali Khan, Mohammad Nazeeruddin, Shahabuddin Muhammad, Asif Ali:
A mining based approach for efficient enumeration of algebraic structures. DSAA 2015: 1-6 - 2014
- [b1]Asif Ali:
Voice query-by-example for resource-limited languages using an ergodic hidden Markov model of speech. Georgia Institute of Technology, Atlanta, GA, USA, 2014 - 2013
- [c2]Asif Ali, Mark Clements:
Spoken Web Search using an Ergodic Hidden Markov Model of Speech. MediaEval 2013 - 2012
- [j1]Sufian Munawar, Ahmer Mehmood, Asif Ali:
Three-dimensional squeezing flow in a rotating channel of lower stretching porous wall. Comput. Math. Appl. 64(6): 1575-1586 (2012) - 2011
- [c1]Asif Ali, Jens Carl Streibig, Svend Christensen, Christian Andreasen:
Estimation of Weeds Leaf Cover Using Image Analysis and Its Relationship with Fresh Biomass Yield of Maize Under Field Conditions. HAICTA 2011: 41-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint