Professor Department of Information System, International Islamic University Malaysia
Verified email at
Cited by
Cited by
Cloud computing adoption model for universities to increase ICT proficiency
S Okai, M Uddin, A Arshad, R Alsaqour, A Shah
SAGE Open 4 (3), 2158244014546461, 2014
Barriers effecting successful implementation of E-learning in Saudi Arabian Universities
NN Quadri, AH Muhammed, S Sanober, MRN Qureshi, A Shah
International Journal of Emerging Technologies in Learning (iJET) 12 (06 …, 2017
Steganography: a new horizon for safe communication through xml.
AG Memon, S Khawaja, A Shah
Journal of Theoretical & Applied Information Technology 4 (3), 2008
Measuring efficiency of tier level data centers to implement green energy efficient data centers
M Uddin, A Shah, R Alsaqour, J Memon
Middle-East Journal of Scientific Research 15 (2), 200-207, 2013
Green Information Technology (IT) framework for energy efficient data centers using virtualization
M Uddin, M Talha, AA Rahman, A Shah, JA Khader, J Memon
International Journal of Physical Sciences 7 (13), 2052-2065, 2012
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: A review
M Uddin, Y Darabidarabkhani, A Shah, J Memon
Renewable and Sustainable Energy Reviews 51, 1553-1563, 2015
Internet banking in Pakistan: finding complexities
MA Akhlaq, A Shah
The Journal of Internet Banking and Commerce 16 (1), 1-14, 1970
An appraisal of off-line signature verification techniques
AS Shah, MNA Khan, A Shah
International Journal of Modern Education and Computer Science 7 (4), 67-75, 2015
Online banking information systems acceptance: An empirical examination of system characteristics and web security
FH Chandio, Z Irani, AM Zeki, A Shah, SC Shah
Information Systems Management 34 (1), 50-64, 2017
A mixed method study for investigating critical success factors (CSFs) of e-learning in Saudi Arabian universities
QN Naveed, A Muhammad, S Sanober, MRN Qureshi, A Shah
methods 8 (5), 2017
Improving performance of mobile ad hoc networks using efficient tactical on demand distance vector (TAODV) routing algorithm
M Uddin, AA Rahman, A Alarifi, M Talha, A Shah, M Iftikhar, A Zomaya
International Journal of Innovative Computing, Information and Control …, 2012
Mobile agent based multi-layer security framework for cloud data centers
M Uddin, J Memon, R Alsaqour, A Shah, MZA Rozan
Indian Journal of Science and Technology 8 (12), 1, 2015
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
A Hamza, A Shah
International Journal of Computer and Information Technology 3 (1), 13-20, 2014
Anomaly detection in vessel tracking using support vector machines (SVMs)
DOD Handayani, W Sediono, A Shah
2013 International Conference on Advanced Computer Science Applications and …, 2013
Building CMU Sphinx language model for the Holy Quran using simplified Arabic phonemes
MY El Amrani, MMH Rahman, MR Wahiddin, A Shah
Egyptian informatics journal 17 (3), 305-314, 2016
Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection
N Mahmood, A Shah, A Waqas, A Abubakar, S Kamran, SB Zaidi
Journal of Theoretical and Applied Information Technology 71 (1), 87-96, 2015
Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem
M Uddin, RC Hindu, R Alsaqour, A Shah, A Abubakar, T Saba
Applied Mathematics & Information Sciences 9 (5), 2703, 2015
Power usage effectiveness metrics to measure efficiency and performance of data centers
M Uddin, R Alsaqour, A Shah, T Saba
Applied mathematics & information sciences 8 (5), 2207, 2014
Assessment of arsenic exposure by drinking well water and associated carcinogenic risk in peri-urban areas of Vehari, Pakistan
AH Shah, M Shahid, S Khalid, Z Shabbir, HF Bakhat, B Murtaza, A Farooq, ...
Environmental Geochemistry and Health 42 (1), 121-133, 2020
Redesigning Curriculum in line with Industry 4.0
RM Ellahi, MUA Khan, A Shah
Procedia computer science 151, 699-708, 2019
The system can't perform the operation now. Try again later.
Articles 1–20