Professor Department of Information System, International Islamic University Malaysia
Verified email at
TitleCited byYear
Cloud computing adoption model for universities to increase ICT proficiency
S Okai, M Uddin, A Arshad, R Alsaqour, A Shah
SAGE Open 4 (3), 2158244014546461, 2014
Steganography: a new horizon for safe communication through xml.
AG Memon, S Khawaja, A Shah
Journal of Theoretical & Applied Information Technology 4 (3), 2008
Measuring efficiency of tier level data centers to implement green energy efficient data centers
M Uddin, A Shah, R Alsaqour, J Memon
Middle-East Journal of Scientific Research 15 (2), 200-207, 2013
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: A review
M Uddin, Y Darabidarabkhani, A Shah, J Memon
Renewable and Sustainable Energy Reviews 51, 1553-1563, 2015
Green Information Technology (IT) framework for energy efficient data centers using virtualization
M Uddin, M Talha, AA Rahman, A Shah, JA Khader, J Memon
International Journal of Physical Sciences 7 (13), 2052-2065, 2012
Internet banking in Pakistan: finding complexities
MA Akhlaq, A Shah
The Journal of Internet Banking and Commerce 16 (1), 1-14, 1970
Improving performance of mobile Ad Hoc networks using efficient tactical On demand distance vector (TAODV) routing algorithm
M Uddin, AA Rahman, A Alarifi, M Talha, A Shah, M Iftikhar, A Zomaya
International Journal of Innovative Computing, Information and Control …, 2012
An appraisal of off-line signature verification techniques
AS Shah, MNA Khan, A Shah
International Journal of Modern Education and Computer Science 7 (4), 67, 2015
Barriers Effecting Successful Implementation of E-Learning in Saudi Arabian Universities.
QN Naveed, A Muhammed, S Sanober, MRN Qureshi, A Shah
International Journal of Emerging Technologies in Learning 12 (6), 2017
A mixed method study for investigating critical success factors (CSFs) of e-learning in Saudi Arabian universities
QN Naveed, A Muhammad, S Sanober, MRN Qureshi, A Shah
methods 8 (5), 2017
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
A Hamza, A Shah
International Journal of Computer and Information Technology 3 (1), 13-20, 2014
Anomaly detection in vessel tracking using support vector machines (SVMs)
DOD Handayani, W Sediono, A Shah
2013 International Conference on Advanced Computer Science Applications and …, 2013
Online banking information systems acceptance: An empirical examination of system characteristics and web security
FH Chandio, Z Irani, AM Zeki, A Shah, SC Shah
Information Systems Management 34 (1), 50-64, 2017
Building CMU Sphinx language model for the Holy Quran using simplified Arabic phonemes
MY El Amrani, MMH Rahman, MR Wahiddin, A Shah
Egyptian informatics journal 17 (3), 305-314, 2016
Mobile agent based multi-layer security framework for cloud data centers
M Uddin, J Memon, R Alsaqour, A Shah, MZA Rozan
Indian Journal of Science and Technology 8 (12), 1, 2015
Transaction Management Techniques and Practices In Current Cloud Computing Environments: A Survey
A Waqas, AW Mahessar, N Mahmood, Z Bhatti, M Karbasi, A Shah
International Journal of Database Management Systems 7 (1), 41, 2015
Power usage effectiveness metrics to measure efficiency and performance of data centers
M Uddin, R Alsaqour, A Shah, T Saba
Applied mathematics & information sciences 8 (5), 2207, 2014
A security-based survey and classification of Cloud Architectures, State of Art and Future Directions
A Waqas, ZM Yusof, A Shah
2013 International Conference on Advanced Computer Science Applications and …, 2013
Sharing of attacks information across clouds for improving security: A conceptual framework
A Waqas, ZM Yusof, A Shah, N Mahmood
2014 International Conference on Computer, Communications, and Control …, 2014
Fault tolerant cloud auditing
A Waqas, ZM Yusof, A Shah
2013 5th International Conference on Information and Communication …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20