default search action
Ali Ahmed
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Ali Ahmed 0001 — Victoria University of Wellington, Wellington, New Zealand (and 3 more)
- Ali Ahmed 0002 — Concordia University, Montreal, QC, Canada
- Ali Ahmed 0003 — Universitii Teknologi Malaysia
- Ali Ahmed 0004 — Information Technology University, Department of Electrical Engineering, Lahore, Pakistan (and 3 more)
- Ali Ahmed 0005 — Hanyang University, Department of Electronics and Communication Engineering, Gyeonggi-do, South Korea
- Ali Ahmed 0006 — Minufiya University, Faculty of Computers and Information, Shebin el Kom, Egypt
- Ali Ahmed 0007 — King Abdulaziz University, Rabigh, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Amr Ezz El-Din Rashed, Waleed M. Bahgat, Ali Ahmed, Tamer Ahmed Farrag, Ahmed E. Mansour Atwa:
Efficient machine learning models across multiple datasets for autism spectrum disorder diagnoses. Biomed. Signal Process. Control. 100: 106949 (2025) - 2024
- [j9]Amr Ezz El-Din Rashed, Ahmed E. Mansour Atwa, Ali Ahmed, Mahmoud Badawy, Mostafa A. Elhosseini, Waleed M. Bahgat:
Facial image analysis for automated suicide risk detection with deep neural networks. Artif. Intell. Rev. 57(10): 274 (2024) - [j8]Ali Ahmed, Amit Deokar, Ho Cheung Brian Lee, Nichalin S. Summerfield:
The role of commitment in online reputation systems: An empirical study of express delivery promise in an E-commerce platform. Decis. Support Syst. 176: 114061 (2024) - 2023
- [j7]Tania Saleem, Muhammad Ismaeel, Muhammad Umar Janjua, Abdulrahman Ali, Awab Aqib, Ali Ahmed, Saeed-Ul Hassan:
Predicting functional roles of Ethereum blockchain addresses. Peer Peer Netw. Appl. 16(6): 2985-3002 (2023) - [c21]Ali Ahmed:
Smart Transformer Health Monitoring System. HRI (Companion) 2023: 837-840 - 2022
- [c20]Ali Ahmed, Ezgi Akar:
An Empirical Examination of Technology and Security Services in Sharing Economy. AMCIS 2022 - [c19]Adnan Muhammad Shah, Wazir Muhammad, Ali Ahmed, Saad Bin Saeed Ahmed:
Designing an IT-Based System for Optimizing Lung Cancer Management. AMCIS 2022 - [c18]Yan Cheng, Ali Ahmed, Edward Zamrini, Yijun Shao, Qing Zeng-Treitler:
Medication-Wide Association Study Plus (MWAS+): A New Approach to Drug Repurposing. AMIA 2022 - [c17]Yijun Shao, Yan Cheng, Stuart J. Nelson, Peter Kokkinos, Edward Zamrini, Ali Ahmed, Qing Zeng-Treitler:
A Novel Hybrid Value-Aware Transformer Architecture for Learning from Longitudinal Clinical Data. AMIA 2022 - 2021
- [j6]Ali Ahmed, Muhammad Faisal Nadeem Khan, Irfan Khan, Hani Alquhayz, Muhammad Adnan Khan, Arooj Tariq Kiani:
A Novel Framework to Determine the Impact of Time Varying Load Models on Wind DG Planning. IEEE Access 9: 11342-11357 (2021) - [j5]Mehar-Un-Nisa Khursheed, Mohammed A. Alghamdi, Muhammad Faisal Nadeem Khan, Ahmed Khalil Khan, Irfan Khan, Ali Ahmed, Arooj Tariq Kiani, Muhammad Adnan Khan:
PV Model Parameter Estimation Using Modified FPA With Dynamic Switch Probability and Step Size Function. IEEE Access 9: 42027-42044 (2021) - [j4]Ali Ahmed, Amit V. Deokar, Ho Cheung Brian Lee:
Vulnerability disclosure mechanisms: A synthesis and framework for market-based and non-market-based disclosures. Decis. Support Syst. 148: 113586 (2021) - [j3]Muhammad Awais, Saeed-Ul Hassan, Ali Ahmed:
Leveraging big data for politics: predicting general election of Pakistan using a novel rigged model. J. Ambient Intell. Humaniz. Comput. 12(4): 4305-4313 (2021) - [j2]YiJun Shao, Ali Ahmed, Angelike P. Liappis, Charles Faselis, Stuart J. Nelson, Qing Zeng-Treitler:
Understanding Demographic Risk Factors for Adverse Outcomes in COVID-19 Patients: Explanation of a Deep Learning Model. J. Heal. Informatics Res. 5(2): 181-200 (2021) - [c16]Yijun Shao, Ali Ahmed, Edward Zamrini, Yan Cheng, Qing Zeng-Treitler:
Enhancing Clinical Data Analysis by Explaining Interaction Effects Between Covariates in Deep Neural Network Models. AMIA 2021 - [c15]Ali Ahmed, Brian Lee, Amit V. Deokar:
The Role of Vulnerability Disclosure on Hacker Participation in Bug Bounty Programs. ICIS 2021 - 2020
- [c14]Ali Ahmed, Brian Lee:
Organizational Learning on Bug Bounty Platforms. AMCIS 2020
2010 – 2019
- 2019
- [c13]Ali Ahmed, Tareq Nasralah, Abdullah Wahbeh, Cherie Noteboom:
Patients' Characteristics Effecting the Use of a MyChart Patient Portal. HICSS 2019: 1-6 - [c12]Mohammad Al-Ramahi, Ali Ahmed:
Identifying Users' Concerns in Lodging Sharing Economy Using Unsupervised Machine Learning Approach. ICDIS 2019: 160-166 - [c11]Alex J. Cope, Ali Ahmed, Fadl Isa, James A. R. Marshall:
MiniBee: A Minature MAV for the Biomimetic Embodiment of Insect Brain Models. Living Machines 2019: 76-87 - 2018
- [c10]Gabriel Ford, Rebecca Cargan, Ali Ahmed, Kevin Rigney, Christopher Berry, Donald J. Bucci, Moshe Kam:
Wireless network traffic disaggregation using Bayesian nonparametric techniques. CISS 2018: 1-6 - [i1]Ali Ahmed:
Blind Deconvolution using Modulated Inputs. CoRR abs/1811.08453 (2018) - 2017
- [j1]Ali Ahmed:
A Robust Framework for Accurate Face Tracking. J. Softw. 12(5): 326-338 (2017) - [c9]Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, Ronghua Shan:
Impact of E-Visits on Emergency Departments and Urgent Care Centers. AMCIS 2017 - 2016
- [c8]Ali Ahmed:
Negative Effects of Online Health Forums on User's Health. AMCIS 2016 - [c7]Ali Ahmed:
Security Vulnerabilities in Children's Toys. AMCIS 2016 - [c6]YiJun Shao, April F. Mohanty, Ali Ahmed, Charlene R. Weir, Bruce E. Bray, Rashmee U. Shah, Douglas Redd, Qing Zeng-Treitler:
Identification and Use of Frailty Indicators from Text to Examine Associations with Clinical Outcomes Among Patients with Heart Failure. AMIA 2016 - 2015
- [c5]Ali Ahmed, Salma Hesham, Mohamed A. Abd El Ghany, Diana Göhringer, Klaus Hofmann:
Online bicast allocation algorithm for contention-free-routing NoCs. ICECS 2015: 324-327 - 2013
- [c4]Amr M. Nagy, Ali Ahmed, Hala Helmy Zayed:
Hybrid Iterated Kalman Particle Filter for Object Tracking Problems. VISAPP (2) 2013: 375-381 - 2012
- [c3]Ali Ahmed, Abdullah A. I. Alnajem:
Trust-aware access control: How recent is your transaction history? DICTAP 2012: 208-213 - 2011
- [c2]Syed Akhlaq Hussain Shah, Ali Ahmed, Iftekhar Mahmood, Khurram Khurshid:
Hand gesture based user interface for computer using a camera and projector. ICSIPA 2011: 168-173
2000 – 2009
- 2009
- [c1]Ali Ahmed, K. Terada:
Object Detection and Tracking using Kalman Filter and Fast Mean Shift Algorithm. VISAPP (1) 2009: 585-589
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint