Mohammad Ali

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Ergodic Capacity of Multi-Tag Ambient Backscatter Systems With Hardware Impairments.
IEEE Commun. Lett., March, 2024

Understanding gratifications for engaging with short-video: a comparison of TikTok use in the USA and China.
Int. J. Mob. Commun., 2024

Exploring the Potential of the Large Language Models (LLMs) in Identifying Misleading News Headlines.
CoRR, 2024

Automatic Modulation Recognition Across SNR Variability Via Domain Adversary.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

Alleviating Dataset Constraints through Synthetic Data Generation in Machine Learning Driven Power Modeling.
Proceedings of the 15th IEEE International Green and Sustainable Computing Conference, 2024

2022
Obstacles Avoidance for Mobile Robot Using Type-2 Fuzzy Logic Controller.
Robotics, 2022

A conceptual analysis of the ethicality of Web-based messaging on the COVID-19 pandemic.
J. Inf. Commun. Ethics Soc., 2022

A Survey of Computational Framing Analysis Approaches.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2020
ICT Based Mathematics Skill Development Program: An Initiative to Overcome Mathematics Anxiety.
Int. J. Emerg. Technol. Learn., 2020

Developing Augmented Reality based Gaming Model to Teach Ethical Education in Primary Schools.
CoRR, 2020

Develop Health Monitoring and Management System to Track Health Condition and Nutrient Balance for School Students.
CoRR, 2020

Multi-dialect Arabic BERT for Country-level Dialect Identification.
Proceedings of the Fifth Arabic Natural Language Processing Workshop, 2020

Transfer Learning Based Method for COVID-19 Detection From Chest X-ray Images.
Proceedings of the 2020 IEEE Region 10 Conference, 2020

2017
Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics.
Proceedings of the International Conference on Networking, Systems and Security, 2017

2016
Efficient parallel compression and decompression for large XML files.
Int. Arab J. Inf. Technol., 2016

2011
Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement.
Proceedings of the 2011 Frontiers of Information Technology, 2011

2009
A robust technique for motion correction in fMRI.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

2008
Low Scale Deployment of RFIDs for Library Asset Tracking System.
Proceedings of the 2008 International Conference on Communications in Computing, 2008

2005
Spatial Modeling of Risk Factors for Gender-Specific Child Mortality.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005


  Loading...