Yasir Ahmad

Orcid: 0000-0002-5264-8621

According to our database1, Yasir Ahmad authored at least 12 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Computing the expected value of invariants based on resistance distance for random spiro-polynomio chains.
Discret. Appl. Math., 2025

2024
Outsourcing or in-house manufacturing in Hi-tech industry: supply chain process with Delphi-AHP approach.
Kybernetes, 2024

2022
On Vertex-Edge-Degree Topological Descriptors for Certain Crystal Networks.
Comput. Syst. Sci. Eng., 2022

Assessing the Role of Minimum Viable Products in Digital Startups.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2022

Work Demand and Prevalence of Work-related Musculoskeletal Disorders: A Case Study of Pakistan Aviation Maintenance Workers.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2022

2021
Edge Weight Based Entropy Measure of Different Shapes of Carbon Nanotubes.
IEEE Access, 2021

An Intuitionistic Fuzzy Based Approach to Resolve Detected Ambiguities in the User Requirements Document.
IEEE Access, 2021

2020
SiFSO: Fish Swarm Optimization-Based Technique for Efficient Community Detection in Complex Networks.
Complex., 2020

2018
A Hybrid Approach Using SWOT and AHP to Prioritize the Factors for Indigenous Production of Automobiles: A Case of Pakistani Automotive Industry.
Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management, 2018

2013
Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking.
Comput. Inf. Sci., 2013

2009
An Incremental View Maintenance Approach Using Version Store in Warehousing Environment.
Proceedings of the Database Theory and Application, 2009

A New Approach in T-FA Authentication with OTP Using Mobile Phone.
Proceedings of the Security Technology, 2009


  Loading...