Dr. Waqar Mehmood
Dr. Waqar Mehmood
Associate Professor, Pak-Austria Fachhochshule: Institute of Applied Science and Technology
Verified email at - Homepage
Cited by
Cited by
Why do firms adopt enterprise risk management (ERM)? Empirical evidence from France
MJ Khan, D Hussain, W Mehmood
Management Decision 54 (8), 1886-1907, 2016
Predicting the cricket match outcome using crowd opinions on social networks: A comparative study of machine learning methods
RU Mustafa, MS Nawaz, MIU Lali, T Zia, W Mehmood
Malaysian Journal of Computer Science 30 (1), 63-76, 2017
Breast cancer detection and classification using traditional computer vision techniques: a comprehensive review
S Zahoor, IU Lali, MA Khan, K Javed, W Mehmood
Current medical imaging 16 (10), 1187-1200, 2020
A feature-centric spam email detection model using diverse supervised machine learning algorithms
A Zamir, HU Khan, W Mehmood, T Iqbal, AU Akram
The Electronic Library 38 (3), 633-657, 2020
A survey of P2P content sharing in MANETs
N Shah, SA Abid, D Qian, W Mehmood
Computers & Electrical Engineering 57, 55-68, 2017
Enforcing optimal ACL policies using K-partite graph in hybrid SDN
R Amin, N Shah, W Mehmood
Electronics 8 (6), 604, 2019
Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development.
W Aslam, F Ijaz, MIU Lali, W Mehmood
J. Inf. Sci. Eng. 33 (6), 1481-1500, 2017
Distributed partition detection with dynamic replication management in a DHT-based MANET
S Zahid, SA Abid, N Shah, SHA Naqvi, W Mehmood
IEEE Access 6, 18731-18746, 2018
Security modeling for service-oriented systems using security pattern refinement approach
M Memon, GD Menghwar, MH Depar, AA Jalbani, WM Mashwani
Software & Systems Modeling 13, 549-572, 2014
Leaf Blights Detection and Classification in Large Scale Applications.
AM Fayyaz, KA Al-Dhlan, SU Rehman, M Raza, W Mehmood, M Shafiq, ...
Intelligent Automation & Soft Computing 31 (1), 2022
A Fast Implementation of Minimum Spanning Tree Method and Applying it to Kruskal’s and Prim’s Algorithms
B Munier, M Aleem, MA Islam, MA Iqbal, W Mehmood
Sukkur IBA Journal of Computing and Mathematical Sciences 1 (1), 58-66, 2017
A comparative analysis of anomaly detection methods for predictive maintenance in SME
M Qasim, M Khan, W Mehmood, F Sobieczky, M Pichler, B Moser
International Conference on Database and Expert Systems Applications, 22-31, 2022
Automatic identification of sarcasm in tweets and customer reviews
F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ...
Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019
An evaluation of software measurement processes in pakistani software industry
T Tahir, G Rasool, W Mehmood, C Gencel
IEEE Access 6, 57868-57896, 2018
Designing Healthcare Knowledge Management Systems–Development of an Integrated Component-Based KM Model for Effective Governance
A Arshad, MFB Noordin, R Bint Othman, W Mehmood
2018 International Conference on Information and Communication Technology …, 2018
CMMI Compliant Modernization Framework to Transform Legacy Systems.
M Khan, I Ali, W Mehmood, W Nisar, W Aslam, M Shafiq, JG Choi
Intelligent Automation & Soft Computing 27 (2), 2021
An efficient and scalable routing for MANETs
N Shah, A Ahmad, W Mehmood, D Qian, R Wang
Wireless personal communications 75, 987-1004, 2014
Fine-granular model merge solution for model-based version control system
W Mehmood, N Shah, MJ Khan, M Memon, M Ikramullah
Malaysian Journal of Computer Science 29 (3), 225-246, 2016
Modernization Framework to Enhance the Security of Legacy Information Systems.
M Khan, I Ali, W Nisar, MQ Saleem, AS Ahmed, HE Elamin, W Mehmood, ...
Intelligent Automation & Soft Computing 32 (1), 2022
CMMI compliant workflow models to track and control changes
I Ali, SM Ali, W Mehmood, W Nisar, MQ Saleem, MK Omer, M Niazi, ...
Intelligent Automation & Soft Computing 31 (1), 387-405, 2022
The system can't perform the operation now. Try again later.
Articles 1–20