Shahaboddin Shamshirband
Publications
328
h-index
52
Citations
9,243
Highly Influential Citations
216
Claim Author Page
Author pages are created from data sourced from our academic publisher partnerships and public sources.
Publications
Influence
We’re testing a new way to view lists of papers.
Try Semantic Swipe
A systematic literature review on agile requirements engineering practices and challenges
I. Inayat, S. Salim, S. Marczak, M. Daneva, Shahaboddin Shamshirband
Computer ScienceComput. Hum. Behav.
1 October 2015
TLDR
The findings suggest that agile requirements engineering as a research context needs additional attention and more empirical results are required to better understand the impact of agile requirements Engineering practices e.g. dealing with non-functional requirements and self-organising teams.Expand
306 Citations
45
PDF
Identification and prioritization of critical issues for the promotion of e-learning in Pakistan
S. Farid, R. Ahmad, I. A. Niaz, Muhammad Arif, Shahaboddin Shamshirband, M. D. Khattak
Political Science, Computer Science
Comput. Hum. Behav.
1 October 2015
TLDR
This study contributes in devising taxonomy and proposing new category software for the identified critical issues and the identified dimensions and issues have been prioritized according to their importance using the Analytical Hierarchy Process method. Expand
53 Citations
6
PDF
Copy-move forgery detection: Survey, challenges and future directions
Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, +4 authors Kim-Kwang Raymond Choo
Computer ScienceJ. Netw. Comput. Appl.
1 November 2016
TLDR
The common CMFD workflow of feature extraction and matching process using block or keypoint-based approaches is characterized, and the types of copied regions are categorized.Expand
101 Citations
5
Soft computing approaches for forecasting reference evapotranspiration
M. Gocić, S. Motamedi, +4 authors Muhammad Arif
Engineering, Computer Science
Comput. Electron. Agric.
1 April 2015
TLDR
SVM-Wavelet model was found to perform better than the GP, SVM-FFA and ANN models and have higher correlation coefficient as compared to ANN and GP computational methods.Expand
97 Citations
5
PDF
A support vector machine–firefly algorithm-based model for global solar radiation prediction
L. Olatomiwa, S. Mekhilef, Shahaboddin Shamshirband, Kasra Mohammadi, D. Petkovic, C. Sudheer
Mathematics
1 May 2015
In this paper, the accuracy of a hybrid machine learning technique for solar radiation prediction based on some meteorological data is examined. For this aim, a novel method named as SVM–FFA is… Expand
200 Citations
5
PDF
Adaptive neuro-fuzzy approach for solar radiation prediction in Nigeria
L. Olatomiwa, S. Mekhilef, Shahaboddin Shamshirband, D. Petkovic
Mathematics
1 November 2015
In this paper, the accuracy of a soft computing technique is investigated for predicting solar radiation based on a series of measured meteorological data: monthly mean minimum temperature and,… Expand
109 Citations
5
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
Shahaboddin Shamshirband, Ahmed Patel, N. B. Anuar, Miss Laiha Mat Kiah, A. Abraham
Computer ScienceEng. Appl. Artif. Intell.
1 June 2014
TLDR
The proposed cooperative Game-based Fuzzy Q-learning (G-FQL) model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy, and yields a greater improvement than existing machine learning methods. Expand
129 Citations
4
PDF
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
Shahaboddin Shamshirband, N. B. Anuar, +4 authors Abdul Nasir Khan
Computer ScienceJ. Netw. Comput. Appl.
1 June 2014
TLDR
The proposed cooperative-based fuzzy artificial immune system (Co-FAIS) improves detection accuracy and successful defense rate performance against attacks compared to conventional empirical methods.Expand
86 Citations
4
PDF
Incremental proxy re-encryption scheme for mobile cloud computing environment
Abdul Nasir Khan, Miss Laiha Mat Kiah, S. Madani, Mazhar Ali, A. R. Khan, Shahaboddin Shamshirband
Computer Science
The Journal of Supercomputing
1 May 2014
TLDR
An incremental version of proxy re-encryption scheme for improving the file modification operation is proposed and shows significant improvement in results while performing file modification operations using limited processing capability of mobile devices. Expand
74 Citations
4
PDF
Hybrid ANFIS-PSO approach for predicting optimum parameters of a protective spur dike
Hossein Basser, H. Karami, +5 authors H. Javidnia
Geology, Computer ScienceAppl. Soft Comput.
1 May 2015
TLDR
A novel hybrid approach was developed, combining adaptive-network-based fuzzy inference system and particle swarm optimization (ANFIS-PSO) to predict protective spur dike's parameters in order to control scouring around a series of spur dikes.Expand
54 Citations
4
...
1
2
3
4
...
Recommended Authors
D. Petkovic
170 Publications • 3,416 Citations
Kasra Mohammadi
94 Publications • 2,896 Citations
O. Kisi
335 Publications • 11,680 Citations
K. Chau
194 Publications • 10,734 Citations
Stay Connected With Semantic Scholar
What Is Semantic Scholar?
Semantic Scholar is a free, AI-powered research tool for scientific literature, based at the Allen Institute for AI.
Learn More
About
About Us
Publishers
Beta Program
Contact
Research
Team
Datasets
Open Corpus
Supp.ai
Resources
Librarians
Tutorials
FAQ
API
Proudly built by AI2
Terms of ServicePrivacy Policy
By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License
ACCEPT & CONTINUE