Match!
Tehmina Amjad
International Islamic University, Islamabad
Data miningRankingInformation retrievalCitationComputer science
25Publications
8H-index
215Citations
What is this?
Publications 28
Newest
#1Muhammad ShoaibH-Index: 2
#2Ali DaudH-Index: 1
Last. Tehmina Amjad (IIUI: International Islamic University, Islamabad)H-Index: 8
view all 3 authors...
Entity resolution is a challenging and hot research area in the field of Information Systems since last decade. Author Name Disambiguation (AND) in Bibliographic Databases (BD) like DBLP , Citeseer , and Scopus is a specialized field of entity resolution. Given many citations of underlying authors, the AND task is to find which citations belong to the same author. In this survey, we start with three basic AND problems, followed by need for solution and challenges. A generic, five-step framework ...
#1Ali DaudH-Index: 1
#2Min SongH-Index: 18
Last. Anwar GhaniH-Index: 3
view all 7 authors...
Source
#1Sarah Shafqat (IIUI: International Islamic University, Islamabad)H-Index: 2
#2Saira Kishwer (IIUI: International Islamic University, Islamabad)H-Index: 1
Last. Hafiz Farooq Ahmad (King Faisal University)H-Index: 11
view all 6 authors...
There is increased interest in deploying big data technology in the healthcare industry to manage massive collections of heterogeneous health datasets such as electronic health records and sensor data, which are increasing in volume and variety due to the commoditization of digital devices such as mobile phones and wireless sensors. The modern healthcare system requires an overhaul of traditional healthcare software/hardware paradigms, which are ill-equipped to cope with the volume and diversity...
6 CitationsSource
#1Tehmina Amjad (IIUI: International Islamic University, Islamabad)H-Index: 8
#2Yusra Rehmat (IIUI: International Islamic University, Islamabad)
Last. Rabeeh Ayaz Abbasi (QAU: Quaid-i-Azam University)H-Index: 8
view all 4 authors...
In bibliometric and scientometric research, the quantitative assessment of scientific impact has boomed over the past few decades. Citations, being playing a major role in enhancing the impact of researchers, have become a very significant part of a plethora of new techniques for measuring scientific impact. Self-citations, though can be used genuinely to credit someone’s own work, can play a significant role in artificial manipulation of scientific impact. In this research, we study the impact ...
Source
Purpose The purpose of this paper is to trace the knowledge diffusion patterns between the publications of top journals of computer science and physics to uncover the knowledge diffusion trends. Design/methodology/approach The degree of information flow between the disciplines is a measure of entropy and received citations. The entropy gives the uncertainty in the citation distribution of a journal; the more a journal is involved in spreading information or affected by other journals, its entrop...
Source
#1Wahab KhanH-Index: 2
#2Ali DaudH-Index: 1
Last. Fahd Saleh Alotaibi (KAU: King Abdulaziz University)H-Index: 3
view all 7 authors...
Part of speech (POS) tagging, the assignment of syntactic categories for words in running text, is significant to natural language processing as a preliminary task in applications such as speech processing, information extraction, and others. Urdu language processing presents a challenge due to the dual behaviour of various Urdu POS tags in differing situations (morphosyntactic ambiguity). This paper addresses this challenge by developing a novel tagging approach using linear-chain conditional r...
Source
#1Umara Noor (IIUI: International Islamic University, Islamabad)H-Index: 1
#2Zahid Anwar (Fontbonne University)H-Index: 14
Last. Kim-Kwang Raymond Choo (UTSA: University of Texas at San Antonio)H-Index: 21
view all 4 authors...
Abstract Cyber threat attribution identifies the source of a malicious cyber activity, which in turn informs cyber security mitigation responses and strategies. Such responses and strategies are crucial for deterring future attacks, particularly in the financial and critical infrastructure sectors. However, existing approaches generally rely on manual analysis of attack indicators obtained through approaches such as trace-back, firewalls, intrusion detection and honeypot deployments. These attac...
Source
#1Ali Daud (IIUI: International Islamic University, Islamabad)H-Index: 13
#2Tehmina Amjad (IIUI: International Islamic University, Islamabad)H-Index: 8
Last. Muhammad Ahtisham Aslam (KAU: King Abdulaziz University)H-Index: 5
view all 6 authors...
Citation analysis is an important measure for the assessment of quality and impact of academic entities (authors, papers and publication venues) used for ranking of research articles, authors and publication venues. It is a common observation that high-level publication venues, with few exceptions (Nature, Science and PLOS ONE), are usually topic specific. The purpose of this paper is to investigate the claim correlation analysis between topic specificity and citation count of different types of...
2 CitationsSource
#1Tehmina Amjad (IIUI: International Islamic University, Islamabad)H-Index: 8
#2Ali Daud (IIUI: International Islamic University, Islamabad)H-Index: 1
Last. Faisal Imran (QAU: Quaid-i-Azam University)
view all 5 authors...
Finding the rising stars is an interesting problem and has been recently studied in various domains including academic networks. This study formulates the problem of rising stars prediction as a machine learning task. Classification models are applied and features are classified as co-authors, author, and venues. The impact of the categorization of these features is empirically analyzed. The experimentation is performed on data of Pakistani researchers retrieved from Web of Sciences ranging from...
Source
#1Faisal Imran (QAU: Quaid-i-Azam University)
#2Rabeeh Ayaz Abbasi (QAU: Quaid-i-Azam University)H-Index: 8
Last. Tehmina Amjad (IIUI: International Islamic University, Islamabad)H-Index: 8
view all 6 authors...
Identifying research areas of academicians is a challenging task. Most of the researchers have used supervised machine learning to handle this task which requires labelled data. In this paper, we propose to use clique percolation (an overlapping community detection algorithm) to identify research areas of academicians. We propose a framework to collect data from digital libraries and websites of selected universities in Pakistan. We then identify researchers working in multiple research areas us...
Source
123