Covid-transformer: Interpretable covid-19 detection using vision transformer for healthcare D Shome, T Kar, SN Mohanty, P Tiwari, K Muhammad, A AlTameem, ... International Journal of Environmental Research and Public Health 18 (21), 11086, 2021 | 106 | 2021 |
An inhibiting context hampering role of information technology as an enabler in organizational learning AA Al-Tameem Journal of Computer Information Systems 44 (4), 34-40, 2004 | 34 | 2004 |
The critical factors of e-government adoption: An empirical study in the Saudi Arabia public sectors TA Altameem School of Information Systems, Computing and Mathematics, 2007 | 31 | 2007 |
Impacts of COVID-19 on the food supply chain: a case study on Saudi Arabia AA Alsuwailem, E Salem, AKJ Saudagar, A AlTameem, M AlKhathami, ... Sustainability 14 (1), 254, 2021 | 25 | 2021 |
The Role of Strategic Information Systems (SIS) in Supporting and Achieving the Competitive Advantages (CA): An Empirical Study on Saudi Banking Sector NF Alshubaily, AA Altameem International Journal of Advanced Computer Science and Applications 8 (7), 2017 | 24 | 2017 |
An enhanced SEIR model for prediction of COVID-19 with vaccination effect RC Poonia, AKJ Saudagar, A Altameem, M Alkhathami, MB Khan, ... Life 12 (5), 647, 2022 | 23 | 2022 |
IoT in education: Its impacts and its future in saudi universities and educational environments S Abed, N Alyahya, A Altameem First International Conference on Sustainable Technologies for Computational …, 2019 | 17 | 2019 |
Next-gen mulsemedia: virtual reality haptic simulator’s impact on medical practitioner for higher education institutions A Kumar, B Srinivasan, AKJ Saudagar, A AlTameem, M Alkhathami, ... Electronics 12 (2), 356, 2023 | 16 | 2023 |
Technology based management of human relational capital-human touch still a necessity Z Husain Husain Z., Al-Tameem, AA, Gautam 2013, 53-76, 2013 | 16 | 2013 |
COVID-19 genome sequence analysis for new variant prediction and generation A Ullah, KM Malik, AKJ Saudagar, MB Khan, MHA Hasanat, A AlTameem, ... Mathematics 10 (22), 4267, 2022 | 11 | 2022 |
Towards robust diagnosis of COVID-19 using vision self-attention transformer F Mehboob, A Rauf, R Jiang, AKJ Saudagar, KM Malik, MB Khan, ... Scientific Reports 12 (1), 8922, 2022 | 11 | 2022 |
An extended UTAUT2 model to explain the adoption of virtual reality Technology in Health Centers: an empirical study based in Riyadh M Algahtani, A Altameem, AR Baig International journal of computer science and network security: IJCSNS 21 (3 …, 2021 | 11 | 2021 |
An interoperable data framework to manipulate the smart city data using semantic technologies M Beseiso, A Al-Alwani, A Altameem International Journal of Advanced computer science and applications 8 (1), 2017 | 10 | 2017 |
COVID‐DAI: A novel framework for COVID‐19 detection and infection growth estimation using computed tomography images T Nazir, M Nawaz, A Javed, KM Malik, AKJ Saudagar, MB Khan, ... Microscopy Research and Technique 85 (6), 2313-2330, 2022 | 9 | 2022 |
WEENet: an intelligent system for diagnosing COVID-19 and lung cancer in IoMT environments K Muhammad, H Ullah, ZA Khan, AKJ Saudagar, A AlTameem, ... Frontiers in oncology 11, 811355, 2022 | 9 | 2022 |
Critical success factors for m-commerce in Saudi Arabia's private sector--a multiple case study analysis NS Alturaigi, AA Altameem arXiv preprint arXiv:1611.00370, 2016 | 9 | 2016 |
A process view of information system benefits management and evaluation AA Al-Tameem, FP Wheeler AMCIS 2000 Proceedings, 5, 2000 | 9 | 2000 |
Efficient contrast adjustment and fusion method for underexposed images in industrial cyber-physical systems Z Rahman, M Aamir, Z Ali, AKJ Saudagar, A AlTameem, K Muhammad IEEE Systems Journal, 2023 | 8 | 2023 |
Disease progression detection via deep sequence learning of successive radiographic scans J Ahmad, AKJ Saudagar, KM Malik, W Ahmad, MB Khan, MHA Hasanat, ... International journal of environmental research and public health 19 (1), 480, 2022 | 8 | 2022 |
The Impact of AJAX vulnerability in Web 2.0 applications AA Al-Tameem Journal of Information Assurance and Security 3, 240-244, 2008 | 8 | 2008 |