User profiles for Nabeel A. Ali
Nabeel Salih Ali (orcid.org/0000-0001-9988-5619)Information Technology Research and Development Centre, University of Kufa, Kufa, Najaf … Verified email at uokufa.edu.iq Cited by 1139 |
Management of a malignant pleural effusion: British Thoracic Society pleural disease guideline 2010
ME Roberts, E Neville, RG Berrisford, G Antunes, NJ Ali - Thorax, 2010 - thorax.bmj.com
INTRODUCTION The discovery of malignant cells in pleural fluid and/or parietal pleura signifies
disseminated or advanced disease and a reduced life expectancy in patients with cancer…
disseminated or advanced disease and a reduced life expectancy in patients with cancer…
Local anaesthetic thoracoscopy: British Thoracic Society pleural disease guideline 2010
NM Rahman, NJ Ali, G Brown, SJ Chapman… - Thorax, 2010 - thorax.bmj.com
< Evidence for use of local anaesthetic thoracoscopy as a diagnostic and therapeutic tool.<
The conditions and patients in whom local anaesthetic thoracoscopy could be considered.< …
The conditions and patients in whom local anaesthetic thoracoscopy could be considered.< …
Local understandings of vulnerability and protection during the neonatal period in Sylhet District, Bangladesh: a qualitative study
Background Understanding of local knowledge and practices relating to the newborn period,
as locally defined, is needed in the development of interventions to reduce neonatal …
as locally defined, is needed in the development of interventions to reduce neonatal …
A review of fog computing and machine learning: Concepts, applications, challenges, and open issues
Systems based on fog computing produce massive amounts of data; accordingly, an increasing
number of fog computing apps and services are emerging. In addition, machine learning …
number of fog computing apps and services are emerging. In addition, machine learning …
[HTML][HTML] Factors affecting recruitment and retention of community health workers in a newborn care intervention in Bangladesh
SM Rahman, NA Ali, L Jennings, MHR Seraji… - Human resources for …, 2010 - Springer
Background Well-trained and highly motivated community health workers (CHWs) are critical
for delivery of many community-based newborn care interventions. High rates of CHW …
for delivery of many community-based newborn care interventions. High rates of CHW …
[HTML][HTML] Husbands' involvement in delivery care utilization in rural Bangladesh: A qualitative study
WT Story, SA Burgard, JR Lori, F Taleb, NA Ali… - BMC pregnancy and …, 2012 - Springer
Background A primary cause of high maternal mortality in Bangladesh is lack of access to
professional delivery care. Examining the role of the family, particularly the husband, during …
professional delivery care. Examining the role of the family, particularly the husband, during …
[PDF][PDF] Attendance and information system using RFID and web-based application for academic sector
Recently, students attendance have been considered as one of the crucial elements or issues
that reflects the academic achievements and the performance contributed to any university …
that reflects the academic achievements and the performance contributed to any university …
[PDF][PDF] Cyber-security incidents: a review cases in cyber-physical systems
Cyber-Physical Systems refer to systems that have an interaction between computers,
communication channels and physical devices to solve a real-world problem. Towards industry …
communication channels and physical devices to solve a real-world problem. Towards industry …
EEG feature fusion for motor imagery: A new robust framework towards stroke patients rehabilitation
Stroke is the second foremost cause of death worldwide and is one of the most common
causes of disability. Several approaches have been proposed to manage stroke patient …
causes of disability. Several approaches have been proposed to manage stroke patient …
[HTML][HTML] A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems, methods…
cybersecurity. This phenomenon indicates that threats require special detection systems, methods…