Article 
2019 
Generation of elementary gates and Bell's states using controlled adiabatic evolutions. International Journal of Quantum Information
, 17
(3)
pp.19500201

2018 
Contextaware services based on spatiotemporal zoning and crowdsourcing. Behaviour & Information Technology
, 37
(7)
pp.736760

2018 
Squeezing, mixed mode squeezing, amplitude squared
squeezing and principal squeezing in a nondegenerate
parametric oscillator. Optik
, 157
pp.10351052

2018 
A novel secret key generation based on image link. International Journal of Engineering and Technology
, 7
(2.5)
pp.2326

2017 
Robustness of dengue complex network under targeted versus random attack. Complexity
, 2017
pp.112

2017 
Twomode network modeling and analysis of dengue epidemic behaviour in Gombak, Malaysia. Applied Mathematical Modelling
, 43
pp.207220

2017 
The probe attack on the BennettBrassard 1984 protocol in the presences of noisy amplitude damping channel. Springer
pp.112

2017 
Quantum phase fluctuations of coherent and thermal light coupled to a nondegenerate parametric oscillator beyond rotating wave approximation. Optics Communications
, 398
pp.111

2016 
Towards using CMU sphinx tools for the Holy Quran recitation verification. International Journal on Islamic Applications in Computer Science And Technology (IJASAT)
, 4
(2)
pp.1015

2016 
Atomic coupler with twomode squeezed vacuum state. Malaysian Journal of Mathematical Sciences
, 10
pp.103110

2016 
On the quantum phase fluctuations of coherent light coupled to a degenerate parametric amplifier. Optik International Journal for Light and Electron Optics
, 127
pp.29882991

2016 
Building CMU Sphinx language model for the Holy
Quran using simplified Arabic phonemes. Egyptian Informatics Journal
, 17
(3)
pp.305314

2016 
The importance of building a conscience in business actions. APACCIOOutlook
, 2
(1)
pp.4546

2015 
Entanglement for moving threelevel atom under decoherence effect. Journal of Computational and Theoretical Nanoscience
, 12
(10)
pp.39703976

2015 
Entropy squeezing for qubitfield system in the presence multiphoton process under decoherence effect. Optical and Quantum Electronics
, 47
(2)
pp.267278

2015 
Topological structure of complex networks and its importance in diffusion. Sindh University Research Journal (Science Series)
, 47
(2)
pp.191194

2015 
Analyzing the weighted dark networks using scalefree network approach. WSEAS Transactions on Computers
, 14
pp.748759

2015 
Combinatorial interpretation of raney numbers and tree enumerations. Open Journal of Discrete Mathematics
, 5
(1)
pp.19

2014 
Entropy squeezing for qubit  field system under decoherence effect. Quantum Electronics
, 44
(3)
pp.274278

2013 
Three level atom in bad cavity. MiddleEast Journal of Scientific Research
, 13
pp.3137

2013 
Interaction of two pulses in defocusing nonlinear Schrodinger equation. Journal of Physics: Conference Series
, 435
(012034)
pp.14

2013 
Computer assisted alerts using mental model approach for customer service improvement. Journal of Software Engineering and Applications
, 6
pp.2125

2012 
Phase coherent states for enhancing the performance of continuous variable quantum key distribution. Journal of the Physical Society of Japan
, 81
pp.19

2012 
Tight bounds for the eavesdropping collective attacks on general CVQKD protocols that involve nonmaximally entanglement. Quantum Information Processing
, 12
(2)
pp.15511171

2012 
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
. International Journal of Modern Physics B
, 26
(16)
pp.115

2012 
Continuousvariable quantum key distribution protocols with eightstate discrete modulation. International Journal of Quantum Information
, 10
(1)
pp.115

2010 
Fiber and freespace practical decoy state QKD for both BB84
and SARG04 protocols. The European Physical Journal D

2010 
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process sixstate quantum protocol. Journal of Computer Science
, 6
(10)
pp.10941100

2010 
Quantum properties of the threemode squeezed operator: triply concurrent parametric amplifiers. Optics Communications
, 283
(16)
pp.31583167

2010 
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection . Journal of Physics B : Atomic, Molecular and Optical Physics
, 43
pp.16

2010 
A protocol for secret key infusion from satellite transmissions . International Journal of Computer and Network Security (IJCNS)
, 2
(7)
pp.99101

2010 
A linear atomic quantum coupler . Journal of Physics B : Atomic, Molecular and Optical Physics
, 43
pp.19

2010 
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP6DP). Journal of Computer Science
, 6
(10)
pp.11231129

2009 
Quantum state engineering with ququarts: application for deterministic QKD protocol. EPL (Europhysics Letters)
, 87
pp.10008p1

2009 
Quantum key distribution in terms of the GreenbergerHorneZeilinger state: multikey generation . Laser Physics (International Journal)
, 20
(5)
pp.121

2009 
Quantum key distribution using decoy state protocol. American Journal of Engineering and Applied Sciences
, 2
(4)
pp.694698

2009 
New estimates of single photon parameters for satellitebased QKD. Optics Communications
, 282
(15)
pp.31853189

2009 
Decoy state quantum key distribution. IIUM Engineering Journal
, 10
(2)
pp.8186

2009 
Implementation of decoy state protocol. European Journal of Scientific Research
, 33
(1)
pp.183186

2008 
Blind encoding into qudits. Physics Letters A
, 372
(12)
pp.19631967

2008 
Transient entropy squeezing of a singleCooperpair box placed inside a phasedamped cavity. Optics Communications
, 281
(24)
pp.60196023

2008 
Singleatom entropy squeezing for two twolevel atoms interacting with a singlemode radiation field. Optics Communications
, 281
(10)
pp.28542863

2007 
Anticlone Gaussian attack for continuous variable EPR correlations. Journal of Physics B: Atomic, Molecular and Optical Physics
, 40
(6)
pp.11531160

2007 
Nonentagled qutrits in two way deterministic QKD. Physics Letters A
, 361
(6)
pp.445449

2006 
Generation of threequbit entangled Wstate by nonlinear optical state truncation. Journal of Physic B : Atomic, Molecular and Optical Physics
, 39
(6)
pp.12691274

2006 
Deterministic six states protocol for quantum communication. Physics Letters A
, 358
(2)
pp.8590

2005 
Coupledmode theory for Bose–Einstein condensates with time dependent atomic scattering length. Physics Letters A
, 345
(13)
pp.237244

2004 
The effect of finite bandwidth squeezed light on entanglement creation in the Dicke model. Journal of Optics B: Quantum and Semiclassical Optics
, 6
(7)
pp.289295

2004 
An Ising model with three competing interactions on a Cayley tree. Journal of Mathematical Physics
, 45
(9)
pp.36453658

2003 
Quantumtrajectory simulations of a twolevel atom cascaded to a cavity QED laser. Physical Review A  Atomic, Molecular, and Optical Physics
, 68
(6)
pp.063804/1063804/6

2003 
Spin squeezing as a measure of entanglement in a twoqubit system. Physical Review A  Atomic, Molecular, and Optical Physics
, 68
(6)
pp.064301/1064301/4

2003 
Exact solution of an Ising model with competing interactions on a Cayley tree. Journal of Physics A: Mathematical and General
, 36
(15)
pp.42834289

1998 
Quantum trajectory theory for a twolevel atom in a squeezed vacuum field with nonradiative dephasing. Journal of Modern Optics
, 45
(10)
pp.21052115

Conference or Workshop Item 
2019 
Investigation of adoption behaviour for social commerce
in the Kingdom of Saudi Arabia.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018

2018 
Rule based modeling of knowledge bases: rule based construction of knowledge base models for automation/expert systems.
In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI 2017)

2018 
Towards an accurate speakerindependent Holy Quran acoustic model.
In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017

2018 
Cyber security maturity model and Maqasid alShari'ah.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)

2018 
Constructing a knowledge base for AlQur’an utilizing principles of human communication.
In: 4th International Conference on Information Retrieval and Knowledge Management (CAMP)

2017 
Testing Sphinx’s language model faulttolerance for the Holy Quran.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)

2017 
Message from Deputy Rector (Research & Innovation).
In: 6th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2016

2017 
Quality of polarization entanglement in spontaneous parametric down conversion.
In: International Conference on Applied Photonics and Electronics 2017 (InCAPE2017)

2016 
Logicolinguistic semantic representation of documents.
In: 2nd International Conference on Big Data Intelligence and Computing (DataCom 2016)

2016 
Intellectual assets and knowledge audit as a fundamental step for the "University of the Future" transformation.
In: 4th IEEE International Colloquium on Information Science and Technology (CiSt)

2016 
Multilayered alert filtration and feedback cycle using Brahms model.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)

2016 
Scale free network analysis of a large crowd through their
spatiotemporal activities.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)

2016 
Atomic coupler with twomode squeezed vacuum states.
In: 3rd International Conference on Mathematical Applications in Engineering (ICMAE'14)

2016 
Cultivating the Communities of Practice in the Academia.
In: KCONNECT 2016

2015 
A cybersecurity capability maturity model based on Maqasid Shari’ah(MSC2M2).
In: International Conference on Maqasid AlShari'ah in Public Policy and Governance

2015 
iDiary: A crowdsourcebased spatioTemporal multimedia enhanced points of interest authoring tool.
In: 2015 ACM Multimedia Conference

2015 
Visualization of a scale free network in a smartphonebased multimedia big data environment.
In: The First IEEE International Conference on Multimedia Big Data : BigMM 2015

2015 
Towards using CMU Sphinx Tools for the Holy Quran recitation verification.
In: 3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015)

2014 
Calculus and its applications in scalefree networks .
In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014)

2014 
Towards a mobile and contextaware framework from crowdsourced data.
In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)

2014 
Node status detection and information diffusion in router network using scalefree network.
In: 10th International Network Conference, INC 2014

2014 
Twomode complex network modeling of dengue epidemic in Selangor, Malaysis.
In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)

2013 
Generalized quantum rotation gates using STIRAP
.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)

2012 
Interaction of two pulses in defocusing Nonlinear Schrödinger equation.
In: International Conference of Application Science & Technology (iCAST2012)

2010 
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP6DP).
In: International Conference on Computer and Communication Engineering, ICCCE 2010
