Article |
2021 |
Research and publications in Islamic perspective (Part 1). KICT Newsletter
, 1
(1)
pp.7-7
|
2021 |
انظمة التعرف الضوئي على الكتابة اليدوية بواسطة شاشات اللمس: التحديات والحلول. المجلة الدولية للتطبيقات الإسلامية في علم الحاسب والتقنية
, 9
(1)
pp.21-35
|
2021 |
الرسائل الجامعية المتصلة بالقرآن الكريم واللغة العربية فيما قدم في كليتي تقنية المعلومات والاتصالات والهندسة في الجامعة الإسلامية العالمية بماليزيا. المجلة الدولية للتطبيقات الإسلامية في علم الحاسب والتقنية
, 9
(2)
pp.13-37
|
2021 |
تعليم اللغة العربية بوصفها لغة ثانية من خلال رسائل الماجستير الحاسوبية في الجامعة الإسلامية العالمية بماليزيا مثالاً. المجلة الدولية للتطبيقات الإسلامية في علم الحاسب والتقنية
, 9
(2)
pp.16-49
|
2021 |
Arabic text classification using hybrid feature selection method using chi-square binary artificial bee colony algorithm. International Journal of Mathematics and Computer Science
, 16
(1)
pp.213-228
|
2020 |
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
, 32
(1)
pp.261-277
|
2020 |
Classification of Holy Quran verses based on imbalanced learning. International Journal on Islamic Applications in Computer Science And Technology
, 8
(2)
pp.11-24
|
2020 |
Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications
, 4
(5)
pp.1-12
|
2020 |
الإنشاء التلقائي للخرائط الذهنية من القرآن الكريم. المجلة الدولية للتطبيقات الإسلامية في علم الحاسب والتقنية
, 8
(3)
pp.28-40
|
2019 |
Speaker identification based on hybrid feature extraction techniques. International Journal of Advanced Computer Science and Applications
, 10
(3)
pp.322-327
|
2019 |
Massive Open Online Courses (MOOCs): data on
higher education. Data in Brief
, 22
pp.118-125
|
2019 |
Towards adaptive e-learning among university students: by Applying Technology Acceptance Model (TAM). International Journal of Engineering and Advanced Technology
, 8
(6S3)
pp.270-276
|
2019 |
Quranic motivation toward modern approach for e-Da'wah. Quranica: International Journal of Islamic Research
, 11
(2)
pp.53-83
|
2018 |
Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology
, 96
(6)
pp.1633 -1646
|
2018 |
أسماء التفضيل في القرآن الكريم والحديث النبوي الشريف - دارسة دلالية
The names of preference in the Quran and Hadith - Semantic Study. International Journal of Islamic Applications in Computer Science and Technology - Ijaza
|
2018 |
Impact of Quran in treatment of the psychological disorder and spiritual illness. Journal of Religion and Health
pp.1-14
|
2018 |
Quranic sign language for deaf people: Quranic recitation classification and verification. International Journal on Perceptive and Cognitive Computing
, 4
(1)
pp.8-12
|
2018 |
Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research
, 8
(1)
pp.49-61
|
2018 |
Regularization-based multi-frame super-resolution: A systematic review. Journal of King Saud University - Computer and Information Sciences
|
2017 |
Dynamics of watermark position in audio watermarked
files using neural networks. Applied Mathematics & Information Sciences
, 11
(3)
pp.703-715
|
2017 |
Necessary and sufficient conditions for complementary stochastic quadratic operators of finite-dimensional simplex. Journal of Computing and Mathematical Sciences
, 1
(1 (Jan-June 2017))
pp.22-27
|
2017 |
Social media use, collaborative learning and students’ academic performance: a systematic literature review of theoretical models. Journal of Theoretical and Applied Information Technology
, 95
(20)
pp.5399-5414
|
2017 |
The impact of using social media for teaching and learning in post-secondary institutes. The Anthropologist
, 29
(1)
pp.8-18
|
2017 |
Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS
, 5
pp.480-500
|
2017 |
A review on soft set-based parameter reduction
and decision making. IEEE ACCESS
, 5
pp.4671-4689
|
2017 |
The dynamics of data packet in transmission session. IEEE ACCESS
, 5
pp.4329-4339
|
2017 |
A model of using social media for collaborative
learning to enhance learners’ performance on learning. Journal of King Saud University - Computer and Information Sciences
, 29
(4)
pp.526-535
|
2017 |
Information technology usage in the Islamic perspective: a systematic literature review. The Anthropologist
, 29
(1)
pp.27-41
|
2017 |
Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management
, 34
(1)
pp.50-64
|
2017 |
PSW statistical LSB image steganalysis. Multimedia Tools and Applications
, 77
(1)
pp.805-835
|
2017 |
Social media and its impact on academic performance among university students. The Anthropologist
, 28
(1-2)
pp.52-68
|
2017 |
Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control
, 90
(7)
pp.1-29
|
2017 |
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system. Journal of Internet Banking and Commerce
, 22
(Special Issue-S8)
pp.1-14
|
2017 |
Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology
, 5
(2)
pp.26-36
|
2016 |
Arabic text classification: Review study. Journal of Engineering and Applied Science
, 11
(3)
pp.528-536
|
2016 |
The most principle security issues in e-Commerce. International Journal of Scientific and Research Publications
, 5
(12)
pp.556-560
|
2016 |
Utilising key climate element variability for the
prediction of future climate change using a support
vector machine model. International Journal of Global Warming
, 9
(2)
pp.129-151
|
2016 |
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security. Journal of Theoretical and Applied Information Technology
, 83
(2)
pp.173-179
|
2016 |
ICT readiness and information security policies in OIC Countries. International Journal of Scientific and Research Publications
, 6
(1)
pp.58-61
|
2016 |
Attitude of students towards information access issues: The case of International Islamic University Malaysia. International Journal of Soft Computing
, 11
(4)
pp.236-241
|
2016 |
Dynamics of doubly stochastic quadratic operators on a finite-dimensional simplex. Open Mathematics
, 14
(1)
pp.509-519
|
2016 |
An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus
, 5
(1)
pp.868-1-868-25
|
2016 |
A finite state model for a self-help system based on minhaj 'al Abidin. Research Journal of Applied Sciences
, 11
(6)
pp.345-351
|
2015 |
Formal analysis of weighted longitudinal routers network via scale-free network: a case study. Journal of Theoretical and Applied Information Technology
, 80
(2)
pp.257-265
|
2015 |
How technology affected our privacy. International Journal of Science and Research (IJSR)
, 4
(12)
pp.406-410
|
2015 |
Security issues with health care information technology. International Journal of Science and Research (IJSR)
, 4
(12)
pp.1021-1024
|
2015 |
Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences
, 9
(6)
pp.3133-3145
|
2015 |
QoS amendment toward seamless handover in network mobility NEMO. ARPN Journal of Engineering and Applied Sciences
, 10
(21)
pp.9698-9709
|
2015 |
"مشروع برنامج للتبويب الشامل والمفصل لعلوم القرآن والتفسير "سورة الحجرات نموذجا = Mashru' barnamij lil-tabwib al-shamil al-mufassal li-'ulum al-Qur'an wa-al-tafsir "surah al-Hujrat namudhajan. al-Majallat al-Dauliyah lil-Buhuth al-Islamiyah wa-al-Insaniyah al-Mutaqaddimah
, 5
(10)
pp.1-18
|
2015 |
An unsupevised package for multi-spectral image processing for remote data. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 5
(4)
pp.113-122
|
2015 |
Web assisted language learning system for enhancing Arabic language learning using cognates. Jurnal Teknologi
, 77
(19)
pp.107-112
|
2015 |
Mini-ATX Computer System in Vehicle. Advanced Materials Research
, 1115
pp.484-487
|
2014 |
Performance analysis of HRO-B+ scheme for the nested mobile networks using OPNet. Journal of Technology
, 4
pp.174-191
|
2014 |
Developing a solar calculator system. Advanced Materials Research
, 980
pp.179-183
|
2014 |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology
, 61
(1)
pp.37-43
|
2014 |
Empirical investigation of visualization quality for
three-dimensional (3d) objects of 3d map on mobile device for navigation aid
. Journal of Theoretical and Applied Information Technology
, 63
(2)
pp.372-380
|
2014 |
My E-Mosque system: an Islamic android companion. International Journal on Islamic Applications in Computer Science And Technology
, 2
(2)
pp.30-37
|
2014 |
Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences
, 13
(Sp. ed)
pp.75-90
|
2014 |
Online databases on Quranic handwritten words. Journal of Theoretical and Applied Information Technology
, 62
(2)
pp.485-492
|
2014 |
The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology
, 2
(4)
pp.23-34
|
2013 |
Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology
, 1
(3)
pp.17-23
|
2013 |
High Watermarking Image Quality Based on Dual Intermediate
Significant Bit (DISB). International Journal of Digital Content Technology and its Applications
, 7
(5)
pp.733-742
|
2013 |
Assessing issues of change impact analysis process for a software projects. World Applied Sciences Journal
, 28
(10)
pp.1366-1374
|
2013 |
Analytical evaluation of a new route pptimization scheme for nested mobile network. World Applied Sciences Journal
(21)
pp.16-20
|
2012 |
Analysis of Islamic website design. International Journal of Arab Culture, Management and Sustainable Development
, 2
(4)
pp.309-317
|
2012 |
Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE. Turkish Journal of Computer and Mathematics Education
, 12
(14)
pp.5212-5224
|
2012 |
Analytical evaluation of a new route optimization scheme for nested mobile network. World Applied Sciences Journal
pp.16-20
|
2011 |
High watermarking capacity based on spatial domain technique. Information Technology Journal
, 10
(7)
pp.1367-1373
|
2011 |
Distortion-free embedding in the optic disk of retina fundus images using complex-valued neural network. World Applied Sciences Journal
, 13
(6)
pp.1295-1301
|
2011 |
Forgery detection in medical images using Complex Valued Neural Network (CVNN). Australian Journal of Basic and Applied Sciences
, 5
(7)
pp.1251-1264
|
2011 |
A robust watermark embedding in smooth areas. Research Journal of Information Technology
, 3
(2)
pp.123-131
|
2011 |
ISB watermarking embedding: block based model. Information Technology Journal
, 10
(4)
pp.841-848
|
2011 |
Determining watermark embedding strength using complex valued neural network. Journal of Applied Sciences
, 11
(16)
pp.2907-2915
|
2011 |
Frequencies determination of characters for Bahasa Melayu:
results of preliminary investigation
. Procedia - Social and Behavioral Sciences
, 27
pp.233-240
|
2010 |
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms. International Journal of Computer Science and Information Security
, 8
(6)
pp.47-51
|
2010 |
Watermaking technique based on ISB (Intermediate Significant Bit).
pp.41
|
2009 |
An artificial-intelligence-based approach for audio steganography. MASAUM Journal of Open in Science and Engineering
, 1
(1)
pp.64-68
|
2009 |
A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology
, 50
pp.989-996
|
2009 |
A genetic-algorithm-based approach for audio steganography. World Academy of Science, Engineering and Technology
, 54
pp.360-363
|
Conference or Workshop Item |
2020 |
Correlation between speaker gender and perceptual quality of mobile speech signal.
In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM 2020)
|
2020 |
A framework assessing the effect of user emotions on touch gesture behavioural biometric authentication.
In: 2019 6th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2019 |
Multi-frame super-resolution: a survey.
In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
|
2018 |
تقنبة المعلومات وأخلاق المهنة.
In: 3rd International Social Science Conference: Islamic Thought & Understanding (ISSCITU 2018)
|
2018 |
Knowing what you know about your faith an interactive application for measuring your faith in Islam.
In: International Conference on Information and Communication Technology for the Muslim World, ICT4M 2018
|
2018 |
Software defined-network for real-time operations of business intelligence tasks.
In: International Conference on Business, Humanities and Education (ICBHE 2018)
|
2018 |
Information-based interactive services and support system.
In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017)
|
2018 |
Speaker identification based on curvlet transform technique.
In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
|
2017 |
Isolated Iqlab checking rules based on speech recognition system.
In: 2017 8th International Conference on Information Technology (ICIT)
|
2017 |
Successful business intelligence system for SME: An
analytical study in Malaysia.
In: International Research and Innovation Summit (IRIS2017)
|
2017 |
The trend of business intelligence adoption and maturity.
In: 2nd International Conference on Computer Science and Engineering
|
2017 |
Comments and improvements of “HOTA: Handover optimized
ticketbased authentication in networkbased mobility
management”.
In: 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)
|
2017 |
Attitude towards information property rights
among students : The case of International Islamic University Malaysia.
In: 2016 4th International Conference on User Science and Engineering (i-USEr)
|
2017 |
Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation.
In: IEEE 13th International Colloquium on Signal Processing & its Application (CSPA 2017)
|
2016 |
Performance comparison of (Diff-FH NEMO) scheme in IPv6-based network mobility.
In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
|
2016 |
Determining the state of truthfulness and falsehood by analyzing the acquired EEG signals.
In: 12th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2016
|
2016 |
Impersonate affecting users' attitude toward facebook in Egypt.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Attitude towards information privacy issues among students of IIUM.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
The extreme doubly stochastic quadratic operators on two dimensional simplex.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Evaluation of users' awareness and their reaction on information security.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Web users’ knowledge and their behavior towards security threats and vulnerabilities.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Variable size of blocks for embedding watermark images using ISB technique.
In: 6th International Conference on Digital Information Processing and Communications, ICDIPC 2016
|
2016 |
The convergence consensus of multi-agent systems controlled via doubly stochastic quadratic operators.
In: 1st International Symposium on Agents, Multi-Agent Systems and Robotics, ISAMSR 2015
|
2016 |
Web user' knowledge and their behavior towards security threats and vulnerabilities.
In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
|
2016 |
Developing mobile E-groceries model.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Least Significant Bit (LSB) and Random Right
Circular Shift (RRCF) in digital watermarking.
In: 2016 12th International Computer Engineering Conference (ICENCO)
|
2016 |
Security failures in EMV smart card payment systems.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2016 |
An appraisal of online audio Qur'an as a new media tool for civilization.
In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015
|
2015 |
Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication.
In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015)
|
2015 |
الدارسات المعجمية ومنهج التعامل مع المصطلح القرآني.
In: المؤتمر القرآني الدولي السنوي (Muqaddas V) 2015
|
2015 |
الدراسات المعجمية ومنهج التعامل مع المصطلح القرآني = Methods on dealing with the Quranic terms.
In: The 5th Annual International Qur'anic Conference 2015 (MUQADDAS V)
|
2015 |
Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students.
In: 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2014)
|
2015 |
Investigating the empirical relation and importance of perceived usefulness, perceived ease of use and intention to use online information resources for evidence based medicine.
In: 2014 International Conference on Computer Assisted System in Health (CASH)
|
2014 |
The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2014 |
Perceptions of library and information science community towards open source software adoption in libraries of Oman.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
A new robust image watermarking method using Dual intermediate significant bits.
In: 4th International Conference on Control System and Computing and Engineering (ICCSCE 2014)
|
2014 |
Mini-ATX computer system in vehicle.
In: International Conference on Advances in Manufacturing and Materials Engineering
|
2014 |
Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset.
In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014)
|
2014 |
Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Investigating how the sources of online audio Qur’an empower listeners.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Project dimension as a readiness factor toward business intelligent systems.
In: 3rd International Conference on Computer Engineering & Mathematical Sciences (ICCEMS 2014)
|
2014 |
Personal learning environment framework for a self-help Maqam-based search system.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Automatic face reconstruction system.
In: 2014 6th International Conference on Computer Science and Information Technology (CSIT)
|
2014 |
Robust image watermarking based on Dual Intermediate Significant Bit (DISB).
In: 2014 6th International Conference on Computer Science and Information Technology (CSIT)
|
2014 |
Exploring the challenges of MP3 audio steganography.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2014 |
Orthogonal wavelet support vector machine for predicting crude oil prices.
In: 1st International Conference on Advanced Data and Information Engineering (DaEng 2013)
|
2014 |
The important dimensions for assessing organizations' readiness toward business intelligence systems from the perspective of Malaysian organization.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies ACSAT 2013
|
2014 |
3D animation as an alternative mean of da'wah for children.
In: 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014
|
2014 |
Online recognition system for handwritten Arabic chemical symbols.
In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
|
2014 |
التكنولوجيا وأزمة اللغة العربية
بين التهميش والانتشار
.
In: المؤتمر الدولي الثالث للغة العربية
|
2014 |
Online recognition system for handwritten Hindi digits based on matching alignment algorithm.
In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
|
2014 |
Management dimension for assessing organizations' readiness toward business intelligence systems.
In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference
|
2014 |
Arabic-Malay cognates as a computer assisted language learning.
In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
|
2014 |
Career guidance and employment management system.
In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
|
2014 |
Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm.
In: The First International Conference on Soft Computing and Data Mining (SCDM-2014)
|
2014 |
Robust image watermarking scheme by discrete wavelet transform.
In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
|
2013 |
Online recognition system for handwritten Arabic mathematical symbols.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
The important dimensions for assessing organization's readiness toward business intelligence systems from the perspective of Malaysian organization.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
Trade-off between robustness, and quality based on dual intermediate significant bits.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages .
In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
Problems of writing on digital surfaces in online handwriting recognition systems.
In: 5th International Conference on Information and Communication Technology for the Muslim World.
|
2013 |
Feature extraction techniques of online handwriting arabic text recognition.
In: 5th International Conference on Information and Communication Technology for the Muslim World
|
2013 |
Properties of digital image watermarking.
In: IEEE 9th International Colloquium on Signal Processing and its Applications
|
2013 |
Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
3D mobile map visualization concept for remote rendered
dataset.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Investigating digital watermark dynamics on carrier file by feed-forward neural network.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2013 |
Feature extraction techniques of online handwriting arabic text recognition.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Automatic interactive security monitoring system.
In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS)
|
2013 |
Co - active neuro-fuzzy inference systems model for predicting crude oil price based on OECD inventories.
In: 3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13)
|
2013 |
Investigating the dynamics of watermark features in audio streams.
In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA)
|
2013 |
Intelligent system for predicting the price of natural gas based on non-oil commodities.
In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013)
|
2013 |
Comparison of empirical indoor propagation models for 4G wireless networks at 2.6 GHz.
In: International Conference on Control, Engineering & Information Technology (CEIT2013)
|
2012 |
Route optimization scenario of a new scheme based on nested mobile network.
In: International Conference on Computer and Communication Engineering (ICCCE 2012)
|
2012 |
Recognition techniques for online Arabic handwriting recognition systems.
In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012)
|
2012 |
Novel mechanism to improve Hadith classifier performance.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Digital image watermarking, analysis of current methods.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Web-based conference management system for higher learning institutions.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Image recognition technique of road tax sticker in Malaysia.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Manpower model for human resource planning management.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
High image quality watermarking model by using genetic algorithm.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Assessing organizations readiness toward business intelligence systems: a proposed hypothesized model.
In: International Conference on Advanced Computer Science Applications and Technologies
|
2012 |
Improving knowledge extraction of Hadith classifier using decision tree algorithm.
In: International Conference on Information Retrieval & Knowledge Management (CAMP), 2012
|
2012 |
Protection of integrity and ownership of pdf documents using invisible signature.
In: 14th International Conference on Computer Modelling and Simulation (UKSim)
|
2012 |
Digital watermarking: A counterfeiting and piracy deterrence.
In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012
|
2012 |
Analytical evaluation of a new route optimization scheme for nested mobile network
.
In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE’10)
|
2012 |
A framework of a route optimization scheme for nested mobile network.
In: 19th International Conference on Neural Information Processing (ICONIP 2012)
|
2012 |
A mobile dictionary for pilgrims.
In: 2012 International Conference on Information Technology and e-Services
|
2011 |
Analysis of ISB watermarking model : block based methods vs Embedding repetition methods.
In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011)
|
2011 |
Analysis of ISB watermarking model: Block based methods vs embedding repetition methods.
In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011)
|
2011 |
Human capital business partner information technology and network technology manpower model.
In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011)
|
2011 |
Tropical crops advisory selection system.
In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011)
|
2011 |
A watermarking authentication system for medical images.
In: World Congress on Engineering and Technology (CET 2011)
|
2011 |
Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation.
In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)
|
2011 |
التقنيات الحديث في خدمة ضيوف الرحمن = Al-Taqniyāh al-ḥadīthah fi khidmah ḍuyūf al-raḥman..
In: الندوة الوطنية الثالثة لتقنية المعلومات: المحتوى العربي والإسلامي على الانترنت = Al-Nadwah al-waṭaniyah al-thālithah li taqniyah al-ma'lūmāt: al-muḥtawā al-Arabi wa al-Islāmī 'ala Internet
|
2011 |
Analysis of ISB watermarking model: block based methods vs embedding repetition methods .
In: MoMM '11 Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
|
2011 |
Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network.
In: 4th International Conference on Mechatronics (ICOM 2011)
|
2011 |
An analytical evaluation of the Islamic websites.
In: International Conference on Islamization in Modern Science and Scientification of Islamic Studies: Prospects and Bridges (ICIMSIS 2011)
|
2011 |
Comparative study of different steganographic techniques.
In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011)
|
2011 |
Enhanced mechanism to handle missing data of Hadith classifier.
In: International Conference on Sustainable Development 2011
|
2011 |
Development of model for assessing organizations’ readiness toward successful Business Intelligence Systems.
In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011)
|
2010 |
Digital watermarking for mammogram authentication.
In: International Conference on Fundamental & Applied Sciences (ICFAS) 2010
|
2010 |
Watermarking technique based on ISB (Intermediate Significant Bit).
In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010)
|
2010 |
Watermarking in safe region of frequency domain using complex-valued neural network.
In: International Conference on Computer and Communication Engineering (ICCCE 2010)
|
2010 |
Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources .
In: International Conference on Information and Communication Technology for Muslim World (ICT4M)
|
2010 |
Segmentation Techniques for Online Arabic Handwriting Recognition:A Survey .
In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010
|
2009 |
A secure audio steganography approach.
|
2009 |
A Novel Approach for Audio Watermarking .
In: Firth International Conference on Information Assurance and Security
|
2009 |
Robust Audio Steganography via Genetic Algorithm .
In: Third International Conference on Information & Communication Texchnologies IEEE-ICIST 2009
|
2009 |
An approach to improve the robustness of substitution techniques of audio steganography .
In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT)
|
2007 |
Steganography technique using modulus arithmetic.
In: 9th International Symposium on Signal Processing and Its Applications, 2007. ISSPA 2007.
|
Book Section |
2016 |
Dynamics classifications of extreme doubly stochastic quadratic operators on 2D simplex.
In: Advanced Computer and Communication Engineering Technology, LNEE
Springer International Publishing
. ISBN 978-3-319-24582-9
, pp.323-335
|
2016 |
Developing a mobile navigation aid.
In: Critical Socio-Technical Issues Surrounding Mobile Computing
IGI Global
. ISBN 978-1466694385
, pp.124-136
|
2016 |
Developing a mobile navigation aid.
In: Critical Socio-Technical Issues Surrounding Mobile Computing
IGI Global
. ISBN 978-1466694385
, pp.124-136
|
2015 |
Fundamentals of multimedia.
In: Multimedia and Its Applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.1-23
|
2015 |
Malaysian multimedia content industry.
In: Multimedia and Its Applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.24-40
|
2015 |
Multimedia and its relevance to education.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.41-52
|
2015 |
Elements of multimedia on the Internet.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.53-63
|
2015 |
Text in multimedia.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.64-72
|
2015 |
Arabic text.
In: Multimedia and Its Applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.73-92
|
2015 |
Practices of handling audio.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.126-138
|
2015 |
Video.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.139-148
|
2015 |
Introduction to computer graphics.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.149-158
|
2015 |
Application of multimedia in digital watermarking.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.159-177
|
2015 |
Application of multimedia in language self-learner.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.178-184
|
2015 |
Application of multimedia in learning history subject.
In: Multimedia and its applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.185-191
|
2015 |
Application of multimedia in teaching Hajj.
In: Multimedia and Its Applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.192-198
|
2015 |
The high impact of using multimedia in enhancing education in schools.
In: Multimedia and Its Applications
IIUM Press
. ISBN 978-967-418-312-7
, pp.198-206
|
2015 |
Fundamentals of computer networks: wired/wireless.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.1-15
|
2015 |
Using multimedia in developing Islamic website.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.40-47
|
2015 |
Multimedia security and the internet.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.48-62
|
2015 |
Application of multimedia user friendly e-lecture notes.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.63-69
|
2015 |
Application of multimedia in e-books system.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.70-77
|
2015 |
Web-based conference management system for higher learning institutions.
In: Internet Applications
IIUM Press
. ISBN 9789674183134
, pp.106-118
|
2015 |
Spread spectrum audio watermarking using vector space projections.
In: Advances in Intelligent Informatics
Springer International Publishing
. ISBN 978-3-319-11218-3
, pp.297-307
|
2013 |
Analysis of wardriving activity and WiFi access points.
In: Wireless sensor networks for developing countries: First International Conference, WSN4DC 2013 Jamshoro, Pakistan, April 2013 revised selected papers
Springer
. ISBN 9783642410536, e-ISBN 9783642410543
, pp.51-59
|
2011 |
Classifying users emotions towards the quranic recitation using EEG: a preliminary study.
In: Understanding brain developmental disorder based on EEG in soft computing approach
IIUM Press
. ISBN 9789674181116
, pp.404-419
|
2011 |
Multimedia elements and internet
.
In: The Web : Its Utilisation, Evaluation and Security
IIUM Press
. ISBN 978-967-418-112-3
, pp.198-201
|
2011 |
Introduction to E- learning.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.1-4
|
2011 |
An overview of ATM systems security .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.113-128
|
2011 |
Security risk of ATM systems, case of study .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.129-138
|
2011 |
Relevance of multimedia in education. .
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.11-14
|
2011 |
Improving the robustness of ISB watermarking techniques by repetition of the embedding.
In: Software engineering and computer systems: communications in computer and Information science
Springer-Verlag Berlin Heidelberg
. ISBN 978-3-642-22170-5 (O), 978-3-642-22169-9
, pp.592-599
|
2011 |
Threats and solutions for ATM security systems .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.139-152
|
2011 |
Security of multimedia in the web
.
In: The web : Its utilisation, Evaluation and Security
IIUM Press
. ISBN 978-967-418-112-3
, pp.257-262
|
2011 |
Investigating the student’s awareness on computer security and ethics .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.155-177
|
2011 |
Difficulties and challenges of recognizing Arabic text .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.179-191
|
2011 |
The study of multicast hierarchical mobile IPV6.
In: Advances in mobility management for IP networks
IIUM Press
. ISBN 9789674181406
, pp.21-26
|
2011 |
Learning PMR history subject using multimedia..
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.51-54
|
2011 |
Teaching Islamic concepts electronically : hajj as an example..
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.55-60
|
2011 |
Virtual learning environment.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.5-9
|
2011 |
The effect of external factors on the students' acceptance of virtual learning..
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.15-20
|
2011 |
دراسة احصائية لكلمات القرآن الكريم = Dirāsah ihsāiyah li kalimāt al-Qura'an al-Karīm.
In: الألسنية المعاصرة واتجاهاتها (al-Alsuniyah al-mu'asirah wa-ittijahatuha)
IIUM Press
. ISBN 9789670225302
, pp.286-302
|
2011 |
An evaluation of transform domain watermarking and its application to intellectual properties images.
In: Multimedia Encryption, Transmission and Authentication
IIUM Press
. ISBN 978-967-418-160-4
, pp.192-197
|
2011 |
Introduction to QoS approaches in mobile ad hoc networks.
In: Advances in mobility management for IP networks
IIUM Press
. ISBN 9789674181406
, pp.171-175
|
2011 |
Online management systems for primary school students. .
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.113-116
|
2011 |
Tropical crops planting recommendation system.
In: Data management: issues, challenges and opportunities
IIUM Press
. ISBN 9789674180843
, pp.157-160
|
2011 |
Employing machine learning algorithms to extract Islamic knowledge.
In: Data management: issues, challenges and opportunities
IIUM Press
. ISBN 9789674180843
, pp.161-168
|
2011 |
Justification of voice recognition system : case study of the Quran..
In: Information technology issues and applications in Malaysia : a collection of articles
IIUM Press
. ISBN 9789674180034
, pp.287-301
|
2011 |
Ethical issues in e-learning..
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.145-149
|
2011 |
Language self-learner.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.21-25
|
2011 |
Logistic database system.
In: Data management: issues, challenges and opportunities
IIUM Press
. ISBN 9789674180843
, pp.177-183
|
2011 |
Online teaching notes.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.27-31
|
2011 |
Development of user friendly e-lectures notes.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.33-38
|
2011 |
E-Books systems.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.39-44
|
2011 |
The high impact of using animation in enhancing education in schools.
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.45-50
|
2011 |
Introduction to mobility management.
In: QoS And Mobile Technologies
IIUM Press
. ISBN 9789674181420
, pp.47-51
|
2011 |
Nested mobile networks.
In: QoS And Mobile Technologies
IIUM Press
. ISBN 9789674181420
, pp.53-57
|
2011 |
Evaluation of NEMO extensions.
In: QoS And Mobile Technologies
IIUM Press
. ISBN 9789674181420
, pp.59-64
|
2011 |
Handoff process in micromobility protocols.
In: QoS And Mobile Technologies
IIUM Press
. ISBN 9789674181420
, pp.65-70
|
2011 |
Comparison between network simulators.
In: QoS And Mobile Technologies
IIUM Press
. ISBN 9789674181420
, pp.71-74
|
2011 |
Adaptive digital watermarking system for authentication of intellectual properties.
In: Multimedia Encryption, Transmission and Authentication
IIUM Press
. ISBN 978-967-418-160-4
, pp.182-191
|
2011 |
Human capital business partner information technology & network technology manpower model.
In: Selected readings in computing and telecommunications
IIUM Press
. ISBN 9789670225814
, pp.38-49
|