Article |
30 |
A knowledge-based sense disambiguation method to
semantically enhanced NL question for restricted domain. Information
, 12
(452)
pp.1-18
|
2021 |
Conceptual framework for measuring the
acceptance of Smartwatch to check blood
pressure and pulse transmission time. International Journal of Computational Intelligence in Control
, 13
(02)
pp.155-162
|
2021 |
Predicting spatial displacement based on intraocular image design using convolution neural network - preliminary findings. Journal of Information Systems and Digital Technologies
, 3
(1)
pp.74-82
|
2021 |
Ontology-based approach to semantically enhanced question
answering for closed domain: a review. Information
, 12
(5)
pp.1-22
|
2021 |
Pervasive learning environment for educational makerspaces with emerging technologies and teaching and learning transformation. International Journal of Advanced Trends in Computer Science and Engineering
, 10
(3)
pp.2272-2277
|
2021 |
Framework for location based attendance system by using fourth industrial revolution (4ir) technologies. International Journal of Advanced Trends in Computer Science and Engineering
, 10
(3)
pp.2260-2266
|
2021 |
Acceptance of IoT learning among university students at Pakistan. International Journal of Advanced Trends in Computer Science and Engineering
, 10
(3)
pp.2267-2271
|
2021 |
The effect of adoption of digital marketing on the competitiveness among Omani SMEs. Turkish Online Journal of Qualitative Inquiry (TOJQI)
, 12
(4)
pp.1615-1620
|
2021 |
A methodology for incorporating quality assurance practices during software development life cycle. International Journal of Advanced Trends in Computer Science and Engineering
, 10
(3)
pp.2296-2301
|
2020 |
Measuring secure software development awareness and usage among software developers. Sindh University Research Journal - SURJ (Science Series)
, 52
(4)
pp.381-385
|
2020 |
A study on efectiveness in using continuous integration and development for software development: a state of the art review. Journal of Information Systems and Digital Technologies -JISDT
, 2
(2)
pp.18-27
|
2020 |
Dynamic user preference parameters selection
and energy consumption optimization for smart
homes using deep extreme learning machine
and bat algorithm. IEEE Access
, 8
pp.204744-204762
|
2020 |
Evaluating critical success factors in implementing E-learning system using multicriteria decision-making. PLOS ONE
, 15
(5)
pp.1-25
|
2020 |
A theoretical model of healthcare monitoring surveillance system for patients with severe allergies. international Journal of Advanced and Applied Sciences
, 7
(6)
pp.69-75
|
2020 |
Time and cost efficient cloud resource allocation for
real-time data-intensive smart systems. Energies
, 13
(5706)
pp.1-25
|
2020 |
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems. International journal of Distributed sensor networks
, 16
(8)
pp.1-35
|
2020 |
Augmented reality for learning of children and adolescents with autism spectrum disorder (ASD): A systematic review. IEEE Access
, 8
pp.78779-78807
|
2020 |
Review of components from frameworks and models for GBL for history based courses. University of Sindh journal of Information and Communication Technology
, 4
(1)
pp.9-16
|
2020 |
A study on effectiveness in using continuous
integration and deployment for software
development: a state of the art review. Journal of Information Systems and Digital Technologies
, 2
(2)
pp.18-27
|
2020 |
Evaluating critical success factors in implementing E-learning system using multi-criteria decision-making. PLoS ONE
, 15
(5)
|
2020 |
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children
with autism spectrum disorder (ASD). Universal Access in the Information Society
, 19
(2)
pp.213-243
|
2020 |
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect. Indian journal of Sciences and Technology
, 13
(26)
pp.2601-2608
|
2019 |
A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments. Information
, 10
(108)
pp.1-34
|
2019 |
Competitive algorithms for online conversion problems with interrelated prices. International Journal of Advanced Computer Science and Applications (IJACSA)
, 10
(6)
pp.582-589
|
2019 |
Key individual identification using dimensional relevance in the stratum of networks. Journal of Intelligent & Fuzzy systems
pp.1-15
|
2019 |
Analysis of models for e-commerce adoption factors in developing countries. International Journal on Perceptive and Cognitive Computing (IJPCC)
, 5
(2)
pp.72-80
|
2019 |
Deployment of social nets in multi-layer model to identify Key individuals using majority voting. Knowledge and Information Systems An international Journal
, 58
(1)
pp.113-137
|
2019 |
Deployment of social nets in multilayer model to identify key individuals using majority voting. Knowledge and Information Systems
, 58
(1)
pp.113-137
|
2019 |
Predicting most productive requirements elicitation teams using MBTI personality traits model. International Journal of Engineering and Advanced Technology (IJEAT)
, 9
(1)
pp.3809-3814
|
2019 |
A review on energy consumption optimization techniques in IoT based smart building environment. Information
, 10
(3)
pp.1-34
|
2019 |
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder. Universal Access in the Information Society
pp.1-31
|
2019 |
Effects of socioeconomic characteristics on online purchase intention among Malaysians. Journal of Computational and Theoretical Nanoscience
, 16
(3)
pp.927-934
|
2019 |
Sliding mode control for 2 degrees of freedom upper limb rehabilitation robotics system under uncertainties. Intentional journal of Engineering and Advanced Technology (IJEAT)
, 9
(2)
pp.3268-3274
|
2019 |
Big-five personality traits mapped with software development tasks to find most productive software development teams. International Journal of Innovative Technology and exploring Engineering (IJITEE)
, 8
(12)
pp.965-971
|
2019 |
Revised and extended social commerce technology adoption in e-business of Pakistan. International Journal on Perceptive and Cognitive Computing
, 5
(2)
pp.52-58
|
2018 |
A review on optimization of vehicle frontal crashworthiness
for passenger safety. International Journal of Engineering & Technology (UAE)
, 7
(2.34 (Special issue 34))
|
2018 |
Beyond traditional audits: the implications of information technology on auditing. International Journal of Engineering & Technology (UAE)
, 7
(2.34)
pp.5-11
|
2018 |
Integration social media technology and ethical collaborative learning. International Journal of Engineering & Technology (UAE)
, 7
(2.34 (Special issue 34))
pp.12-15
|
2018 |
An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies. International Journal of Engineering & Technology (UAE)
, 7
(2.34 (Special issue 34))
pp.16-21
|
2018 |
Robotic exoskeleton control for lower limb rehabilitation
of knee joint. International Journal of Engineering & Technology (UAE)
, 7
(2.34 (Special issue 34))
pp.56-59
|
2018 |
Near field communication enabled mobile payments: preliminary study. International Journal of Engineering & Technology (UAE)
, 7
(2.34 (Special issue 34))
pp.60-63
|
2018 |
Preliminary study for customer’s online shopping satisfaction from security perspective. International Journal of Engineering & Technology (UAE)
, 7
(2.34 (Special issue 34))
pp.64-68
|
2018 |
Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies. International Journal of Engineering & Technology
, 7
(2.34 (Special issue 34))
pp.89-92
|
2018 |
Analysis determinants of social media acceptance in higher educational institution of Pakistan. International Journal of Engineering and Technology
, 7
(2.5 (Special Issue 5))
pp.32-36
|
2018 |
Identification of valued users to generate more telecom filigence. Sindh University Research Journal (Science Series)
, 50
(3D)
pp.224-226
|
2018 |
An assessment of proximity technology adoption from a user's perspective. Sindh University Research Journal (Science Series)
, 50
(3D)
pp.220-223
|
2018 |
A review of near field communication process: how do it works?. Sindh University Research Journal (Science Series)
, 50
(3D)
pp.237-240
|
2018 |
Visualization representing benefits of pre-requirement specification traceability. International Journal of Engineering and Technology(UAE)
, 7
(2)
pp.44-52
|
2018 |
Performance evaluation of distributed mMulti media wireless sensor network. International Journal of Engineering and Technology
, Vol 7
(4.15)
pp.318-322
|
2018 |
Performance optimization of wireless sensor network for multimedia services. International Journal of Engineering and Technology
, 7
(4.15)
pp.323-326
|
2018 |
Energy efficiency in virtualized data center. International Journal of Engineering & Technology
, 7
(4.15)
pp.315-317
|
2018 |
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem. International Journal of control and Automation
, 11
(3)
pp.35-44
|
2018 |
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review. International Journal of Control and Automation
, 11
(2)
pp.135-150
|
2018 |
Unstructured source artifacts ontology for requirement validation in GDSD. International Journal of Engineering and Technology
, 7
(2.5 (Special Issue 5))
pp.44-52
|
2018 |
Visualization representation benefits of pre-requirement specification tractability. International Journal of Engineering & Technology
, 7
(2.5 (Special Issue 5))
pp.44-52
|
2018 |
Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation. International Journal of Advanced Computer and Applications
, 9
(4)
pp.221-229
|
2017 |
Artifact evaluation in information systems design science research: social constructivism environment. Science International
, 29
(5)
pp.1059-1064
|
2017 |
A mixed method study for investigating critical success factors (CSFs) of E-learning in Saudi Arabian Universities. International Journal of Advanced Computer Science and Applications
, 8
(5)
pp.171-178
|
2017 |
Assessing digital library acceptance by postgraduate students: a proposed framework. University of Sindh Journal of Information and Communication Technology
, 1
(1)
pp.47-50
|
2017 |
Selecting respondents for survey questionnaire in Islamic way. Journal of Islamic, Social an, Economics and Development
, 2
(5)
pp.40-46
|
2017 |
Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management
, 34
(1)
pp.50-64
|
2017 |
Reliability and validity of a questionnaire for empirical analysis of factors influencing IOT-based smart healthcare. Science International
, 29
(6 Section B (November-December))
pp.1201-1206
|
2017 |
A hybrid method using kinect depth and color data stream for hand blobs segmentation. Science International
, 29
(3 (May-June))
pp.515-519
|
2017 |
Predicting the fraud volume in personal computer using different web browsers. Since International
, 29
(3 (May-June))
pp.681-685
|
2017 |
Halal products recognition using RFID/NFC technology. Science International
, 29
(3 (May-June))
pp.687-692
|
2017 |
Barriers effecting successful implementation of E-learning in Saudi Arabian universities. Internation Journalk of Educational Technology (iJET)
, 12
(6)
pp.94-107
|
2017 |
WSN based sensing model for smart crowed movement with identification: an extended study. Journal of Theoretical and Applied Information Technology
, 95
(5)
pp.975-988
|
2017 |
Forensic analysis of offline signature using multi-layer perception and random forest. International Journal of Database Theory and Applications
, 10
(1)
pp.139-148
|
2016 |
Analysis and enhancement of the denoising depth data using kinect through iterative technique. Jurnal Teknologi
, 78
(9)
pp.185-193
|
2016 |
Real-time hand detection by depth images: a survey. Jurnal Teknologi
, 78
(2)
pp.141-148
|
2016 |
Building CMU Sphinx language model for the Holy
Quran using simplified Arabic phonemes. Egyptian Informatics Journal
, 17
(3)
pp.305-314
|
2016 |
Application service delivery in the modern virtualized data center-improving reliability and scalability. Sindh University Research Journal (Science Series)
, 48
(3)
pp.579-584
|
2016 |
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm. International Journal of Signal Processing, Image Processing and Pattern Recognition
, 9
(10)
pp.11-20
|
2016 |
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems. Sindh University Research Journal (Science Series)
, 48
(4D)
pp.17-26
|
2016 |
An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem. SINDH university Research Journal ( science series )
, 48
(4D)
pp.175-182
|
2016 |
Utilizing modular neural network for prediction of possible
emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science
, 10
(2)
pp.34-51
|
2016 |
Transitional approaches for PERN migration to SDN. Information Technology Journal
, 15
(4)
pp.137-143
|
2016 |
Towards using CMU sphinx tools for the Holy Quran recitation verification. International Journal on Islamic Applications in Computer Science And Technology (IJASAT)
, 4
(2)
pp.10-15
|
2016 |
HTM:a new hierarchical interconnection network for future generation parallel computers. IETE Technical Review
, 33
(2)
pp.93-104
|
2016 |
An offline signature verification technique using pixels intensity levels. International Journal of Signal Processing, Image Processing and Pattern Recognition
, 9
(8)
pp.205-222
|
2016 |
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan . Sindh University Research Journal (Science Series)
, 48
(2)
pp.309-314
|
2016 |
Testing desktop application: Police station information management system. International Journal of Software Engineering and Its Applications
, 10
(7)
pp.101-118
|
2016 |
A study to investigate state of ethical Development in E-learning. International Journal of Advanced Computer Science and Applications
, 7
(4)
pp.284-290
|
2016 |
Risk management policies of telecommunication and engineering laboratories . International Journal of Hybrid Information Technology
, 9
(4)
pp.281-290
|
2015 |
Automated animation of quadrupeds using procedural programming technique. Asian Journal of Scientific Research
, 8
(2)
pp.165-181
|
2015 |
An applications development for record keeping of police stations in Pakistan . Journal of Scientifc Research and Advances
, 2
(4)
pp.144-150
|
2015 |
Resolving ethical dilemma in technology enhanced education through smart mobile devices . International Arab Journal of e-Technology
, 4
(1)
pp.25-31
|
2015 |
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review. Renewable and Sustainable Energy Reviews
, 51
pp.1553-1563
|
2015 |
Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences
, 9
(5)
pp.2703-2714
|
2015 |
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework. Journal of Islamic Countries Society of Statistical Sciences (IJOSS)
, 1
(2)
pp.131-139
|
2015 |
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation . International Journal of Computer Graphics & Animation
, 5
(1)
pp.47-67
|
2015 |
Analyzing the weighted dark networks using scale-free network approach. WSEAS Transactions on Computers
, 14
pp.748-759
|
2015 |
Computational modeling of mood from sequence of emotions. Advanced Science Letters
, 21
(10)
pp.2997-3001
|
2015 |
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait . Wulfenia Journal
, 22
(3)
pp.258-269
|
2015 |
Transaction Management techniques and practices in current cloud computing environment: a survey . International Journal of Database Management Systems (IJDMS)
, 7
(1)
pp.41-49
|
2015 |
Pervasive learning using cloud computing . Sindh University Research Journal (Science Series)
, 47
(3)
pp.567-570
|
2015 |
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students . Journal of Ecosystem & Ecography
, 5
(3)
pp.1-5
|
2015 |
An appraisal of off-line signature verification techniques . International Journal on Modern Education and Computer Science
, 4
pp.67-75
|
2015 |
Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology
, 71
(1)
pp.87-96
|
2015 |
Collaborative learning, using Facebook's page and Groups. International Journal of Computer System
, 2
(2)
pp.47-52
|
2015 |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering
, 2
(3)
pp.10-19
|
2015 |
Mobile agent based multi-layer security framework for cloud data centers. Indian Journal of Science & Technology
, 8
(12)
pp.52923-1
|
2014 |
Contribution of cloud computing in the reduction of carbon dioxide emission . International Journal for Innovation Education and Research
, 2
(8)
pp.118-120
|
2014 |
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria. International journal of Computer and Information Technology
, 3
(1)
pp.13-20
|
2014 |
Energy efficiency and environmental consideration for green data centres. International Journal of Green Economics
, 8
(2)
pp.144-157
|
2014 |
Metrics for computing performance of data center for instigating Energy Efficient Data center. Journal of Scientifc and Industrial Research
, 73
pp.11-15
|
2014 |
Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal
, 21
(3)
pp.462-470
|
2014 |
Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering
, 2
(1)
pp.1-7
|
2014 |
Cloud computing adoption model for universities to increase ICT proficiency. SAGE Open
pp.1-10
|
2014 |
Power usage effectiveness metrics to measure efficiency and performance of data centers. Applied Mathematics and Information Sciences
, 8
(5)
pp.2207-2216
|
2014 |
Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies
, 94
(2)
pp.1-10
|
2014 |
Cloud computing adaptation model for universities to increase ICT proficiency. SAGE Open
, 4
(3)
pp.1-10
|
2014 |
ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal
, 76
(5)
pp.xx-xx
|
2014 |
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal
, 7
(5)
pp.88-103
|
2014 |
Encryption method for SCADA security enhancement. Journal of Applied Sciences
pp.1-9
|
2014 |
Encryption method for SCADA security enhancement. Journal of Applied Sciences
pp.1-9
|
2014 |
Deployment of new dynamic cryptography buffer for SCADA security enhancement . Journal of Applied Sciences
pp.1-11
|
2013 |
Prototyping of a situation awareness system in the maritime surveillance. IOP Conference Series: Materials Science and Engineering
, 53
(012007)
pp.1-6
|
2013 |
Selecting a mentor: guide for a Protégé. World Applied Sciences Journal
, 24
(6)
pp.732-738
|
2013 |
Forward and Inverse Kinematics Seamless Matching using Jacobian. Sindh University Research Journal (Science Series)
, 45
(2)
pp.387-392
|
2013 |
Measuring efficiency of tier level data centers to implement green energy efficient data centers. Middle-East Journal of Scientific Research
, 15
(2)
pp.200-207
|
2013 |
Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 3
(1)
pp.21-30
|
2013 |
Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia. International Journal of Emerging Technologies in Learning
, 8
(3)
pp.8-12
|
2013 |
Evaluating the effect of IP and IGP on
the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 3
(2)
pp.71-82
|
2012 |
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm. International Journal of Innovative Computing, Information and Control
, 8
(6)
pp.4375-4389
|
2012 |
Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE. Turkish Journal of Computer and Mathematics Education
, 12
(14)
pp.5212-5224
|
2012 |
Virtualization implementation approach for data centers to maximize performance. Asian Journal of Scientific Research
, 5
(2)
pp.45-57
|
2012 |
Information and communication technology workforce employability in Malaysia. Campus Wide Information Systems
, 29
(2)
pp.80-89
|
2011 |
Green IT based energy efficiency model for data
centers to reduce energy consumption & CO2 emissions. International Journal of Current Research and Review
, 3
(10)
pp.1-10
|
2011 |
Command based line following robot using RF technology. Journal of Computer Science and Technology
, 1
(1)
pp.25-35
|
2011 |
Internet banking in Pakistan: finding complexities. Journal of Internet Banking and Commerce
, 16
(1)
pp.1-14
|
2011 |
Differential image compression for telemedicine: a novel approach. Pakistan Journal of Engineering, Technology and Science
, 1
(1)
pp.14-20
|
2011 |
Revisiting far/near infrared pyramid-based fusion types for night vision using matlab. Pakistan Journal of Engineering Technology & Science (PJETS)
, 1
(1)
pp.21-36
|
2011 |
A novel text steganography technique to Arabic language using reverse fatah . Pakistan Journal of Engineering Technology & Science (PJETS)
, 1
(2)
pp.106-113
|
2011 |
Frequencies determination of characters for Bahasa Melayu:
results of preliminary investigation
. Procedia - Social and Behavioral Sciences
, 27
pp.233-240
|
2006 |
Infective endocarditis in the East coast of peninsular Malaysia: a two year retrospective survey from Kuantan. JK-Practitioner
, 13
(1)
pp.5-8
|
Conference or Workshop Item |
2021 |
Enhancing Higher education in Pakistan: Smart learning a way forward.
In: 10th International virtual conference on emerging trends and technologies in computing and software enggineerin, 2021
|
2021 |
Assessing student learning using modern tools and techniques of 21st century.
In: 1st international symposium on virtual learning and assessment methods
|
2021 |
Energy consumption optimization in the smart homes.
In: 11th International Conference On Distributed Computing, Information Systems and Internet of Things (IOT)
|
2020 |
Mobile augmented reality app for children with autism spectrum disorder (asd) to learn vocabulary (marvoc): From the requirement gathering to its initial evaluation.
In: 2nd International Conference on HCI in Games, HCI-Games 2020
|
2020 |
A novel RE Teams selection process for user-centric requirements elicitation frameworks based on big-five personality assessment model.
In: IEEE ICIIS-2020
|
2020 |
Recent teaching technologies and smart learning.
In: 1st National Conference on Emerging trends in Information and Engineering Technologies
|
2020 |
Energy consumption optimization in the smart homes.
In: 3rd International Conference on Computer Information Science and Application Technology (CISAT 2020)
|
2020 |
Information technology (IT) based intervention among individuals with ASD (autism spectrum disorder): A review.
In: 2nd IEEE International Conference on Innovative Research and Development, ICIRD 2019
|
2020 |
Process hierarchy for GSD based user-centric
requirements elicitation frameworks.
In: IEEE ICIIS-2020
|
2020 |
Smart learning environment framework.
In: International virtual conference on emerging trends in computer and software Engineering
|
2020 |
A model for e-commerce adoption by SMEs in developing countries.
In: The International Conference on Business and Technology (ICBT 2020)
|
2019 |
Review on Natural Language Processing (NLP) and its toolkits for opinion mining and sentiment analysis.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2019 |
Comprehensive ICT framework for educational institutes of Kuwait: an empirical study.
In: 2nd IEEE International Conference on Innovative Research and Development (ICIRD 2019)
|
2019 |
Digital literacy and the attitude of educators towards MOOC platform in GCC countries.
In: 2nd IEEE International Conference on Innovative Research and Development (ICIRD 2019)
|
2019 |
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan.
In: 2019 International Conference on Information Science and Communication Technology (ICISCT)
|
2019 |
Visualization: a tool to study nodes in multi-dimensional networks.
In: Computing Conference 2019
|
2019 |
Disparity between theory & practice beyond the worst-case competitive analysis.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2019 |
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life.
In: 5 th IEEE International Conference on Engineering, Technologies and Applied Sciences ( ICETAS 2018 )
|
2019 |
The effect of web-based social networking on consultancy.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2019 |
Factors affecting secure software development practices among developers- an investigation.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2019 |
A conceptual framework for measuring acceptance of
contactless payment methods.
In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2019 |
Social science interdisciplinary research and challenges.
In: 1st International Conference on " Multidisciplinary Innovation & Research Challenges in Social Science"
|
2019 |
A review of programming code assessment approaches.
In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2019 |
Offline printed Sindhi optical text recognition: survey.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2019 |
The impact of emerging technologies on public sector.
In: International Conference, Student Exchange & Social Exploration Post Graduate Program
|
2019 |
Acceptance and use of information and communication technology in higher education institutes of Kuwait: a proposed framework.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2019 |
Comparative views on western paradigms of knowledge
with the Islamic paradigm of knowledge and knowledge
discovery and integration.
In: 7th International conference on Islamic Applications
|
2018 |
Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP).
In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2018 |
An empirical study of Internet of Things (IoT) - based healthcare acceptance in Pakistan:pilot study.
In: 3rd IEEE International Conference on Engineering Technologies and Social Sciences, ICETSS 2017
|
2018 |
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes.
In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD)
|
2018 |
The future of data privacy and security concerns in
Internet of things.
In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD)
|
2018 |
Prediction-based resource allocation model for real time tasks.
In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2018 |
Social commerce in e-business of Pakistan: opportunities, challenges and solutions.
In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2018
|
2018 |
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases.
In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018
|
2018 |
Security and privacy for IoT and fog computing paradigm.
In: 15th Learning and Technology Conference (L&T) 2018
|
2018 |
Health information system (HMS) in Malaysia.
In: 1st International conference on Multidisciplinary Academic Research
|
2018 |
Using web crawlers for feature extraction of social nets for analysis.
In: 14th International Conference on Information Technology - New Generations (ITNG 2017)
|
2018 |
Near field communication enabled payment system adoption: A
proposed framework.
In: 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS)
|
2018 |
Detecting change from social networks using temporal analysis of email data.
In: 14th International Conference on Information Technology - New Generations (ITNG 2017)
|
2018 |
Towards an accurate speaker-independent Holy Quran acoustic model.
In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017
|
2018 |
E-learning in Iraqi universities: a review.
In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
|
2018 |
Towards an integrated framework of e-learning through an international innovative collaboration: Iraqi perspective.
In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
|
2018 |
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh.
In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
|
2018 |
Preliminary study on factors affecting E-commerce success: a modified Delone and McLean model.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2017 |
Assimilating e-learning barriers using an interpretive structural modelling (ISM).
In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2017 |
Important attributes of customer satisfaction in telecom industry: a survey based study.
In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2017 |
Development of a game for history course of secondary school students.
In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
|
2017 |
Testing Sphinx’s language model fault-tolerance for the Holy Quran.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2016 |
WSN based sensing model for smart crowd movement with identification: a conceptual model.
In: Multi Conference on Computer Science And Information Systems 2016
|
2016 |
An adoption of Halal food recognition system using Mobile Radio Frequency Identification (RFID) and near field communication (NFC).
In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
|
2016 |
Modeling user's trust in M-commerce acceptance: a conceptual framework in context of Pakistan.
In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
|
2016 |
Acceptance and use of information and communication technology by academicians: Towards a conceptual framework.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2016 |
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
|
2016 |
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
|
2016 |
Factors effecting fixed-line telecom services customer retention: A study of Pakistan .
In: 14th International Conference on Statsitical Sciences
|
2015 |
Relation mining using cross correlation of multi domain social networks .
In: SAI Intelligent Systems Conference (IntelliSys), 2015
|
2015 |
A conceptual framework for the analysis of determinants of m-commerce acceptance.
In: 13th International Conference on Statistical Sciences
|
2015 |
Detecting changes in context using time series analysis of social network.
In: SAI Intellegence Systems Conference 2015
|
2015 |
SmartCrowd: novel approach to big crowd management using mobile cloud computing.
In: International Conference on Cloud Computing 2015 (ICCC'2015)
|
2015 |
A conceptual framework for measuring the acceptance of pervasive learning.
In: 5th International Conference on Computing and Informatics (ICOCI 2015)
|
2015 |
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan.
In: 5th International Conference on Computing and Informatics, ICOCI 2015
|
2015 |
Predicting the fraud volume in the advent of internet enabled handheld devices .
In: 4th International Conference on Advances in Engineering Sciences and applied Mathematics, ICAESAM' 2015
|
2015 |
Mobile online services and measuring user satisfaction: study of Kuwait.
In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
|
2015 |
A model for handling overloading of literature review process for social science .
In: The International Conference on Advanced Research in Business and Social Sciences 2015 (ICARBSS 2015)
|
2015 |
Towards using CMU Sphinx Tools for the Holy Quran recitation verification.
In: 3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015)
|
2015 |
A review of slicing techniques in software engineering.
In: International Conference on Engineering and Technology
|
2015 |
Simulation of Resources Sharing Architecture (ReSa) between
clouds using Java programming.
In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
|
2014 |
RFID based smart hospital management system: A conceptual framework.
In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
|
2014 |
Sharing of attacks information across clouds for improving security:a conceptual framework.
In: International Conference on Computer, Communication, and Control Technology (I4CT 2014)
|
2014 |
Anomaly detection in vessel tracking using Support Vector Machines (SVMs).
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
|
2014 |
Identification of vessel anomaly behavior using support vector machines and Bayesian networks.
In: International Conference on Computer and Communication Engineering (ICCCE 2014)
|
2014 |
Investigating how the sources of online audio Qur’an empower listeners.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Systematic review of computational modeling of mood and emotion.
In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
|
2014 |
Node status detection and information diffusion in router network using scale-free network.
In: 10th International Network Conference, INC 2014
|
2014 |
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science .
In: 5th International Conference Information & Communication Technology for the Muslim World (ICT4M 2014)
|
2014 |
Calculus and its applications in scale-free networks .
In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014)
|
2014 |
ReSA: architecture for resources sharing between
clouds.
In: 2014 Conference on Information Assurance and Cyber Security (CIACS)
|
2013 |
Inculcating ethical values in the students through e-Learning platform.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Analysis of SNS popularity from different perspectives among users.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
A security-based survey and classification of cloud architectures, state of the art and future directions .
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
Template based procedural rigging of quadrupeds with custom manipulators.
In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
A model for real-time recognition and textual representation of Malaysian sign language through image processing
.
In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages .
In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
|
2013 |
10 c’s of social networking, interconnections and
the impact on social networking.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Prototyping of a situation awareness system in the maritime surveillance.
In: 5th International Conference on Mechatronics
|
2013 |
Ethical perspective of students in Global Learning Environment.
In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2013 |
A 10 C’s of social networking, interconnections and the impact on social networking.
In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M)
|
2013 |
Fault tolerant cloud auditing.
In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
|
2013 |
Towards quick response and secure online banking transactions: using data compression and cryptography.
In: 2nd International Conference on Advances Information Technology (AIT 2013)
|
2013 |
Hierarchical 3D-Mesh Network.
In: IRIIE2013
|
2012 |
On dynamic communication performance of a hierarchical 3D-mesh network.
In: The 9th IFIP International Conference on Network and Parallel Computing (NPC 2012)
|
2012 |
A deadlock-free dimension order routing for hierarchical 3D-mesh network.
In: 2012 International Conference on Computer & Information Science (ICCIS)
|
2012 |
Design and development of the FMCW Radar Scene Generator.
In: 2012 IEEE Symposium on Industrial Electronics and Applications (ISIEA2012)
|
2012 |
Widget based automated rigging of bipedal character with custom manipulators
.
In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;
|
2012 |
NoMadCar: the interactive design using human computer interaction techniques.
In: International Multi-TopIc Conference (IMTIC 2012)
|
2012 |
Building wireless sensor networks application using Sun SPOTs.
In: Second International Multi Topic Conference, IMTIC 2012
|
2012 |
High performance hierarchical torus network.
In: IRIIE2012
|
2011 |
Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation.
In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)
|
2011 |
Maximizing bandwidth efficiency of statistical multiplexer Architexture using frame dropping methods .
In: KICT Seminar
|
Book Section |
2021 |
Special education teachers' for Autism Spectrum Disorder children: behavioral intention and use of technology in Malaysia.
In: Exploring information systems research boundaries (EISRB)
Association for Information Systems Malaysia- MyAIS
, pp.9-18
|
2021 |
Special education teachers’ for autism spectrum disorder children: behavioral intention and use of technology
in Malaysia.
In: Exploring information system research boundaries (EISRB) – SERIES 3
Persatuan Sistem Maklumat Malaysia (MyAIS)
. ISBN 9789671774113
, pp.9-18
|
2021 |
A model for e-commerce adoption by smes in developing countries.
In: The Importance of New Technologies and Entrepreneurship in Business Development: In The Context of Economic Diversity in Developing Countries
Springer International Publishing
. ISBN 978-3-030-69220-9
, pp.516-529
|
2018 |
Proactive business intelligence to give best customer experience to valued social networks in telecoms.
In: Lecture Notes in Networks and Systems
Springer
. ISBN 978-3-319-56993-2
, pp.678-686
|
2013 |
Hierarchical Tori Connected Mesh Network.
In: Computational Science and Its Applications – ICCSA 2013 : 13th International Conference, Ho Chi Minh City, Vietnam, June 24-27, 2013, Proceedings, Part V
Springer-Verlag Berlin Heidelberg
. ISBN 978-3-642-39640-3 (O), 978-3-642-39639-7 (P)
, pp.197-210
|
2011 |
Relational and logical operators.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.39-44
|
2011 |
Bitwise operators and type casting .
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.45-50
|
2011 |
Conditional statements .
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.51-54
|
2011 |
The use of genetic algorithm in autonomous robot navigation .
In: Computer applications: theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.3-13
|
2011 |
If-else statements .
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.55-60
|
2011 |
In-silico drug target design & its approaches .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.15-26
|
2011 |
The If-Else-If statements .
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.61-66
|
2011 |
Switch statement .
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.67-72
|
2011 |
Molecular docking .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.37-44
|
2011 |
The use of genetic algorithm in improving medical image segmentation techniques .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.45-55
|
2011 |
Protection mechanisms using MD5 and Base64.
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.59-69
|
2011 |
Protection mechanisms using LSB and MD5 .
In: Computer applications: Theories and applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.85-98
|
2011 |
Security risk of ATM systems, case of study .
In: Computer Applications: Theories and Applications
IIUM Press
. ISBN 978-967-418-107-9
, pp.129-138
|
2011 |
Introduction .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.1-3
|
2011 |
Arithmetic expressions and data types in C++ .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.1-3
|
2011 |
Sending the output to a print file .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.11-16
|
2011 |
Decision making: If-else statements and relational operators .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.17-24
|
2011 |
Logical operators and switch statements.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.25-31
|
2011 |
Iterative structures .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.39-48
|
2011 |
Review, summary & building skill .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.33-37
|
2011 |
Loops in Java.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.73-78
|
2011 |
The for loop .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.49-53
|
2011 |
Do-While loops.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.79-83
|
2011 |
The do-while loop .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.55-57
|
2011 |
For loops.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.85-92
|
2011 |
Review of variables, formatting.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.59-61
|
2011 |
Review of iterative structures .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.63-72
|
2011 |
Post-test and nested loops .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.73-82
|
2011 |
Loop pitfalls and exercise.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.93-97
|
2011 |
Functions .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.83-90
|
2011 |
Nested loops.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.99-104
|
2011 |
Arrays in Java.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.105-110
|
2011 |
Strings.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.119-125
|
2011 |
Call-by-value and reference .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.91-97
|
2011 |
Methods of string class.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.127-134
|
2011 |
Object and classes.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.135-140
|
2011 |
More on functions.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.99-110
|
2011 |
Constructors.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.141-146
|
2011 |
Structures (struct) and files .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.111-118
|
2011 |
Arguments passing.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.155-161
|
2011 |
Arrays .
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.119-125
|
2011 |
User defined methods.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.147-154
|
2011 |
Exercise of array.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.127-135
|
2011 |
Return statement.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.163-167
|
2011 |
Familiarization with multimeter .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.1-5
|
2011 |
Working with classes.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.169-175
|
2011 |
Multiple classes.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.177-184
|
2011 |
Using the multimeter .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.6-12
|
2011 |
Familiarization with oscilloscope.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.13-17
|
2011 |
Signals .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.18-22
|
2011 |
Probes.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.23-28
|
2011 |
Method overloading and overriding.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.185-190
|
2011 |
Modifiers for class data.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.191-197
|
2011 |
Control panel of an oscilloscope.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.29-33
|
2011 |
Operation of an oscilloscope.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.34-38
|
2011 |
Inner classes.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.199-205
|
2011 |
Measurement techniques.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.39-46
|
2011 |
Resistor color codes .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.47-51
|
2011 |
Soldering iron practice .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.52-55
|
2011 |
Comparison between different class types.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.207-213
|
2011 |
Procedure of soldering iron practice .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.56-59
|
2011 |
Ohm's law .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.60-61
|
2011 |
Using the multi-meter for Ohm's law .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.62-64
|
2011 |
Exception handling.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.215-222
|
2011 |
Voltage divider rule (VDR).
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.65-68
|
2011 |
Common emitter amplifier with fixed bias .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.69-74
|
2011 |
Integration of ICT in education : an Islamic perspective..
In: Advancement in E- learning
IIUM Press
. ISBN 978-967-418-105-5
, pp.61-71
|
2011 |
Common emitter amplifier with self bias .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.75-77
|
2011 |
Common collector transistor amplifier .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.78-81
|
2011 |
Throw & throws keyword.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.223-229
|
2011 |
Darlington common emitter .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.82-86
|
2011 |
Class-A amplifier .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.87-91
|
2011 |
Class-B power amplifier .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.92-96
|
2011 |
Voltage follower.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.97-100
|
2011 |
Local block and static block.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.231-235
|
2011 |
Inverting amplifier .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.101-104
|
2011 |
Summing amplifier .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.105-107
|
2011 |
Abstract class.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.237-244
|
2011 |
Subtractor or differential amplifier .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.108-110
|
2011 |
Integrator.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.111-114
|
2011 |
Differentiator.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.115-120
|
2011 |
Comparator.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.121-122
|
2011 |
Interfaces.
In: JAVA programming lab manual
IIUM Press
. ISBN 9789674180867
, pp.245-257
|
2011 |
Active low pass filter .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.123-128
|
2011 |
Active high pass filter .
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.129-135
|
2011 |
Active band pass filter.
In: Understanding basic concept of electrical and electronic systems
IIUM Press
. ISBN 9789674181161
, pp.136-141
|
2011 |
Read data from a file.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.137-141
|
2011 |
Object oriented programming.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.143-152
|
2011 |
Selection sorting.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.153-159
|
2011 |
Bubble sort algorithm.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.161-166
|
2011 |
Linear searching.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.179-188
|
2011 |
Review of arrays.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.167-177
|
2011 |
Binary search.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.189-197
|
2011 |
Vector class.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.199-202
|
2011 |
Pointers.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.203-211
|
2011 |
Function pointers.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.213-218
|
2011 |
Polymorphism and virtual functions.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.219-221
|
2011 |
C++ references.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.223-227
|
2011 |
Const correctness.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.229-234
|
2011 |
More on const keywords.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.235-239
|
2011 |
Goto statement.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.241-247
|
2011 |
Handling errors in C++.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.249-252
|
2011 |
Static: the multipurpose keyword.
In: C++ Programming: Step by Step
IIUM Press
. ISBN 9789674180904
, pp.253-255
|
2011 |
Internal structure of computer systems.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.1-8
|
2011 |
Interfaces and protocols.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.9-16
|
2011 |
Firmware program.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.17-22
|
2011 |
Graphical user interfaces.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.23-30
|
2011 |
Short cut and hard drive.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.31-38
|
2011 |
Windows explorer.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.39-46
|
2011 |
Folder and directory.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.47-53
|
2011 |
Control panel and screen savers.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.65-72
|
2011 |
Basic operating system setting.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.81-86
|
2011 |
Hardware configuration.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.73-79
|
2011 |
Transmission bandwidth efficiency enhancement techniques.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.1-4
|
2011 |
Linear predictive coding of speech.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.15-17
|
2011 |
Windows installation.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.87-98
|
2011 |
Digital multiplexing techniques.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.5-9
|
2011 |
Low bit rate speech coding.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.10-11
|
2011 |
Network security setting.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.99-106
|
2011 |
Low bit rate speech coding standards.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.12-14
|
2011 |
Task scheduling.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.107-112
|
2011 |
Codebook excited linear predictive coding.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.18-21
|
2011 |
Pulse residual excited linear prediction.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.22-25
|
2011 |
Basic storage management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.113-118
|
2011 |
Multi-pulse residual excitation model (MP-PRE).
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.26-30
|
2011 |
Low bit rate speech multiplexer tools.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.31-32
|
2011 |
Logical drive.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.119-125
|
2011 |
Discontinuous transmission and multiplexing.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.33-35
|
2011 |
Measured temporal parameters.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.36-44
|
2011 |
Storage management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.127-134
|
2011 |
Quality assessments in multiplexing.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.45-46
|
2011 |
Simulation of speech activities using Markov Model.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.47-53
|
2011 |
Basic disk management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.135-140
|
2011 |
Packet loss and frame substitution techniques.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.54-59
|
2011 |
Speech quality in lossy multiplexing.
In: Statistical Time Division Multiplexing Architectures and Design
IIUM Press
. ISBN 978-967-418-190-1
, pp.60-63
|
2011 |
Disk management.
In: Introduction of computer systems and applications
IIUM Press
. ISBN 9789674180850
, pp.141-146
|
2011 |
Design of a low bit rate STDM multiplexing.
In: Statistic |