الباحثين

الباحثين

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Rashidah Funke Olanrewaju
Associate Professor

Print CV Email Me

Staff Details

  • Engineering Tech ~ Engineering And Technology ~ Electrical and Electronic Engineering ~ Image Processing
  • Engineering Tech ~ Engineering And Technology ~ Biomedical Engineering ~ Artificial Intelligent Screening
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
ADVANCED TOPICS IN SOFTWARE ENGINEERING 2016/2017
ALGORITHMS AND PROGRAMMING 2014/2015 2015/2016 2016/2017 2017/2018
COMPUTER AND INFORMATION ENG. LAB I 2015/2016 2016/2017 2017/2018 2018/2019
COMPUTER AND INFORMATION ENGINEERING LAB I 2017/2018 2018/2019 2019/2020 2020/2021 2022/2023 2023/2024
COMPUTER ARCHITECTURE AND DESIGN 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 2018/2019
COMPUTER ARCHITECTURE AND SYSTEM DESIGN 2023/2024
COMPUTER ARCHITECTURE AND SYSTEMS DESIGN 2022/2023 2023/2024
COMPUTER ORGANIZATION AND ARCHITECTURE 2012/2013 2013/2014 2014/2015 2017/2018 2018/2019
CONCEPTUAL ENGINEERING DESIGN 2023/2024
DATA MINING 2019/2020 2020/2021
DATA STRUCTURE AND ALGORITHM DESIGN 2017/2018 2018/2019 2019/2020 2020/2021 2022/2023 2023/2024
DATA STRUCTURE AND PROGRAMMING 2023/2024
FAMILY MANAGEMENT 2021/2022 2022/2023 2023/2024
FAMILY MANAGEMENT & PARENTING 2019/2020 2020/2021
FINAL YEAR PROJECT 1 2019/2020
FINAL YEAR PROJECT I 2018/2019 2019/2020 2020/2021 2023/2024
FINAL YEAR PROJECT II 2018/2019 2022/2023
NEURAL NETWORKS AND SYSTEMS 2019/2020 2020/2021
OBJECT ORIENTED PROGRAMMING FOR ENGINEERS 2009/2010
PROGRAMMING FOR ENGINEERS 2012/2013
REAL-TIME COMPUTING SYSTEMS 2017/2018
SEMINAR 2014/2015 2015/2016 2016/2017 2022/2023 2023/2024
SOFTWARE ENGINEERING DESIGN 2021/2022
SUSTAINABLE DEVELOPMENT: ISSUES, POLICIES AND PRACTICES 2020/2021
In Progress
2021 - Present Investigation of Stress Detection Model based on Speech via Deep Learning Technique
2020 - Present A Unified Holistic Architectural Framework for IoT Applications using SEaaS
2020 - Present Comprehensive Tactical Modelling of Node Misbehaviour for Improved Defence of Threat Computing in Mobile IoT Systems using Decision and Game Theory
2019 - Present New Non-Invasive Technique via Physiological Signals and Intelligence Machine Learning for Rapid Classification of Stress Level
2019 - Present Decision and Game Theory based Comprehensive Tactical Modelling of Node Misbehaviour for Threat Computing in MANET based IoT System
2019 - Present The Role of Fintech in attaining Financial Inclusion in selected IDB-Member Countries
2019 - Present The Role of Fintech in attaining Financial Inclusion in selected IDB-Member Countries
2019 - Present Decision and Game Theory based Comprehensive Tactical Modelling of Node Misbehaviour for Threat Computing in MANET based IoT System
2019 - Present New Non-Invasive Technique via Physiological Signals and Intelligence Machine Learning for Rapid Classification of Stress Level
2018 - Present A Novel Pose Estimation Algorithm for Mobile AR via Inertial Sensing and Conditional Density Propagation
2018 - Present A Novel Pose Estimation Algorithm for Mobile AR via Inertial Sensing and Conditional Density Propagation
Unknown - Present Comprehensive Tactical Modelling of Node Misbehaviour for Improved Defence of Threat Computing in Mobile IoT Systems using Decision and Game Theory
Unknown - Present A Unified Holistic Architectural Framework for IoT Applications using SEaaS
Unknown - Present Comprehensive Tactical Modelling of Node Misbehaviour for Improved Defence of Threat Computing in Mobile IoT Systems using Decision and Game Theory
Unknown - Present A Unified Holistic Architectural Framework for IoT Applications using SEaaS
Completed
2018 - 2019 Game Theoretic Approach for Exhaustive Tactical Modelling of Node Misbehavior in Adhoc Networking based IoT Paradigm
2018 - 2019 Game Theoretic Approach for Exhaustive Tactical Modelling of Node Misbehavior in Adhoc Networking based IoT Paradigm
2017 - 2020 Modeling Novel Maximum power point Tracking Algorithm for Small Scale Wind Turbine System
2017 - 2018 Strategic Profiling & Analytic Modelling of Node Misbehavior in MANET based IoT Paradigm
2017 - 2018 Strategic Profiling & Analytic Modelling of Node Misbehavior in MANET based IoT Paradigm
2017 - 2020 Modeling Novel Maximum power point Tracking Algorithm for Small Scale Wind Turbine System
2016 - 2018 Eradicating Multi-Channel Dependency for Authentication and Authorization in Secure E-Banking Applications
2016 - 2018 Eradicating Multi-Channel Dependency for Authentication and Authorization in Secure E-Banking Applications
2016 - 2018 Multihoming-Based Scheme to Support Mobility Management in NEMO
2016 - 2018 Multihoming-Based Scheme to Support Mobility Management in NEMO
2016 - 2018 Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks Via Game Theory
2016 - 2018 Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks Via Game Theory
2016 - 2019 Novel Tactile Sensory Surface Mat with Electrical Stimulation (SMES)for the Prevention of Pressure Ulcers due to Immobility
2016 - 2019 Novel Tactile Sensory Surface Mat with Electrical Stimulation (SMES)for the Prevention of Pressure Ulcers due to Immobility
2015 - 2018 An Intelligent method to Optimize Web Cache Replacement algorithm using Neuro-Fuzzy Approach
2015 - 2018 An Intelligent method to Optimize Web Cache Replacement algorithm using Neuro-Fuzzy Approach
2013 - 2016 Discovering Colossal Closed Itemsets from High Dimensional Datasets
2013 - 2015 Medical Identity Theft in Telemedicine: Solving the Privacy and Security Issues
2013 - 2016 Discovering Colossal Closed Itemsets from High Dimensional Datasets
2013 - 2015 Medical Identity Theft in Telemedicine: Solving the Privacy and Security Issues
Article
2021 Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion. International Journal of Electrical and Computer Engineering (IJECE)
2021 Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access , 9 pp.61778 -61792
2021 A frictionless and secure user authentication in web-based premium applications. IEEE ACCESS , 9 pp.129240-129255
2020 Scrutinising internet banking security solutions. International Journal of Information and Computer Security , 12 (2-3) pp.269-302
2020 A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks. IEEE Access , 8 pp.124097-124109
2020 A comprehensive insight into game theory in relevance to cyber security. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) , 8 (1) pp.189-203
2020 MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions. International Journal of Recent Technology and Engineering (IJRTE) , 8 (6) pp.3013-3024
2020 A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT). IEEE Access , 8 pp.98481-98490
2019 Smart parking guidance system using 360o camera and haar-cascade classifier on IoT system. International Journal of Recent Technology and Engineering , 8 (2, Special issue 11) pp.864-872
2019 ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET. International Journal of Soft Computing and Engineering , 8 (7) pp.506-519
2019 A critical insight into pragmatic manifestation of diabetic retinopathy grading and detection. International Journal of Innovative Technology and Exploring Engineering (IJITEE) , 9 (2) pp.2040-2049
2018 Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology , 7 (4) pp.4899-4904
2018 Rehashing system security solutions in e-banking. International Journal of Engineering & Technology , 7 (4) pp.4905-4910
2018 Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT) , 6 (7) pp.9-20
2018 Game theory for resource allocation in heterogeneous wireless networks - a review. Indonesian Journal of Electrical Engineering and Computer Science , 12 (2) pp.843-851
2018 Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects. Indonesian Journal of Electrical Engineering and Computer Science , 10 (1) pp.348-353
2018 Radio Access Technology (RAT) selection mechanism using TOPSIS method in Heterogeneous Wireless Networks (HWN). Indonesian Journal of Electrical Engineering and Computer Science , 12 (2) pp.852-864
2018 A survey on MANETs: architecture, evolution, applications, security issues and solutions. Indonesian Journal of Electrical Engineering and Computer Science , 12 (2) pp.832-842
2018 Design and fabrication of an intelligent walking staff for visually impaired subjects. Indonesian Journal of Electrical Engineering and Computer Science , 10 (1) pp.266-270
2018 Bandwidth allocation policy using the game theory model in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT) , 6 (7) pp.9-20
2018 Snort-based smart and swift intrusion detection system. Indian Journal of Science and Technology , 11 (4) pp.1-9
2018 Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches. International Journal of Grid and Utility Computing , 9 (4) pp.307-321
2018 Classification of normal and crackles respiratory sounds into healthy and lung cancer groups. International Journal of Electrical and Computer Engineering (IJECE) , 8 (3) pp.11530-1538
2018 Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches. International Journal of Grid and Utility Computing , 9 (4) pp.307-321
2018 Secure annihilation of out-of-band authorization for online transactions. Indian Journal of Science and Technology , 11 (5) pp.1-9
2018 A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. International Journal of Information and Computer Security pp.1-23
2017 Securing electronic transactions via payment gateways: a systematic review. International Journal Internet Technology and Secured Transactions , 7 (3) pp.245-269
2017 A proposed architecture for generic and scalable CDR analytics platform utilizing big data technology. Advanced Science Letters , 23 (11) pp.11149-11152
2017 A computationally efficient P-LRU based optimal cache heap object replacement policy. International Journal of Advanced Computer Science and Applications (IJASA) , 8 (1) pp.128-138
2017 Real time telemedical health care systems with wearable sensors. Asian Journal of Pharmaceutical Research and Health Care , 9 (3) pp.138-144
2017 Intelligent cooperative adaptive weight ranking policy via dynamic aging based on NB and J48 classifiers. Indonesian Journal of Electrical Engineering and Informatics , 5 (4) pp.357-365
2017 Linking software engineering paradigms to Islamic values. Journal of Theoretical and Applied Information Technology , 95 (7) pp.1405-1417
2017 Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East Journal of Scientific Research , 25 (3) pp.568-579
2017 Critical security challenges in cloud computing environment: An appraisal. Journal of Theoretical and Applied Information Technology , 95 (10) pp.2234-2248
2017 A compendious study of online payment systems:Past developments, present impact, and future considerations. International Journal of Advanced Computer Science and Applications (IJACSA) , 8 (5) pp.256-271
2017 A new automatic method of parkinson disease identification using complex-valued neural network. Journal of Medical and Bioengineering , 6 (1) pp.25-28
2017 A survey on E-payment systems: elements, adoption, architecture, challenges and security concepts. Indian Journal of Science and Technology , 10 (20) pp.1-19
2017 Design and implementation of a five stage pipelining architecture simulator for RiSC-16 instruction set. Indian Journal of Science and Technology , 10 (3) pp.1-9
2017 Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing. Indian Journal of Science and Technology , 10 (7) pp.1-7
2016 Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging. Indian Journal of Science and Technology , 9 (36) pp.1-7
2016 A framework to reduce redundancy in android test suite using refactoring. Indian Journal of Science and Technology , 9 (46) pp.107107-1
2016 DFAM: A distributed feedback analysis mechanism for knowledge based educational big data. Jurnal Teknologi , 78 (12-3) pp.31-38
2016 Autonomous control of tilt tri-rotor unmanned aerial vehicle. Indian Journal of Science and Technology, , 9 (36) pp.1-7
2016 MANET – A cogitation of its design and security issues. Middle-East Journal of Scientific Research , 24 (10) pp.3094-3107
2016 Two objectives big data task scheduling using swarm intelligence in cloud computing. Indian Journal of Science and Technology, Indian Journal of Science and Technology, Vol 9(28 , 9 (28) pp.1-10
2016 Pragmatic manifestation of high dynamic range imaging – A Review. International Journal of Application or Innovation in Engineering & Management (IJAIEM) , 5 (4) pp.14-21
2016 Contemplation of tone mapping operators in high dynamic range imaging . International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) , 5 (2) pp.98-104
2016 An enhanced architecture for big data task scheduling in cloud environment. Advanced Science Letters , 22 (10) pp.2963-2967
2016 A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. Journal of Theoretical and Applied Information Technology , 84 (3) pp.404-413
2015 DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. International Journal of Information Technology & Computer Science (IJITCS) , 22 (1) pp.1-9
2015 Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. Journal of Theoretical and Applied Information Technology , 77 (1) pp.25-43
2015 Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering , 2 (3) pp.10-19
2014 QoS oriented mapReduce optimization for hadoop based bigData application . International Journal of Engineering Research and Application , 4 (4) pp.12-15
2014 Dual authentication for bluetooth connection. International Journal of Engineering Research and Application , 4 (7) pp.181-191
2014 Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal , 21 (3) pp.462-470
2014 Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering , 2 (1) pp.1-7
2014 Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN). Advances in Environmental Biology , 8 (3 (Special)) pp.582-589
2014 Responsibility and accountability of an engineer in religeous perspective. Science International Lahore , 26 (5) pp.2429-2432
2014 ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal , 76 (5) pp.xx-xx
2014 EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal , 7 (5) pp.88-103
2013 Malicious behaviour of node and its significant security techniques in MANET- a review. Australian Journal of Basic and Applied Sciences , 7 (12) pp.286-293
2013 Computational intelligence: It’s application in digital watermarking. Middle East Journal of Scientific Research (MEJSR) , 13 pp.25-30
2013 Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal , 21 pp.78-83
2013 ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services . electronic Journal of Computer Science and Information Technology , 4 (1) pp.19-24
2013 Evaluating the effect of IP and IGP on the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (2) pp.71-82
2012 Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal (20) pp.79-83
2012 An intelligent modeling of coagulant dosing system for water treatment plants based on artificial neural network. Australian Journal of Basic and Applied Sciences , 6 (1) pp.93-99
2011 Determining watermark embedding strength using complex valued neural network. Journal of Applied Sciences , 11 (16) pp.2907-2915
2011 Forgery detection in medical images using Complex Valued Neural Network (CVNN). Australian Journal of Basic and Applied Sciences , 5 (7) pp.1251-1264
2011 Water quality issues in food processing and production: good quality water is very essential in the production of safe food. Halal Pages 2011/2012 pp.66-73
2010 Damageless digital watermarking using complex-valued artificial neural network . Journal of Information and Communication Technology , 9 pp.111-137

Conference or Workshop Item

2021 A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications. In: 2021 IEEE 7th International Conference on Smart Instrumentation, Measurement and Applications
2020 Low cost piezoresistive pressure sensor matrix for pressure ulcer prevention and management. In: 2019 7th International Conference on Mechatronics Engineering (ICOM) 2019
2020 Diabetic retinopathy grading using ResNet convolutional neural network. In: 2020 IEEE Conference on Big Data & Analytics
2020 Postgraduate research: sharing international experience. In: NSUK 2020
2020 Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC)
2020 Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC)
2019 Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms. In: 2nd East Indonesia Conference on Computer and Information Technology, EIConCIT 2018
2019 Electrical stimulation in combating pressure ulcer for immobilize subjects: a conceptual framework. In: International Conference on Biomedical Engineering
2019 Robust , fast and accurate lane departure warning system using deep learning and mobilenets. In: "7th International Conference on Mechatronics Engineering, ICOM 2019"
2019 A cloud-based bus tracking system based on internet-of-things technology. In: 2019 7th International Conference on Mechatronics Engineering (ICOM)
2019 Offline OTP based solution for secure internet banking access. In: 2018 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)
2018 iWalk:intelligent walking stick for visually impaired subjects. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017
2018 Modeling of ANN to determine optimum adsorption capacity for removal of pollutants in wastewater. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017
2018 Modelling of intelligent intrusion detection system: making a case for snort. In: IEEE Conference on Wireless Sensors, ICWiSe 2017
2018 Class attendance management system using face recognition. In: 7th International Conference on Computer and Communication Engineering, ICCCE 2018
2018 LiFi based automated shopping assistance application in IoT. In: 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017
2017 MotionSure: a cloud-based algorithm for detection of injected object in data in motion. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017
2017 STCM: Secured trust-based communication method in vulnerable mobile adhoc network. In: The 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (RoViSP 2016)
2017 Enhancement web proxy cache performance using wrapper feature selection methods with NB and J48. In: 6th International Conference on Mechatronics - ICOM'17
2017 A study on performance evaluation of conventional cache replacement algorithms: A review. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)
2017 JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016
2017 An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing(PDGC)
2016 Mobile Heart Rate Detection System (MoHeRDS) for early warning of potentially-fatal heart diseases. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
2016 RFDA: Reliable framework for data administration based on split-merge policy. In: 2016 SAI Computing Conference (SAI)
2016 STCM: secured trust-based communication method in vulnerable mobile adhoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, RoViSP 2016
2016 I-VRenewal: A cloud based system for VISA renewal: A case study of IIUM. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
2016 Re-emphasizing the dimensions and impacts of complementary IT resources through governance. In: 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2016 Development of heuristic task scheduling algorithm in cloud computing. In: 3rd International Conference on ICTs for Education and Training (TICET 2016)
2016 Automated bank note identification system for visually impaired subjects in Malaysia. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
2016 A novel neuroscience-inspired architecture: for computer vision applications. In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC)
2016 CDR analysis using big data technology. In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015)
2016 Watermarking in protecting and validating the integrity of digital information: a case study of the holy scripture. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2015 RAED: Response analysis of educational data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)
2015 DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. In: International Conference on Computing Education and Information Technology (ICCEIT 2015)
2015 SSM: Secure-Split-Merge data distribution in cloud infrastructure. In: 2015 IEEE Conference on Open Systems (ICOS)
2015 An empirical study of the evolution of PHP MVC framework. In: International Conference on Communication and Computer Engineering (ICOCOE 2014)
2015 An empirical study of the evolution of PHP MVC framework. In: International Conference on Communication and Computer Engineering (ICOCOE 2014)
2015 RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)
2014 MARKCLOUD - Software for data confidentiality and security in cloud computing environments. In: 4th International Conference on Industrial Engineering and Operations Management (IEOM) 2014
2014 Big data analysis solutions using mapReduce framework. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
2014 Application of neural networks in early detection and diagnosis of parkinson's disease. In: 2014 International Conference on Cyber and IT Service Management (CITSM)
2014 A secure authentication scheme for bluetooth connection. In: International Conference on Computer and Communication Engineering (ICCCE 2014)
2014 Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.. In: 4th International Cryptology and Information Security Conference
2014 Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm. In: 5th International Conference on Computer and Communication Engineering
2014 Bandwith conservation framework for mobile cloud computing: challenges and solutions. In: 5th International Conference on Computer & Communication Engineering 2014 (ICCCE 2014)
2014 r-TOLA: an architecture for real time open learning application for universities. In: International Conference on Computer & Communication Engineering 2014
2014 Dearth of information technology governance studies in developing nations: making case for Nigeria. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Qualitative analysis on watermarking algorithm for large resolution camera phone image. In: 5th International Conference on Computer and Communication Engineering (ICCCE2014)
2014 Robust image watermarking scheme by discrete wavelet transform. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
2013 Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN). In: 3rd International Conference on Biotechnology (ICBioE'13)
2012 Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. In: Proceedings of the International Conference on Mathematical Applications in Engineering (ICMAE 2012)
2012 TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID) . In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012)
2012 Computational intelligence: application in digital watermarking. In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012)
2012 Digital audio watermarking; techniques and applications . In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
2012 State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
2012 An Improved Wavelet Digital Watermarking Software Implementation. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
2012 Development of a scalable video compression algorithm. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
2012 ICT in telemedicine: conquering privacy and security issues in health care services. In: Symposium on IT Governance, Management and Audit, 2012 (SIGMA 2012)
2012 Digital watermarking: A counterfeiting and piracy deterrence. In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012
2011 Artificial neural network for modeling coagulant dosing for water treatment plants. In: 2nd International Conference on Biotechnology Engineering (ICBioE 2011)
2010 Watermarking in safe region of frequency domain using complex-valued neural network. In: International Conference on Computer and Communication Engineering (ICCCE 2010)
2010 An attack proof intelligent digital watermarking based on safe region of fast fourier transform. In: The 2nd International Conference on Engineering and ICT
2009 Image quality assessment of fast fourier transform domain watermarked images. In: International Conference on Rural Information and Communication Technology
2009 State-of-the-art application of artificial neural networks in digital watermarking and the way forward . In: International Conference on Computing & Informatics 2009 (ICOCI 09)

Book

2017 Powdered activated carbon for removal of phenol and treatment of palm oil mill final effluent. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-489-6
2013 Conquest XHTML: a programers guide to extensible HyperText Markup Language. Google GRIN Verlag . ISBN 3656517029, 9783656517023

Book Section

2019 An adaptive and viable face identification for Android mobile devices. In: Handbook of Multimedia Information Security: Techniques and Applications, Springer, Cham . ISBN 978-3-030-15886-6 , pp.301-322
2019 Critical challenges in access management schemes for smartphones: an appraisal. In: Smart Network Inspired Paradigm and Approaches in IoT Applications Springer, Singapore . ISBN 978-981-13-8613-8 , pp.87-113
2019 Internet of things: the concept, inherent security challenges and recommended solutions. In: Smart Network Inspired Paradigm and Approaches in IoT Applications Springer, Singapore . ISBN 978-981-13-8613-8 , pp.63-86
2019 Internet of things: the concept, inherent security challenges and recommended solutions. In: Smart Network Inspired Paradigm and Approaches in IoT Applications Springer, Singapore . ISBN 978-981-13-8613-8 , pp.63-86
2018 Trust and resource oriented communication scheme in mobile ad hoc networks. In: Intelligent systems and applications: extended and selected results from SAI Intelligent Systems Conference (IntelliSys) 2016 Springer . ISBN 978-3-319-69265-4 , pp.414-430
2011 An application of biometric technology : Iris recognition. In: Human Behaviour Recognition, Identification and Computer Interaction IIUM Press . ISBN 978-967-418-156-7 , pp.206-212
2011 An evaluation of transform domain watermarking and its application to intellectual properties images. In: Multimedia Encryption, Transmission and Authentication IIUM Press . ISBN 978-967-418-160-4 , pp.192-197
2011 Adaptive digital watermarking system for authentication of intellectual properties. In: Multimedia Encryption, Transmission and Authentication IIUM Press . ISBN 978-967-418-160-4 , pp.182-191