Article |
2021 |
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion. International Journal of Electrical and Computer Engineering (IJECE)
|
2021 |
Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access
, 9
pp.61778 -61792
|
2021 |
A frictionless and secure user authentication
in web-based premium applications. IEEE ACCESS
, 9
pp.129240-129255
|
2020 |
Scrutinising internet banking security solutions. International Journal of Information and Computer Security
, 12
(2-3)
pp.269-302
|
2020 |
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks. IEEE Access
, 8
pp.124097-124109
|
2020 |
A comprehensive insight into game theory in relevance to cyber security. Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
, 8
(1)
pp.189-203
|
2020 |
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions. International Journal of Recent Technology and Engineering (IJRTE)
, 8
(6)
pp.3013-3024
|
2020 |
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT). IEEE Access
, 8
pp.98481-98490
|
2019 |
Smart parking guidance system using 360o camera and haar-cascade classifier on IoT system. International Journal of Recent Technology and Engineering
, 8
(2, Special issue 11)
pp.864-872
|
2019 |
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET. International Journal of Soft Computing and Engineering
, 8
(7)
pp.506-519
|
2019 |
A critical insight into pragmatic manifestation of diabetic retinopathy grading and detection. International Journal of Innovative Technology and Exploring Engineering (IJITEE)
, 9
(2)
pp.2040-2049
|
2018 |
Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology
, 7
(4)
pp.4899-4904
|
2018 |
Rehashing system security solutions in e-banking. International Journal of Engineering & Technology
, 7
(4)
pp.4905-4910
|
2018 |
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT)
, 6
(7)
pp.9-20
|
2018 |
Game theory for resource allocation in heterogeneous wireless networks - a review. Indonesian Journal of Electrical Engineering and Computer Science
, 12
(2)
pp.843-851
|
2018 |
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(1)
pp.348-353
|
2018 |
Radio Access Technology (RAT) selection mechanism using
TOPSIS method in Heterogeneous Wireless Networks (HWN). Indonesian Journal of Electrical Engineering and Computer Science
, 12
(2)
pp.852-864
|
2018 |
A survey on MANETs: architecture, evolution, applications,
security issues and solutions. Indonesian Journal of Electrical Engineering and Computer Science
, 12
(2)
pp.832-842
|
2018 |
Design and fabrication of an intelligent walking staff for visually impaired subjects. Indonesian Journal of Electrical Engineering and Computer Science
, 10
(1)
pp.266-270
|
2018 |
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT)
, 6
(7)
pp.9-20
|
2018 |
Snort-based smart and swift intrusion detection system. Indian Journal of Science and Technology
, 11
(4)
pp.1-9
|
2018 |
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches. International Journal of Grid and Utility Computing
, 9
(4)
pp.307-321
|
2018 |
Classification of normal and crackles respiratory sounds into healthy and lung cancer groups. International Journal of Electrical and Computer Engineering (IJECE)
, 8
(3)
pp.11530-1538
|
2018 |
Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches. International Journal of Grid and Utility Computing
, 9
(4)
pp.307-321
|
2018 |
Secure annihilation of out-of-band authorization for
online transactions. Indian Journal of Science and Technology
, 11
(5)
pp.1-9
|
2018 |
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem. International Journal of Information and Computer Security
pp.1-23
|
2017 |
Securing electronic transactions via payment gateways: a systematic review. International Journal Internet Technology and Secured Transactions
, 7
(3)
pp.245-269
|
2017 |
A proposed architecture for generic and scalable CDR analytics platform utilizing big data technology. Advanced Science Letters
, 23
(11)
pp.11149-11152
|
2017 |
A computationally efficient P-LRU based optimal cache heap object replacement policy. International Journal of Advanced Computer Science and Applications (IJASA)
, 8
(1)
pp.128-138
|
2017 |
Real time telemedical health care systems with wearable sensors. Asian Journal of Pharmaceutical Research and Health Care
, 9
(3)
pp.138-144
|
2017 |
Intelligent cooperative adaptive weight ranking policy via dynamic aging based on NB and J48 classifiers. Indonesian Journal of Electrical Engineering and Informatics
, 5
(4)
pp.357-365
|
2017 |
Linking software engineering paradigms to Islamic values. Journal of Theoretical and Applied Information Technology
, 95
(7)
pp.1405-1417
|
2017 |
Modeling malicious multi-attacker node collusion
in MANETs via game theory. Middle-East Journal of Scientific Research
, 25
(3)
pp.568-579
|
2017 |
Critical security challenges in cloud computing environment: An appraisal. Journal of Theoretical and Applied Information Technology
, 95
(10)
pp.2234-2248
|
2017 |
A compendious study of online payment systems:Past developments, present impact, and future
considerations. International Journal of Advanced Computer Science and Applications (IJACSA)
, 8
(5)
pp.256-271
|
2017 |
A new automatic method of parkinson disease identification using complex-valued neural network. Journal of Medical and Bioengineering
, 6
(1)
pp.25-28
|
2017 |
A survey on E-payment systems: elements, adoption, architecture, challenges and security concepts. Indian Journal of Science and Technology
, 10
(20)
pp.1-19
|
2017 |
Design and implementation of a five stage pipelining architecture simulator for RiSC-16 instruction set. Indian Journal of Science and Technology
, 10
(3)
pp.1-9
|
2017 |
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing. Indian Journal of Science and Technology
, 10
(7)
pp.1-7
|
2016 |
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging. Indian Journal of Science and Technology
, 9
(36)
pp.1-7
|
2016 |
A framework to reduce redundancy in android test suite using refactoring. Indian Journal of Science and Technology
, 9
(46)
pp.107107-1
|
2016 |
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data. Jurnal Teknologi
, 78
(12-3)
pp.31-38
|
2016 |
Autonomous control of tilt tri-rotor unmanned aerial vehicle. Indian Journal of Science and Technology,
, 9
(36)
pp.1-7
|
2016 |
MANET – A cogitation of its design and security issues. Middle-East Journal of Scientific Research
, 24
(10)
pp.3094-3107
|
2016 |
Two objectives big data task scheduling using swarm intelligence in cloud computing. Indian Journal of Science and Technology, Indian Journal of Science and Technology, Vol 9(28
, 9
(28)
pp.1-10
|
2016 |
Pragmatic manifestation of high dynamic range imaging – A Review. International Journal of Application or Innovation in Engineering & Management (IJAIEM)
, 5
(4)
pp.14-21
|
2016 |
Contemplation of tone mapping operators in high dynamic range imaging . International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
, 5
(2)
pp.98-104
|
2016 |
An enhanced architecture for big data task scheduling in cloud environment. Advanced Science Letters
, 22
(10)
pp.2963-2967
|
2016 |
A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. Journal of Theoretical and Applied Information Technology
, 84
(3)
pp.404-413
|
2015 |
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. International Journal of Information Technology & Computer Science (IJITCS)
, 22
(1)
pp.1-9
|
2015 |
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. Journal of Theoretical and Applied Information Technology
, 77
(1)
pp.25-43
|
2015 |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering
, 2
(3)
pp.10-19
|
2014 |
QoS oriented mapReduce optimization for hadoop based
bigData application
. International Journal of Engineering Research and Application
, 4
(4)
pp.12-15
|
2014 |
Dual authentication for bluetooth connection. International Journal of Engineering Research and Application
, 4
(7)
pp.181-191
|
2014 |
Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal
, 21
(3)
pp.462-470
|
2014 |
Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering
, 2
(1)
pp.1-7
|
2014 |
Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN). Advances in Environmental Biology
, 8
(3 (Special))
pp.582-589
|
2014 |
Responsibility and accountability of an engineer in religeous perspective. Science International Lahore
, 26
(5)
pp.2429-2432
|
2014 |
ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal
, 76
(5)
pp.xx-xx
|
2014 |
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal
, 7
(5)
pp.88-103
|
2013 |
Malicious behaviour of node and its significant security techniques in MANET- a review. Australian Journal of Basic and Applied Sciences
, 7
(12)
pp.286-293
|
2013 |
Computational intelligence: It’s application in digital watermarking. Middle East Journal of Scientific Research (MEJSR)
, 13
pp.25-30
|
2013 |
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal
, 21
pp.78-83
|
2013 |
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services . electronic Journal of Computer Science and Information Technology
, 4
(1)
pp.19-24
|
2013 |
Evaluating the effect of IP and IGP on
the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR)
, 3
(2)
pp.71-82
|
2012 |
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal
(20)
pp.79-83
|
2012 |
An intelligent modeling of coagulant dosing system for water treatment plants based on artificial neural network. Australian Journal of Basic and Applied Sciences
, 6
(1)
pp.93-99
|
2011 |
Determining watermark embedding strength using complex valued neural network. Journal of Applied Sciences
, 11
(16)
pp.2907-2915
|
2011 |
Forgery detection in medical images using Complex Valued Neural Network (CVNN). Australian Journal of Basic and Applied Sciences
, 5
(7)
pp.1251-1264
|
2011 |
Water quality issues in food processing and production: good quality water is very essential in the production of safe food. Halal Pages 2011/2012
pp.66-73
|
2010 |
Damageless digital watermarking using complex-valued artificial neural network . Journal of Information and Communication Technology
, 9
pp.111-137
|
Conference or Workshop Item |
2021 |
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications.
In: 2021 IEEE 7th International Conference on Smart Instrumentation, Measurement and Applications
|
2020 |
Low cost piezoresistive pressure sensor matrix for pressure ulcer prevention and management.
In: 2019 7th International Conference on Mechatronics Engineering (ICOM) 2019
|
2020 |
Diabetic retinopathy grading using ResNet convolutional neural network.
In: 2020 IEEE Conference on Big Data & Analytics
|
2020 |
Postgraduate research: sharing international experience.
In: NSUK 2020
|
2020 |
Bayesian signaling game based efficient security model for MANETs.
In: 2019 Future of Information and Communication Conference (FICC)
|
2020 |
Bayesian signaling game based efficient security model for MANETs.
In: 2019 Future of Information and Communication Conference (FICC)
|
2019 |
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms.
In: 2nd East Indonesia Conference on Computer and Information Technology, EIConCIT 2018
|
2019 |
Electrical stimulation in combating pressure ulcer for immobilize subjects: a conceptual framework.
In: International Conference on Biomedical Engineering
|
2019 |
Robust , fast and accurate lane departure warning system using deep learning and mobilenets.
In: "7th International Conference on Mechatronics Engineering, ICOM 2019"
|
2019 |
A cloud-based bus tracking system based on internet-of-things technology.
In: 2019 7th International Conference on Mechatronics Engineering (ICOM)
|
2019 |
Offline OTP based solution for secure internet banking access.
In: 2018 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)
|
2018 |
iWalk:intelligent walking stick for visually impaired subjects.
In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017
|
2018 |
Modeling of ANN to determine optimum adsorption capacity for removal of pollutants in wastewater.
In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017
|
2018 |
Modelling of intelligent intrusion detection system: making a case for snort.
In: IEEE Conference on Wireless Sensors, ICWiSe 2017
|
2018 |
Class attendance management system using face recognition.
In: 7th International Conference on Computer and Communication Engineering, ICCCE 2018
|
2018 |
LiFi based automated shopping assistance application in IoT.
In: 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017
|
2017 |
MotionSure: a cloud-based algorithm for detection of injected object in data in motion.
In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017
|
2017 |
STCM: Secured trust-based communication method in vulnerable mobile adhoc network.
In: The 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (RoViSP 2016)
|
2017 |
Enhancement web proxy cache performance using wrapper feature selection methods with NB and J48.
In: 6th International Conference on Mechatronics - ICOM'17
|
2017 |
A study on performance evaluation of conventional cache replacement algorithms: A review.
In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)
|
2017 |
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network.
In: SAI Intelligent Systems Conference (IntelliSys) 2016
|
2017 |
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches.
In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing(PDGC)
|
2016 |
Mobile Heart Rate Detection System (MoHeRDS) for early warning of potentially-fatal heart diseases.
In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
|
2016 |
RFDA: Reliable framework for data administration based on split-merge policy.
In: 2016 SAI Computing Conference (SAI)
|
2016 |
STCM: secured trust-based communication method in vulnerable mobile adhoc network.
In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, RoViSP 2016
|
2016 |
I-VRenewal: A cloud based system for VISA renewal: A case study of IIUM.
In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
|
2016 |
Re-emphasizing the dimensions and impacts of complementary IT resources through governance.
In: 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
|
2016 |
Development of heuristic task scheduling algorithm in cloud computing.
In: 3rd International Conference on ICTs for Education and Training (TICET 2016)
|
2016 |
Automated bank note identification system for visually impaired subjects in Malaysia.
In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
|
2016 |
A novel neuroscience-inspired architecture: for computer vision applications.
In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC)
|
2016 |
CDR analysis using big data technology.
In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015)
|
2016 |
Watermarking in protecting and validating the integrity of digital information: a case study of the holy scripture.
In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
|
2015 |
RAED: Response analysis of educational data for leveraging knowledge dissemination system.
In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)
|
2015 |
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network.
In: International Conference on Computing Education and Information Technology (ICCEIT 2015)
|
2015 |
SSM: Secure-Split-Merge data distribution in cloud infrastructure.
In: 2015 IEEE Conference on Open Systems (ICOS)
|
2015 |
An empirical study of the evolution of PHP MVC framework.
In: International Conference on Communication and Computer Engineering (ICOCOE 2014)
|
2015 |
An empirical study of the evolution of PHP MVC framework.
In: International Conference on Communication and Computer Engineering (ICOCOE 2014)
|
2015 |
RAED: Response Analysis of Educational Data for
leveraging knowledge dissemination system.
In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e)
|
2014 |
MARKCLOUD - Software for data confidentiality and security in cloud computing environments.
In: 4th International Conference on Industrial Engineering and Operations Management (IEOM) 2014
|
2014 |
Big data analysis solutions using mapReduce framework.
In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
|
2014 |
Application of neural networks in early detection and diagnosis of parkinson's disease.
In: 2014 International Conference on Cyber and IT Service Management (CITSM)
|
2014 |
A secure authentication scheme for bluetooth connection.
In: International Conference on Computer and Communication Engineering (ICCCE 2014)
|
2014 |
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out..
In: 4th International Cryptology and Information Security Conference
|
2014 |
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm.
In: 5th International Conference on Computer and Communication Engineering
|
2014 |
Bandwith conservation framework for mobile cloud computing: challenges and solutions.
In: 5th International Conference on Computer & Communication Engineering 2014 (ICCCE 2014)
|
2014 |
r-TOLA: an architecture for real time open learning application for universities.
In: International Conference on Computer & Communication Engineering 2014
|
2014 |
Dearth of information technology governance studies in developing nations: making case for Nigeria.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
|
2014 |
Qualitative analysis on watermarking algorithm for large resolution camera phone image.
In: 5th International Conference on Computer and Communication Engineering (ICCCE2014)
|
2014 |
Robust image watermarking scheme by discrete wavelet transform.
In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
|
2013 |
Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN).
In: 3rd International Conference on Biotechnology (ICBioE'13)
|
2012 |
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique.
In: Proceedings of the International Conference on Mathematical Applications in Engineering (ICMAE 2012)
|
2012 |
TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID)
.
In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012)
|
2012 |
Computational intelligence: application in digital watermarking.
In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012)
|
2012 |
Digital audio watermarking; techniques and applications
.
In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
|
2012 |
State-of-the-art digital watermarking attacks.
In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
|
2012 |
An Improved Wavelet Digital Watermarking
Software Implementation.
In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
|
2012 |
Development of a scalable video compression algorithm.
In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia
|
2012 |
ICT in telemedicine: conquering privacy and security issues in health care services.
In: Symposium on IT Governance, Management and Audit, 2012 (SIGMA 2012)
|
2012 |
Digital watermarking: A counterfeiting and piracy deterrence.
In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012
|
2011 |
Artificial neural network for modeling coagulant dosing for water treatment plants.
In: 2nd International Conference on Biotechnology Engineering (ICBioE 2011)
|
2010 |
Watermarking in safe region of frequency domain using complex-valued neural network.
In: International Conference on Computer and Communication Engineering (ICCCE 2010)
|
2010 |
An attack proof intelligent digital watermarking based on safe region of fast fourier transform.
In: The 2nd International Conference on Engineering and ICT
|
2009 |
Image quality assessment of fast fourier transform domain watermarked images.
In: International Conference on Rural Information and Communication Technology
|
2009 |
State-of-the-art application of artificial neural networks in digital watermarking and the way forward .
In: International Conference on Computing & Informatics 2009 (ICOCI 09)
|
Book Section |
2019 |
An adaptive and viable face identification for Android mobile devices.
In: Handbook of Multimedia Information Security: Techniques and Applications,
Springer, Cham
. ISBN 978-3-030-15886-6
, pp.301-322
|
2019 |
Critical challenges in access management schemes for smartphones: an appraisal.
In: Smart Network Inspired Paradigm and Approaches in IoT Applications
Springer, Singapore
. ISBN 978-981-13-8613-8
, pp.87-113
|
2019 |
Internet of things: the concept, inherent security challenges
and recommended solutions.
In: Smart Network Inspired Paradigm and Approaches in IoT Applications
Springer, Singapore
. ISBN 978-981-13-8613-8
, pp.63-86
|
2019 |
Internet of things: the concept, inherent security challenges
and recommended solutions.
In: Smart Network Inspired Paradigm and Approaches in IoT Applications
Springer, Singapore
. ISBN 978-981-13-8613-8
, pp.63-86
|
2018 |
Trust and resource oriented communication scheme in mobile ad hoc networks.
In: Intelligent systems and applications: extended and selected results from SAI Intelligent Systems Conference (IntelliSys) 2016
Springer
. ISBN 978-3-319-69265-4
, pp.414-430
|
2011 |
An application of biometric technology : Iris recognition.
In: Human Behaviour Recognition, Identification and Computer Interaction
IIUM Press
. ISBN 978-967-418-156-7
, pp.206-212
|
2011 |
An evaluation of transform domain watermarking and its application to intellectual properties images.
In: Multimedia Encryption, Transmission and Authentication
IIUM Press
. ISBN 978-967-418-160-4
, pp.192-197
|
2011 |
Adaptive digital watermarking system for authentication of intellectual properties.
In: Multimedia Encryption, Transmission and Authentication
IIUM Press
. ISBN 978-967-418-160-4
, pp.182-191
|