Staff Directory

Mohamed Ridza Wahiddin

Academic Qualification

  • Doctor of Philosophy in Theoretical Physics - Doctor of Philosophy, University of Manchester Institute of Science and Technology (UMIST)
  • Masters of Science (Theorical Physics) - Masters Degree, University of Manchester Institute of Science and Technology (UMIST)
  • Bachelor of Science (Physics) - Bachelor Degree, University of Manchester Institute of Science and Technology (UMIST)
  • Diploma in Islamic Studies - Diploma, International Islamic University Malaysia

Mohamed Ridza Wahiddin (Prof. Dr.)

IIUM Gombak Campus


Expert Profile

Mohamed Ridza bin Wahiddin obtained his BSc (Hon), MSc and PhD degrees from UMIST, U.K. in physics. Upon completion of his PhD he returned to Malaysia in August 1989 and took up a lecturer's position at the University of Malaya. For his outstanding pioneering work in quantum optics in Malaysia he is the recipient of the 1994 National Young Scientist Award by the Malaysian Ministry of Science, Technology & Environment. He was the Vice-President of the Malaysian Mathematical Society for the period 1997-1999. On the 10th December 2004 UMIST awarded him the higher doctorate degree of Doctor of Science (DSc) for his contributions to the advancement of knowledge in the field of Quantum Optics.
He was on secondment as the Research Senior Director for Information Security at MIMOS, a Malaysian government research institute focusing on ICT and microelectronics for the period 1st July 2005-30th June 2011. He is MIMOS Best Innovator for 2007 and recipient of MIMOS Innovator Award (2011) in conjunction with MIMOS 25th Anniversary.
He is an Honoree of the 2009 Asia Pacific Information Security Leadership Achievement from (ISC)2 - Senior IT Security Professional Category. He is also the recipient of the Cyber Security Malaysia Award for Information Security Visionary of the Year (CXO of the Year) and 2011 ASEAN Chief Security Officer. He is a Fellow of Malaysia Academy of Sciences, Fellow of Institute of Physics Malaysia, Fellow of Malaysia Mathematical Sciences Society and Senior Member of the Optical Society (OSA). Presently Dr Ridza is a Professor at the Department of Computer Science.

Area of Specialisation

  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography - Quantum Optics, Quantum Information, Information Security, Mathematical Modeling, Human Behavior
  • Natural Science ~ Physical Sciences ~ Acoustics and Optical Physics ~ Optics, Non-Linear Optics and Quantum Optics
  • Natural Science ~ Mathematical Sciences ~ Mathematics and Statistics for ICT and Industries ~ Other Mathematics and Statistics for ICT and Industries n.e.c. - Mathematical Modeling

Teaching Responsibilities

CALCULUS II 2016/2017 2015/2016 2013/2014 2012/2013 2011/2012 2014/2015
FINAL YEAR PROJECT 2014/2015 2015/2016
HALAQAH 1 (BROTHERS) 2002/2003
HALAQAH 1 (SISTER) 2003/2004
HALAQAH 2 (BROTHER) 2002/2003
MATHEMATICAL METHODS 2003/2004 2004/2005

Research Projects

2015 - 2017 Secret Key Infusion for Internet of Things
2013 - 2013 Analisa dan Kajian Analisa Berhubung Cadangan Pelan Strategik 5 Tahun Kementerian Dalam Negeri (KDN) 2004-2018
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2011 - 2014 Modeling Illegal Immigrants Behaviour in Malaysia Via Scale Free Network
2011 - 2013 RU 2011: Block Ciphers: Analysis and Design
2011 - 2015 Systemic Human Behaviour Security: Deception Detection, Privacy & Secure Communications
2009 - 2013 Nonlinear Waves in Bose-Einstein Condensates & Optical Waveguide Systems with Higher Order Nonlinearity
2009 - 2011 Free-Space Optic (FSO) Links for Quantum Key Distribution (QKD)
2008 - 2011 Realization of Quantum Decoy States for Information Security
2007 - 2017 IIUM - MIMOS Cyberspace Security Lab
2006 - 2012 Free Space Quantum Key Distribution: Implementation and Security Analysis
2006 - 2007 Fuzzy correlation Inequalities for Ferromagnetic System
- 2018 Privacy and Security in Cloud First Policy Environment (Microsoft Fund)
2019 - Present A Tripartite Fake News Detection Framework
2019 - Present IIUM Blue Light Hazard App: Transferring Optical Knowledge on the Circadian and Retinal Hazard of Blue Light to the Malaysian Optometrists
2019 - Present Autonomous Quantum Thermal Machine for Quantum Steering
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2017 - Present A New Cost-Effective Low-Hop Distance Hierarchical Interconnection Network for Massively Parallel Computer System
2017 - Present Quantum theory of a non-degenerate parametric amplifier beyond Rotating Wave Approximation
2016 - Present Cybersecurity Capability Maturity Model based on Maqasid al Shari?ah (MS-C2M2)
2008 - Present Intelligent Cyberspace Security
2004 - Present Quantum Information Research Unit (QIRU)

Award & Recognition

12 Jul, 2018 Best Researcher Award - Kulliyyah of ICT KCDIO
12 Jul, 2018 Highest Number of Publications Award - Kulliyyah of ICT KCDIO
12 Jul, 2018 Top 30 Contributors to IIUM Research Performance - IIUM University
28 Apr, 2018 Fellow - Malaysia Academy of Sciences National
02 Nov, 2017 Top Research Scientist Malaysia (TRSM) - Malaysia Academy of Sciences National
28 Aug, 2017 Fellow - Malaysia Mathematical Sciences Society National
31 Jul, 2017 Senior Member - The Optical Society (OSA) International
06 Dec, 2011 2011 ASEAN Chief Security Officer - International Data Group International
28 Oct, 2010 Kesatria Mangku Negara - Federal Government - Seri Paduka Baginda Yang Di-Pertuan Agong National



2020 Information quantifiers for trapped ion in a carrier excitation laser field. Modern Physics Letters A, 35 (28) pp. 1-12
2020 Interaction of a three-level atom and a field with a time-varying frequency in the context of triangular well potentials: an exact treatment. Chaos, Solitons & Fractals, 139 () pp. 1-8
2020 Quantum correlations and quantum fisher information of two qubits in the presence of the time-dependent coupling effect. European Physical Journal Plus, 135 (6) pp.
2019 Generation of elementary gates and Bell's states using controlled adiabatic evolutions. International Journal of Quantum Information, 17 (3) pp. 1950020-1
2019 Nature of complex network of dengue epidemic as a scale-free network. Healthcare Informatics Research, 25 (3) pp. 182-192
2018 A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5) pp. 23-26
2018 Context-aware services based on spatio-temporal zoning and crowdsourcing. Behaviour & Information Technology, 37 (7) pp. 736-760
2018 Squeezing, mixed mode squeezing, amplitude squared squeezing and principal squeezing in a non-degenerate parametric oscillator. Optik, 157 () pp. 1035-1052
2017 Quantum phase fluctuations of coherent and thermal light coupled to a non-degenerate parametric oscillator beyond rotating wave approximation. Optics Communications, 398 () pp. 1-11
2017 Robustness of dengue complex network under targeted versus random attack. Complexity, 2017 () pp. 1-12
2017 The probe attack on the Bennett-Brassard 1984 protocol in the presences of noisy amplitude damping channel. Springer, () pp. 1-12
2017 Two-mode network modeling and analysis of dengue epidemic behaviour in Gombak, Malaysia. Applied Mathematical Modelling, 43 () pp. 207-220
2016 Atomic coupler with two-mode squeezed vacuum state. Malaysian Journal of Mathematical Sciences, 10 () pp. 103-110
2016 Building CMU Sphinx language model for the Holy Quran using simplified Arabic phonemes. Egyptian Informatics Journal, 17 (3) pp. 305-314
2016 On the quantum phase fluctuations of coherent light coupled to a degenerate parametric amplifier. Optik International Journal for Light and Electron Optics, 127 () pp. 2988-2991
2016 The importance of building a conscience in business actions. APACCIOOutlook, 2 (1) pp. 45-46
2016 Towards using CMU sphinx tools for the Holy Quran recitation verification. International Journal on Islamic Applications in Computer Science And Technology (IJASAT), 4 (2) pp. 10-15
2015 Analyzing the weighted dark networks using scale-free network approach. WSEAS Transactions on Computers, 14 () pp. 748-759
2015 Combinatorial interpretation of raney numbers and tree enumerations. Open Journal of Discrete Mathematics , 5 (1) pp. 1-9
2015 Entanglement for moving three-level atom under decoherence effect. Journal of Computational and Theoretical Nanoscience, 12 (10) pp. 3970-3976
2015 Entropy squeezing for qubit-field system in the presence multi-photon process under decoherence effect. Optical and Quantum Electronics, 47 (2) pp. 267-278
2015 Topological structure of complex networks and its importance in diffusion. Sindh University Research Journal (Science Series), 47 (2) pp. 191-194
2014 Entropy squeezing for qubit - field system under decoherence effect. Quantum Electronics, 44 (3) pp. 274-278
2013 Computer assisted alerts using mental model approach for customer service improvement. Journal of Software Engineering and Applications, 6 () pp. 21-25
2013 Interaction of two pulses in defocusing nonlinear Schrodinger equation. Journal of Physics: Conference Series, 435 (012034) pp. 1-4
2013 Three level atom in bad cavity. Middle-East Journal of Scientific Research, 13 () pp. 31-37
2012 Continuous-variable quantum key distribution protocols with eight-state discrete modulation. International Journal of Quantum Information, 10 (1) pp. 1-15
2012 Phase coherent states for enhancing the performance of continuous variable quantum key distribution. Journal of the Physical Society of Japan , 81 () pp. 1-9
2012 Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement. Quantum Information Processing, 12 (2) pp. 1551-1171
2012 Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement . International Journal of Modern Physics B, 26 (16) pp. 1-15
2010 A linear atomic quantum coupler . Journal of Physics B : Atomic, Molecular and Optical Physics, 43 () pp. 1-9
2010 A protocol for secret key infusion from satellite transmissions . International Journal of Computer and Network Security (IJCNS), 2 (7) pp. 99-101
2010 Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols. The European Physical Journal D, () pp.
2010 Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection . Journal of Physics B : Atomic, Molecular and Optical Physics, 43 () pp. 1-6
2010 Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP). Journal of Computer Science, 6 (10) pp. 1123-1129
2010 Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol. Journal of Computer Science, 6 (10) pp. 1094-1100
2010 Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers. Optics Communications, 283 (16) pp. 3158-3167
2009 Decoy state quantum key distribution. IIUM Engineering Journal, 10 (2) pp. 81-86
2009 Implementation of decoy state protocol. European Journal of Scientific Research, 33 (1) pp. 183-186
2009 New estimates of single photon parameters for satellite-based QKD. Optics Communications, 282 (15) pp. 3185-3189
2009 Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation . Laser Physics (International Journal), 20 (5) pp. 1-21
2009 Quantum key distribution using decoy state protocol. American Journal of Engineering and Applied Sciences, 2 (4) pp. 694-698
2009 Quantum state engineering with ququarts: application for deterministic QKD protocol. EPL (Europhysics Letters), 87 () pp. 10008-p1
2008 Blind encoding into qudits. Physics Letters A, 372 (12) pp. 1963-1967
2008 Single-atom entropy squeezing for two two-level atoms interacting with a single-mode radiation field. Optics Communications, 281 (10) pp. 2854-2863
2008 Transient entropy squeezing of a single-Cooper-pair box placed inside a phase-damped cavity. Optics Communications, 281 (24) pp. 6019-6023
2007 Anticlone Gaussian attack for continuous variable EPR correlations. Journal of Physics B: Atomic, Molecular and Optical Physics, 40 (6) pp. 1153-1160
2007 Nonentagled qutrits in two way deterministic QKD. Physics Letters A, 361 (6) pp. 445-449
2006 Deterministic six states protocol for quantum communication. Physics Letters A, 358 (2) pp. 85-90
2006 Generation of three-qubit entangled W-state by nonlinear optical state truncation. Journal of Physic B : Atomic, Molecular and Optical Physics, 39 (6) pp. 1269-1274
2005 Coupled-mode theory for Bose–Einstein condensates with time dependent atomic scattering length. Physics Letters A, 345 (1-3) pp. 237-244
2004 An Ising model with three competing interactions on a Cayley tree. Journal of Mathematical Physics, 45 (9) pp. 3645-3658
2004 The effect of finite bandwidth squeezed light on entanglement creation in the Dicke model. Journal of Optics B: Quantum and Semiclassical Optics, 6 (7) pp. 289-295
2003 Exact solution of an Ising model with competing interactions on a Cayley tree. Journal of Physics A: Mathematical and General, 36 (15) pp. 4283-4289
2003 Quantum-trajectory simulations of a two-level atom cascaded to a cavity QED laser. Physical Review A - Atomic, Molecular, and Optical Physics, 68 (6) pp. 063804/1-063804/6
2003 Spin squeezing as a measure of entanglement in a two-qubit system. Physical Review A - Atomic, Molecular, and Optical Physics, 68 (6) pp. 064301/1-064301/4
1998 Quantum trajectory theory for a two-level atom in a squeezed vacuum field with non-radiative dephasing. Journal of Modern Optics, 45 (10) pp. 2105-2115
Conference or Workshop Item

2019 Investigation of adoption behaviour for social commerce in the Kingdom of Saudi Arabia. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2018 Constructing a knowledge base for Al-Qur’an utilizing principles of human communication. In: 4th International Conference on Information Retrieval and Knowledge Management (CAMP),
2018 Cyber security maturity model and Maqasid al-Shari'ah. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2018 Rule based modeling of knowledge bases: rule based construction of knowledge base models for automation/expert systems. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI 2017),
2018 Towards an accurate speaker-independent Holy Quran acoustic model. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017,
2017 Message from Deputy Rector (Research & Innovation). In: 6th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2016,
2017 Quality of polarization entanglement in spontaneous parametric down conversion. In: International Conference on Applied Photonics and Electronics 2017 (InCAPE2017),
2017 Testing Sphinx’s language model fault-tolerance for the Holy Quran. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 Atomic coupler with two-mode squeezed vacuum states. In: 3rd International Conference on Mathematical Applications in Engineering (ICMAE'14),
2016 Cultivating the Communities of Practice in the Academia. In: KCONNECT 2016,
2016 Intellectual assets and knowledge audit as a fundamental step for the "University of the Future" transformation. In: 4th IEEE International Colloquium on Information Science and Technology (CiSt),
2016 Logico-linguistic semantic representation of documents. In: 2nd International Conference on Big Data Intelligence and Computing (DataCom 2016),
2016 Multi-layered alert filtration and feedback cycle using Brahms model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Scale free network analysis of a large crowd through their spatio-temporal activities. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2015 A cybersecurity capability maturity model based on Maqasid Shari’ah(MS-C2M2). In: International Conference on Maqasid Al-Shari'ah in Public Policy and Governance,
2015 i-Diary: A crowdsource-based spatio-Temporal multimedia enhanced points of interest authoring tool. In: 2015 ACM Multimedia Conference,
2015 Towards using CMU Sphinx Tools for the Holy Quran recitation verification. In: 3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015),
2015 Visualization of a scale free network in a smartphone-based multimedia big data environment. In: The First IEEE International Conference on Multimedia Big Data : BigMM 2015,
2014 Calculus and its applications in scale-free networks . In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014),
2014 Node status detection and information diffusion in router network using scale-free network. In: 10th International Network Conference, INC 2014,
2014 Towards a mobile and context-aware framework from crowdsourced data. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 Two-mode complex network modeling of dengue epidemic in Selangor, Malaysia. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2013 Generalized quantum rotation gates using STIRAP . In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2012 Interaction of two pulses in defocusing Nonlinear Schrödinger equation. In: International Conference of Application Science & Technology (iCAST2012),
2010 A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP). In: International Conference on Computer and Communication Engineering, ICCCE 2010,

2019 Kampung Malays: surviving modernity. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-491-014-3
2014 Quantum optics for beginners. Pan Stanford Publishing Pte. Ltd., ISBN: 9789814411752
Book Section

2016 A new quantum theory in accordance with Islamic science. In: Springer Singapore, ISBN: 978-981-287-777-2, pp. 237-255
2013 Strategic planning: steering the ship through changing circumstances. In: IIUM Press, ISBN: 9789674182700, pp. 63-77
2012 Reasoning of collaborative human behaviour in security-critical work practices: a framework. In: Atlantis Press, ISBN: 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online), pp. 99-106
2011 The decoy state method in quantum key distribution. In: IIUM Press, ISBN: 9789674181536, pp. 97-119