Staff Directory


Akram M Z M Khedher

Academic Qualification

  • Doctor of Philosophy in Computer Science - Doctor of Philosophy, Universiti Teknologi Malaysia (UTM)
  • Master of Science in Computer Imaging - Masters Degree, Universiti Putra Malaysia (UPM)
  • Bachelor of Science in Physic - Bachelor Degree, University of Jordan

Akram M Z M Khedher (Dr.)

Associate Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Other's position:

Deputy Director, Centre for Islamisation


akramzeki@iium.edu.my
5661


Expert Profile


Akram M. Zeki obtained B.Sc. from the University of Jordan, Amman, Jordan in 2000, and Master in Computer Graphics from the Faculty of Computer Science and Information Technology at University Putra Malaysia in 2004. His Ph.D was from the Faculty of Computer Science and Information System, University Technology Malaysia in 2009. He did post doctorate research at Kulliyyah of Information and Communication Technology, International Islamic University Malaysia (IIUM) in 2009.
Currently, he is an Associate Professor at the Kulliyyah of Information and Communication Technology, IIUM, and Deputy Director of Centre for Islamisation (CENTRIS).
His research interests include: Watermarking, Steganography, Information Security and Image Processing and Multimedia. He is very interested to work in the field of IT and Islam and develop Islamic Applications.
Apart from supervising Master’s and Ph.D students, he is also involved in research. Dr. Akram has published seven books, 20 articles in journals, 45 book chapters and more than 75 conference papers. Besides that, he has received awards at both university and national levels.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics) - Watermarking and Data Hiding
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Security - Information Security
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ ICT Policy and Social Impact ~ ICT Ethics - Ethics of ICT
  • Natural Science ~ Mathematical Sciences ~ Applied Statistics ~ Indigenisation and Islamisation - Statistics for the Holy Quran


Professional Membership


  • 2020 - 2020: Member of Profesional Body / Association: (Senior Member), Institute of Electrical and Electronics Engineers (IEEE)


Teaching Responsibilities


COMPUTER MEDIATED COMMUNICATION 2018/2019 2017/2018 2020/2021 2016/2017 2015/2016
CRITICAL INFRASTRUCTURE MANAGEMENT 2013/2014
DATABASE SYSTEMS I 2011/2012
DIGITAL MEDIA AND COMMUNICATION 2017/2018 2015/2016
FINAL YEAR PROJECT 1 2017/2018
FINAL YEAR PROJECT I 2010/2011 2016/2017 2014/2015 2019/2020 2012/2013 2020/2021 2011/2012 2009/2010 2013/2014 2017/2018 2015/2016
FINAL YEAR PROJECT II 2017/2018 2011/2012 2015/2016 2013/2014 2016/2017 2019/2020 2021/2022 2010/2011 2020/2021 2014/2015 2012/2013
INDUSTRIAL ATTACHMENT 2010/2011 2014/2015 2015/2016 2011/2012 2013/2014 2012/2013 2016/2017
INFORMATION RESOURCE AND STRATEGY MANAGEMENT 2019/2020 2018/2019 2020/2021
INFORMATION RETRIEVAL TECHNOLOGIES 2016/2017 2018/2019 2017/2018 2019/2020 2015/2016
INFORMATION SECURITY 2012/2013 2009/2010 2011/2012 2010/2011
INFORMATION SECURITY STRATEGY & POLICY 2015/2016
INFORMATION TECHNOLOGY 2009/2010 2008/2009
INTERNET APPLICATIONS 2010/2011 2007/2008 2008/2009 2013/2014 2014/2015
INTRODUCTION COMPUTER NETWORKING (NON ICT) 2012/2013 2014/2015
INTRODUCTION TO COMPUTER NETWORKING (NON - ICT) 2016/2017 2013/2014 2014/2015
MANAGEMENT INFORMATION SYSTEM 2017/2018 2016/2017
MANAGEMENT OF INFORMATION SECURITY 2017/2018 2021/2022 2018/2019 2020/2021 2019/2020
MULTIMEDIA TECHNOLOGY 2013/2014 2010/2011 2012/2013 2009/2010 2014/2015
PHYSICAL PROTECTIVE SECURITY 2020/2021
PRACTICAL TRAINING 2010/2011 2009/2010
PROJECT MANAGEMENT IN IT 2013/2014
RISK MANAGEMENT 2016/2017
WEB PROGRAMMING I 2011/2012


Research Projects


Completed
2016 - 2018 Analyzing Postgraduate Theses and Dissertaions in Selected Islamic Revealed Knowledge Department: A Critical and Objective Study
2016 - 2018 A New Model for Social Media Use for Active Collaborative Learning
2015 - 2019 A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems
2015 - 2018 An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment
2015 - 2016 ?Flood Trauma: The Role of Islamic Religious Education in Shaping Personality Well-being?
2014 - 2016 Glossary of Term of Exegesis and Sciences of the Qur'an
2013 - 2015 Multimedia Technology from Islamic Perspective
2013 - 2016 Subjective Assessment Model of the Quranic Audio Watermarking
2013 - 2013 An Interactive Computer Program to Teach Arabic Voices for Non-Native Speakers
2013 - 2018 Voice Recognition Model for Recitation of the Holy Quran
2012 - 2016 Self-Help Maqam-Based Search System
2012 - 2015 Multicast Network Security using Quantum Key Distribution (QKD)
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2011 - 2012 Mobile Hajj Dictionary (Arabic, Malay and English Based)
2011 - 2011 An Analytical Evaluation of Multimedia Tools in Islamic Websites
2010 - 2011 Justification of Voice Recognition Systems, Quranic case of Study
2010 - 2012 The use of Digital Watermarking to protect Quran & Sunna
2009 - 2011 Comparative Study of Different Steganographic Techniques
On-Going
2018 - Present Novel Over-sampling Methods for Classification of Quranic Topics
2017 - Present SPEECH RECOGNITION FOR ARABIC LANGUAGE
2015 - Present Semantic Body of Knowledge and Testing (SBKT)
2013 - Present Ethical Issues in ICT with Islamic Perspective
2011 - Present Study of Statistical Parmeters the Character Set of Bahasa Malay
2008 - Present Intelligent Cyberspace Security


Award & Recognition


21 Feb, 2019 Bronze Medal - MALAYSIA TECHNOLOGY EXPO National
12 May, 2018 Silver Medal - ITEX2018 University
10 May, 2018 Silver Medal - ITEX National
18 Feb, 2017 Silver Medal - Malaysia Technology Exhibition University
16 Feb, 2017 Silver Medal - Malaysia Technology Exhibition National
02 Sep, 2016 Outstanding Contributor - CREAM 2016 University
29 Apr, 2015 Highest Citation in Citation Index Journal Award - University
19 Nov, 2014 Best Paper Award - INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIMS WORLD (ICT4M) National
18 Jul, 2014 Promising Researcher Award - International Islamic University Malaysia University
25 Jun, 2014 Gold Medal - Politeknik Seberang Perai, Penang, Malaysia. Conference, Competition and Exhibition 2014 (CCE2014) National


Publications


Article

2021 Arabic text classification using hybrid feature selection method using chi-square binary artificial bee colony algorithm. International Journal of Mathematics and Computer Science, 16 (1) pp. 213-228
2020 Classification of Holy Quran verses based on imbalanced learning. International Journal on Islamic Applications in Computer Science And Technology, 8 (2) pp. 11-24
2020 Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications, 4 (5) pp. 1-12
2020 Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems, 32 (1) pp. 261-277
2020 الإنشاء التلقائي للخرائط الذهنية من القرآن الكريم. المجلة الدولية للتطبيقات الإسلامية في علم الحاسب والتقنية, 8 (3) pp. 28-40
2019 Massive Open Online Courses (MOOCs): data on higher education. Data in Brief, 22 () pp. 118-125
2019 Quranic motivation toward modern approach for e-Da'wah. Quranica: International Journal of Islamic Research, 11 (2) pp. 53-83
2019 Speaker identification based on hybrid feature extraction techniques. International Journal of Advanced Computer Science and Applications, 10 (3) pp. 322-327
2019 Towards adaptive e-learning among university students: by Applying Technology Acceptance Model (TAM). International Journal of Engineering and Advanced Technology, 8 (6S3) pp. 270-276
2018 Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology, 96 (6) pp. 1633 -1646
2018 Impact of Quran in treatment of the psychological disorder and spiritual illness. Journal of Religion and Health, () pp. 1-14
2018 Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research, 8 (1) pp. 49-61
2018 Quranic sign language for deaf people: Quranic recitation classification and verification. International Journal on Perceptive and Cognitive Computing, 4 (1) pp. 8-12
2018 Regularization-based multi-frame super-resolution: A systematic review. Journal of King Saud University - Computer and Information Sciences, () pp.
2018 أسماء التفضيل في القرآن الكريم والحديث النبوي الشريف - دارسة دلالية The names of preference in the Quran and Hadith - Semantic Study. International Journal of Islamic Applications in Computer Science and Technology - Ijaza, () pp.
2017 A model of using social media for collaborative learning to enhance learners’ performance on learning. Journal of King Saud University - Computer and Information Sciences, 29 (4) pp. 526-535
2017 A review on soft set-based parameter reduction and decision making. IEEE ACCESS, 5 () pp. 4671-4689
2017 Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS, 5 () pp. 480-500
2017 An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system. Journal of Internet Banking and Commerce, 22 (Special Issue-S8) pp. 1-14
2017 Dynamics of watermark position in audio watermarked files using neural networks. Applied Mathematics & Information Sciences, 11 (3) pp. 703-715
2017 Information technology usage in the Islamic perspective: a systematic literature review. The Anthropologist, 29 (1) pp. 27-41
2017 Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology, 5 (2) pp. 26-36
2017 Necessary and sufficient conditions for complementary stochastic quadratic operators of finite-dimensional simplex. Journal of Computing and Mathematical Sciences, 1 (1 (Jan-June 2017)) pp. 22-27
2017 Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management, 34 (1) pp. 50-64
2017 PSW statistical LSB image steganalysis. Multimedia Tools and Applications, 77 (1) pp. 805-835
2017 Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control, 90 (7) pp. 1-29
2017 Social media and its impact on academic performance among university students. The Anthropologist, 28 (1-2) pp. 52-68
2017 Social media use, collaborative learning and students’ academic performance: a systematic literature review of theoretical models. Journal of Theoretical and Applied Information Technology, 95 (20) pp. 5399-5414
2017 The dynamics of data packet in transmission session. IEEE ACCESS, 5 () pp. 4329-4339
2017 The impact of using social media for teaching and learning in post-secondary institutes. The Anthropologist, 29 (1) pp. 8-18
2016 A finite state model for a self-help system based on minhaj 'al Abidin. Research Journal of Applied Sciences, 11 (6) pp. 345-351
2016 An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus, 5 (1) pp. 868-1-868-25
2016 Arabic text classification: Review study. Journal of Engineering and Applied Science, 11 (3) pp. 528-536
2016 Attitude of students towards information access issues: The case of International Islamic University Malaysia. International Journal of Soft Computing, 11 (4) pp. 236-241
2016 Dynamics of doubly stochastic quadratic operators on a finite-dimensional simplex. Open Mathematics, 14 (1) pp. 509-519
2016 Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security. Journal of Theoretical and Applied Information Technology, 83 (2) pp. 173-179
2016 ICT readiness and information security policies in OIC Countries. International Journal of Scientific and Research Publications, 6 (1) pp. 58-61
2016 The most principle security issues in e-Commerce. International Journal of Scientific and Research Publications, 5 (12) pp. 556-560
2016 Utilising key climate element variability for the prediction of future climate change using a support vector machine model. International Journal of Global Warming, 9 (2) pp. 129-151
2015 "مشروع برنامج للتبويب الشامل والمفصل لعلوم القرآن والتفسير "سورة الحجرات نموذجا = Mashru' barnamij lil-tabwib al-shamil al-mufassal li-'ulum al-Qur'an wa-al-tafsir "surah al-Hujrat namudhajan. al-Majallat al-Dauliyah lil-Buhuth al-Islamiyah wa-al-Insaniyah al-Mutaqaddimah, 5 (10) pp. 1-18
2015 An unsupevised package for multi-spectral image processing for remote data. Journal of Advanced Computer Science and Technology Research (JACSTR), 5 (4) pp. 113-122
2015 Formal analysis of weighted longitudinal routers network via scale-free network: a case study. Journal of Theoretical and Applied Information Technology, 80 (2) pp. 257-265
2015 How technology affected our privacy. International Journal of Science and Research (IJSR), 4 (12) pp. 406-410
2015 Mini-ATX Computer System in Vehicle. Advanced Materials Research, 1115 () pp. 484-487
2015 QoS amendment toward seamless handover in network mobility NEMO. ARPN Journal of Engineering and Applied Sciences, 10 (21) pp. 9698-9709
2015 Security issues with health care information technology. International Journal of Science and Research (IJSR), 4 (12) pp. 1021-1024
2015 Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences, 9 (6) pp. 3133-3145
2015 Web assisted language learning system for enhancing Arabic language learning using cognates. Jurnal Teknologi, 77 (19) pp. 107-112
2014 Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1) pp. 37-43
2014 Developing a solar calculator system. Advanced Materials Research, 980 () pp. 179-183
2014 Empirical investigation of visualization quality for three-dimensional (3d) objects of 3d map on mobile device for navigation aid . Journal of Theoretical and Applied Information Technology, 63 (2) pp. 372-380
2014 My E-Mosque system: an Islamic android companion. International Journal on Islamic Applications in Computer Science And Technology, 2 (2) pp. 30-37
2014 Online databases on Quranic handwritten words. Journal of Theoretical and Applied Information Technology, 62 (2) pp. 485-492
2014 Performance analysis of HRO-B+ scheme for the nested mobile networks using OPNet. Journal of Technology, 4 () pp. 174-191
2014 Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences, 13 (Sp. ed) pp. 75-90
2014 The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology, 2 (4) pp. 23-34
2013 Analytical evaluation of a new route pptimization scheme for nested mobile network. World Applied Sciences Journal , (21) pp. 16-20
2013 Assessing issues of change impact analysis process for a software projects. World Applied Sciences Journal , 28 (10) pp. 1366-1374
2013 High Watermarking Image Quality Based on Dual Intermediate Significant Bit (DISB). International Journal of Digital Content Technology and its Applications, 7 (5) pp. 733-742
2013 Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology, 1 (3) pp. 17-23
2012 Analysis of Islamic website design. International Journal of Arab Culture, Management and Sustainable Development, 2 (4) pp. 309-317
2012 Analytical evaluation of a new route optimization scheme for nested mobile network. World Applied Sciences Journal , () pp. 16-20
2011 A robust watermark embedding in smooth areas. Research Journal of Information Technology, 3 (2) pp. 123-131
2011 Determining watermark embedding strength using complex valued neural network. Journal of Applied Sciences, 11 (16) pp. 2907-2915
2011 Distortion-free embedding in the optic disk of retina fundus images using complex-valued neural network. World Applied Sciences Journal , 13 (6) pp. 1295-1301
2011 Forgery detection in medical images using Complex Valued Neural Network (CVNN). Australian Journal of Basic and Applied Sciences, 5 (7) pp. 1251-1264
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences, 27 () pp. 233-240
2011 High watermarking capacity based on spatial domain technique. Information Technology Journal, 10 (7) pp. 1367-1373
2011 ISB watermarking embedding: block based model. Information Technology Journal, 10 (4) pp. 841-848
2010 The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms. International Journal of Computer Science and Information Security, 8 (6) pp. 47-51
2010 Watermaking technique based on ISB (Intermediate Significant Bit). , () pp. 41
2009 A genetic-algorithm-based approach for audio steganography. World Academy of Science, Engineering and Technology, 54 () pp. 360-363
2009 A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology, 50 () pp. 989-996
2009 An artificial-intelligence-based approach for audio steganography. MASAUM Journal of Open in Science and Engineering, 1 (1) pp. 64-68
Conference or Workshop Item

2020 A framework assessing the effect of user emotions on touch gesture behavioural biometric authentication. In: 2019 6th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2020 Correlation between speaker gender and perceptual quality of mobile speech signal. In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM 2020),
2019 Multi-frame super-resolution: a survey. In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
2018 Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017),
2018 Knowing what you know about your faith an interactive application for measuring your faith in Islam. In: International Conference on Information and Communication Technology for the Muslim World, ICT4M 2018,
2018 Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018),
2018 Speaker identification based on curvlet transform technique. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017,
2018 تقنبة المعلومات وأخلاق المهنة. In: 3rd International Social Science Conference: Islamic Thought & Understanding (ISSCITU 2018),
2017 Attitude towards information property rights among students : The case of International Islamic University Malaysia. In: 2016 4th International Conference on User Science and Engineering (i-USEr),
2017 Comments and improvements of “HOTA: Handover optimized ticket­based authentication in network­based mobility management”. In: 20th Conference on Innovations in Clouds, Internet and Networks (ICIN),
2017 Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation. In: IEEE 13th International Colloquium on Signal Processing & its Application (CSPA 2017),
2017 Isolated Iqlab checking rules based on speech recognition system. In: 2017 8th International Conference on Information Technology (ICIT),
2017 Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017),
2017 The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering,
2016 An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015,
2016 Attitude towards information privacy issues among students of IIUM. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Determining the state of truthfulness and falsehood by analyzing the acquired EEG signals. In: 12th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2016,
2016 Developing mobile E-groceries model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Evaluation of users' awareness and their reaction on information security. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Impersonate affecting users' attitude toward facebook in Egypt. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Least Significant Bit (LSB) and Random Right Circular Shift (RRCF) in digital watermarking. In: 2016 12th International Computer Engineering Conference (ICENCO),
2016 Performance comparison of (Diff-FH NEMO) scheme in IPv6-based network mobility. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016),
2016 Security failures in EMV smart card payment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 The convergence consensus of multi-agent systems controlled via doubly stochastic quadratic operators. In: 1st International Symposium on Agents, Multi-Agent Systems and Robotics, ISAMSR 2015,
2016 The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Variable size of blocks for embedding watermark images using ISB technique. In: 6th International Conference on Digital Information Processing and Communications, ICDIPC 2016,
2016 Web user' knowledge and their behavior towards security threats and vulnerabilities. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015,
2016 Web users’ knowledge and their behavior towards security threats and vulnerabilities. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2015 Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication. In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015),
2015 Investigating the empirical relation and importance of perceived usefulness, perceived ease of use and intention to use online information resources for evidence based medicine. In: 2014 International Conference on Computer Assisted System in Health (CASH),
2015 Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students. In: 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2014),
2015 الدارسات المعجمية ومنهج التعامل مع المصطلح القرآني. In: المؤتمر القرآني الدولي السنوي (Muqaddas V) 2015,
2015 الدراسات المعجمية ومنهج التعامل مع المصطلح القرآني = Methods on dealing with the Quranic terms. In: The 5th Annual International Qur'anic Conference 2015 (MUQADDAS V),
2014 3D animation as an alternative mean of da'wah for children. In: 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014,
2014 A new robust image watermarking method using Dual intermediate significant bits. In: 4th International Conference on Control System and Computing and Engineering (ICCSCE 2014),
2014 Arabic-Malay cognates as a computer assisted language learning. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies,
2014 Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT),
2014 Career guidance and employment management system. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies,
2014 Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014),
2014 Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014),
2014 Management dimension for assessing organizations' readiness toward business intelligence systems. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference,
2014 Mini-ATX computer system in vehicle. In: International Conference on Advances in Manufacturing and Materials Engineering,
2014 Online recognition system for handwritten Arabic chemical symbols. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014),
2014 Online recognition system for handwritten Hindi digits based on matching alignment algorithm. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies,
2014 Orthogonal wavelet support vector machine for predicting crude oil prices. In: 1st International Conference on Advanced Data and Information Engineering (DaEng 2013),
2014 Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Personal learning environment framework for a self-help Maqam-based search system. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Project dimension as a readiness factor toward business intelligent systems. In: 3rd International Conference on Computer Engineering & Mathematical Sciences (ICCEMS 2014),
2014 Robust image watermarking based on Dual Intermediate Significant Bit (DISB). In: 2014 6th International Conference on Computer Science and Information Technology (CSIT),
2014 Robust image watermarking scheme by discrete wavelet transform. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014),
2014 The important dimensions for assessing organizations' readiness toward business intelligence systems from the perspective of Malaysian organization. In: 2013 International Conference on Advanced Computer Science Applications and Technologies ACSAT 2013,
2014 The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2014 التكنولوجيا وأزمة اللغة العربية بين التهميش والانتشار . In: المؤتمر الدولي الثالث للغة العربية ,
2013 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS),
2013 Co - active neuro-fuzzy inference systems model for predicting crude oil price based on OECD inventories. In: 3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13),
2013 Comparison of empirical indoor propagation models for 4G wireless networks at 2.6 GHz. In: International Conference on Control, Engineering & Information Technology (CEIT2013),
2013 Feature extraction techniques of online handwriting arabic text recognition. In: 5th International Conference on Information and Communication Technology for the Muslim World,
2013 Feature extraction techniques of online handwriting arabic text recognition. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013),
2013 Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA),
2013 Online recognition system for handwritten Arabic mathematical symbols. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2013 Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2013 Problems of writing on digital surfaces in online handwriting recognition systems. In: 5th International Conference on Information and Communication Technology for the Muslim World.,
2013 Properties of digital image watermarking. In: IEEE 9th International Colloquium on Signal Processing and its Applications,
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT),
2013 The important dimensions for assessing organization's readiness toward business intelligence systems from the perspective of Malaysian organization. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2013 Trade-off between robustness, and quality based on dual intermediate significant bits. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2012 A framework of a route optimization scheme for nested mobile network. In: 19th International Conference on Neural Information Processing (ICONIP 2012),
2012 A mobile dictionary for pilgrims. In: 2012 International Conference on Information Technology and e-Services,
2012 Analytical evaluation of a new route optimization scheme for nested mobile network . In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE’10),
2012 Assessing organizations readiness toward business intelligence systems: a proposed hypothesized model. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Digital image watermarking, analysis of current methods. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Digital watermarking: A counterfeiting and piracy deterrence. In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012,
2012 High image quality watermarking model by using genetic algorithm. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Image recognition technique of road tax sticker in Malaysia. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Improving knowledge extraction of Hadith classifier using decision tree algorithm. In: International Conference on Information Retrieval & Knowledge Management (CAMP), 2012,
2012 Manpower model for human resource planning management. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Novel mechanism to improve Hadith classifier performance. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim),
2012 Recognition techniques for online Arabic handwriting recognition systems. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012),
2012 Route optimization scenario of a new scheme based on nested mobile network. In: International Conference on Computer and Communication Engineering (ICCCE 2012),
2012 Web-based conference management system for higher learning institutions. In: International Conference on Advanced Computer Science Applications and Technologies ,
2011 التقنيات الحديث في خدمة ضيوف الرحمن = Al-Taqniyāh al-ḥadīthah fi khidmah ḍuyūf al-raḥman.. In: الندوة الوطنية الثالثة لتقنية المعلومات: المحتوى العربي والإسلامي على الانترنت = Al-Nadwah al-waṭaniyah al-thālithah li taqniyah al-ma'lūmāt: al-muḥtawā al-Arabi wa al-Islāmī 'ala Internet ,
2011 A watermarking authentication system for medical images. In: World Congress on Engineering and Technology (CET 2011),
2011 An analytical evaluation of the Islamic websites. In: International Conference on Islamization in Modern Science and Scientification of Islamic Studies: Prospects and Bridges (ICIMSIS 2011),
2011 Analysis of ISB watermarking model : block based methods vs Embedding repetition methods. In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011),
2011 Analysis of ISB watermarking model: Block based methods vs embedding repetition methods. In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011),
2011 Analysis of ISB watermarking model: block based methods vs embedding repetition methods . In: MoMM '11 Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia,
2011 Comparative study of different steganographic techniques. In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011),
2011 Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network. In: 4th International Conference on Mechatronics (ICOM 2011),
2011 Development of model for assessing organizations’ readiness toward successful Business Intelligence Systems. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011),
2011 Enhanced mechanism to handle missing data of Hadith classifier. In: International Conference on Sustainable Development 2011,
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011),
2011 Human capital business partner information technology and network technology manpower model. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011),
2011 Tropical crops advisory selection system. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011),
2010 Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources . In: International Conference on Information and Communication Technology for Muslim World (ICT4M),
2010 Digital watermarking for mammogram authentication. In: International Conference on Fundamental & Applied Sciences (ICFAS) 2010,
2010 Segmentation Techniques for Online Arabic Handwriting Recognition:A Survey . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010,
2010 Watermarking in safe region of frequency domain using complex-valued neural network. In: International Conference on Computer and Communication Engineering (ICCCE 2010),
2010 Watermarking technique based on ISB (Intermediate Significant Bit). In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010),
2009 A Novel Approach for Audio Watermarking . In: Firth International Conference on Information Assurance and Security,
2009 A secure audio steganography approach. In: ,
2009 An approach to improve the robustness of substitution techniques of audio steganography . In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT),
2009 Robust Audio Steganography via Genetic Algorithm . In: Third International Conference on Information & Communication Texchnologies IEEE-ICIST 2009,
2007 Steganography technique using modulus arithmetic. In: 9th International Symposium on Signal Processing and Its Applications, 2007. ISSPA 2007. ,
Book

2020 معجم المصطلحات الخاصة بالتفسير وعلوم القرآن. Al Ilm Publishing, ISBN: 978-613-6-30367-3
2017 Nonlinear stochastic operators to control the consensus problem in multi-agent systems. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-690-6
2017 Open source software adoption for academic libraries. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-761-3
2015 Internet applications. IIUM Press, ISBN: 978-967-418-313-4
2015 Multimedia and its applications. IIUM Press, ISBN: 9789674183127
2011 Advancement in E-Learning.. IIUM Press, ISBN: 978-967-418-105-5
2011 Computer applications: theories and applications. IIUM Press, ISBN: 9789674181079
2011 Data management: issues, challenges and opportunities. IIUM Press, ISBN: 9789674180843
2011 Informatics Engineering and Information Science : International Conference, ICIEIS 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 Proceedings, Part II . Springer, ISBN: 978-3-642-25452-9; e-ISBN 978-3-642-25453-6
2011 Informatics Engineering and Information Science : International Conference, ICIES 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 proceedings, Part I. . Springer, ISBN: 978-3-642-25326-3.
Book Section

2016 Developing a mobile navigation aid. In: IGI Global, ISBN: 978-1466694385, pp. 124-136
2016 Developing a mobile navigation aid. In: IGI Global, ISBN: 978-1466694385, pp. 124-136
2016 Dynamics classifications of extreme doubly stochastic quadratic operators on 2D simplex. In: Springer International Publishing, ISBN: 978-3-319-24582-9, pp. 323-335
2015 Application of multimedia in digital watermarking. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 159-177
2015 Application of multimedia in e-books system. In: IIUM Press, ISBN: 9789674183134, pp. 70-77
2015 Application of multimedia in language self-learner. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 178-184
2015 Application of multimedia in learning history subject. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 185-191
2015 Application of multimedia in teaching Hajj. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 192-198
2015 Application of multimedia user friendly e-lecture notes. In: IIUM Press, ISBN: 9789674183134, pp. 63-69
2015 Arabic text. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 73-92
2015 Elements of multimedia on the Internet. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 53-63
2015 Fundamentals of computer networks: wired/wireless. In: IIUM Press, ISBN: 9789674183134, pp. 1-15
2015 Fundamentals of multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 1-23
2015 Introduction to computer graphics. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 149-158
2015 Malaysian multimedia content industry. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 24-40
2015 Multimedia and its relevance to education. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 41-52
2015 Multimedia security and the internet. In: IIUM Press, ISBN: 9789674183134, pp. 48-62
2015 Practices of handling audio. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 126-138
2015 Spread spectrum audio watermarking using vector space projections. In: Springer International Publishing, ISBN: 978-3-319-11218-3, pp. 297-307
2015 Text in multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 64-72
2015 The high impact of using multimedia in enhancing education in schools. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 198-206
2015 Using multimedia in developing Islamic website. In: IIUM Press, ISBN: 9789674183134, pp. 40-47
2015 Video. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 139-148
2015 Web-based conference management system for higher learning institutions. In: IIUM Press, ISBN: 9789674183134, pp. 106-118
2013 Analysis of wardriving activity and WiFi access points. In: Springer, ISBN: 9783642410536, e-ISBN 9783642410543, pp. 51-59
2011 Adaptive digital watermarking system for authentication of intellectual properties. In: IIUM Press, ISBN: 978-967-418-160-4, pp. 182-191
2011 An evaluation of transform domain watermarking and its application to intellectual properties images. In: IIUM Press, ISBN: 978-967-418-160-4, pp. 192-197
2011 An overview of ATM systems security . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 113-128
2011 Classifying users emotions towards the quranic recitation using EEG: a preliminary study. In: IIUM Press, ISBN: 9789674181116, pp. 404-419
2011 Comparison between network simulators. In: IIUM Press, ISBN: 9789674181420, pp. 71-74
2011 Development of user friendly e-lectures notes. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 33-38
2011 Difficulties and challenges of recognizing Arabic text . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 179-191
2011 E-Books systems. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 39-44
2011 Employing machine learning algorithms to extract Islamic knowledge. In: IIUM Press, ISBN: 9789674180843, pp. 161-168
2011 Ethical issues in e-learning.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 145-149
2011 Evaluation of NEMO extensions. In: IIUM Press, ISBN: 9789674181420, pp. 59-64
2011 Handoff process in micromobility protocols. In: IIUM Press, ISBN: 9789674181420, pp. 65-70
2011 Human capital business partner information technology & network technology manpower model. In: IIUM Press, ISBN: 9789670225814, pp. 38-49
2011 Improving the robustness of ISB watermarking techniques by repetition of the embedding. In: Springer-Verlag Berlin Heidelberg, ISBN: 978-3-642-22170-5 (O), 978-3-642-22169-9, pp. 592-599
2011 Introduction to E- learning. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 1-4
2011 Introduction to mobility management. In: IIUM Press, ISBN: 9789674181420, pp. 47-51
2011 Introduction to QoS approaches in mobile ad hoc networks. In: IIUM Press, ISBN: 9789674181406, pp. 171-175
2011 Investigating the student’s awareness on computer security and ethics . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 155-177
2011 Justification of voice recognition system : case study of the Quran.. In: IIUM Press, ISBN: 9789674180034, pp. 287-301
2011 Language self-learner. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 21-25
2011 Learning PMR history subject using multimedia.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 51-54
2011 Logistic database system. In: IIUM Press, ISBN: 9789674180843, pp. 177-183
2011 Multimedia elements and internet . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 198-201
2011 Nested mobile networks. In: IIUM Press, ISBN: 9789674181420, pp. 53-57
2011 Online management systems for primary school students. . In: IIUM Press, ISBN: 978-967-418-105-5, pp. 113-116
2011 Online teaching notes. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 27-31
2011 Relevance of multimedia in education. . In: IIUM Press, ISBN: 978-967-418-105-5, pp. 11-14
2011 Security of multimedia in the web . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 257-262
2011 Security risk of ATM systems, case of study . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 129-138
2011 Teaching Islamic concepts electronically : hajj as an example.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 55-60
2011 The effect of external factors on the students' acceptance of virtual learning.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 15-20
2011 The high impact of using animation in enhancing education in schools. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 45-50
2011 The study of multicast hierarchical mobile IPV6. In: IIUM Press, ISBN: 9789674181406, pp. 21-26
2011 Threats and solutions for ATM security systems . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 139-152
2011 Tropical crops planting recommendation system. In: IIUM Press, ISBN: 9789674180843, pp. 157-160
2011 Virtual learning environment. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 5-9
2011 دراسة احصائية لكلمات القرآن الكريم = Dirāsah ihsāiyah li kalimāt al-Qura'an al-Karīm. In: IIUM Press, ISBN: 9789670225302 , pp. 286-302