Staff Directory

Academic Qualification
- Doctor of Philosophy in Computer Science - Doctor of Philosophy, Universiti Teknologi Malaysia (UTM)
- Master of Science in Computer Imaging - Masters Degree, Universiti Putra Malaysia (UPM)
- Bachelor of Science in Physic - Bachelor Degree, University of Jordan
Akram M Z M Khedher (Prof. Dr.)
Professor
IIUM Gombak Campus
KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
Other's position:
Coordinator, Kulliyyah of Information and Communication Technology
akramzeki@iium.edu.my
5661
Expert Profile
Akram M. Zeki obtained B.Sc. from the University of Jordan, Amman, Jordan in 2000, and Master in Computer Graphics from the Faculty of Computer Science and Information Technology at University Putra Malaysia in 2004. His Ph.D was from the Faculty of Computer Science and Information System, University Technology Malaysia in 2009. He did post doctorate research at Kulliyyah of Information and Communication Technology, International Islamic University Malaysia (IIUM) in 2009.
Currently, he is an Associate Professor at the Kulliyyah of Information and Communication Technology, IIUM, and Deputy Director of Centre for Islamisation (CENTRIS).
His research interests include: Watermarking, Steganography, Information Security and Image Processing and Multimedia. He is very interested to work in the field of IT and Islam and develop Islamic Applications.
Apart from supervising Master’s and Ph.D students, he is also involved in research. Dr. Akram has published seven books, 20 articles in journals, 45 book chapters and more than 75 conference papers. Besides that, he has received awards at both university and national levels.
Currently, he is an Associate Professor at the Kulliyyah of Information and Communication Technology, IIUM, and Deputy Director of Centre for Islamisation (CENTRIS).
His research interests include: Watermarking, Steganography, Information Security and Image Processing and Multimedia. He is very interested to work in the field of IT and Islam and develop Islamic Applications.
Apart from supervising Master’s and Ph.D students, he is also involved in research. Dr. Akram has published seven books, 20 articles in journals, 45 book chapters and more than 75 conference papers. Besides that, he has received awards at both university and national levels.
Area of Specialisation
- Natural Science ~ Mathematical Sciences ~ Applied Statistics ~ Indigenisation and Islamisation - Statistics for the Holy Quran
- ICT ~ Information, Computer And Communications Technology (ICT) ~ ICT Policy and Social Impact ~ ICT Ethics - Ethics of ICT
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics) - Watermarking and Data Hiding
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Security - Information Security
Professional Membership
- 2020 - 2020: Member of Profesional Body / Association: (Senior Member), Institute of Electrical and Electronics Engineers (IEEE)
Teaching Responsibilities
COMPUTER MEDIATED COMMUNICATION | 2020/2021 2018/2019 2017/2018 2016/2017 2015/2016 |
CRITICAL INFRASTRUCTURE MANAGEMENT | 2013/2014 |
DATABASE SYSTEMS I | 2011/2012 |
DIGITAL MEDIA AND COMMUNICATION | 2017/2018 2015/2016 |
FINAL YEAR PROJECT 1 | 2017/2018 |
FINAL YEAR PROJECT I | 2021/2022 2020/2021 2019/2020 2017/2018 2016/2017 2015/2016 2014/2015 2013/2014 2012/2013 2011/2012 2010/2011 2009/2010 |
FINAL YEAR PROJECT II | 2021/2022 2020/2021 2019/2020 2017/2018 2016/2017 2015/2016 2014/2015 2013/2014 2012/2013 2011/2012 2010/2011 |
INDUSTRIAL ATTACHMENT | 2016/2017 2015/2016 2014/2015 2013/2014 2012/2013 2011/2012 2010/2011 |
INFORMATION RESOURCE AND STRATEGY MANAGEMENT | 2020/2021 2019/2020 2018/2019 |
INFORMATION RESOURCES AND STRATEGY MANAGEMENT | 2022/2023 2021/2022 |
INFORMATION RETRIEVAL TECHNOLOGIES | 2022/2023 2019/2020 2018/2019 2017/2018 2016/2017 2015/2016 |
INFORMATION SECURITY | 2012/2013 2011/2012 2010/2011 2009/2010 |
INFORMATION SECURITY STRATEGY & POLICY | 2015/2016 |
INFORMATION TECHNOLOGY | 2020/2021 2009/2010 2008/2009 |
INTERNET APPLICATIONS | 2014/2015 2013/2014 2010/2011 2008/2009 2007/2008 |
INTRODUCTION COMPUTER NETWORKING (NON ICT) | 2014/2015 2012/2013 |
INTRODUCTION TO COMPUTER NETWORKING (NON - ICT) | 2016/2017 2014/2015 2013/2014 |
ISLAMIC WORLDVIEW ON ICT AND SOCIETY | 2022/2023 |
ISLAMIC WORLDVIEW ON IT AND SOCIETY | 2022/2023 |
MANAGEMENT INFORMATION SYSTEM | 2017/2018 2016/2017 |
MANAGEMENT INFORMATION SYSTEMS | 2023/2024 |
MANAGEMENT OF INFORMATION SECURITY | 2021/2022 2020/2021 2019/2020 2018/2019 2017/2018 |
MULTIMEDIA TECHNOLOGY | 2014/2015 2013/2014 2012/2013 2010/2011 2009/2010 |
PHYSICAL PROTECTIVE SECURITY | 2021/2022 2020/2021 |
PRACTICAL TRAINING | 2010/2011 2009/2010 |
PROJECT MANAGEMENT IN IT | 2013/2014 |
RISK MANAGEMENT | 2016/2017 |
USRAH IN ACTION 1 | 2022/2023 |
WEB PROGRAMMING I | 2011/2012 |
Research Projects
Completed
2018 - 2023 | Novel Over-sampling Methods for Classification of Quranic Topics |
2017 - 2023 | SPEECH RECOGNITION FOR ARABIC LANGUAGE |
2016 - 2018 | Analyzing Postgraduate Theses and Dissertaions in Selected Islamic Revealed Knowledge Department: A Critical and Objective Study |
2016 - 2018 | A New Model for Social Media Use for Active Collaborative Learning |
2015 - 2019 | A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems |
2015 - 2016 | ?Flood Trauma: The Role of Islamic Religious Education in Shaping Personality Well-being? |
2015 - 2018 | An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment |
2014 - 2016 | Glossary of Term of Exegesis and Sciences of the Qur'an |
2013 - 2013 | An Interactive Computer Program to Teach Arabic Voices for Non-Native Speakers |
2013 - 2016 | Subjective Assessment Model of the Quranic Audio Watermarking |
2013 - 2015 | Multimedia Technology from Islamic Perspective |
2013 - 2018 | Voice Recognition Model for Recitation of the Holy Quran |
2012 - 2015 | A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits |
2012 - 2015 | Multicast Network Security using Quantum Key Distribution (QKD) |
2012 - 2016 | Self-Help Maqam-Based Search System |
2011 - 2011 | An Analytical Evaluation of Multimedia Tools in Islamic Websites |
2011 - 2012 | Mobile Hajj Dictionary (Arabic, Malay and English Based) |
2010 - 2011 | Justification of Voice Recognition Systems, Quranic case of Study |
2010 - 2012 | The use of Digital Watermarking to protect Quran & Sunna |
2009 - 2011 | Comparative Study of Different Steganographic Techniques |
On-Going
2022 - Present | Cryptocurrencies from Islamic Perspectives: Systematic Literature Review |
2022 - Present | Information Technology from the Islamic Perspective: Systematic Literature Review |
2022 - Present | Blockchain-based Model for Deep Packet Inspection System |
2021 - Present | ISLAMIC WORLDVIEW, ICT AND SOCIETY |
2021 - Present | Ethical Principles in IT (in Arabic) |
2015 - Present | Semantic Body of Knowledge and Testing (SBKT) |
2013 - Present | Ethical Issues in ICT with Islamic Perspective |
2011 - Present | Study of Statistical Parmeters the Character Set of Bahasa Malay |
2008 - Present | Intelligent Cyberspace Security |
Award & Recognition
21 Feb, 2019 | Bronze Medal - MALAYSIA TECHNOLOGY EXPO | National |
12 May, 2018 | Silver Medal - ITEX2018 | University |
10 May, 2018 | Silver Medal - ITEX | National |
18 Feb, 2017 | Silver Medal - Malaysia Technology Exhibition | University |
16 Feb, 2017 | Silver Medal - Malaysia Technology Exhibition | National |
02 Sep, 2016 | Outstanding Contributor - CREAM 2016 | University |
29 Apr, 2015 | Highest Citation in Citation Index Journal Award - | University |
19 Nov, 2014 | Best Paper Award - INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIMS WORLD (ICT4M) | National |
18 Jul, 2014 | Promising Researcher Award - International Islamic University Malaysia | University |
25 Jun, 2014 | Gold Medal - Politeknik Seberang Perai, Penang, Malaysia. Conference, Competition and Exhibition 2014 (CCE2014) | National |
Publications
Article
Conference or Workshop Item
2023 | Exploring blockchain for KYC: deepening client understanding. In: 2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE), |
2022 | GOS: a Genetic OverSampling Algorithm for classification of Quranic verses. In: The 13th International Conference on Information & Communication Systems, |
2021 | Classification of Quranic topics using ensemble learning. In: 8th International Conference on Computer and Communication Engineering, ICCCE 2021, |
2021 | Classification of Quranic topics using SMOTE technique. In: 2021 International Conference of Modern Trends in Information and Communication Technology Industry, MTICTI 2021, |
2020 | A framework assessing the effect of user emotions on touch gesture behavioural biometric authentication. In: 2019 6th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS), |
2020 | Correlation between speaker gender and perceptual quality of mobile speech signal. In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM 2020), |
2019 | Multi-frame super-resolution: a survey. In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), |
2018 | Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017), |
2018 | Knowing what you know about your faith an interactive application for measuring your faith in Islam. In: International Conference on Information and Communication Technology for the Muslim World, ICT4M 2018, |
2018 | Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018), |
2018 | Speaker identification based on curvlet transform technique. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017, |
2018 | تقنبة المعلومات وأخلاق المهنة. In: 3rd International Social Science Conference: Islamic Thought & Understanding (ISSCITU 2018), |
2017 | Attitude towards information property rights among students : The case of International Islamic University Malaysia. In: 2016 4th International Conference on User Science and Engineering (i-USEr), |
2017 | Comments and improvements of “HOTA: Handover optimized ticketbased authentication in networkbased mobility management”. In: 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), |
2017 | Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation. In: IEEE 13th International Colloquium on Signal Processing & its Application (CSPA 2017), |
2017 | Isolated Iqlab checking rules based on speech recognition system. In: 2017 8th International Conference on Information Technology (ICIT), |
2017 | Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017), |
2017 | The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering, |
2016 | An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015, |
2016 | Attitude towards information privacy issues among students of IIUM. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Determining the state of truthfulness and falsehood by analyzing the acquired EEG signals. In: 12th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2016, |
2016 | Developing mobile E-groceries model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Evaluation of users' awareness and their reaction on information security. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Impersonate affecting users' attitude toward facebook in Egypt. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Least Significant Bit (LSB) and Random Right Circular Shift (RRCF) in digital watermarking. In: 2016 12th International Computer Engineering Conference (ICENCO), |
2016 | Performance comparison of (Diff-FH NEMO) scheme in IPv6-based network mobility. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016), |
2016 | Security failures in EMV smart card payment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), |
2016 | The convergence consensus of multi-agent systems controlled via doubly stochastic quadratic operators. In: 1st International Symposium on Agents, Multi-Agent Systems and Robotics, ISAMSR 2015, |
2016 | The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Variable size of blocks for embedding watermark images using ISB technique. In: 6th International Conference on Digital Information Processing and Communications, ICDIPC 2016, |
2016 | Web user' knowledge and their behavior towards security threats and vulnerabilities. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015, |
2016 | Web users’ knowledge and their behavior towards security threats and vulnerabilities. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2015 | Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication. In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015), |
2015 | Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students. In: 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2014), |
2015 | الدارسات المعجمية ومنهج التعامل مع المصطلح القرآني. In: المؤتمر القرآني الدولي السنوي (Muqaddas V) 2015, |
2015 | الدراسات المعجمية ومنهج التعامل مع المصطلح القرآني = Methods on dealing with the Quranic terms. In: The 5th Annual International Qur'anic Conference 2015 (MUQADDAS V), |
2014 | 3D animation as an alternative mean of da'wah for children. In: 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014, |
2014 | A new robust image watermarking method using Dual intermediate significant bits. In: 4th International Conference on Control System and Computing and Engineering (ICCSCE 2014), |
2014 | Arabic-Malay cognates as a computer assisted language learning. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies, |
2014 | Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT), |
2014 | Career guidance and employment management system. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies, |
2014 | Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014), |
2014 | Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2014 | Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014), |
2014 | Management dimension for assessing organizations' readiness toward business intelligence systems. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference, |
2014 | Mini-ATX computer system in vehicle. In: International Conference on Advances in Manufacturing and Materials Engineering, |
2014 | Online recognition system for handwritten Arabic chemical symbols. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014), |
2014 | Orthogonal wavelet support vector machine for predicting crude oil prices. In: 1st International Conference on Advanced Data and Information Engineering (DaEng 2013), |
2014 | Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Personal learning environment framework for a self-help Maqam-based search system. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Project dimension as a readiness factor toward business intelligent systems. In: 3rd International Conference on Computer Engineering & Mathematical Sciences (ICCEMS 2014), |
2014 | Robust image watermarking based on Dual Intermediate Significant Bit (DISB). In: 2014 6th International Conference on Computer Science and Information Technology (CSIT), |
2014 | Robust image watermarking scheme by discrete wavelet transform. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014), |
2014 | The important dimensions for assessing organizations' readiness toward business intelligence systems from the perspective of Malaysian organization. In: 2013 International Conference on Advanced Computer Science Applications and Technologies ACSAT 2013, |
2014 | The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
2014 | التكنولوجيا وأزمة اللغة العربية بين التهميش والانتشار . In: المؤتمر الدولي الثالث للغة العربية , |
2013 | 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), |
2013 | Co - active neuro-fuzzy inference systems model for predicting crude oil price based on OECD inventories. In: 3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13), |
2013 | Comparison of empirical indoor propagation models for 4G wireless networks at 2.6 GHz. In: International Conference on Control, Engineering & Information Technology (CEIT2013), |
2013 | Feature extraction techniques of online handwriting arabic text recognition. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), |
2013 | Feature extraction techniques of online handwriting arabic text recognition. In: 5th International Conference on Information and Communication Technology for the Muslim World, |
2013 | Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013), |
2013 | Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA), |
2013 | Online recognition system for handwritten Arabic mathematical symbols. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
2013 | Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
2013 | Problems of writing on digital surfaces in online handwriting recognition systems. In: 5th International Conference on Information and Communication Technology for the Muslim World., |
2013 | Properties of digital image watermarking. In: IEEE 9th International Colloquium on Signal Processing and its Applications, |
2013 | Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT), |
2013 | The important dimensions for assessing organization's readiness toward business intelligence systems from the perspective of Malaysian organization. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
2013 | Trade-off between robustness, and quality based on dual intermediate significant bits. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
2012 | A framework of a route optimization scheme for nested mobile network. In: 19th International Conference on Neural Information Processing (ICONIP 2012), |
2012 | A mobile dictionary for pilgrims. In: 2012 International Conference on Information Technology and e-Services, |
2012 | Analytical evaluation of a new route optimization scheme for nested mobile network . In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE’10), |
2012 | Assessing organizations readiness toward business intelligence systems: a proposed hypothesized model. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Digital image watermarking, analysis of current methods. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Digital watermarking: A counterfeiting and piracy deterrence. In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012, |
2012 | High image quality watermarking model by using genetic algorithm. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Image recognition technique of road tax sticker in Malaysia. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Improving knowledge extraction of Hadith classifier using decision tree algorithm. In: International Conference on Information Retrieval & Knowledge Management (CAMP), 2012, |
2012 | Manpower model for human resource planning management. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Novel mechanism to improve Hadith classifier performance. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim), |
2012 | Recognition techniques for online Arabic handwriting recognition systems. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), |
2012 | Route optimization scenario of a new scheme based on nested mobile network. In: International Conference on Computer and Communication Engineering (ICCCE 2012), |
2012 | Web-based conference management system for higher learning institutions. In: International Conference on Advanced Computer Science Applications and Technologies , |
2011 | التقنيات الحديث في خدمة ضيوف الرحمن = Al-Taqniyāh al-ḥadīthah fi khidmah ḍuyūf al-raḥman.. In: الندوة الوطنية الثالثة لتقنية المعلومات: المحتوى العربي والإسلامي على الانترنت = Al-Nadwah al-waṭaniyah al-thālithah li taqniyah al-ma'lūmāt: al-muḥtawā al-Arabi wa al-Islāmī 'ala Internet , |
2011 | A watermarking authentication system for medical images. In: World Congress on Engineering and Technology (CET 2011), |
2011 | An analytical evaluation of the Islamic websites. In: International Conference on Islamization in Modern Science and Scientification of Islamic Studies: Prospects and Bridges (ICIMSIS 2011), |
2011 | Analysis of ISB watermarking model : block based methods vs Embedding repetition methods. In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011), |
2011 | Analysis of ISB watermarking model: Block based methods vs embedding repetition methods. In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011), |
2011 | Analysis of ISB watermarking model: block based methods vs embedding repetition methods . In: MoMM '11 Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia, |
2011 | Comparative study of different steganographic techniques. In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011), |
2011 | Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network. In: 4th International Conference on Mechatronics (ICOM 2011), |
2011 | Development of model for assessing organizations’ readiness toward successful Business Intelligence Systems. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011), |
2011 | Enhanced mechanism to handle missing data of Hadith classifier. In: International Conference on Sustainable Development 2011, |
2011 | Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011), |
2011 | Human capital business partner information technology and network technology manpower model. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011), |
2011 | Tropical crops advisory selection system. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011), |
2010 | Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources . In: International Conference on Information and Communication Technology for Muslim World (ICT4M), |
2010 | Digital watermarking for mammogram authentication. In: International Conference on Fundamental & Applied Sciences (ICFAS) 2010, |
2010 | Segmentation Techniques for Online Arabic Handwriting Recognition:A Survey . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010, |
2010 | Watermarking in safe region of frequency domain using complex-valued neural network. In: International Conference on Computer and Communication Engineering (ICCCE 2010), |
2010 | Watermarking technique based on ISB (Intermediate Significant Bit). In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), |
2009 | A Novel Approach for Audio Watermarking . In: Firth International Conference on Information Assurance and Security, |
2009 | A secure audio steganography approach. In: , |
2009 | An approach to improve the robustness of substitution techniques of audio steganography . In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT), |
2009 | Robust Audio Steganography via Genetic Algorithm . In: Third International Conference on Information & Communication Texchnologies IEEE-ICIST 2009, |
2007 | Steganography technique using modulus arithmetic. In: 9th International Symposium on Signal Processing and Its Applications, 2007. ISSPA 2007. , |
Book
Book Section
2022 | Sustainable development goals (SDGs) and the leadership of Prophet Muhammad (SAW). In: International Institute for Muslim Unity (IIMU) and the Center for Islamisation (CENTRIS), International Islamic University Malaysia (IIUM), ISBN: 978-967-25504-1-9, pp. 174-203 |
2022 | Sustainable development goals (SDGs) and the leadership of Prophet Muhammad (SAW). In: International Institute for Muslim Unity (IIMU) and the Center for Islamisation (CENTRIS), International Islamic University Malaysia (IIUM), ISBN: 978-967-25504-1-9, pp. 174-203 |
2021 | أسلمة الإنسانيات الرقمية. In: ARID Scientific, ISBN: 978-1-365-28794-7, pp. 11-39 |
2016 | Developing a mobile navigation aid. In: IGI Global, ISBN: 978-1466694385, pp. 124-136 |
2016 | Developing a mobile navigation aid. In: IGI Global, ISBN: 978-1466694385, pp. 124-136 |
2016 | Dynamics classifications of extreme doubly stochastic quadratic operators on 2D simplex. In: Springer International Publishing, ISBN: 978-3-319-24582-9, pp. 323-335 |
2015 | Application of multimedia in digital watermarking. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 159-177 |
2015 | Application of multimedia in e-books system. In: IIUM Press, ISBN: 9789674183134, pp. 70-77 |
2015 | Application of multimedia in language self-learner. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 178-184 |
2015 | Application of multimedia in learning history subject. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 185-191 |
2015 | Application of multimedia in teaching Hajj. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 192-198 |
2015 | Application of multimedia user friendly e-lecture notes. In: IIUM Press, ISBN: 9789674183134, pp. 63-69 |
2015 | Arabic text. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 73-92 |
2015 | Elements of multimedia on the Internet. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 53-63 |
2015 | Fundamentals of computer networks: wired/wireless. In: IIUM Press, ISBN: 9789674183134, pp. 1-15 |
2015 | Fundamentals of multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 1-23 |
2015 | Introduction to computer graphics. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 149-158 |
2015 | Malaysian multimedia content industry. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 24-40 |
2015 | Multimedia and its relevance to education. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 41-52 |
2015 | Multimedia security and the internet. In: IIUM Press, ISBN: 9789674183134, pp. 48-62 |
2015 | Practices of handling audio. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 126-138 |
2015 | Spread spectrum audio watermarking using vector space projections. In: Springer International Publishing, ISBN: 978-3-319-11218-3, pp. 297-307 |
2015 | Text in multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 64-72 |
2015 | The high impact of using multimedia in enhancing education in schools. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 198-206 |
2015 | Using multimedia in developing Islamic website. In: IIUM Press, ISBN: 9789674183134, pp. 40-47 |
2015 | Video. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 139-148 |
2015 | Web-based conference management system for higher learning institutions. In: IIUM Press, ISBN: 9789674183134, pp. 106-118 |
2013 | Analysis of wardriving activity and WiFi access points. In: Springer, ISBN: 9783642410536, e-ISBN 9783642410543, pp. 51-59 |
2011 | Adaptive digital watermarking system for authentication of intellectual properties. In: IIUM Press, ISBN: 978-967-418-160-4, pp. 182-191 |
2011 | An evaluation of transform domain watermarking and its application to intellectual properties images. In: IIUM Press, ISBN: 978-967-418-160-4, pp. 192-197 |
2011 | An overview of ATM systems security . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 113-128 |
2011 | Classifying users emotions towards the quranic recitation using EEG: a preliminary study. In: IIUM Press, ISBN: 9789674181116, pp. 404-419 |
2011 | Comparison between network simulators. In: IIUM Press, ISBN: 9789674181420, pp. 71-74 |
2011 | Development of user friendly e-lectures notes. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 33-38 |
2011 | Difficulties and challenges of recognizing Arabic text . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 179-191 |
2011 | E-Books systems. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 39-44 |
2011 | Employing machine learning algorithms to extract Islamic knowledge. In: IIUM Press, ISBN: 9789674180843, pp. 161-168 |
2011 | Ethical issues in e-learning.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 145-149 |
2011 | Evaluation of NEMO extensions. In: IIUM Press, ISBN: 9789674181420, pp. 59-64 |
2011 | Handoff process in micromobility protocols. In: IIUM Press, ISBN: 9789674181420, pp. 65-70 |
2011 | Human capital business partner information technology & network technology manpower model. In: IIUM Press, ISBN: 9789670225814, pp. 38-49 |
2011 | Improving the robustness of ISB watermarking techniques by repetition of the embedding. In: Springer-Verlag Berlin Heidelberg, ISBN: 978-3-642-22170-5 (O), 978-3-642-22169-9, pp. 592-599 |
2011 | Introduction to E- learning. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 1-4 |
2011 | Introduction to mobility management. In: IIUM Press, ISBN: 9789674181420, pp. 47-51 |
2011 | Introduction to QoS approaches in mobile ad hoc networks. In: IIUM Press, ISBN: 9789674181406, pp. 171-175 |
2011 | Investigating the student’s awareness on computer security and ethics . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 155-177 |
2011 | Justification of voice recognition system : case study of the Quran.. In: IIUM Press, ISBN: 9789674180034, pp. 287-301 |
2011 | Language self-learner. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 21-25 |
2011 | Learning PMR history subject using multimedia.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 51-54 |
2011 | Logistic database system. In: IIUM Press, ISBN: 9789674180843, pp. 177-183 |
2011 | Multimedia elements and internet . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 198-201 |
2011 | Nested mobile networks. In: IIUM Press, ISBN: 9789674181420, pp. 53-57 |
2011 | Online management systems for primary school students. . In: IIUM Press, ISBN: 978-967-418-105-5, pp. 113-116 |
2011 | Online teaching notes. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 27-31 |
2011 | Relevance of multimedia in education. . In: IIUM Press, ISBN: 978-967-418-105-5, pp. 11-14 |
2011 | Security of multimedia in the web . In: IIUM Press, ISBN: 978-967-418-112-3, pp. 257-262 |
2011 | Security risk of ATM systems, case of study . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 129-138 |
2011 | Teaching Islamic concepts electronically : hajj as an example.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 55-60 |
2011 | The effect of external factors on the students' acceptance of virtual learning.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 15-20 |
2011 | The high impact of using animation in enhancing education in schools. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 45-50 |
2011 | The study of multicast hierarchical mobile IPV6. In: IIUM Press, ISBN: 9789674181406, pp. 21-26 |
2011 | Threats and solutions for ATM security systems . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 139-152 |
2011 | Tropical crops planting recommendation system. In: IIUM Press, ISBN: 9789674180843, pp. 157-160 |
2011 | Virtual learning environment. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 5-9 |
2011 | دراسة احصائية لكلمات القرآن الكريم = Dirāsah ihsāiyah li kalimāt al-Qura'an al-Karīm. In: IIUM Press, ISBN: 9789670225302 , pp. 286-302 |