Staff Directory

Academic Qualification
- Computer Science - Doctor of Philosophy, University of Pune
- Computer Science - Masters Degree, University of Technology, Iraq
- Mathemathics - Bachelor Degree, Al-Mustansiriya University, Iraq
Imad Fakhri Taha Alyaseen (Prof. Dr.)
Professor
IIUM Gombak Campus
KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
Other's position:
Head, Kulliyyah of Information and Communication Technology
imadf@iium.edu.my
5686
Expert Profile
Imad Fakhri Al-Shaikhli, a IEEE senior member, obtained his BSc (Hon) in Mathematics, MSc in Computer Science from Iraq, and Ph.D degree from Pune University, India, 2000. After obtaining his Ph.D, he returned to Iraq and continued teaching and supervising postgraduate students. In 2003, he was appointed as the Head of Department of Computer Information Systems at Alrafidain University College until 2005. Then he joined Gulf University- Bahrain in January 2006 and was appointed as the founding Dean of the College of Computer Engineering and Sciences. During this period, he introduced the CCNA certificate to be part of the curriculum which had a strong impact on the students' careers.
In November 2010, he joined IIUM at the Dept. of Computer Science / Kulliyyah of Information and Communication Technology. He received the Best Teacher Award in 2011. He has been the editor in chief of International journal on Advanced Computer Science and Technology Research since 2011 now, and the general chair of the international conference on Advanced Computer Science Applications and Technologies since 2012 till now. He obtained a US patent for his work with his Ph.D student on smart traffic light with accident detection system on 2nd December 2014. Prof. Imad has published more than 100 papers in, journals and book chapters in addition to three books.
Presently Dr Imad is a Professor at the Department of Computer Science and Head of Research at the Kulliyyah of Information and Communication Technology.
In November 2010, he joined IIUM at the Dept. of Computer Science / Kulliyyah of Information and Communication Technology. He received the Best Teacher Award in 2011. He has been the editor in chief of International journal on Advanced Computer Science and Technology Research since 2011 now, and the general chair of the international conference on Advanced Computer Science Applications and Technologies since 2012 till now. He obtained a US patent for his work with his Ph.D student on smart traffic light with accident detection system on 2nd December 2014. Prof. Imad has published more than 100 papers in, journals and book chapters in addition to three books.
Presently Dr Imad is a Professor at the Department of Computer Science and Head of Research at the Kulliyyah of Information and Communication Technology.
Area of Specialisation
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography - specialized in cryptography, and cryptanalysis research
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Soft Computing - specially in genetic algorithms, neural networks, evolving connectionist systems, and fuzzy logic
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - research on using biometrics as secure and authentic systems
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science
Professional Membership
- 2012 - 2020: Member of Profesional Body / Association: (member), Malaysian Society for cryptology Research
- 2012 - 2013: Member of Profesional Body / Association, Society of Digital Information and Wireless Communications
- 2015 - 2020: Member of Profesional Body / Association: (senior member), Institute of Electrical and Electronics Engineers (IEEE)
- 2017 - 2019: Member of Profesional Body / Association: (member), Persatuan Capaian Maklumat dan Pengurusan Pengetahuan Malaysia
Teaching Responsibilities
CRYPTOGRAPHY | 2020/2021 2016/2017 2019/2020 2011/2012 2017/2018 2014/2015 2015/2016 2013/2014 2018/2019 2012/2013 |
DATA STRUCTURE & ALGORITHM | 2015/2016 2014/2015 2013/2014 2012/2013 2011/2012 2010/2011 |
DATA STRUCTURES AND ALGORITHMS I | 2019/2020 2018/2019 2020/2021 2017/2018 2016/2017 |
FINAL YEAR PROJECT | 2011/2012 2013/2014 2012/2013 2010/2011 2014/2015 |
INDUSTRIAL ATTACHMENT | 2014/2015 2015/2016 2011/2012 2012/2013 2016/2017 2017/2018 2013/2014 2010/2011 |
NEURAL NETWORKS | 2010/2011 |
PRINCIPLES OF ARTIFICIAL INTELLIGENCE | 2011/2012 2012/2013 |
Research Projects
Completed
2016 - 2018 | Analysis of ZUC Cipher in Mobile Communication |
2015 - 2018 | AN EFFICIENT MODEL FOR PROCESSING SKYLINE QUERIES IN INCOMPLETE AND UNCERTAIN DATABASES |
2015 - 2019 | An Online Computational Modeling for EcoS Feature Selection in Traffic Volumes Prediction |
2014 - 2017 | Test Automation Model for Conformance of Mobile Applications Life Cycle |
2014 - 2016 | Anti-Malware for Mobilephones |
2014 - 2016 | Computational Modeling for Analyzing the Effect of Quranic Recitations on Human Emotions |
2013 - 2017 | Regulated Splicing Systems and Formal Models for Food Authentication |
2013 - 2017 | New Algorithm for Realtime OLAP Scheme over Multicore Distributed Processing to Serve Warehouse Data Mining |
2013 - 2016 | Visualization of Emotional Dynamic on Brain Topology using Neural Inspired Computational Model |
2012 - 2015 | A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits |
2011 - 2013 | RU 2011: Block Ciphers: Analysis and Design |
2010 - 2012 | The use of Digital Watermarking to protect Quran & Sunna |
On-Going
2020 - Present | MRI Medical Images Detection and Classification of Brain Tumor Based on Deep Learning Techniques |
2016 - Present | Identifying and Profiling children with Learning disabilities using Algorithmic Computational Neuro-Physiological (CNP) Model |
2016 - Present | Development of an Evolving Neuro-Cognitive Computational Model Based on Event-Related Potentials for Healthy Lifestyle Profiling |
2011 - Present | Study of Statistical Parmeters the Character Set of Bahasa Malay |
2008 - Present | Intelligent Cyberspace Security |
Award & Recognition
19 Dec, 2020 | UMMAH REVIVAL SERIES 2.0: Resolution in The New Era of Covid-19 - Others | University |
18 Nov, 2019 | Appreciation Letter - Duzce University Rector-Turkey | International |
24 Jul, 2019 | IIUM Takrim Day-highest no. of publications - honorabl Rector | University |
23 Jul, 2018 | Top 250 contributors to IIUM's MyRA performance - IIUM RECTOR | University |
19 Jan, 2015 | appreciation - Dean, KICT | University |
21 Dec, 2014 | best paper award - international conference on computer assisted system in health 2014 | International |
12 Jun, 2014 | Silver Medal for a poster at IRIIE 2014 - IIUM | International |
31 Dec, 2013 | best library partner- 2013 - IIUM Library | University |
27 Jun, 2012 | best teacher award - KICT | University |
22 Feb, 2012 | IRIIE 2012 - IIUM | University |
22 Feb, 2012 | IRIIE 2012 - IIUM | University |
Publications
Article
2021 | MRI brain tumor medical images analysis using deep learning techniques: a systematic review. Health and Technology Journal, 11 () pp. 267-282 |
2020 | A proposed de-noising algorithm. The International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 90-96 |
2020 | Image De-Noising techniques: a comparative study. Journal of Advanced Computer Science And Technology Research, 10 (2) pp. 21-37 |
2020 | Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems, 32 (1) pp. 261-277 |
2019 | A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 799-799(1) |
2019 | Consensus algorithms blockchain: a comparative study. International Journal on Perceptive and Cognitive Computing (IJPCC), 5 (2) pp. 66-71 |
2019 | Detection of cracked digitized paintings and manuscripts based on threshold techniques. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 1108-1113 |
2019 | Editorial: mobile networks in the era of big data. Mobile Networks and Applications, 24 (4) pp. 1135-1138 |
2019 | Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications, 24 (3) pp. 1015-1017 |
2019 | Identifying skylines in cloud databases with incomplete data. Journal of Information and Communication Technology, 18 (1) pp. 19-34 |
2019 | Increasing the runs in compressed data using a dedicated move to front algorithm. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 903-906 |
2019 | Neural network and principle component analysis based numerical data analysis for stock market prediction with machine learning techniques. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 806-812 |
2019 | Optimal path planning for urban vehicles using Internet of Things: a new navigation perspective. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 1074-1080 |
2019 | The influence of Internet and social media on purchasing decisions in Indonesia and a comparison between Indonesia and Kuwait. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 1029-1034 |
2019 | The scalability challenge of the blockchain: a review. Journal of Advanced Computer Science and Technology Research, 9 (2) pp. 13-19 |
2019 | Theoretical review of routing protocols used for wireless community networks. Journal of Computational and Theoretical Nanoscience, 16 (9) pp. 3656-3662 |
2018 | A model for skyline query processing in a partially complete database. Advanced Science Letters, 24 (2) pp. 1339-1343 |
2018 | A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5) pp. 23-26 |
2018 | A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1) pp. 1-6 |
2018 | A scientific review of soft-computing techniques and methods for stock market prediction. International Journal of Engineering and Technology, 7 (2.5) pp. 27-31 |
2018 | Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology, 7 (4.15) pp. 519-523 |
2018 | Detection and restoration of cracked digitized paintings and manuscripts using image processing. International Journal of Engineering & Technology, 7 (2.34) pp. 39-43 |
2018 | Implementation of dynamic fuzzy logic control of traffic light with accident detection and action system using iTraffic simulation Simulation. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1) pp. 100-109 |
2018 | Improving the cost factor of DLBCA lightweight block cipher algorithm. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2) pp. 786-791 |
2018 | Multi-level of feature extraction and classification for X-Ray medical image. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1) pp. 154-167 |
2018 | On randomness of compressed data using non-parametric randomness tests. Bulletin of Electrical Engineering and Informatics, 7 (1) pp. 63-69 |
2018 | Technical approach in text mining for stock market prediction: a systematic review. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2) pp. 770-777 |
2018 | The influence of internet and social media on purchasing decisions in Kuwait. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2) pp. 792-797 |
2018 | Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal. International Journal of Engineering & Technology, 7 (2 (Special Issue 34)) pp. 34-38 |
2017 | A comparative performance analysis of modified DÓ§mÓ§si’s cryptosystem and data encryption standard. International Journal on Perceptive and Cognitive Computing (IJPCC), 3 (1) pp. 11-14 |
2017 | A symmetric cryptosystem based on nondeterministic finite automata. Journal of Theoretical and Applied Information Technology ( JATIT ), 95 (6) pp. 1489-1498 |
2017 | A web and software-based approach blending social networks for online Qur'anic Arabic learning. The International Arab Journal of Information Technology, 14 (1) pp. 80-90 |
2017 | Analyzing brainwaves while listening to Quranic recitation compared with listening to music based on EEG signals. International Journal on Perceptive and Cognitive Computing (IJPCC), 3 (1) pp. 1-5 |
2017 | Detection and restoration of cracked digitized paintings and manuscripts using image processing - a survey. International Journal on Perceptive and Cognitive Computing, 3 (2) pp. 1-6 |
2017 | Input significance analysis: feature ranking through synaptic weights manipulation for ANNS-based classifiers. Journal of Fundamental and Applied Sciences, 9 (4S) pp. 639-662 |
2017 | Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier. Journal of Fundamental and Applied Sciences, 9 (4S) pp. 681-709 |
2017 | Processing skyline queries in incomplete database: issues, challenges and future trends. Journal of Computer Science, 13 (11) pp. 590-601 |
2017 | Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control, 90 (7) pp. 1-29 |
2017 | The influence of internet and social media on purchasing decisions in Egypt and a comparison between Egypt and Kuwait. International Journal of Computer Applications, 178 (5) pp. 26-32 |
2016 | A framework for evaluating skyline queries over incomplete data. Procedia Computer Science, 94 () pp. 191-198 |
2016 | A new block cipher based on finite automata systems. International Journal on Perceptive and Cognitive Computing (IJPCC), 2 (1) pp. 23-26 |
2016 | An overview of cryptosystems based on finite automata. Journal of Advanced Review on Scientific Research, 27 (1) pp. 1-7 |
2016 | Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems. International Journal on Perceptive and Cognitive Computing, 2 () pp. 12-16 |
2016 | Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT), 8 (5) pp. 80-94 |
2016 | Emotion detection using physiological signals EEG & ECG. International Journal of Advancements in Computing Technology (IJACT), 8 (3) pp. 103-112 |
2016 | Lightweight block cipher algorithms: review paper. International Journal of Enhanced Research in Science, Technology & Engineering, 5 (5) pp. 136-143 |
2016 | Performance and security improvements of DÓ§mÓ§si’s cryptosystem. International Journal of Applied Mathematics and Statistics, 55 (2) pp. 32-45 |
2016 | Security and performance analysis of SCDSP. International Journal on Perceptive and Cognitive Computing (IJPCC), 2 (1) pp. 27-33 |
2015 | A new design of cryptographic hash function: gear . International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1) pp. 29-34 |
2015 | A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1) pp. 29-34 |
2015 | An adequate approach to image retrieval based on local level feature extraction . Mehran University Research Journal of Engineering & Technology, 34 (4) pp. 337-348 |
2015 | Blogging: a new platform for spreading rumors!. CCIT Journal, 9 (1) pp. 71-76 |
2015 | CERT team involving GEs structured. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 3 (3) pp. 12-26 |
2015 | CERT Technologies. International Journal of Innovation in Science and Mathematics, 3 (6) pp. 275-282 |
2015 | SCDSP: a novel stream cipher with dynamic structure and parameters. International Journal of Advancements in Computing Technology (IJACT), 7 (5) pp. 49-56 |
2014 | Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications, 5 (7) pp. 7-10 |
2014 | Key-dependent s-box in lightweight block ciphers. Journal of Theoretical and Applied Information Technology, 62 (2) pp. 554-559 |
2014 | Kuwait government entities e-business continuity and disaster recovery plan. Journal of Advanced Computer Science and Technology Research (JACSTR), 4 (3) pp. 62-75 |
2013 | A new algorithm for human face detection using skin color tone. IOSR-Journal of Computer Engineering, 11 (6) pp. 31-38 |
2013 | Achieving security by combining Huffman and SLSB algorithms. Journal of Advanced Computer Science and Technology Research (JACSTR), 3 (4) pp. 163-172 |
2013 | Affective computing model using source-temporal domain. Procedia - Social and Behavioral Sciences, 97 () pp. 54-62 |
2013 | Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4) pp. 239-246 |
2013 | Comparative study between traffic control methods Using simulation software . International Journal of Machine Learning and Computing (IJMLC), 3 (5) pp. 424-429 |
2013 | EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences, 97 () pp. 30-37 |
2013 | Emotion recognition model using source-temporal features and fuzzy. Lecture Notes in Computer Science (LNCS), 8226 (1) pp. 577-584 |
2013 | Evaluation of usability problems of labor portal in Saudi Arabia. International Journal of Advanced Computer Science and Information Technology, 2 (1) pp. 14-25 |
2013 | Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology, 2 (2) pp. 1-12 |
2013 | MOIM: a novel design of cryptographic hash function. International Journal of Computer Engineering & Technology (IJECT), 4 (4) pp. 1-19 |
2013 | The ethical dilemma of software piracy: an inquiry from an Islamic perspective. Creative Communication and Information Technology, 7 (1) pp. 59-76 |
2012 | Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3) pp. 127-139 |
2012 | Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (3) pp. 116-126 |
2012 | Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (4) pp. 159-165 |
2012 | Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1) pp. 22-34 |
2012 | Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences, 3 (7) pp. 1093-1102 |
2012 | Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (2) pp. 79-90 |
2011 | A practical method for the analysis of genetic algorithms. Journal of Advanced Computer Science and Technology Research(JACSTR), 1 ( ) pp. 1-9 |
2011 | An improved genetic algorithm for solving the multiprocessor scheduling problem. Australian Journal of Basic and Applied Sciences, () pp. |
2011 | Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences, 27 () pp. 233-240 |
2011 | Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1) pp. 36-51 |
2006 | Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College, 8 (19) pp. 217-232 |
2006 | Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College, 8 (19) pp. 87-98 |
2006 | New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18) pp. 81-101 |
2004 | Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq, 7 (15) pp. 51-60 |
Conference or Workshop Item
2019 | XMIAR: X-ray medical image annotation and retrieval. In: Computer Vision Conference, CVC 2019, |
2018 | Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), |
2018 | Disaster recovery in single-cloud and multi-cloud environments: Issues and challenges. In: The 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS), |
2018 | Scientific research in view of Quran and the creation of Allah s w t. In: Seminar of Information Retrieval and knowledge management SIRKM 2018, |
2018 | Scientific research in view of Quran and the creation of Allah s.w.t.. In: International Conference on Computer Assisted Systems in Health (CASH 2018), |
2018 | Structure of research proposal. In: Postgraduate Development Program (Package 2), |
2017 | A practical and interactive web-based software for online Qur’anic Arabic learning. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), |
2017 | Analysis of confidentiality algorithms in different mobile generations. In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17), |
2017 | Skyline query processing for incomplete data in cloud environment. In: The 6th International Conference on Computing and Informatics, ICOCI 2017, |
2016 | A performance improvement of Dömösi’s cryptosystem. In: Progress in Applied Mathematics in Science and Engineering 2015, |
2016 | A practical and interactive web-based software for online Qur'anic Arabic learning. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016), |
2016 | Automatic emotion recognition based on EEG and ECG signals while listening to quranic recitation compared with listening to music. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), |
2016 | Computational properties of Watson-Crick context-free grammars. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies, |
2016 | Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015, |
2016 | Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Statistical analysis of the eSTREAM competition winners. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | Statistical approach for a complex emotion recognition based on EEG features. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2015 | A performance improvement of Domosi’s cryptosystem . In: 2015 Progress in Applied Mathematics in Science and Engineering (PIAMSE), |
2015 | Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015, |
2014 | A cognitive-affective measurement model based on the 12-point affective circumplex. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies, |
2014 | A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 2014 the 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014, |
2014 | A study on the effects of EEG and ECG signals while listening to Qur’an recitation. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | A survey of intrusion detection system using case study Kuwait governments entiteis. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference , |
2014 | Brain & heart from computer science perspective. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, |
2014 | CMAC-based computational model of affects (CCMA) for profiling emotion from EEG signals. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, |
2014 | Design and analysis of a new hash function gear. In: 7th International Conference on Security of Information and Networks (SIN'14), |
2014 | Dynamic linear feedback shift registers: a review. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Feature ranking through weights manipulations for artificial neural networks-based classifiers. In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), |
2014 | Feature ranking through weights manipulations for artificial neural networks-based classifiers. In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), |
2014 | HISEC: a new lightweight block cipher algorithm. In: The 7th International Conference on Security of Information and Networks (SIN'14), |
2014 | OLBCA: a new lightweight block cipher algorithm. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, |
2014 | Security risk analysis used by Kuwait government sectors . In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, |
2013 | A new fragile digital watermarking technique for a PDF digital Holy Quran. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
2013 | Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, |
2013 | e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Improving PRESENT lightweight algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Improving the security of LBlock lightweight algorithm using bit permutation. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Joux multicollisions attack in sponge construction. In: 6th International Conference on Security of Information and Networks, |
2013 | Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, |
2013 | Protection of the digital Holy Quran hash digest by using cryptography algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies, |
2013 | Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia. In: 5th International Conference on Information and Communication Technology for the Muslim World, |
2013 | Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT), |
2013 | SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World, |
2012 | An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | An improved full search block matching algorithm for imaging applications. In: International Conference on Computer and Communication Engineering (ICCCE 2012), |
2012 | Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim), |
2012 | Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, |
2012 | Quality evaluation of “safeer” portal for Saudi students studying abroad . In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , |
2012 | Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012, |
2011 | Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011), |
1999 | A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99, |
Book
2017 | Dynamic fuzzy logic traffic light integrated system with accident detection and action. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-673-9 |
2017 | Effectiveness and performance of e-government in Saudi Arabia. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-680-7 |
2017 | Enhancement of lightweight block cipher algorithms. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-695-1 |
2017 | Minimum capabilities and requirements for establishing a national cert for AGC. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-682-1 |
2017 | Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos). IIUM Press, ISBN: 978-967-418-688-3 |
2017 | Protection of the digital holy Quran using IT techniques. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-789-7 |
2011 | Computer applications: theories and applications. IIUM Press, ISBN: 9789674181079 |
2011 | Cryptography: past, present and future. IIUM Press, ISBN: 9789674181130 |
2011 | Introduction of computer systems and applications. IIUM Press, ISBN: 978-967-418-085-0 |
Book Section
2015 | Cryptographic hash function: a high level view. In: IGI Global, ISBN: 978-1-4666-6583-5, pp. 80-94 |
2015 | Cryptographic hash function: a high level view. In: IGI Global, ISBN: 978-1-4666-6583-5, pp. 80-94 |
2011 | Advanced Encryption Standard (AES). In: IIUM Press, ISBN: 9789674181130, pp. 47-52 |
2011 | Background of zero-knowledge proof. In: IIUM Press, ISBN: 9789674181130, pp. 117-120 |
2011 | Basic disk management. In: IIUM Press, ISBN: 9789674180850, pp. 135-140 |
2011 | Basic operating system setting. In: IIUM Press, ISBN: 9789674180850, pp. 81-86 |
2011 | Basic storage management. In: IIUM Press, ISBN: 9789674180850, pp. 113-118 |
2011 | Basic text effects. In: IIUM Press, ISBN: 9789674180850, pp. 205-212 |
2011 | Blakely’s secret sharing scheme. In: IIUM Press, ISBN: 9789674181130, pp. 151-154 |
2011 | Block and stream cipher. In: IIUM Press, ISBN: 9789674181130, pp. 33-38 |
2011 | Cascade style sheets. In: IIUM Press, ISBN: 9789674180850, pp. 147-155 |
2011 | Control panel and screen savers. In: IIUM Press, ISBN: 9789674180850, pp. 65-72 |
2011 | Cryptanalysis of RSA. In: IIUM Press, ISBN: 9789674181130, pp. 107-112 |
2011 | Data Encryption Standard (DES). In: IIUM Press, ISBN: 9789674181130, pp. 39-46 |
2011 | Developed system for Quran protection using LSB replacement and MD5 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 99-109 |
2011 | Developed system for Quran protection using MD5 and Base64 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 71-84 |
2011 | Digital signature algorithm. In: IIUM Press, ISBN: 9789674181130, pp. 113-115 |
2011 | Disk management. In: IIUM Press, ISBN: 9789674180850, pp. 141-146 |
2011 | Feige-Fiat-Shamir identification scheme. In: IIUM Press, ISBN: 9789674181130, pp. 133-138 |
2011 | Firmware program. In: IIUM Press, ISBN: 9789674180850, pp. 17-22 |
2011 | Folder and directory. In: IIUM Press, ISBN: 9789674180850, pp. 47-53 |
2011 | Graphical user interfaces. In: IIUM Press, ISBN: 9789674180850, pp. 23-30 |
2011 | Hardware configuration. In: IIUM Press, ISBN: 9789674180850, pp. 73-79 |
2011 | Image and special effects. In: IIUM Press, ISBN: 9789674180850, pp. 199-204 |
2011 | Image clone 1. In: IIUM Press, ISBN: 9789674180850, pp. 181-191 |
2011 | Image clone 2. In: IIUM Press, ISBN: 9789674180850, pp. 193-197 |
2011 | Image editing. In: IIUM Press, ISBN: 9789674180850, pp. 157-164 |
2011 | Image effects. In: IIUM Press, ISBN: 9789674180850, pp. 165-172 |
2011 | Image filtering. In: IIUM Press, ISBN: 9789674180850, pp. 227-232 |
2011 | Image quality improvement. In: IIUM Press, ISBN: 9789674180850, pp. 233-239 |
2011 | Image tool function. In: IIUM Press, ISBN: 9789674180850, pp. 173-179 |
2011 | In-silico drug target design & its approaches . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 15-26 |
2011 | Interactive proof systems. In: IIUM Press, ISBN: 9789674181130, pp. 121-126 |
2011 | Interfaces and protocols. In: IIUM Press, ISBN: 9789674180850, pp. 9-16 |
2011 | Internal structure of computer systems. In: IIUM Press, ISBN: 9789674180850, pp. 1-8 |
2011 | Introduction. In: IIUM Press, ISBN: 9789674181130, pp. 65-72 |
2011 | Introduction. In: IIUM Press, ISBN: 9789674181130, pp. 3-9 |
2011 | Introduction. In: IIUM Press, ISBN: 9789674181130, pp. 141-146 |
2011 | Logical drive. In: IIUM Press, ISBN: 9789674180850, pp. 119-125 |
2011 | Machine based cryptography. In: IIUM Press, ISBN: 9789674181130, pp. 25-30 |
2011 | Message Digest (MDx) family. In: IIUM Press, ISBN: 9789674181130, pp. 73-80 |
2011 | MIPV6 based approaches for mobility management. In: IIUM Press, ISBN: 9789674181406, pp. 32-35 |
2011 | Molecular docking . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 37-44 |
2011 | Monoalphabetic substitution cipher. In: IIUM Press, ISBN: 9789674181130, pp. 11-16 |
2011 | Network security setting. In: IIUM Press, ISBN: 9789674180850, pp. 99-106 |
2011 | Polyalphabetic substitution cipher. In: IIUM Press, ISBN: 9789674181130, pp. 17-23 |
2011 | Protection mechanisms using LSB and MD5 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 85-98 |
2011 | Protection mechanisms using MD5 and Base64. In: IIUM Press, ISBN: 978-967-418-107-9, pp. 59-69 |
2011 | Qualitative study of mobility management approaches. In: IIUM Press, ISBN: 9789674181406, pp. 48-52 |
2011 | RIPEMD and Chameleon hash function. In: IIUM Press, ISBN: 9789674181130, pp. 89-96 |
2011 | Rivest-Shamir-Adleman (RSA). In: IIUM Press, ISBN: 9789674181130, pp. 99-105 |
2011 | SHA family hash function. In: IIUM Press, ISBN: 9789674181130, pp. 81-87 |
2011 | Shamir’s threshold scheme. In: IIUM Press, ISBN: 9789674181130, pp. 147-150 |
2011 | Short cut and hard drive. In: IIUM Press, ISBN: 9789674180850, pp. 31-38 |
2011 | Storage management. In: IIUM Press, ISBN: 9789674180850, pp. 127-134 |
2011 | Task scheduling. In: IIUM Press, ISBN: 9789674180850, pp. 107-112 |
2011 | Text animation. In: IIUM Press, ISBN: 9789674180850, pp. 213-219 |
2011 | Text effects. In: IIUM Press, ISBN: 9789674180850, pp. 221-226 |
2011 | The study of multicast listener discovery. In: IIUM Press, ISBN: 9789674181406, pp. 27-31 |
2011 | The use of genetic algorithm in autonomous robot navigation . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 3-13 |
2011 | The use of genetic algorithm in improving medical image segmentation techniques . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 45-55 |
2011 | Trivium and Rabbit stream cipher. In: IIUM Press, ISBN: 9789674181130, pp. 53-61 |
2011 | Windows explorer. In: IIUM Press, ISBN: 9789674180850, pp. 39-46 |
2011 | Windows installation. In: IIUM Press, ISBN: 9789674180850, pp. 87-98 |
2011 | Zero-knowledge-proof. In: IIUM Press, ISBN: 9789674181130, pp. 127-132 |