Staff Directory


Imad Fakhri Taha Alyaseen

Academic Qualification

  • Computer Science - Doctor of Philosophy, University of Pune
  • Computer Science - Masters Degree, University of Technology, Iraq
  • Mathemathics - Bachelor Degree, Al-Mustansiriya University, Iraq

Imad Fakhri Taha Alyaseen (Prof. Dr.)

Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY


imadf@iium.edu.my
5686


Expert Profile


Imad Fakhri Al-Shaikhli, a IEEE senior member, obtained his BSc (Hon) in Mathematics, MSc in Computer Science from Iraq, and Ph.D degree from Pune University, India, 2000. After obtaining his Ph.D, he returned to Iraq and continued teaching and supervising postgraduate students. In 2003, he was appointed as the Head of Department of Computer Information Systems at Alrafidain University College until 2005. Then he joined Gulf University- Bahrain in January 2006 and was appointed as the founding Dean of the College of Computer Engineering and Sciences. During this period, he introduced the CCNA certificate to be part of the curriculum which had a strong impact on the students' careers.
In November 2010, he joined IIUM at the Dept. of Computer Science / Kulliyyah of Information and Communication Technology. He received the Best Teacher Award in 2011. He has been the editor in chief of International journal on Advanced Computer Science and Technology Research since 2011 now, and the general chair of the international conference on Advanced Computer Science Applications and Technologies since 2012 till now. He obtained a US patent for his work with his Ph.D student on smart traffic light with accident detection system on 2nd December 2014. Prof. Imad has published more than 100 papers in, journals and book chapters in addition to three books.
Presently Dr Imad is a Professor at the Department of Computer Science and Head of Research at the Kulliyyah of Information and Communication Technology.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography - specialized in cryptography, and cryptanalysis research
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Soft Computing - specially in genetic algorithms, neural networks, evolving connectionist systems, and fuzzy logic
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - research on using biometrics as secure and authentic systems
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science


Professional Membership


  • 2012 - 2020: Member of Profesional Body / Association: (member), Malaysian Society for cryptology Research
  • 2012 - 2013: Member of Profesional Body / Association, Society of Digital Information and Wireless Communications
  • 2015 - 2020: Member of Profesional Body / Association: (senior member), Institute of Electrical and Electronics Engineers (IEEE)
  • 2017 - 2019: Member of Profesional Body / Association: (member), Persatuan Capaian Maklumat dan Pengurusan Pengetahuan Malaysia


Teaching Responsibilities


CRYPTOGRAPHY 2020/2021 2016/2017 2019/2020 2011/2012 2017/2018 2014/2015 2015/2016 2013/2014 2018/2019 2012/2013 2021/2022
DATA STRUCTURE & ALGORITHM 2015/2016 2014/2015 2013/2014 2012/2013 2011/2012 2010/2011
DATA STRUCTURES AND ALGORITHMS I 2019/2020 2018/2019 2020/2021 2021/2022 2017/2018 2016/2017
FINAL YEAR PROJECT 2011/2012 2013/2014 2012/2013 2010/2011 2014/2015
INDUSTRIAL ATTACHMENT 2014/2015 2015/2016 2011/2012 2012/2013 2016/2017 2017/2018 2013/2014 2010/2011
NEURAL NETWORKS 2010/2011
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2011/2012 2012/2013


Research Projects


Completed
2016 - 2020 Identifying and Profiling children with Learning disabilities using Algorithmic Computational Neuro-Physiological (CNP) Model
2016 - 2018 Analysis of ZUC Cipher in Mobile Communication
2015 - 2018 AN EFFICIENT MODEL FOR PROCESSING SKYLINE QUERIES IN INCOMPLETE AND UNCERTAIN DATABASES
2015 - 2019 An Online Computational Modeling for EcoS Feature Selection in Traffic Volumes Prediction
2014 - 2016 Computational Modeling for Analyzing the Effect of Quranic Recitations on Human Emotions
2014 - 2016 Anti-Malware for Mobilephones
2014 - 2017 Test Automation Model for Conformance of Mobile Applications Life Cycle
2013 - 2017 New Algorithm for Realtime OLAP Scheme over Multicore Distributed Processing to Serve Warehouse Data Mining
2013 - 2016 Visualization of Emotional Dynamic on Brain Topology using Neural Inspired Computational Model
2013 - 2017 Regulated Splicing Systems and Formal Models for Food Authentication
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2011 - 2013 RU 2011: Block Ciphers: Analysis and Design
2010 - 2012 The use of Digital Watermarking to protect Quran & Sunna
On-Going
2021 - Present A Model for Skyline Queries Over Knowledge Large-Scale Uncertain and Incomplete Graphs
2021 - Present Quran and Scientific Research
2020 - Present MRI Medical Images Detection and Classification of Brain Tumor Based on Deep Learning Techniques
2016 - Present Development of an Evolving Neuro-Cognitive Computational Model Based on Event-Related Potentials for Healthy Lifestyle Profiling
2011 - Present Study of Statistical Parmeters the Character Set of Bahasa Malay
2008 - Present Intelligent Cyberspace Security


Award & Recognition


19 Dec, 2020 UMMAH REVIVAL SERIES 2.0: Resolution in The New Era of Covid-19 - Others University
18 Nov, 2019 Appreciation Letter - Duzce University Rector-Turkey International
24 Jul, 2019 IIUM Takrim Day-highest no. of publications - honorabl Rector University
23 Jul, 2018 Top 250 contributors to IIUM's MyRA performance - IIUM RECTOR University
19 Jan, 2015 appreciation - Dean, KICT University
21 Dec, 2014 best paper award - international conference on computer assisted system in health 2014 International
12 Jun, 2014 Silver Medal for a poster at IRIIE 2014 - IIUM International
31 Dec, 2013 best library partner- 2013 - IIUM Library University
27 Jun, 2012 best teacher award - KICT University
22 Feb, 2012 IRIIE 2012 - IIUM University
22 Feb, 2012 IRIIE 2012 - IIUM University


Publications


Article

2021 Business owners’ feedback toward adoption of open data: a case study in Kuwait. Journal of Electrical and Computer Engineering, 2021 (6692410) pp. 1-9
2021 Dynamic radius for context- aware recommender system. Journal of Engineering Science and Technology, Special Issue (5) pp. 57-65
2021 Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels. Journal of Engineering Science and Technology- JESTEC, 16 (4) pp. 32-40
2021 High-level transportation framework for outdoor context-aware recommender. Journal of Engineering Science and Technology- JESTEC, 16 (4) pp. 15-31
2021 MRI brain tumor medical images analysis using deep learning techniques: a systematic review. Health and Technology Journal, 11 () pp. 267-282
2021 Second compression for pixelated images under edge-based compression algorithms: JPEG-LS as an example. Journal of Intelligent & Fuzzy Systems, 40 (6) pp. 10661-10669
2021 Successful factors determining the significant relationship between e-governance system and government operational excellence. Bulletin of Electrical Engineering and Informatics, 10 (6) pp. 3460-3470
2020 A proposed de-noising algorithm. The International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 90-96
2020 Image De-Noising techniques: a comparative study. Journal of Advanced Computer Science And Technology Research, 10 (2) pp. 21-37
2020 Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems, 32 (1) pp. 261-277
2019 A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 799-799(1)
2019 Consensus algorithms blockchain: a comparative study. International Journal on Perceptive and Cognitive Computing (IJPCC), 5 (2) pp. 66-71
2019 Detection of cracked digitized paintings and manuscripts based on threshold techniques. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 1108-1113
2019 Editorial: mobile networks in the era of big data. Mobile Networks and Applications, 24 (4) pp. 1135-1138
2019 Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications, 24 (3) pp. 1015-1017
2019 Identifying skylines in cloud databases with incomplete data. Journal of Information and Communication Technology, 18 (1) pp. 19-34
2019 Increasing the runs in compressed data using a dedicated move to front algorithm. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 903-906
2019 Neural network and principle component analysis based numerical data analysis for stock market prediction with machine learning techniques. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 806-812
2019 Optimal path planning for urban vehicles using Internet of Things: a new navigation perspective. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 1074-1080
2019 The influence of Internet and social media on purchasing decisions in Indonesia and a comparison between Indonesia and Kuwait. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 1029-1034
2019 The scalability challenge of the blockchain: a review. Journal of Advanced Computer Science and Technology Research, 9 (2) pp. 13-19
2019 Theoretical review of routing protocols used for wireless community networks. Journal of Computational and Theoretical Nanoscience, 16 (9) pp. 3656-3662
2018 A model for skyline query processing in a partially complete database. Advanced Science Letters, 24 (2) pp. 1339-1343
2018 A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5) pp. 23-26
2018 A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1) pp. 1-6
2018 A scientific review of soft-computing techniques and methods for stock market prediction. International Journal of Engineering and Technology, 7 (2.5) pp. 27-31
2018 Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology, 7 (4.15) pp. 519-523
2018 Detection and restoration of cracked digitized paintings and manuscripts using image processing. International Journal of Engineering & Technology, 7 (2.34) pp. 39-43
2018 Implementation of dynamic fuzzy logic control of traffic light with accident detection and action system using iTraffic simulation Simulation. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1) pp. 100-109
2018 Improving the cost factor of DLBCA lightweight block cipher algorithm. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2) pp. 786-791
2018 Multi-level of feature extraction and classification for X-Ray medical image. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1) pp. 154-167
2018 On randomness of compressed data using non-parametric randomness tests. Bulletin of Electrical Engineering and Informatics, 7 (1) pp. 63-69
2018 Technical approach in text mining for stock market prediction: a systematic review. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2) pp. 770-777
2018 The influence of internet and social media on purchasing decisions in Kuwait. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2) pp. 792-797
2018 Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal. International Journal of Engineering & Technology, 7 (2 (Special Issue 34)) pp. 34-38
2017 A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard. International Journal on Perceptive and Cognitive Computing (IJPCC), 3 (1) pp. 11-14
2017 A symmetric cryptosystem based on nondeterministic finite automata. Journal of Theoretical and Applied Information Technology ( JATIT ), 95 (6) pp. 1489-1498
2017 A web and software-based approach blending social networks for online Qur'anic Arabic learning. The International Arab Journal of Information Technology, 14 (1) pp. 80-90
2017 Analyzing brainwaves while listening to Quranic recitation compared with listening to music based on EEG signals. International Journal on Perceptive and Cognitive Computing (IJPCC), 3 (1) pp. 1-5
2017 Detection and restoration of cracked digitized paintings and manuscripts using image processing - a survey. International Journal on Perceptive and Cognitive Computing, 3 (2) pp. 1-6
2017 Input significance analysis: feature ranking through synaptic weights manipulation for ANNS-based classifiers. Journal of Fundamental and Applied Sciences, 9 (4S) pp. 639-662
2017 Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier. Journal of Fundamental and Applied Sciences, 9 (4S) pp. 681-709
2017 Processing skyline queries in incomplete database: issues, challenges and future trends. Journal of Computer Science, 13 (11) pp. 590-601
2017 Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control, 90 (7) pp. 1-29
2017 The influence of internet and social media on purchasing decisions in Egypt and a comparison between Egypt and Kuwait. International Journal of Computer Applications, 178 (5) pp. 26-32
2016 A framework for evaluating skyline queries over incomplete data. Procedia Computer Science, 94 () pp. 191-198
2016 A new block cipher based on finite automata systems. International Journal on Perceptive and Cognitive Computing (IJPCC), 2 (1) pp. 23-26
2016 An overview of cryptosystems based on finite automata. Journal of Advanced Review on Scientific Research, 27 (1) pp. 1-7
2016 Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems. International Journal on Perceptive and Cognitive Computing, 2 () pp. 12-16
2016 Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT), 8 (5) pp. 80-94
2016 Emotion detection using physiological signals EEG & ECG. International Journal of Advancements in Computing Technology (IJACT), 8 (3) pp. 103-112
2016 Lightweight block cipher algorithms: review paper. International Journal of Enhanced Research in Science, Technology & Engineering, 5 (5) pp. 136-143
2016 Performance and security improvements of Dӧmӧsi’s cryptosystem. International Journal of Applied Mathematics and Statistics, 55 (2) pp. 32-45
2016 Security and performance analysis of SCDSP. International Journal on Perceptive and Cognitive Computing (IJPCC), 2 (1) pp. 27-33
2015 A new design of cryptographic hash function: gear . International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1) pp. 29-34
2015 A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1) pp. 29-34
2015 An adequate approach to image retrieval based on local level feature extraction . Mehran University Research Journal of Engineering & Technology, 34 (4) pp. 337-348
2015 Blogging: a new platform for spreading rumors!. CCIT Journal, 9 (1) pp. 71-76
2015 CERT team involving GEs structured. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 3 (3) pp. 12-26
2015 CERT Technologies. International Journal of Innovation in Science and Mathematics, 3 (6) pp. 275-282
2015 SCDSP: a novel stream cipher with dynamic structure and parameters. International Journal of Advancements in Computing Technology (IJACT), 7 (5) pp. 49-56
2014 Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications, 5 (7) pp. 7-10
2014 Key-dependent s-box in lightweight block ciphers. Journal of Theoretical and Applied Information Technology, 62 (2) pp. 554-559
2014 Kuwait government entities e-business continuity and disaster recovery plan. Journal of Advanced Computer Science and Technology Research (JACSTR), 4 (3) pp. 62-75
2013 A new algorithm for human face detection using skin color tone. IOSR-Journal of Computer Engineering, 11 (6) pp. 31-38
2013 Achieving security by combining Huffman and SLSB algorithms. Journal of Advanced Computer Science and Technology Research (JACSTR), 3 (4) pp. 163-172
2013 Affective computing model using source-temporal domain. Procedia - Social and Behavioral Sciences, 97 () pp. 54-62
2013 Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4) pp. 239-246
2013 Comparative study between traffic control methods Using simulation software . International Journal of Machine Learning and Computing (IJMLC), 3 (5) pp. 424-429
2013 EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences, 97 () pp. 30-37
2013 Emotion recognition model using source-temporal features and fuzzy. Lecture Notes in Computer Science (LNCS), 8226 (1) pp. 577-584
2013 Evaluation of usability problems of labor portal in Saudi Arabia. International Journal of Advanced Computer Science and Information Technology, 2 (1) pp. 14-25
2013 Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology, 2 (2) pp. 1-12
2013 MOIM: a novel design of cryptographic hash function. International Journal of Computer Engineering & Technology (IJECT), 4 (4) pp. 1-19
2013 The ethical dilemma of software piracy: an inquiry from an Islamic perspective. Creative Communication and Information Technology, 7 (1) pp. 59-76
2012 Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3) pp. 127-139
2012 Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (3) pp. 116-126
2012 Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (4) pp. 159-165
2012 Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1) pp. 22-34
2012 Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences, 3 (7) pp. 1093-1102
2012 Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (2) pp. 79-90
2011 A practical method for the analysis of genetic algorithms. Journal of Advanced Computer Science and Technology Research(JACSTR), 1 ( ) pp. 1-9
2011 An improved genetic algorithm for solving the multiprocessor scheduling problem. Australian Journal of Basic and Applied Sciences, () pp.
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences, 27 () pp. 233-240
2011 Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1) pp. 36-51
2006 Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College, 8 (19) pp. 217-232
2006 Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College, 8 (19) pp. 87-98
2006 New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18) pp. 81-101
2004 Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq, 7 (15) pp. 51-60
Conference or Workshop Item

2019 XMIAR: X-ray medical image annotation and retrieval. In: Computer Vision Conference, CVC 2019,
2018 Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2018 Disaster recovery in single-cloud and multi-cloud environments: Issues and challenges. In: The 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2018 Scientific research in view of Quran and the creation of Allah s w t. In: Seminar of Information Retrieval and knowledge management SIRKM 2018,
2018 Scientific research in view of Quran and the creation of Allah s.w.t.. In: International Conference on Computer Assisted Systems in Health (CASH 2018),
2018 Structure of research proposal. In: Postgraduate Development Program (Package 2),
2017 A practical and interactive web-based software for online Qur’anic Arabic learning. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2017 Analysis of confidentiality algorithms in different mobile generations. In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17),
2017 Skyline query processing for incomplete data in cloud environment. In: The 6th International Conference on Computing and Informatics, ICOCI 2017,
2016 A performance improvement of Dömösi’s cryptosystem. In: Progress in Applied Mathematics in Science and Engineering 2015,
2016 A practical and interactive web-based software for online Qur'anic Arabic learning. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016),
2016 Automatic emotion recognition based on EEG and ECG signals while listening to quranic recitation compared with listening to music. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 Computational properties of Watson-Crick context-free grammars. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies,
2016 Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015,
2016 Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Statistical analysis of the eSTREAM competition winners. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Statistical approach for a complex emotion recognition based on EEG features. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2015 A performance improvement of Domosi’s cryptosystem . In: 2015 Progress in Applied Mathematics in Science and Engineering (PIAMSE),
2015 Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015,
2014 A cognitive-affective measurement model based on the 12-point affective circumplex. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies,
2014 A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 2014 the 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014,
2014 A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 A study on the effects of EEG and ECG signals while listening to Qur’an recitation. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 A survey of intrusion detection system using case study Kuwait governments entiteis. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference ,
2014 Brain & heart from computer science perspective. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014,
2014 CMAC-based computational model of affects (CCMA) for profiling emotion from EEG signals. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014,
2014 Design and analysis of a new hash function gear. In: 7th International Conference on Security of Information and Networks (SIN'14),
2014 Dynamic linear feedback shift registers: a review. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Feature ranking through weights manipulations for artificial neural networks-based classifiers. In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014),
2014 Feature ranking through weights manipulations for artificial neural networks-based classifiers. In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014),
2014 HISEC: a new lightweight block cipher algorithm. In: The 7th International Conference on Security of Information and Networks (SIN'14),
2014 OLBCA: a new lightweight block cipher algorithm. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014,
2014 Security risk analysis used by Kuwait government sectors . In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014,
2013 A new fragile digital watermarking technique for a PDF digital Holy Quran. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2013 Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013,
2013 e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Improving PRESENT lightweight algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Improving the security of LBlock lightweight algorithm using bit permutation. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Joux multicollisions attack in sponge construction. In: 6th International Conference on Security of Information and Networks,
2013 Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013,
2013 Protection of the digital Holy Quran hash digest by using cryptography algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies,
2013 Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia. In: 5th International Conference on Information and Communication Technology for the Muslim World,
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT),
2013 SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World,
2012 An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 An improved full search block matching algorithm for imaging applications. In: International Conference on Computer and Communication Engineering (ICCCE 2012),
2012 Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim),
2012 Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012,
2012 Quality evaluation of “safeer” portal for Saudi students studying abroad . In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies ,
2012 Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012,
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011),
1999 A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99,
Book

2017 Dynamic fuzzy logic traffic light integrated system with accident detection and action. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-673-9
2017 Effectiveness and performance of e-government in Saudi Arabia. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-680-7
2017 Enhancement of lightweight block cipher algorithms. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-695-1
2017 Minimum capabilities and requirements for establishing a national cert for AGC. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-682-1
2017 Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos). IIUM Press, ISBN: 978-967-418-688-3
2017 Protection of the digital holy Quran using IT techniques. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-789-7
2011 Computer applications: theories and applications. IIUM Press, ISBN: 9789674181079
2011 Cryptography: past, present and future. IIUM Press, ISBN: 9789674181130
2011 Introduction of computer systems and applications. IIUM Press, ISBN: 978-967-418-085-0
Book Section

2015 Cryptographic hash function: a high level view. In: IGI Global, ISBN: 978-1-4666-6583-5, pp. 80-94
2015 Cryptographic hash function: a high level view. In: IGI Global, ISBN: 978-1-4666-6583-5, pp. 80-94
2011 Advanced Encryption Standard (AES). In: IIUM Press, ISBN: 9789674181130, pp. 47-52
2011 Background of zero-knowledge proof. In: IIUM Press, ISBN: 9789674181130, pp. 117-120
2011 Basic disk management. In: IIUM Press, ISBN: 9789674180850, pp. 135-140
2011 Basic operating system setting. In: IIUM Press, ISBN: 9789674180850, pp. 81-86
2011 Basic storage management. In: IIUM Press, ISBN: 9789674180850, pp. 113-118
2011 Basic text effects. In: IIUM Press, ISBN: 9789674180850, pp. 205-212
2011 Blakely’s secret sharing scheme. In: IIUM Press, ISBN: 9789674181130, pp. 151-154
2011 Block and stream cipher. In: IIUM Press, ISBN: 9789674181130, pp. 33-38
2011 Cascade style sheets. In: IIUM Press, ISBN: 9789674180850, pp. 147-155
2011 Control panel and screen savers. In: IIUM Press, ISBN: 9789674180850, pp. 65-72
2011 Cryptanalysis of RSA. In: IIUM Press, ISBN: 9789674181130, pp. 107-112
2011 Data Encryption Standard (DES). In: IIUM Press, ISBN: 9789674181130, pp. 39-46
2011 Developed system for Quran protection using LSB replacement and MD5 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 99-109
2011 Developed system for Quran protection using MD5 and Base64 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 71-84
2011 Digital signature algorithm. In: IIUM Press, ISBN: 9789674181130, pp. 113-115
2011 Disk management. In: IIUM Press, ISBN: 9789674180850, pp. 141-146
2011 Feige-Fiat-Shamir identification scheme. In: IIUM Press, ISBN: 9789674181130, pp. 133-138
2011 Firmware program. In: IIUM Press, ISBN: 9789674180850, pp. 17-22
2011 Folder and directory. In: IIUM Press, ISBN: 9789674180850, pp. 47-53
2011 Graphical user interfaces. In: IIUM Press, ISBN: 9789674180850, pp. 23-30
2011 Hardware configuration. In: IIUM Press, ISBN: 9789674180850, pp. 73-79
2011 Image and special effects. In: IIUM Press, ISBN: 9789674180850, pp. 199-204
2011 Image clone 1. In: IIUM Press, ISBN: 9789674180850, pp. 181-191
2011 Image clone 2. In: IIUM Press, ISBN: 9789674180850, pp. 193-197
2011 Image editing. In: IIUM Press, ISBN: 9789674180850, pp. 157-164
2011 Image effects. In: IIUM Press, ISBN: 9789674180850, pp. 165-172
2011 Image filtering. In: IIUM Press, ISBN: 9789674180850, pp. 227-232
2011 Image quality improvement. In: IIUM Press, ISBN: 9789674180850, pp. 233-239
2011 Image tool function. In: IIUM Press, ISBN: 9789674180850, pp. 173-179
2011 In-silico drug target design & its approaches . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 15-26
2011 Interactive proof systems. In: IIUM Press, ISBN: 9789674181130, pp. 121-126
2011 Interfaces and protocols. In: IIUM Press, ISBN: 9789674180850, pp. 9-16
2011 Internal structure of computer systems. In: IIUM Press, ISBN: 9789674180850, pp. 1-8
2011 Introduction. In: IIUM Press, ISBN: 9789674181130, pp. 65-72
2011 Introduction. In: IIUM Press, ISBN: 9789674181130, pp. 3-9
2011 Introduction. In: IIUM Press, ISBN: 9789674181130, pp. 141-146
2011 Logical drive. In: IIUM Press, ISBN: 9789674180850, pp. 119-125
2011 Machine based cryptography. In: IIUM Press, ISBN: 9789674181130, pp. 25-30
2011 Message Digest (MDx) family. In: IIUM Press, ISBN: 9789674181130, pp. 73-80
2011 MIPV6 based approaches for mobility management. In: IIUM Press, ISBN: 9789674181406, pp. 32-35
2011 Molecular docking . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 37-44
2011 Monoalphabetic substitution cipher. In: IIUM Press, ISBN: 9789674181130, pp. 11-16
2011 Network security setting. In: IIUM Press, ISBN: 9789674180850, pp. 99-106
2011 Polyalphabetic substitution cipher. In: IIUM Press, ISBN: 9789674181130, pp. 17-23
2011 Protection mechanisms using LSB and MD5 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 85-98
2011 Protection mechanisms using MD5 and Base64. In: IIUM Press, ISBN: 978-967-418-107-9, pp. 59-69
2011 Qualitative study of mobility management approaches. In: IIUM Press, ISBN: 9789674181406, pp. 48-52
2011 RIPEMD and Chameleon hash function. In: IIUM Press, ISBN: 9789674181130, pp. 89-96
2011 Rivest-Shamir-Adleman (RSA). In: IIUM Press, ISBN: 9789674181130, pp. 99-105
2011 SHA family hash function. In: IIUM Press, ISBN: 9789674181130, pp. 81-87
2011 Shamir’s threshold scheme. In: IIUM Press, ISBN: 9789674181130, pp. 147-150
2011 Short cut and hard drive. In: IIUM Press, ISBN: 9789674180850, pp. 31-38
2011 Storage management. In: IIUM Press, ISBN: 9789674180850, pp. 127-134
2011 Task scheduling. In: IIUM Press, ISBN: 9789674180850, pp. 107-112
2011 Text animation. In: IIUM Press, ISBN: 9789674180850, pp. 213-219
2011 Text effects. In: IIUM Press, ISBN: 9789674180850, pp. 221-226
2011 The study of multicast listener discovery. In: IIUM Press, ISBN: 9789674181406, pp. 27-31
2011 The use of genetic algorithm in autonomous robot navigation . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 3-13
2011 The use of genetic algorithm in improving medical image segmentation techniques . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 45-55
2011 Trivium and Rabbit stream cipher. In: IIUM Press, ISBN: 9789674181130, pp. 53-61
2011 Windows explorer. In: IIUM Press, ISBN: 9789674180850, pp. 39-46
2011 Windows installation. In: IIUM Press, ISBN: 9789674180850, pp. 87-98
2011 Zero-knowledge-proof. In: IIUM Press, ISBN: 9789674181130, pp. 127-132