Staff Directory


Asadullah Shah

Academic Qualification

  • Ph.D in Multimedia Communication - Doctor of Philosophy, University of Surrey
  • M.Sc in Computer Technology - Masters Degree, University of Al-Sind
  • B.Sc in Electronic - Bachelor Degree, University of Al-Sind

Asadullah Shah (Prof. Dr.)

Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Other's position:

Head, IIUM Press


asadullah@iium.edu.my
NA


Expert Profile


Professor Asadullah Shah started his career as a Computer Technology lecturer in 1986. Before joining IIUM in January 2011, he worked in Pakistan as a full professor (2001-2010) at Isra, IOBM and SIBA. He earned his Ph.D in Multimedia Communication from the University of Surrey UK in 1998. During his 28 years of teaching, he has taught courses in the fields of Electronics, Computers, Multimedia Communication and Research Methodologies at undergraduate and postgraduate levels.
He has held various administrative positions throughout his carreer as Head of Department, Dean, controller of examinations, member board of governors, member selection boards, and expert on various forums. He has published 180 articles in ISI and Scopus indexed publications. In addition to that, he has published 12 books.
Since 2012, he has been working as a resource person and delivering workshops on proposal writing, research methodologies and literature review at Student Learning Unit (SLeU), Faculty of Economics and KICT, International Islamic University Malaysia and consultancies to other organizations. He is the winner of many gold, silver and bronze medals in his carreer and reviewer for many ISI, and Scopus indexed journals, and other journals of high repute. Currently, he is supervising many Ph.D projects in KICT in the field of IT and CS.


Area of Specialisation


  • Engineering Tech ~ Applied Sciences And Technologies ~ Aerospace ~ Advance and Emerging Methods (Including Quantitative Analysis such as Forecasting, Modelling, Inference, Data Mining; Survey Techniques Complex Survey, Rank Set Sampling, Market Survey), and Performance Measurement (Hierarchical Modelling, Data Envelopment Analysis, Stochastic Frontier Analysis and Risk Analysis)) - Cloud computing, e-learning, social media, multimedia and machine learning, Information System
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ ICT Applications ~ e-Learning - smart learning and education
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ ICT Applications ~ Education
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Compression Technology - DATA COMPRESSION AND MULTIMEDIA COMPRESSION


Professional Membership


  • 2013 - 2014: Member of Profesional Body / Association, IEEE Computer Society
  • 2013 - 2014: Member of Profesional Body / Association, Majlis Professor Negara


Teaching Responsibilities


ADVANCED DATA MANAGEMENT 2017/2018 2020/2021 2019/2020 2018/2019
ADVANCED ENTERPRISE INTEGRATION 2019/2020 2020/2021 2021/2022 2018/2019
ANIMATION TECHNIQUE 2014/2015 2012/2013 2013/2014
CREATIVE DESIGN TECHNIQUES 2012/2013 2014/2015 2013/2014 2015/2016
DATA MANAGEMENT 2016/2017
DIGITAL AUDIO AND VIDEO TECHNOLOGY 2018/2019
ENTERPRISE INTEGRATION 2018/2019
FINAL YEAR PROJECT I 2012/2013 2019/2020 2020/2021 2014/2015 2013/2014 2016/2017
FINAL YEAR PROJECT II 2014/2015 2019/2020 2021/2022 2015/2016 2013/2014 2017/2018 2020/2021
ICT RESEARCH METHODS 2021/2022 2019/2020 2017/2018
INDUSTRIAL ATTACHMENT 2015/2016 2011/2012 2010/2011 2016/2017
ISLAMIC WORLDVIEW, IT AND SOCIETY 2016/2017
IT PROJECT AND CHANGE MANAGEMENT 2017/2018
IT SECURITY II 2011/2012 2012/2013
MANAGEMENT INFORMATION SYSTEMS 2020/2021
MOBILE COMMUNICATION 2017/2018 2016/2017
MOBILE COMMUNICATIONS AND NETWORKS 2020/2021 2019/2020 2018/2019
OPERATING SYSTEM 2012/2013
PROJECT & CHANGE MANAGEMENT 2016/2017 2017/2018
QUANTITATIVE RESEARCH METHODOLOGY 2013/2014 2014/2015
RESEARCH METHODOLOGY 2019/2020 2017/2018 2018/2019
RESEARCH METHODOLOGY FOR IT 2015/2016 2014/2015 2011/2012 2017/2018 2012/2013 2013/2014
SIGNALS AND SYSTEMS 2011/2012
WEB PROGRAMMING 2011/2012
WEB PROGRAMMING FUNDAMENTAL 2011/2012 2012/2013


Research Projects


Completed
2016 - 2019 Tori-Connected Flattened Butterfly Network (TFBN)
2015 - 2019 Re-engineering pre-marriage course learning for JAKIM: an investigation of multimedia lifelong mobile learning experience
2013 - 2014 Research Methodologies: An Islamic Perspective
2012 - 2016 A novel model of routing protocol for mobile ad hoc networks based on link reliability
2012 - 2016 A Novel Feedback Technique to Detect Unsatisfiable Submodels of UML/OCL Class Diagrams for Verification of UML/OCL Models
2011 - 2012 Mobile Hajj Dictionary (Arabic, Malay and English Based)
2011 - 2011 Research Methodologies : A Practical Approach (KVC Project 2011)
2011 - 2015 RU 2011: Development of Text Compression Package for Tri-Language Text
2011 - 2013 RU 2011: On Adverse and Non-Uniform Traffic Patterns on H3DM Network
2011 - 2021 Numeric Of Language (KVC Project 2011)
On-Going
2020 - Present Teachers? Behavioral Intention and Acceptance of Technology for the Intervention of Children with Autism Spectrum Disorder (ASD) in Malaysia
2019 - Present Analysis of Video Game Design Styles on Learning Aptitude Using EEG
2016 - Present A Cloud Computing Framework for Sharing of Cloud Resources and Attacks Information Amongst Cloud Networks
2011 - Present Study of Statistical Parmeters the Character Set of Bahasa Malay


Award & Recognition


20 Nov, 2020 IIUM Quality Research Award - International Islamic University Malaysia University
10 Apr, 2019 IIUM Takrim Day - International Islamic University Malaysia University
24 Apr, 2018 IIUM Quality Research Award - International Islamic University Malaysia University
02 Sep, 2016 Outstanding Contribution - University


Publications


Article

2021 A methodology for incorporating quality assurance practices during software development life cycle. International Journal of Advanced Trends in Computer Science and Engineering, 10 (3) pp. 2296-2301
2021 Acceptance of IoT learning among university students at Pakistan. International Journal of Advanced Trends in Computer Science and Engineering, 10 (3) pp. 2267-2271
2021 Framework for location based attendance system by using fourth industrial revolution (4ir) technologies. International Journal of Advanced Trends in Computer Science and Engineering, 10 (3) pp. 2260-2266
2021 Ontology-based approach to semantically enhanced question answering for closed domain: a review. Information, 12 (5) pp. 1-22
2021 Pervasive learning environment for educational makerspaces with emerging technologies and teaching and learning transformation. International Journal of Advanced Trends in Computer Science and Engineering, 10 (3) pp. 2272-2277
2021 Predicting spatial displacement based on intraocular image design using convolution neural network - preliminary findings. Journal of Information Systems and Digital Technologies, 3 (1) pp. 74-82
2021 The effect of adoption of digital marketing on the competitiveness among Omani SMEs. Turkish Online Journal of Qualitative Inquiry (TOJQI), 12 (4) pp. 1615-1620
2020 A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems. International journal of Distributed sensor networks, 16 (8) pp. 1-35
2020 A study on efectiveness in using continuous integration and development for software development: a state of the art review. Journal of Information Systems and Digital Technologies -JISDT, 2 (2) pp. 18-27
2020 A study on effectiveness in using continuous integration and deployment for software development: a state of the art review. Journal of Information Systems and Digital Technologies, 2 (2) pp. 18-27
2020 A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder (ASD). Universal Access in the Information Society, 19 (2) pp. 213-243
2020 A theoretical model of healthcare monitoring surveillance system for patients with severe allergies. international Journal of Advanced and Applied Sciences, 7 (6) pp. 69-75
2020 Augmented reality for learning of children and adolescents with autism spectrum disorder (ASD): A systematic review. IEEE Access, 8 () pp. 78779-78807
2020 Challenges and limitations in secure software development adoption - A qualitative analysis in Malaysian software industry prospect. Indian journal of Sciences and Technology, 13 (26) pp. 2601-2608
2020 Dynamic user preference parameters selection and energy consumption optimization for smart homes using deep extreme learning machine and bat algorithm. IEEE Access, 8 () pp. 204744-204762
2020 Evaluating critical success factors in implementing E-learning system using multi-criteria decision-making. PLoS ONE, 15 (5) pp.
2020 Evaluating critical success factors in implementing E-learning system using multicriteria decision-making. PLOS ONE, 15 (5) pp. 1-25
2020 Measuring secure software development awareness and usage among software developers. Sindh University Research Journal - SURJ (Science Series), 52 (4) pp. 381-385
2020 Review of components from frameworks and models for GBL for history based courses. University of Sindh journal of Information and Communication Technology, 4 (1) pp. 9-16
2020 Time and cost efficient cloud resource allocation for real-time data-intensive smart systems. Energies, 13 (5706) pp. 1-25
2019 A review on energy consumption optimization techniques in IoT based smart building environment. Information, 10 (3) pp. 1-34
2019 A Review on energy consumption optimization techniques in IoT based smart building environments. Information, 10 (108) pp. 1-34
2019 A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder. Universal Access in the Information Society, () pp. 1-31
2019 Analysis of models for e-commerce adoption factors in developing countries. International Journal on Perceptive and Cognitive Computing (IJPCC), 5 (2) pp. 72-80
2019 Big-five personality traits mapped with software development tasks to find most productive software development teams. International Journal of Innovative Technology and exploring Engineering (IJITEE), 8 (12) pp. 965-971
2019 Competitive algorithms for online conversion problems with interrelated prices. International Journal of Advanced Computer Science and Applications (IJACSA), 10 (6) pp. 582-589
2019 Deployment of social nets in multi-layer model to identify Key individuals using majority voting. Knowledge and Information Systems An international Journal, 58 (1) pp. 113-137
2019 Deployment of social nets in multilayer model to identify key individuals using majority voting. Knowledge and Information Systems, 58 (1) pp. 113-137
2019 Effects of socioeconomic characteristics on online purchase intention among Malaysians. Journal of Computational and Theoretical Nanoscience, 16 (3) pp. 927-934
2019 Key individual identification using dimensional relevance in the stratum of networks. Journal of Intelligent & Fuzzy systems, () pp. 1-15
2019 Predicting most productive requirements elicitation teams using MBTI personality traits model. International Journal of Engineering and Advanced Technology (IJEAT), 9 (1) pp. 3809-3814
2019 Revised and extended social commerce technology adoption in e-business of Pakistan. International Journal on Perceptive and Cognitive Computing, 5 (2) pp. 52-58
2019 Sliding mode control for 2 degrees of freedom upper limb rehabilitation robotics system under uncertainties. Intentional journal of Engineering and Advanced Technology (IJEAT), 9 (2) pp. 3268-3274
2018 A review of near field communication process: how do it works?. Sindh University Research Journal (Science Series), 50 (3D) pp. 237-240
2018 A review on optimization of vehicle frontal crashworthiness for passenger safety. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)) pp.
2018 An assessment of proximity technology adoption from a user's perspective. Sindh University Research Journal (Science Series), 50 (3D) pp. 220-223
2018 An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)) pp. 16-21
2018 Analysis determinants of social media acceptance in higher educational institution of Pakistan. International Journal of Engineering and Technology, 7 (2.5 (Special Issue 5)) pp. 32-36
2018 Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem. International Journal of control and Automation, 11 (3) pp. 35-44
2018 Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review. International Journal of Control and Automation, 11 (2) pp. 135-150
2018 Beyond traditional audits: the implications of information technology on auditing. International Journal of Engineering & Technology (UAE), 7 (2.34) pp. 5-11
2018 Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation. International Journal of Advanced Computer and Applications, 9 (4) pp. 221-229
2018 Energy efficiency in virtualized data center. International Journal of Engineering & Technology, 7 (4.15) pp. 315-317
2018 Identification of valued users to generate more telecom filigence. Sindh University Research Journal (Science Series), 50 (3D) pp. 224-226
2018 Integration social media technology and ethical collaborative learning. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)) pp. 12-15
2018 Near field communication enabled mobile payments: preliminary study. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)) pp. 60-63
2018 Performance evaluation of distributed mMulti media wireless sensor network. International Journal of Engineering and Technology, Vol 7 (4.15) pp. 318-322
2018 Performance optimization of wireless sensor network for multimedia services. International Journal of Engineering and Technology, 7 (4.15) pp. 323-326
2018 Preliminary study for customer’s online shopping satisfaction from security perspective. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)) pp. 64-68
2018 Robotic exoskeleton control for lower limb rehabilitation of knee joint. International Journal of Engineering & Technology (UAE), 7 (2.34 (Special issue 34)) pp. 56-59
2018 Unstructured source artifacts ontology for requirement validation in GDSD. International Journal of Engineering and Technology, 7 (2.5 (Special Issue 5)) pp. 44-52
2018 Visualization representation benefits of pre-requirement specification tractability. International Journal of Engineering & Technology, 7 (2.5 (Special Issue 5)) pp. 44-52
2018 Visualization representing benefits of pre-requirement specification traceability. International Journal of Engineering and Technology(UAE), 7 (2) pp. 44-52
2018 Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies. International Journal of Engineering & Technology, 7 (2.34 (Special issue 34)) pp. 89-92
2017 A hybrid method using kinect depth and color data stream for hand blobs segmentation. Science International, 29 (3 (May-June)) pp. 515-519
2017 A mixed method study for investigating critical success factors (CSFs) of E-learning in Saudi Arabian Universities. International Journal of Advanced Computer Science and Applications, 8 (5) pp. 171-178
2017 Artifact evaluation in information systems design science research: social constructivism environment. Science International, 29 (5) pp. 1059-1064
2017 Assessing digital library acceptance by postgraduate students: a proposed framework. University of Sindh Journal of Information and Communication Technology, 1 (1) pp. 47-50
2017 Barriers effecting successful implementation of E-learning in Saudi Arabian universities. Internation Journalk of Educational Technology (iJET), 12 (6) pp. 94-107
2017 Forensic analysis of offline signature using multi-layer perception and random forest. International Journal of Database Theory and Applications, 10 (1) pp. 139-148
2017 Halal products recognition using RFID/NFC technology. Science International, 29 (3 (May-June)) pp. 687-692
2017 Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management, 34 (1) pp. 50-64
2017 Predicting the fraud volume in personal computer using different web browsers. Since International, 29 (3 (May-June)) pp. 681-685
2017 Reliability and validity of a questionnaire for empirical analysis of factors influencing IOT-based smart healthcare. Science International, 29 (6 Section B (November-December)) pp. 1201-1206
2017 Selecting respondents for survey questionnaire in Islamic way. Journal of Islamic, Social an, Economics and Development, 2 (5) pp. 40-46
2017 WSN based sensing model for smart crowed movement with identification: an extended study. Journal of Theoretical and Applied Information Technology, 95 (5) pp. 975-988
2016 A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm. International Journal of Signal Processing, Image Processing and Pattern Recognition, 9 (10) pp. 11-20
2016 A study to investigate state of ethical Development in E-learning. International Journal of Advanced Computer Science and Applications, 7 (4) pp. 284-290
2016 An offline signature verification technique using pixels intensity levels. International Journal of Signal Processing, Image Processing and Pattern Recognition, 9 (8) pp. 205-222
2016 An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem. SINDH university Research Journal ( science series ), 48 (4D) pp. 175-182
2016 Analysis and enhancement of the denoising depth data using kinect through iterative technique. Jurnal Teknologi, 78 (9) pp. 185-193
2016 Application service delivery in the modern virtualized data center-improving reliability and scalability. Sindh University Research Journal (Science Series), 48 (3) pp. 579-584
2016 Building CMU Sphinx language model for the Holy Quran using simplified Arabic phonemes. Egyptian Informatics Journal, 17 (3) pp. 305-314
2016 HTM:a new hierarchical interconnection network for future generation parallel computers. IETE Technical Review, 33 (2) pp. 93-104
2016 Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems. Sindh University Research Journal (Science Series), 48 (4D) pp. 17-26
2016 Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan . Sindh University Research Journal (Science Series), 48 (2) pp. 309-314
2016 Real-time hand detection by depth images: a survey. Jurnal Teknologi, 78 (2) pp. 141-148
2016 Risk management policies of telecommunication and engineering laboratories . International Journal of Hybrid Information Technology, 9 (4) pp. 281-290
2016 Testing desktop application: Police station information management system. International Journal of Software Engineering and Its Applications, 10 (7) pp. 101-118
2016 Towards using CMU sphinx tools for the Holy Quran recitation verification. International Journal on Islamic Applications in Computer Science And Technology (IJASAT), 4 (2) pp. 10-15
2016 Transitional approaches for PERN migration to SDN. Information Technology Journal, 15 (4) pp. 137-143
2016 Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science, 10 (2) pp. 34-51
2015 A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students . Journal of Ecosystem & Ecography , 5 (3) pp. 1-5
2015 An applications development for record keeping of police stations in Pakistan . Journal of Scientifc Research and Advances, 2 (4) pp. 144-150
2015 An appraisal of off-line signature verification techniques . International Journal on Modern Education and Computer Science , 4 () pp. 67-75
2015 An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait . Wulfenia Journal, 22 (3) pp. 258-269
2015 Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation . International Journal of Computer Graphics & Animation, 5 (1) pp. 47-67
2015 Analyzing the weighted dark networks using scale-free network approach. WSEAS Transactions on Computers, 14 () pp. 748-759
2015 Automated animation of quadrupeds using procedural programming technique. Asian Journal of Scientific Research, 8 (2) pp. 165-181
2015 Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering, 2 (3) pp. 10-19
2015 Collaborative learning, using Facebook's page and Groups. International Journal of Computer System, 2 (2) pp. 47-52
2015 Computational modeling of mood from sequence of emotions. Advanced Science Letters, 21 (10) pp. 2997-3001
2015 Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review. Renewable and Sustainable Energy Reviews, 51 () pp. 1553-1563
2015 Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology, 71 (1) pp. 87-96
2015 Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences, 9 (5) pp. 2703-2714
2015 Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework. Journal of Islamic Countries Society of Statistical Sciences (IJOSS), 1 (2) pp. 131-139
2015 Mobile agent based multi-layer security framework for cloud data centers. Indian Journal of Science & Technology, 8 (12) pp. 52923-1
2015 Pervasive learning using cloud computing . Sindh University Research Journal (Science Series), 47 (3) pp. 567-570
2015 Resolving ethical dilemma in technology enhanced education through smart mobile devices . International Arab Journal of e-Technology, 4 (1) pp. 25-31
2015 Transaction Management techniques and practices in current cloud computing environment: a survey . International Journal of Database Management Systems (IJDMS) , 7 (1) pp. 41-49
2014 Cloud computing adaptation model for universities to increase ICT proficiency. SAGE Open, 4 (3) pp. 1-10
2014 Cloud computing adoption model for universities to increase ICT proficiency. SAGE Open, () pp. 1-10
2014 Contribution of cloud computing in the reduction of carbon dioxide emission . International Journal for Innovation Education and Research, 2 (8) pp. 118-120
2014 Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering, 2 (1) pp. 1-7
2014 Deployment of new dynamic cryptography buffer for SCADA security enhancement . Journal of Applied Sciences, () pp. 1-11
2014 ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal, 76 (5) pp. xx-xx
2014 EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal, 7 (5) pp. 88-103
2014 Encryption method for SCADA security enhancement. Journal of Applied Sciences, () pp. 1-9
2014 Energy efficiency and environmental consideration for green data centres. International Journal of Green Economics, 8 (2) pp. 144-157
2014 Gender and mobile payment system adoption among students of tertiary institutions in Nigeria. International journal of Computer and Information Technology, 3 (1) pp. 13-20
2014 Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies, 94 (2) pp. 1-10
2014 Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal, 21 (3) pp. 462-470
2014 Metrics for computing performance of data center for instigating Energy Efficient Data center. Journal of Scientifc and Industrial Research , 73 () pp. 11-15
2014 Power usage effectiveness metrics to measure efficiency and performance of data centers. Applied Mathematics and Information Sciences, 8 (5) pp. 2207-2216
2013 Evaluating the effect of IP and IGP on the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR), 3 (2) pp. 71-82
2013 Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN. Journal of Advanced Computer Science and Technology Research (JACSTR), 3 (1) pp. 21-30
2013 Forward and Inverse Kinematics Seamless Matching using Jacobian. Sindh University Research Journal (Science Series), 45 (2) pp. 387-392
2013 Measuring efficiency of tier level data centers to implement green energy efficient data centers. Middle-East Journal of Scientific Research, 15 (2) pp. 200-207
2013 Prototyping of a situation awareness system in the maritime surveillance. IOP Conference Series: Materials Science and Engineering, 53 (012007) pp. 1-6
2013 Selecting a mentor: guide for a Protégé. World Applied Sciences Journal , 24 (6) pp. 732-738
2013 Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia. International Journal of Emerging Technologies in Learning, 8 (3) pp. 8-12
2012 Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm. International Journal of Innovative Computing, Information and Control, 8 (6) pp. 4375-4389
2012 Information and communication technology workforce employability in Malaysia. Campus Wide Information Systems, 29 (2) pp. 80-89
2012 Virtualization implementation approach for data centers to maximize performance. Asian Journal of Scientific Research, 5 (2) pp. 45-57
2011 A novel text steganography technique to Arabic language using reverse fatah . Pakistan Journal of Engineering Technology & Science (PJETS), 1 (2) pp. 106-113
2011 Command based line following robot using RF technology. Journal of Computer Science and Technology, 1 (1) pp. 25-35
2011 Differential image compression for telemedicine: a novel approach. Pakistan Journal of Engineering, Technology and Science, 1 (1) pp. 14-20
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences, 27 () pp. 233-240
2011 Green IT based energy efficiency model for data centers to reduce energy consumption & CO2 emissions. International Journal of Current Research and Review, 3 (10) pp. 1-10
2011 Internet banking in Pakistan: finding complexities. Journal of Internet Banking and Commerce, 16 (1) pp. 1-14
2011 Revisiting far/near infrared pyramid-based fusion types for night vision using matlab. Pakistan Journal of Engineering Technology & Science (PJETS), 1 (1) pp. 21-36
2006 Infective endocarditis in the East coast of peninsular Malaysia: a two year retrospective survey from Kuantan. JK-Practitioner, 13 (1) pp. 5-8
Conference or Workshop Item

2020 A model for e-commerce adoption by SMEs in developing countries. In: The International Conference on Business and Technology (ICBT 2020),
2020 A novel RE Teams selection process for user-centric requirements elicitation frameworks based on big-five personality assessment model. In: IEEE ICIIS-2020,
2020 Energy consumption optimization in the smart homes. In: 3rd International Conference on Computer Information Science and Application Technology (CISAT 2020),
2020 Information technology (IT) based intervention among individuals with ASD (autism spectrum disorder): A review. In: 2nd IEEE International Conference on Innovative Research and Development, ICIRD 2019,
2020 Mobile augmented reality app for children with autism spectrum disorder (asd) to learn vocabulary (marvoc): From the requirement gathering to its initial evaluation. In: 2nd International Conference on HCI in Games, HCI-Games 2020,
2020 Process hierarchy for GSD based user-centric requirements elicitation frameworks. In: IEEE ICIIS-2020,
2020 Recent teaching technologies and smart learning. In: 1st National Conference on Emerging trends in Information and Engineering Technologies,
2020 Smart learning environment framework. In: International virtual conference on emerging trends in computer and software Engineering,
2019 A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan. In: 2019 International Conference on Information Science and Communication Technology (ICISCT),
2019 A conceptual framework for measuring acceptance of contactless payment methods. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2019 A review of programming code assessment approaches. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2019 A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life. In: 5 th IEEE International Conference on Engineering, Technologies and Applied Sciences ( ICETAS 2018 ),
2019 Acceptance and use of information and communication technology in higher education institutes of Kuwait: a proposed framework. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2019 Comparative views on western paradigms of knowledge with the Islamic paradigm of knowledge and knowledge discovery and integration. In: 7th International conference on Islamic Applications,
2019 Comprehensive ICT framework for educational institutes of Kuwait: an empirical study. In: 2nd IEEE International Conference on Innovative Research and Development (ICIRD 2019),
2019 Digital literacy and the attitude of educators towards MOOC platform in GCC countries. In: 2nd IEEE International Conference on Innovative Research and Development (ICIRD 2019),
2019 Disparity between theory & practice beyond the worst-case competitive analysis. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2019 Factors affecting secure software development practices among developers- an investigation. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2019 Offline printed Sindhi optical text recognition: survey. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2019 Review on Natural Language Processing (NLP) and its toolkits for opinion mining and sentiment analysis. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2019 Social science interdisciplinary research and challenges. In: 1st International Conference on " Multidisciplinary Innovation & Research Challenges in Social Science",
2019 The effect of web-based social networking on consultancy. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2019 The impact of emerging technologies on public sector. In: International Conference, Student Exchange & Social Exploration Post Graduate Program,
2019 Visualization: a tool to study nodes in multi-dimensional networks. In: Computing Conference 2019,
2018 A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018,
2018 A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018,
2018 An empirical study of Internet of Things (IoT) - based healthcare acceptance in Pakistan:pilot study. In: 3rd IEEE International Conference on Engineering Technologies and Social Sciences, ICETSS 2017,
2018 Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD),
2018 Detecting change from social networks using temporal analysis of email data. In: 14th International Conference on Information Technology - New Generations (ITNG 2017),
2018 E-learning in Iraqi universities: a review. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017,
2018 Health information system (HMS) in Malaysia. In: 1st International conference on Multidisciplinary Academic Research,
2018 Near field communication enabled payment system adoption: A proposed framework. In: 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS),
2018 Prediction-based resource allocation model for real time tasks. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2018 Preliminary study on factors affecting E-commerce success: a modified Delone and McLean model. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2018 Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP). In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2018 Security and privacy for IoT and fog computing paradigm. In: 15th Learning and Technology Conference (L&T) 2018,
2018 Social commerce in e-business of Pakistan: opportunities, challenges and solutions. In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2018,
2018 The future of data privacy and security concerns in Internet of things. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD),
2018 Towards an accurate speaker-independent Holy Quran acoustic model. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017,
2018 Towards an integrated framework of e-learning through an international innovative collaboration: Iraqi perspective. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017,
2018 Using web crawlers for feature extraction of social nets for analysis. In: 14th International Conference on Information Technology - New Generations (ITNG 2017),
2017 Assimilating e-learning barriers using an interpretive structural modelling (ISM). In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2017 Development of a game for history course of secondary school students. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2017 Important attributes of customer satisfaction in telecom industry: a survey based study. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS),
2017 Testing Sphinx’s language model fault-tolerance for the Holy Quran. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 Acceptance and use of information and communication technology by academicians: Towards a conceptual framework. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 An adoption of Halal food recognition system using Mobile Radio Frequency Identification (RFID) and near field communication (NFC). In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016),
2016 Factors effecting fixed-line telecom services customer retention: A study of Pakistan . In: 14th International Conference on Statsitical Sciences ,
2016 Modeling user's trust in M-commerce acceptance: a conceptual framework in context of Pakistan. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015,
2016 Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 WSN based sensing model for smart crowd movement with identification: a conceptual model. In: Multi Conference on Computer Science And Information Systems 2016,
2015 A conceptual framework for measuring the acceptance of pervasive learning. In: 5th International Conference on Computing and Informatics (ICOCI 2015),
2015 A conceptual framework for the analysis of determinants of m-commerce acceptance. In: 13th International Conference on Statistical Sciences,
2015 A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan. In: 5th International Conference on Computing and Informatics, ICOCI 2015,
2015 A model for handling overloading of literature review process for social science . In: The International Conference on Advanced Research in Business and Social Sciences 2015 (ICARBSS 2015),
2015 A review of slicing techniques in software engineering. In: International Conference on Engineering and Technology,
2015 Detecting changes in context using time series analysis of social network. In: SAI Intellegence Systems Conference 2015,
2015 Mobile online services and measuring user satisfaction: study of Kuwait. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies,
2015 Predicting the fraud volume in the advent of internet enabled handheld devices . In: 4th International Conference on Advances in Engineering Sciences and applied Mathematics, ICAESAM' 2015 ,
2015 Relation mining using cross correlation of multi domain social networks . In: SAI Intelligent Systems Conference (IntelliSys), 2015,
2015 Simulation of Resources Sharing Architecture (ReSa) between clouds using Java programming. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014),
2015 SmartCrowd: novel approach to big crowd management using mobile cloud computing. In: International Conference on Cloud Computing 2015 (ICCC'2015),
2015 Towards using CMU Sphinx Tools for the Holy Quran recitation verification. In: 3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015),
2014 Anomaly detection in vessel tracking using Support Vector Machines (SVMs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2014 Calculus and its applications in scale-free networks . In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014),
2014 Identification of vessel anomaly behavior using support vector machines and Bayesian networks. In: International Conference on Computer and Communication Engineering (ICCCE 2014),
2014 Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science . In: 5th International Conference Information & Communication Technology for the Muslim World (ICT4M 2014),
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Node status detection and information diffusion in router network using scale-free network. In: 10th International Network Conference, INC 2014,
2014 ReSA: architecture for resources sharing between clouds. In: 2014 Conference on Information Assurance and Cyber Security (CIACS),
2014 RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 Sharing of attacks information across clouds for improving security:a conceptual framework. In: International Conference on Computer, Communication, and Control Technology (I4CT 2014),
2014 Systematic review of computational modeling of mood and emotion. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014),
2013 10 c’s of social networking, interconnections and the impact on social networking. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 A 10 C’s of social networking, interconnections and the impact on social networking. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2013 A model for real-time recognition and textual representation of Malaysian sign language through image processing . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT),
2013 A security-based survey and classification of cloud architectures, state of the art and future directions . In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
2013 Analysis of SNS popularity from different perspectives among users. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 Ethical perspective of students in Global Learning Environment. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2013 Fault tolerant cloud auditing. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 Hierarchical 3D-Mesh Network. In: IRIIE2013,
2013 Inculcating ethical values in the students through e-Learning platform. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M),
2013 Prototyping of a situation awareness system in the maritime surveillance. In: 5th International Conference on Mechatronics,
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT),
2013 Template based procedural rigging of quadrupeds with custom manipulators. In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT),
2013 Towards quick response and secure online banking transactions: using data compression and cryptography. In: 2nd International Conference on Advances Information Technology (AIT 2013),
2012 A deadlock-free dimension order routing for hierarchical 3D-mesh network. In: 2012 International Conference on Computer & Information Science (ICCIS),
2012 Building wireless sensor networks application using Sun SPOTs. In: Second International Multi Topic Conference, IMTIC 2012,
2012 Design and development of the FMCW Radar Scene Generator. In: 2012 IEEE Symposium on Industrial Electronics and Applications (ISIEA2012),
2012 High performance hierarchical torus network. In: IRIIE2012,
2012 NoMadCar: the interactive design using human computer interaction techniques. In: International Multi-TopIc Conference (IMTIC 2012),
2012 On dynamic communication performance of a hierarchical 3D-mesh network. In: The 9th IFIP International Conference on Network and Parallel Computing (NPC 2012),
2012 Widget based automated rigging of bipedal character with custom manipulators . In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;,
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011),
2011 Maximizing bandwidth efficiency of statistical multiplexer Architexture using frame dropping methods . In: KICT Seminar,
Book

2017 A model for social media in higher education institutions of Pakistan. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-795-8
2017 An integrated model of acceptance for pervasive learning from students’ perspective. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-792-7
2017 Factors affecting the acceptance of mobile commerce in Pakistan. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-794-1
2017 Predicting online banking fraud using adaptive neuro-fuzzy inference system (ANFIS). IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-791-0
2016 Research methodologies an Islamic perspective. IIUM Press, ISBN: 9789674183868
2013 Wireless sensor networks for developing countries: First International Conference, WSN4DC 2013 Jamshoro, Pakistan, April 2013 revised selected papers. Springer Berlin Heidelberg, ISBN: 978-3-642-41054-3 (O), 978-3-642-41053-6 (P),
2011 C++ programming: step by step . IIUM Press, ISBN: 9789674180904
2011 Computer applications: theories and applications. IIUM Press, ISBN: 9789674181079
2011 Introduction of computer systems and applications. IIUM Press, ISBN: 978-967-418-085-0
2011 JAVA programming lab manual. IIUM Press, ISBN: 9789674181048
2011 Research methodologies: a practical approach. IIUM Press, ISBN: 9789674180171
2011 Statistical time division multiplexing architectures and design. IIUM Press, ISBN: 978-967-418-190-1
2011 Understanding basic concept of electrical and electronic system . IIUM Press, ISBN: 9789674181161
Book Section

2021 A model for e-commerce adoption by SMEs in developing countries. In: Springer International Publishing, ISBN: 978-3-030-69220-9, pp. 516-529
2021 Special education teachers’ for autism spectrum disorder children: behavioral intention and use of technology in Malaysia. In: Persatuan Sistem Maklumat Malaysia (MyAIS), ISBN: 9789671774113, pp. 9-18
2018 Proactive business intelligence to give best customer experience to valued social networks in telecoms. In: Springer, ISBN: 978-3-319-56993-2, pp. 678-686
2013 Hierarchical Tori Connected Mesh Network. In: Springer-Verlag Berlin Heidelberg, ISBN: 978-3-642-39640-3 (O), 978-3-642-39639-7 (P), pp. 197-210
2011 Abstract class. In: IIUM Press, ISBN: 9789674180867, pp. 237-244
2011 Active band pass filter. In: IIUM Press, ISBN: 9789674181161, pp. 136-141
2011 Active high pass filter . In: IIUM Press, ISBN: 9789674181161, pp. 129-135
2011 Active low pass filter . In: IIUM Press, ISBN: 9789674181161, pp. 123-128
2011 Arguments passing. In: IIUM Press, ISBN: 9789674180867, pp. 155-161
2011 Arithmetic and relational operators. In: IIUM Press, ISBN: 9789674180867, pp. 33-38
2011 Arithmetic expressions and data types in C++ . In: IIUM Press, ISBN: 9789674180904, pp. 1-3
2011 Arrays . In: IIUM Press, ISBN: 9789674180904, pp. 119-125
2011 Arrays in Java. In: IIUM Press, ISBN: 9789674180867, pp. 105-110
2011 Basic disk management. In: IIUM Press, ISBN: 9789674180850, pp. 135-140
2011 Basic operating system setting. In: IIUM Press, ISBN: 9789674180850, pp. 81-86
2011 Basic storage management. In: IIUM Press, ISBN: 9789674180850, pp. 113-118
2011 Basic text effects. In: IIUM Press, ISBN: 9789674180850, pp. 205-212
2011 Binary search. In: IIUM Press, ISBN: 9789674180904, pp. 189-197
2011 Bitwise operators and type casting . In: IIUM Press, ISBN: 9789674180867, pp. 45-50
2011 Bubble sort algorithm. In: IIUM Press, ISBN: 9789674180904, pp. 161-166
2011 C++ references. In: IIUM Press, ISBN: 9789674180904, pp. 223-227
2011 Call-by-value and reference . In: IIUM Press, ISBN: 9789674180904, pp. 91-97
2011 Cascade style sheets. In: IIUM Press, ISBN: 9789674180850, pp. 147-155
2011 Class-A amplifier . In: IIUM Press, ISBN: 9789674181161, pp. 87-91
2011 Class-B power amplifier . In: IIUM Press, ISBN: 9789674181161, pp. 92-96
2011 Codebook excited linear predictive coding. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 18-21
2011 Common collector transistor amplifier . In: IIUM Press, ISBN: 9789674181161, pp. 78-81
2011 Common emitter amplifier with fixed bias . In: IIUM Press, ISBN: 9789674181161, pp. 69-74
2011 Common emitter amplifier with self bias . In: IIUM Press, ISBN: 9789674181161, pp. 75-77
2011 Comparator. In: IIUM Press, ISBN: 9789674181161, pp. 121-122
2011 Comparison between different class types. In: IIUM Press, ISBN: 9789674180867, pp. 207-213
2011 Compiling and executing Java code. In: IIUM Press, ISBN: 9789674180867, pp. 21-26
2011 Concept of frames discarding and multiplexing efficiency. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 84-88
2011 Conditional statements . In: IIUM Press, ISBN: 9789674180867, pp. 51-54
2011 Const correctness. In: IIUM Press, ISBN: 9789674180904, pp. 229-234
2011 Constructors. In: IIUM Press, ISBN: 9789674180867, pp. 141-146
2011 Control panel and screen savers. In: IIUM Press, ISBN: 9789674180850, pp. 65-72
2011 Control panel of an oscilloscope. In: IIUM Press, ISBN: 9789674181161, pp. 29-33
2011 Cyclic frame discarding multiplexer design. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 102-105
2011 Darlington common emitter . In: IIUM Press, ISBN: 9789674181161, pp. 82-86
2011 Decision making: If-else statements and relational operators . In: IIUM Press, ISBN: 9789674180904, pp. 17-24
2011 Design of a low bit rate STDM multiplexing. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 64-67
2011 Differentiator. In: IIUM Press, ISBN: 9789674181161, pp. 115-120
2011 Digital multiplexing techniques. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 5-9
2011 Discontinuous transmission and multiplexing. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 33-35
2011 Disk management. In: IIUM Press, ISBN: 9789674180850, pp. 141-146
2011 Do-While loops. In: IIUM Press, ISBN: 9789674180867, pp. 79-83
2011 DSI advantage capability of LFR. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 80-83
2011 Dynamic talker activity analysis. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 73-79
2011 Energy ad a criterion for frame discarding and multiplexing efissiency. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 89-91
2011 Energy threshold sensitivity for frame loss. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 113-118
2011 Exception handling. In: IIUM Press, ISBN: 9789674180867, pp. 215-222
2011 Exercise of array. In: IIUM Press, ISBN: 9789674180904, pp. 127-135
2011 Familiarization with multimeter . In: IIUM Press, ISBN: 9789674181161, pp. 1-5
2011 Familiarization with oscilloscope. In: IIUM Press, ISBN: 9789674181161, pp. 13-17
2011 Firmware program. In: IIUM Press, ISBN: 9789674180850, pp. 17-22
2011 Folder and directory. In: IIUM Press, ISBN: 9789674180850, pp. 47-53
2011 For loops. In: IIUM Press, ISBN: 9789674180867, pp. 85-92
2011 Function pointers. In: IIUM Press, ISBN: 9789674180904, pp. 213-218
2011 Functions . In: IIUM Press, ISBN: 9789674180904, pp. 83-90
2011 Goto statement. In: IIUM Press, ISBN: 9789674180904, pp. 241-247
2011 Graphical user interfaces. In: IIUM Press, ISBN: 9789674180850, pp. 23-30
2011 Handling errors in C++. In: IIUM Press, ISBN: 9789674180904, pp. 249-252
2011 Hardware configuration. In: IIUM Press, ISBN: 9789674180850, pp. 73-79
2011 If-else statements . In: IIUM Press, ISBN: 9789674180867, pp. 55-60
2011 Image and special effects. In: IIUM Press, ISBN: 9789674180850, pp. 199-204
2011 Image clone 1. In: IIUM Press, ISBN: 9789674180850, pp. 181-191
2011 Image clone 2. In: IIUM Press, ISBN: 9789674180850, pp. 193-197
2011 Image editing. In: IIUM Press, ISBN: 9789674180850, pp. 157-164
2011 Image effects. In: IIUM Press, ISBN: 9789674180850, pp. 165-172
2011 Image filtering. In: IIUM Press, ISBN: 9789674180850, pp. 227-232
2011 Image quality improvement. In: IIUM Press, ISBN: 9789674180850, pp. 233-239
2011 Image tool function. In: IIUM Press, ISBN: 9789674180850, pp. 173-179
2011 In-silico drug target design & its approaches . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 15-26
2011 Inner classes. In: IIUM Press, ISBN: 9789674180867, pp. 199-205
2011 Integration of ICT in education : an Islamic perspective.. In: IIUM Press, ISBN: 978-967-418-105-5, pp. 61-71
2011 Integrator. In: IIUM Press, ISBN: 9789674181161, pp. 111-114
2011 Interfaces. In: IIUM Press, ISBN: 9789674180867, pp. 245-257
2011 Interfaces and protocols. In: IIUM Press, ISBN: 9789674180850, pp. 9-16
2011 Internal structure of computer systems. In: IIUM Press, ISBN: 9789674180850, pp. 1-8
2011 Introduction . In: IIUM Press, ISBN: 9789674180904, pp. 1-3
2011 Introduction to data types in Java. In: IIUM Press, ISBN: 9789674180867, pp. 27-32
2011 Introduction to Java. In: IIUM Press, ISBN: 9789674180867, pp. 15-20
2011 Inverting amplifier . In: IIUM Press, ISBN: 9789674181161, pp. 101-104
2011 Iterative structures . In: IIUM Press, ISBN: 9789674180904, pp. 39-48
2011 Linear predictive coding of speech. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 15-17
2011 Linear searching. In: IIUM Press, ISBN: 9789674180904, pp. 179-188
2011 Local block and static block. In: IIUM Press, ISBN: 9789674180867, pp. 231-235
2011 Logical drive. In: IIUM Press, ISBN: 9789674180850, pp. 119-125
2011 Logical operators and switch statements. In: IIUM Press, ISBN: 9789674180904, pp. 25-31
2011 Loop pitfalls and exercise. In: IIUM Press, ISBN: 9789674180867, pp. 93-97
2011 Loops in Java. In: IIUM Press, ISBN: 9789674180867, pp. 73-78
2011 Low bit rate speech coders. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 70-72
2011 Low bit rate speech coding. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 10-11
2011 Low bit rate speech coding standards. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 12-14
2011 Low bit rate speech multiplexer tools. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 31-32
2011 LPC envelope difference criterion and multiplexing efficiency. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 92-94
2011 Measured temporal parameters. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 36-44
2011 Measurement techniques. In: IIUM Press, ISBN: 9789674181161, pp. 39-46
2011 Method overloading and overriding. In: IIUM Press, ISBN: 9789674180867, pp. 185-190
2011 Methods of string class. In: IIUM Press, ISBN: 9789674180867, pp. 127-134
2011 Modifiers for class data. In: IIUM Press, ISBN: 9789674180867, pp. 191-197
2011 Molecular docking . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 37-44
2011 More on const keywords. In: IIUM Press, ISBN: 9789674180904, pp. 235-239
2011 More on functions. In: IIUM Press, ISBN: 9789674180904, pp. 99-110
2011 Multi-pulse residual excitation model (MP-PRE). In: IIUM Press, ISBN: 978-967-418-190-1, pp. 26-30
2011 Multiple classes. In: IIUM Press, ISBN: 9789674180867, pp. 177-184
2011 Multiplexing and operational scenarios. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 68-69
2011 Nested loops. In: IIUM Press, ISBN: 9789674180867, pp. 99-104
2011 Network security setting. In: IIUM Press, ISBN: 9789674180850, pp. 99-106
2011 Networking issue. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 95-101
2011 Object and classes. In: IIUM Press, ISBN: 9789674180867, pp. 135-140
2011 Object oriented programming. In: IIUM Press, ISBN: 9789674180904, pp. 143-152
2011 Ohm's law . In: IIUM Press, ISBN: 9789674181161, pp. 60-61
2011 Operation of an oscilloscope. In: IIUM Press, ISBN: 9789674181161, pp. 34-38
2011 Packet loss and frame substitution techniques. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 54-59
2011 Pointers. In: IIUM Press, ISBN: 9789674180904, pp. 203-211
2011 Polymorphism and virtual functions. In: IIUM Press, ISBN: 9789674180904, pp. 219-221
2011 Post-test and nested loops . In: IIUM Press, ISBN: 9789674180904, pp. 73-82
2011 Probes. In: IIUM Press, ISBN: 9789674181161, pp. 23-28
2011 Procedure of soldering iron practice . In: IIUM Press, ISBN: 9789674181161, pp. 56-59
2011 Protection mechanisms using LSB and MD5 . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 85-98
2011 Protection mechanisms using MD5 and Base64. In: IIUM Press, ISBN: 978-967-418-107-9, pp. 59-69
2011 Pulse residual excited linear prediction. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 22-25
2011 Quality assessments in multiplexing. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 45-46
2011 Read data from a file. In: IIUM Press, ISBN: 9789674180904, pp. 137-141
2011 Relational and logical operators. In: IIUM Press, ISBN: 9789674180867, pp. 39-44
2011 Resistor color codes . In: IIUM Press, ISBN: 9789674181161, pp. 47-51
2011 Return statement. In: IIUM Press, ISBN: 9789674180867, pp. 163-167
2011 Review of arrays. In: IIUM Press, ISBN: 9789674180904, pp. 167-177
2011 Review of iterative structures . In: IIUM Press, ISBN: 9789674180904, pp. 63-72
2011 Review of variables, formatting. In: IIUM Press, ISBN: 9789674180904, pp. 59-61
2011 Review, summary & building skill . In: IIUM Press, ISBN: 9789674180904, pp. 33-37
2011 Security risk of ATM systems, case of study . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 129-138
2011 Selection sorting. In: IIUM Press, ISBN: 9789674180904, pp. 153-159
2011 Sending the output to a print file . In: IIUM Press, ISBN: 9789674180904, pp. 11-16
2011 Short cut and hard drive. In: IIUM Press, ISBN: 9789674180850, pp. 31-38
2011 Signals . In: IIUM Press, ISBN: 9789674181161, pp. 18-22
2011 Simulation of speech activities using Markov Model. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 47-53
2011 Soldering iron practice . In: IIUM Press, ISBN: 9789674181161, pp. 52-55
2011 Speech frame sensitivity based on mean square error criterion. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 106-112
2011 Speech quality for energy criterion in multiplexing. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 119-123
2011 Speech quality for LPC envelope criterion. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 124-126
2011 Speech quality in lossy multiplexing. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 60-63
2011 Static: the multipurpose keyword. In: IIUM Press, ISBN: 9789674180904, pp. 253-255
2011 Storage management. In: IIUM Press, ISBN: 9789674180850, pp. 127-134
2011 Strings. In: IIUM Press, ISBN: 9789674180867, pp. 119-125
2011 Structures (struct) and files . In: IIUM Press, ISBN: 9789674180904, pp. 111-118
2011 Subtractor or differential amplifier . In: IIUM Press, ISBN: 9789674181161, pp. 108-110
2011 Summing amplifier . In: IIUM Press, ISBN: 9789674181161, pp. 105-107
2011 Switch statement . In: IIUM Press, ISBN: 9789674180867, pp. 67-72
2011 Task scheduling. In: IIUM Press, ISBN: 9789674180850, pp. 107-112
2011 Text animation. In: IIUM Press, ISBN: 9789674180850, pp. 213-219
2011 Text effects. In: IIUM Press, ISBN: 9789674180850, pp. 221-226
2011 The do-while loop . In: IIUM Press, ISBN: 9789674180904, pp. 55-57
2011 The for loop . In: IIUM Press, ISBN: 9789674180904, pp. 49-53
2011 The If-Else-If statements . In: IIUM Press, ISBN: 9789674180867, pp. 61-66
2011 The use of genetic algorithm in autonomous robot navigation . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 3-13
2011 The use of genetic algorithm in improving medical image segmentation techniques . In: IIUM Press, ISBN: 978-967-418-107-9, pp. 45-55
2011 Throw & throws keyword. In: IIUM Press, ISBN: 9789674180867, pp. 223-229
2011 Transmission bandwidth efficiency enhancement techniques. In: IIUM Press, ISBN: 978-967-418-190-1, pp. 1-4
2011 User defined methods. In: IIUM Press, ISBN: 9789674180867, pp. 147-154
2011 Using the multi-meter for Ohm's law . In: IIUM Press, ISBN: 9789674181161, pp. 62-64
2011 Using the multimeter . In: IIUM Press, ISBN: 9789674181161, pp. 6-12
2011 Vector class. In: IIUM Press, ISBN: 9789674180904, pp. 199-202
2011 Voltage divider rule (VDR). In: IIUM Press, ISBN: 9789674181161, pp. 65-68
2011 Voltage follower. In: IIUM Press, ISBN: 9789674181161, pp. 97-100
2011 Windows explorer. In: IIUM Press, ISBN: 9789674180850, pp. 39-46
2011 Windows installation. In: IIUM Press, ISBN: 9789674180850, pp. 87-98
2011 Working with classes. In: IIUM Press, ISBN: 9789674180867, pp. 169-175