Staff Directory

Academic Qualification
- Ph.D in Engineering - Doctor of Philosophy, International Islamic University Malaysia
- Master of Science (Computer & Information Engineering) - Masters Degree, International Islamic University Malaysia
- Bachelor of Computer Science (Hon.) - Bachelor Degree, Universiti Putra Malaysia (UPM)
Rashidah Funke Olanrewaju (Assoc. Prof. Dr.)
Associate Professor
IIUM Gombak Campus
KULLIYYAH OF ENGINEERING
frashidah@iium.edu.my
4502
Expert Profile
Asst. Prof. Dr. Rashidah Funke Olanrewaju, a Nigerian citizen is from Kaduna, Nigeria. She earned her BSc. Hons. Computer Science at University Putra Malaysia, majoring in Software Engineering in 2002, M.Sc. in Computer and Information Engineering, majoring in Information Engineering from International Islamic University Malaysia (IIUM) in 2006.
She earned a Ph.D (Engineering) in August 2011 with specialization in Information Security in Digital Image Processing where she identified watermark embedding strength and developed an intelligent digital watermarking system based on Safe Region of Fast Fourier Transform using the newly identified embedding strength to hide watermark in the Safe Region of host image. She also earned a Postgraduate Diploma in Islamic Studies (DIS) from IIUM in 2001.
She started her professional career as a tutor/demonstrator in the Faculty of Engineering, IIUM in 2003, She became a part time lecturer with the same faculty in 2009. In 2011, she was appointed as a Post - Doctoral Fellow in the Department of Electrical and Computer Engineering, IIUM after completion of her Ph.D research. She served for a year and in 2012 was appointed as Assistant Professor in the same department. She is currently the Secretary General of Software Engineering Research Group SERG and Deputy Secretary General for Department of Electrical and Computer Engineering, Faculty of Engineering, 2012-2014.
She earned a Ph.D (Engineering) in August 2011 with specialization in Information Security in Digital Image Processing where she identified watermark embedding strength and developed an intelligent digital watermarking system based on Safe Region of Fast Fourier Transform using the newly identified embedding strength to hide watermark in the Safe Region of host image. She also earned a Postgraduate Diploma in Islamic Studies (DIS) from IIUM in 2001.
She started her professional career as a tutor/demonstrator in the Faculty of Engineering, IIUM in 2003, She became a part time lecturer with the same faculty in 2009. In 2011, she was appointed as a Post - Doctoral Fellow in the Department of Electrical and Computer Engineering, IIUM after completion of her Ph.D research. She served for a year and in 2012 was appointed as Assistant Professor in the same department. She is currently the Secretary General of Software Engineering Research Group SERG and Deputy Secretary General for Department of Electrical and Computer Engineering, Faculty of Engineering, 2012-2014.
Area of Specialisation
- Engineering Tech ~ Engineering And Technology ~ Electrical and Electronic Engineering ~ Image Processing - Digital image watermarking
- Engineering Tech ~ Engineering And Technology ~ Biomedical Engineering ~ Artificial Intelligent Screening
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
Professional Membership
- 2016 - 2017: Member of Profesional Body / Association, IEEE, WOMEN IN ENGINEERING, MALAYSIA CHAPTER
- 2017 - 2018: Member of Profesional Body / Association: (Executive Committee), IEEE Women in Engineering
Teaching Responsibilities
ADVANCED TOPICS IN SOFTWARE ENGINEERING | 2016/2017 |
ALGORITHMS AND PROGRAMMING | 2017/2018 2016/2017 2015/2016 2014/2015 |
Artificial Intelligence | 2023/2024 |
COMPUTER AND INFORMATION ENG. LAB I | 2018/2019 2017/2018 2016/2017 2015/2016 |
COMPUTER AND INFORMATION ENGINEERING LAB I | 2023/2024 2022/2023 2020/2021 2019/2020 2018/2019 2017/2018 |
COMPUTER ARCHITECTURE AND DESIGN | 2018/2019 2017/2018 2016/2017 2015/2016 2014/2015 2013/2014 2012/2013 |
COMPUTER ARCHITECTURE AND SYSTEM DESIGN | 2023/2024 |
COMPUTER ARCHITECTURE AND SYSTEMS DESIGN | 2023/2024 2022/2023 |
COMPUTER ORGANIZATION AND ARCHITECTURE | 2018/2019 2017/2018 2014/2015 2013/2014 2012/2013 |
CONCEPTUAL ENGINEERING DESIGN | 2023/2024 |
DATA MINING | 2020/2021 2019/2020 |
DATA STRUCTURE AND ALGORITHM DESIGN | 2023/2024 2022/2023 2020/2021 2019/2020 2018/2019 2017/2018 |
FAMILY MANAGEMENT | 2022/2023 2021/2022 |
FAMILY MANAGEMENT & PARENTING | 2020/2021 2019/2020 |
FINAL YEAR PROJECT 1 | 2019/2020 |
FINAL YEAR PROJECT I | 2020/2021 2019/2020 2018/2019 |
FINAL YEAR PROJECT II | 2022/2023 2018/2019 |
NEURAL NETWORKS AND SYSTEMS | 2020/2021 2019/2020 |
OBJECT ORIENTED PROGRAMMING FOR ENGINEERS | 2009/2010 |
PROGRAMMING FOR ENGINEERS | 2012/2013 |
REAL-TIME COMPUTING SYSTEMS | 2017/2018 |
SEMINAR | 2023/2024 2022/2023 2016/2017 2015/2016 2014/2015 |
SOFTWARE ENGINEERING DESIGN | 2021/2022 |
SUSTAINABLE DEVELOPMENT: ISSUES, POLICIES AND PRACTICES | 2020/2021 |
Research Projects
Completed
2020 - 2023 | A Unified Holistic Architectural Framework for IoT Applications using SEaaS |
2020 - 2023 | Comprehensive Tactical Modelling of Node Misbehaviour for Improved Defence of Threat Computing in Mobile IoT Systems using Decision and Game Theory |
2019 - 2023 | Decision and Game Theory based Comprehensive Tactical Modelling of Node Misbehaviour for Threat Computing in MANET based IoT System |
2019 - 2022 | New Non-Invasive Technique via Physiological Signals and Intelligence Machine Learning for Rapid Classification of Stress Level |
2019 - 2023 | The Role of Fintech in attaining Financial Inclusion in selected IDB-Member Countries |
2018 - 2022 | A Novel Pose Estimation Algorithm for Mobile AR via Inertial Sensing and Conditional Density Propagation |
2018 - 2019 | Game Theoretic Approach for Exhaustive Tactical Modelling of Node Misbehavior in Adhoc Networking based IoT Paradigm |
2017 - 2020 | Modeling Novel Maximum power point Tracking Algorithm for Small Scale Wind Turbine System |
2017 - 2018 | Strategic Profiling & Analytic Modelling of Node Misbehavior in MANET based IoT Paradigm |
2016 - 2018 | Multihoming-Based Scheme to Support Mobility Management in NEMO |
2016 - 2018 | Eradicating Multi-Channel Dependency for Authentication and Authorization in Secure E-Banking Applications |
2016 - 2019 | Novel Tactile Sensory Surface Mat with Electrical Stimulation (SMES)for the Prevention of Pressure Ulcers due to Immobility |
2016 - 2018 | Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks Via Game Theory |
2015 - 2018 | An Intelligent method to Optimize Web Cache Replacement algorithm using Neuro-Fuzzy Approach |
2013 - 2015 | Medical Identity Theft in Telemedicine: Solving the Privacy and Security Issues |
2013 - 2016 | Discovering Colossal Closed Itemsets from High Dimensional Datasets |
On-Going
2021 - Present | Investigation of Stress Detection Model based on Speech via Deep Learning Technique |
Award & Recognition
13 Jun, 2013 | Bronze medal, Kulliyyah of Engineering Research and Innovation exhibition (KERIE) - Kulliyyah of Engineering, IIUM. | University |
16 Feb, 2012 | Silver medal - ? Silver Medal: IIUM Research, Invention and Innovation Exhibition IRIIE | University |
04 Feb, 2010 | Bronze Medal: Malaysia Technology Expo MTE, - malaysian Technology Expo | National |
Publications
Article
Conference or Workshop Item
2022 | OVeRS: Online Venue Reservation System for university facilities. In: International Conference on Smart, Secure and Sustainable Nation | S3N’2022, |
2022 | Stress detection based on TEO and MFCC speech features using Convolutional Neural Networks (CNN). In: 2nd International Conference on Computing 2022 (ICOCO 2022), |
2021 | A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications. In: 2021 IEEE 7th International Conference on Smart Instrumentation, Measurement and Applications, |
2021 | Non invasive stress detection method based on discrete wavelet transform and machine learning algorithms. In: 2021 IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), |
2020 | Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC), |
2020 | Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC), |
2020 | Diabetic retinopathy grading using ResNet convolutional neural network. In: 2020 IEEE Conference on Big Data & Analytics, |
2020 | Low cost piezoresistive pressure sensor matrix for pressure ulcer prevention and management. In: 2019 7th International Conference on Mechatronics Engineering (ICOM) 2019, |
2020 | Postgraduate research: sharing international experience. In: NSUK 2020, |
2019 | A cloud-based bus tracking system based on internet-of-things technology. In: 2019 7th International Conference on Mechatronics Engineering (ICOM), |
2019 | Electrical stimulation in combating pressure ulcer for immobilize subjects: a conceptual framework. In: International Conference on Biomedical Engineering, |
2019 | Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms. In: 2nd East Indonesia Conference on Computer and Information Technology, EIConCIT 2018, |
2019 | Offline OTP based solution for secure internet banking access. In: 2018 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), |
2019 | Robust , fast and accurate lane departure warning system using deep learning and mobilenets. In: "7th International Conference on Mechatronics Engineering, ICOM 2019", |
2018 | Class attendance management system using face recognition. In: 7th International Conference on Computer and Communication Engineering, ICCCE 2018, |
2018 | iWalk:intelligent walking stick for visually impaired subjects. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017, |
2018 | LiFi based automated shopping assistance application in IoT. In: 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017, |
2018 | Modeling of ANN to determine optimum adsorption capacity for removal of pollutants in wastewater. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017, |
2018 | Modelling of intelligent intrusion detection system: making a case for snort. In: IEEE Conference on Wireless Sensors, ICWiSe 2017, |
2017 | A study on performance evaluation of conventional cache replacement algorithms: A review. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), |
2017 | An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing(PDGC), |
2017 | Enhancement web proxy cache performance using wrapper feature selection methods with NB and J48. In: 6th International Conference on Mechatronics - ICOM'17, |
2017 | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016, |
2017 | MotionSure: a cloud-based algorithm for detection of injected object in data in motion. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017, |
2017 | STCM: Secured trust-based communication method in vulnerable mobile adhoc network. In: The 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (RoViSP 2016), |
2016 | A novel neuroscience-inspired architecture: for computer vision applications. In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC), |
2016 | Automated bank note identification system for visually impaired subjects in Malaysia. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016), |
2016 | CDR analysis using big data technology. In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015), |
2016 | Development of heuristic task scheduling algorithm in cloud computing. In: 3rd International Conference on ICTs for Education and Training (TICET 2016), |
2016 | I-VRenewal: A cloud based system for VISA renewal: A case study of IIUM. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016), |
2016 | Mobile Heart Rate Detection System (MoHeRDS) for early warning of potentially-fatal heart diseases. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016), |
2016 | Re-emphasizing the dimensions and impacts of complementary IT resources through governance. In: 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M), |
2016 | RFDA: Reliable framework for data administration based on split-merge policy. In: 2016 SAI Computing Conference (SAI), |
2016 | STCM: secured trust-based communication method in vulnerable mobile adhoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, RoViSP 2016, |
2016 | Watermarking in protecting and validating the integrity of digital information: a case study of the holy scripture. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016), |
2015 | An empirical study of the evolution of PHP MVC framework. In: International Conference on Communication and Computer Engineering (ICOCOE 2014), |
2015 | An empirical study of the evolution of PHP MVC framework. In: International Conference on Communication and Computer Engineering (ICOCOE 2014), |
2015 | DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. In: International Conference on Computing Education and Information Technology (ICCEIT 2015) , |
2015 | RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), |
2015 | RAED: Response analysis of educational data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e) , |
2015 | SSM: Secure-Split-Merge data distribution in cloud infrastructure. In: 2015 IEEE Conference on Open Systems (ICOS), |
2014 | A secure authentication scheme for bluetooth connection. In: International Conference on Computer and Communication Engineering (ICCCE 2014), |
2014 | Application of neural networks in early detection and diagnosis of parkinson's disease. In: 2014 International Conference on Cyber and IT Service Management (CITSM), |
2014 | Bandwith conservation framework for mobile cloud computing: challenges and solutions. In: 5th International Conference on Computer & Communication Engineering 2014 (ICCCE 2014), |
2014 | Big data analysis solutions using mapReduce framework. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014), |
2014 | Dearth of information technology governance studies in developing nations: making case for Nigeria. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm. In: 5th International Conference on Computer and Communication Engineering, |
2014 | Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.. In: 4th International Cryptology and Information Security Conference, |
2014 | MARKCLOUD - Software for data confidentiality and security in cloud computing environments. In: 4th International Conference on Industrial Engineering and Operations Management (IEOM) 2014, |
2014 | Qualitative analysis on watermarking algorithm for large resolution camera phone image. In: 5th International Conference on Computer and Communication Engineering (ICCCE2014), |
2014 | r-TOLA: an architecture for real time open learning application for universities. In: International Conference on Computer & Communication Engineering 2014, |
2014 | Robust image watermarking scheme by discrete wavelet transform. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014), |
2013 | Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN). In: 3rd International Conference on Biotechnology (ICBioE'13), |
2012 | An Improved Wavelet Digital Watermarking Software Implementation. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, |
2012 | Computational intelligence: application in digital watermarking. In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012), |
2012 | Development of a scalable video compression algorithm. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, |
2012 | Digital audio watermarking; techniques and applications . In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, |
2012 | Digital watermarking: A counterfeiting and piracy deterrence. In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012, |
2012 | ICT in telemedicine: conquering privacy and security issues in health care services. In: Symposium on IT Governance, Management and Audit, 2012 (SIGMA 2012), |
2012 | Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. In: Proceedings of the International Conference on Mathematical Applications in Engineering (ICMAE 2012), |
2012 | State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, |
2012 | TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID) . In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012), |
2011 | Artificial neural network for modeling coagulant dosing for water treatment plants. In: 2nd International Conference on Biotechnology Engineering (ICBioE 2011), |
2010 | An attack proof intelligent digital watermarking based on safe region of fast fourier transform. In: The 2nd International Conference on Engineering and ICT, |
2010 | Watermarking in safe region of frequency domain using complex-valued neural network. In: International Conference on Computer and Communication Engineering (ICCCE 2010), |
2009 | Image quality assessment of fast fourier transform domain watermarked images. In: International Conference on Rural Information and Communication Technology , |
2009 | State-of-the-art application of artificial neural networks in digital watermarking and the way forward . In: International Conference on Computing & Informatics 2009 (ICOCI 09), |
Book
2017 | Powdered activated carbon for removal of phenol and treatment of palm oil mill final effluent. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-489-6 |
2013 | Conquest XHTML: a programers guide to extensible HyperText Markup Language. Google GRIN Verlag, ISBN: 3656517029, 9783656517023 |