2022 |
A high static performance hierarchical three-dimensional shifted completely connected network.
IEEE Access,
10
()
pp. 43812-43836
|
2022 |
A new concept of duplicate address detection processes in IPv6 link-local network.
International Journal of Innovative Computing,
12
(2)
pp. 9-16
|
2022 |
Analysis of business intelligence systems transmission session.
Journal of Science and Technology,
27
(1)
pp. 15-28
|
2022 |
Bitcoin investment during Covid-19: the critical factors influencing its adoption.
Journal of Information System and Technology Management (JISTM),
7
(25)
pp. 1-20
|
2022 |
Breast cancer prediction using machine learning.
International Journal on Perceptive and Cognitive Computing (IJPCC),
8
(1)
pp. 24-28
|
2022 |
Business intelligence capabilities and critical success factors in public sector company of Malaysia.
Journal of Science and Technology,
27
(1)
pp. 29-44
|
2022 |
Effective utilization of an Unused Bandwidth in IEEE 802.16 network.
Journal of Telecommunication, Electronic and Computer Engineering,
14
(2)
pp. 15-22
|
2022 |
End-to-end fully-informed network nodes associated with 433 MHz outdoor propagation environment.
International Journal of Computing and Digital Systems,
11
(1)
pp. 1329-1373
|
2022 |
Examining the performance of software defined virtual local area network.
International Journal of Innovative Computing,
12
(2)
pp. 25-30
|
2022 |
Face authentication-based online voting system.
International Journal on Perceptive and Cognitive Computing,
8
(1)
pp. 19-23
|
2022 |
Heart murmur detection using supervised machine learning.
International Journal on Perceptive and Cognitive Computing (IJPCC),
8
(2)
pp. 25-29
|
2022 |
Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model.
International Journal of Interactive Mobile Technologies,
16
(22)
pp. 75-93
|
2022 |
Islamic smart city innovation, concept, application and Shari’ah
parameters: a theoretical assessment and technological advancement in artificial intelligence.
Global Journal of Researches in Engineering: J General Engineering,
22
(1)
pp.
|
2022 |
SDN multi-domain supervisory controller with enhanced computational security cunt.
Journal of Telecommunication, Electronic and Computer Engineering,
14
(2)
pp. 23-29
|
2022 |
The effective utilization of internet bandwidth in organizational demand services and applications.
Journal of Information and Knowledge Management (JIKM),
12
(1)
pp. 140-161
|
2022 |
The trade-off between robustness and imperceptibility performance of watermarking technique with DWT and SCHUR decomposition for medical images.
Journal of Theoretical and Applied Information Technology,
100
(1)
pp. 81-88
|
2022 |
The use of robots for delivery of packages in food industries and its impact on job loss.
Journal of Information Systems and Digital Technologies,
4
(2)
pp. 179-197
|
2022 |
Threats from unintentional insiders: an assessment of an organization’s readiness using machine learning.
IEEE Access,
10
()
pp. 110294 -110308
|
2021 |
Breast cancer prediction using machine learning.
International Journal on Perceptive and Cognitive Computing (IJPCC),
()
pp. 1-5
|
2021 |
Cryptocurrency adoption in e-payment: barrier of its implementation.
Journal of Theoretical and Applied Information Technology,
99
(9)
pp. 4461-4481
|
2021 |
Emoji's multi-interpretation effect on the intended emotion.
International Journal on Perceptive and Cognitive Computing (IJPCC),
7
(1)
pp. 92-98
|
2021 |
EXAMINING THE FACTORS INFLUENCING THE SUCCESS OF MOBILE MONEY IN AFGHANISTAN.
Journal of Information Systems and Digital Technologies,
3
(1)
pp. 40-64
|
2021 |
SRC voting system with face authentication.
International Journal on Perceptive and Cognitive Computing (IJPCC),
()
pp.
|
2021 |
Subscribers' expectations of internet speed for multiplayer online battle arena (MOBA) game.
International Journal on Perceptive and Cognitive Computing (IJPCC),
7
(1)
pp. 1-7
|
2021 |
The internet of everything from Islamic perspective.
International Journal of Perceptive and Cognitive Computing (IJPCC),
7
(1)
pp. 66-71
|
2021 |
The static performance effect of hybrid-hierarchical interconnection by shifted completely connected network.
IEEE,
9
()
pp. 99249-99265
|
2021 |
Trust based security model for cloud systems in an organization.
Journal of Information Systems and Digital Technologies,
3
(2)
pp. 50-67
|
2020 |
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review.
Journal of Computer Science,
16
(6)
pp. 848-855
|
2020 |
Assessment of the influence of ICT facilities for sustainability of modern teaching excellence in education.
International Journal on Perceptive and Cognitive Computing,
6
(1)
pp. 28-36
|
2020 |
DDoS mitigation: a review of content delivery network and its DDoS defense techniques.
International Journal on Perceptive and Cognitive Computing (IJPCC),
6
(2)
pp. 67-76
|
2020 |
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach.
IEEE Access,
8
()
pp. 197554-197566
|
2020 |
Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things.
Journal of Physics Communications,
4
(5)
pp. 1-12
|
2020 |
Factors influencing adoption of cryptocurrency-based transaction from an Islamic perspective.
Global Journal of Computer Science and Technology,
20
(4)
pp. 21-32
|
2020 |
Internet of things: ideological prospects and its social implication to the Muslim community.
International Journal on Perceptive and Cognitive Computing (IJPCC),
6
(2)
pp. 47-52
|
2020 |
Islamic approach toward purification of transaction with cryptocurrency.
Journal of Theoretical and Applied Information Technology,
98
(6)
pp. 1050-1067
|
2020 |
Machine translation in natural language processing by implementing artificial neural network modelling techniques: an Analysis.
International Journal on Perceptive and Cognitive Computing,
6
(1)
pp. 9-18
|
2020 |
Understanding Muslims self-presentation strategies in online dating.
International Journal on Perceptive and Cognitive Computing (IJPCC),
6
(2)
pp. 81-89
|
2020 |
Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming.
IEEE Access,
8
()
pp. 83155-83166
|
2019 |
Cotton crop cultivation oriented semantic framework based on IoT smart farming application.
International Journal of Engineering & Advanced Technology (IJEAT),
8
(3)
pp. 480-484
|
2019 |
Limit behavior of the trajectories of extreme doubly stochastic quadratic operators on two dimensional simplex.
International Journal of Recent Technology and Engineering (IJRTE),
()
pp.
|
2019 |
Recent advances in mobile touch screen security authentication methods: a systematic literature review.
Computers & Security,
85
()
pp. 1-24
|
2019 |
Rift: a high-performance consensus algorithm for Consortium Blockchain.
International Journal of Recent Technology and Engineering,
7
(6S)
pp. 989-997
|
2019 |
Sensor enhanced health information systems: issues and challenges.
International Journal of Interactive Mobile Technologies,
13
(1)
pp. 99-114
|
2019 |
The connectivity and the static-cost-effective analysis
of a shifted completely connected network.
International Journal of Computational Intelligence Studies,
8
(1/2)
pp. 158-175
|
2019 |
Users perception of cryptocurrency system application from the Islamic views.
International Journal on Islamic Applications in Computer Science And Technology,
7
(1)
pp. 13-25
|
2018 |
BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network.
International Journal of Engineering & Technology,
7
(4)
pp. 888-892
|
2018 |
Critical factors influencing effective of ICT resources and capabilities.
Journal of Theoretical and Applied Information Technology,
96
(6)
pp. 1633 -1646
|
2018 |
Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems.
Journal of Artificial Intelligence and Soft Computing Research,
8
(1)
pp. 49-61
|
2018 |
Small and medium-sized enterprise: prioritization of Internet bandwidth needs for business purposes.
International Journal of Advanced Science and Technology,
116
()
pp. 151-166
|
2017 |
A Review on mobile SMS Spam filtering techniques.
IEEE Access,
5
()
pp. 15650-15666
|
2017 |
A review on soft set-based parameter reduction
and decision making.
IEEE ACCESS,
5
()
pp. 4671-4689
|
2017 |
Advances in teaching and learning on facebook in higher institutions.
IEEE ACCESS,
5
()
pp. 480-500
|
2017 |
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm.
Applied Soft Computing,
61
()
pp. 149-173
|
2017 |
CPU scheduling with a round Robin algorithm based on an effective time slice.
Journal of Information Processing Systems,
13
(4)
pp. 941-950
|
2017 |
Dynamics of watermark position in audio watermarked
files using neural networks.
Applied Mathematics & Information Sciences,
11
(3)
pp. 703-715
|
2017 |
Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir.
International Journal on Islamic Applications in Computer Science And Technology,
5
(2)
pp. 26-36
|
2017 |
Neural networks optimization through genetic algorithm searches: A review.
Applied Mathematics and Information Sciences,
11
(6)
pp. 1543-1564
|
2017 |
Online fake news detection algorithm.
Journal of Theoretical and Applied Information Technology,
95
(17)
pp. 4114-4122
|
2017 |
Soft computing approach for predicting OPEC countries’ oil consumption.
International Journal of Oil, Gas and Coal Technology,
15
(3)
pp. 298-316
|
2017 |
The dynamics of data packet in transmission session.
IEEE ACCESS,
5
()
pp. 4329-4339
|
2016 |
A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm.
Applied Soft Computing,
48 (November 2016)
()
pp. 50-58
|
2016 |
A review on artificial intelligence methodologies for the forecasting of crude oil price.
Intelligent Automation & Soft Computing,
22
(3)
pp. 449-462
|
2016 |
A support vector machine classification of
computational capabilities of 3D map on mobile
device for navigation aid.
International Journal of Interactive Mobile Technologies,
10
(3)
pp. 4-10
|
2016 |
An intermediate significant bit (ISB) watermarking technique using neural networks.
SpringerPlus,
5
(1)
pp. 868-1-868-25
|
2016 |
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia.
International Journal of Advanced Research,
4
(1)
pp. 1443-1450
|
2016 |
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm.
International Review on Computers and Software (IRECOS),
11
(9)
pp. 752-763
|
2016 |
Non-contact electrocardiogram (ECG) smart chair for ST segment elevation myocardial infarction detect.
Journal of Theoretical and Applied Information Technology,
84
(3)
pp. 315-320
|
2016 |
Studying the effect of training Levenberg
Marquardt neural network by using hybrid
meta-heuristic algorithms.
Journal of Computational and Theoretical Nanoscience,
13
(1)
pp. 450-460
|
2016 |
Utilising key climate element variability for the
prediction of future climate change using a support
vector machine model.
International Journal of Global Warming,
9
(2)
pp. 129-151
|
2016 |
Utilizing modular neural network for prediction of possible
emergencies locations within point of interest of Hajj pilgrimage.
Modern Applied Science,
10
(2)
pp. 34-51
|
2015 |
A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems.
Procedia Computer Science,
62
()
pp. 221-227
|
2015 |
An appraisal of Malaysian hospital websites as a new media tool for improving healthcare information: a systematic review.
Australian Journal of Basic and Applied Sciences,
9
(2)
pp. 151-156
|
2015 |
Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm.
PLoS ONE,
10
(8)
pp. 1-21
|
2015 |
Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection.
Journal of Theoretical and Applied Information Technology,
71
(1)
pp. 87-96
|
2015 |
Intelligent decision support systems for oil price forecasting.
International Journal of Information Science and Management (IJISM),
Spec.
()
pp. 47-59
|
2015 |
Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem .
Applied Mathematics & Information Sciences,
9
(5)
pp. 2703-2714
|
2015 |
Malaria severity classification through Jordan-Elman neural network based on features extracted from thick blood smear.
Neural Network World ,
5
(15)
pp. 565-584
|
2015 |
Optimization of neural network using cuckoo search for the classification of diabetes.
Journal of Computational and Theoretical Nanoscience,
12
(12)
pp. 5755-5758
|
2015 |
Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device.
Applied Mathematics & Information Sciences,
9
(6)
pp. 3133-3145
|
2014 |
A framework for realizing universal standardization for internet of things.
Journal of Industrial and Intelligent Information,
2
(2)
pp. 147-153
|
2014 |
A navigation-aided framework for 3D map views on mobile devices.
International Review on Computers and Software (IRECOS),
9
(9)
pp. 1605-1611
|
2014 |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges.
Journal of Theoretical and Applied Information Technology,
61
(1)
pp. 37-43
|
2014 |
Empirical investigation of visualization quality for
three-dimensional (3d) objects of 3d map on mobile device for navigation aid
.
Journal of Theoretical and Applied Information Technology,
63
(2)
pp. 372-380
|
2014 |
Implementation of server virualization to build energy efficient data centers.
Journal of Power Technologies,
94
(2)
pp. 1-10
|
2014 |
Investigating the impact of audience response system on student’s performance outcomes.
World Applied Sciences Journal,
32
(7)
pp. 1268-1283
|
2014 |
Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks.
International Review on Computers and Software (I.RE.CO.S.),
9
(11)
pp. 1904-1915
|
2014 |
Randomized text encryption: a new dimension in cryptography.
International Review on Computers and Software (I.RE.CO.S.),
9
(2)
pp. 365-373
|
2014 |
Subjective assessment of audio watermarked quran.
Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences,
13
(Sp. ed)
pp. 75-90
|
2014 |
The state of online audio qur'an and its public perception.
International Journal on Islamic Applications in Computer Science And Technology,
2
(4)
pp. 23-34
|
2013 |
Computational intelligence techniques with application to crude oil price projection: A literature survey from 2001-2012 .
Neural Network World: International Journal On Non-Standard Computing And Artificial Intelligence ,
23
(6)
pp. 523-551
|
2013 |
Computational intelligence techniques with application to crude oil price projection: a literature survey from 2001–2012.
Neural Network World,
6
(13)
pp. 523-551
|
2013 |
Effective utilization of 3D representation in mobile device for pedestrian navigation aid.
International Journal of Humanities and Social Science,
3
(4)
pp. 182-188
|
2013 |
Visual interactive Islamic learning system for children.
International Journal on Islamic Applications in Computer Science And Technology,
1
(3)
pp. 17-23
|
2012 |
3D graphics visualization for interactive mobile users navigation.
WSEAS Transactions on Systems ,
11
(8)
pp. 453-464
|
2022 |
Islamic Smart City innovation, concept, application and Shari’ah parameters: a theoretical assessment and technological advancement in Artificial Intelligence.
In: Ahlia University Conference on Business and Technology,
|
2021 |
A framework for adopting blockchain technology in
medical health records in Nigeria.
In: ICT4M,
|
2021 |
Analysis of watermarking techniques with wavelet and cosine transform for imperceptibility on image.
In: 18th International Multi-Conference on Systems, Signals & Devices (SSD) 2021,
|
2021 |
Bitcoin Adoption in Banking and Finance: The Critical Factors of its Implementation.
In: International Conference on Innovative Research in Engineering and Technology (ICIRET-2021),
|
2021 |
Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme.
In: 18th IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2021,
|
2021 |
The factors influencing the adoption of bitcoin investment during covid-19.
In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT,
|
2020 |
Analyzing DWT and IWT Techniques for Fitness Evaluation in Watermarking Technique Imperceptibility Performance for Medical Images.
In: The 1st International Conference of Science and Technology toward New Normal Era,
|
2020 |
Real-time video traffic communication over the Internet Protocol (IP) Network.
In: 2020 International Conference on Communications, Information System and Computer Engineeringļ¼CISCE 2020),
|
2019 |
Hybrid of swarm intelligent algorithms in medical applications.
In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
|
2019 |
Hybrid of swarm intelligent algorithms in medical applications.
In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
|
2019 |
Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective.
In: Computer Vision Conference (CVC) 2019,
|
2018 |
An improved chaotic image encryption algorithm.
In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018,
|
2018 |
Cloud computing platforms for delivering computer science and mathematics instructional course content to learners.
In: 3rd IEEE International Conference on Electro-Technology for National Development, NIGERCON 2017,
|
2018 |
Information-based interactive services and support system.
In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017),
|
2018 |
MapReduce a comprehensive review.
In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE 2018),
|
2018 |
Software defined-network for real-time operations of business intelligence tasks.
In: International Conference on Business, Humanities and Education (ICBHE 2018),
|
2018 |
Window size and round-trip-time in a network transmission session.
In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
|
2017 |
Successful business intelligence system for SME: An
analytical study in Malaysia.
In: International Research and Innovation Summit (IRIS2017),
|
2017 |
The trend of business intelligence adoption and maturity.
In: 2nd International Conference on Computer Science and Engineering,
|
2016 |
An appraisal of online audio Qur'an as a new media tool for civilization.
In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015,
|
2016 |
Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals.
In: 12th International Conference on Computing and Information Technology (IC2 IT),
|
2016 |
Stegano-image as a digital signature to improve security authentication system in mobile computing.
In: 2016 International Conference on Informatics and Computing (ICIC),
|
2016 |
TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems.
In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
|
2016 |
The extreme doubly stochastic quadratic operators on two dimensional simplex.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
|
2016 |
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation.
In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
|
2016 |
User awareness in the authenticity of mobile Quran apps.
In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016),
|
2016 |
VisUN-3D: User navigation with visualized 3D maps for mobile users.
In: 2016 International Conference on Informatics and Computing (ICIC),
|
2015 |
A framework for non-contact ECG signal detection device on smart chair and its implementation.
In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
|
2015 |
A novel algorithm to detect a QPSK signal with the minimum number of samples.
In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014),
|
2015 |
A review of the applications of bio-inspired flower pollination algorithm.
In: 2015 International Conference on Soft Computing and Software Engineering (SCSE'15),
|
2015 |
An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price.
In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014),
|
2015 |
An evaluation of mobile Quran apps.
In: CHIuXiD 2015 Conference, ACM In Coop International Conference in HCI and UX, Bandung, 8-10 April 2015,
|
2015 |
Comparing performances of neural network models
built through transformed and original data.
In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015,
|
2015 |
Mobile Quran app security vulnerabilities.
In: 5th International Conference on Computing and Informatics, ICOCI 2015,
|
2014 |
An empirical study of customers’ adoption of mobile money transfer services in Somaliland.
In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014),
|
2014 |
Automatic face reconstruction system.
In: 2014 6th International Conference on Computer Science and Information Technology (CSIT),
|
2014 |
Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset.
In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014),
|
2014 |
Exploring the challenges of MP3 audio steganography.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
|
2014 |
Investigating how the sources of online audio Qur’an empower listeners.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
|
2014 |
Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm.
In: The First International Conference on Soft Computing and Data Mining (SCDM-2014),
|
2014 |
Investigating the act of deception in
online-Islamic content.
In: 2014 3rd International Conference on User Science and Engineering (i-USEr),
|
2014 |
Modified neural network activation function.
In: 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology (ICAIET 2014),
|
2014 |
Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices.
In: CF '14 Proceedings of the 11th ACM Conference on Computing Frontiers,
|
2014 |
Perceptions of library and information science community towards open source software adoption in libraries of Oman.
In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
|
2014 |
Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models.
In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
|
2014 |
RFID based smart hospital management system: A conceptual framework.
In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
|
2014 |
Text normalization algorithm for facebook chats in Hausa language.
In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on,
|
2014 |
Throughput analysis of TCP congestion control algorithms in a cloud based collaborative virtual environment.
In: 2014 First International Conference on Systems Informatics, Modelling and Simulation,
|
2013 |
3D mobile map visualization concept for remote rendered
dataset.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
|
2013 |
Automatic interactive security monitoring system.
In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS),
|
2013 |
Intelligent system for predicting the price of natural gas based on non-oil commodities.
In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013),
|
2013 |
Investigating digital watermark dynamics on carrier file by feed-forward neural network.
In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
|
2013 |
Investigating the dynamics of watermark features in audio streams.
In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA),
|
2013 |
Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network.
In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
|
|
Empirical investigation on the barriers of adoption of cryptocurrency-based transaction from an Islamic perspective.
In: 8th International Conference on Information and Communication Technology for the Muslim World,
|
2019 |
A framework for non-contact ECG signal detection device on smart chair and its implementation.
In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 639-646
|
2019 |
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption.
In: Springer Verlag, ISBN: 978-3-319-69889-2, pp. 1-20
|
2019 |
Bio-inspired algorithm optimization of neural network for the prediction of Dubai crude oil price.
In: Springer Nature Singapore, ISBN: 978-3-030-17794-2, pp. 151-162
|
2019 |
Estimation of Middle-East oil
consumption using hybrid
meta-heuristic algorithms.
In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 139-150
|
2019 |
Visualizing pathway on 3D maps for an interactive user navigation in mobile devices.
In: IGI Global, ISBN: 978-1522556930, pp. 237-260
|
2018 |
A new static cost-effective parameter for interconnection networks of massively parallel computer systems.
In: Springer Nature, ISBN: 978-981-13-0513-9 / 978-981-13-0514-6, pp. 147-155
|
2015 |
Fundamentals of computer networks: wired/wireless.
In: IIUM Press, ISBN: 9789674183134, pp. 1-15
|
2015 |
Fundamentals of multimedia.
In: IIUM Press, ISBN: 978-967-418-312-7, pp. 1-23
|
2015 |
Multimedia security and the internet.
In: IIUM Press, ISBN: 9789674183134, pp. 48-62
|
2015 |
Practices of handling audio.
In: IIUM Press, ISBN: 978-967-418-312-7, pp. 126-138
|
2015 |
Spread spectrum audio watermarking using vector space projections.
In: Springer International Publishing, ISBN: 978-3-319-11218-3, pp. 297-307
|
2015 |
Text in multimedia.
In: IIUM Press, ISBN: 978-967-418-312-7, pp. 64-72
|
2015 |
Video.
In: IIUM Press, ISBN: 978-967-418-312-7, pp. 139-148
|
2014 |
Kernel functions for the support vector machine: comparing performances on crude oil price data.
In: Springer International Publishing, ISBN: 9783319076911, pp. 273-281
|
2014 |
Usability evaluation of hospital websites in Nigeria: what affects end users’ preferences?.
In: Springer International Publishing, ISBN: 978-3-319-07853-3 (P), 978-3-319-07854-0 (O), pp. 430-434
|
2013 |
A framework for selecting the optimal technique suitable for application in a data mining task .
In: SpringerLink, ISBN: 978-3-642-40860-1 (P), 978-3-642-40861-8 (O), pp. 163-169
|
2011 |
Web application development process.
In: IIUM Press, ISBN: 978-967-418-112-3, pp. 189-197
|