Staff Directory


Adamu Abubakar Ibrahim

Academic Qualification

  • Information and Communication Technology - Doctor of Philosophy, International Islamic University Malaysia
  • Crytography, Steganography, and Watermarking - Masters Degree, Bayero University
  • Database system and DBMS - Post Graduate Diploma, Bayero University
  • Geography - Bachelor Degree, edu 1 - 1

Adamu Abubakar Ibrahim (Dr.)

Assistant Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY


adamu@iium.edu.my
6433


Expert Profile


Adamu Abubakar Ibrahim is currently an Assistant Professor in the department of Computer Science International Islamic University Malaysia (IIUM). He obtained his BSc (Hon) degree in Geography, PGD, MSc and PhD degrees in Computer Science from Bayero University, Kano, Nigeria and IIUM Malaysia respectively. Dr Adamu is a professional member of Association for Computing Machinery (ACM) and Institute of Electrical and Electronics Engineers (IEEE) since 2014. He is an active CISCO Instructor and a Certified CISCO Professional. He is working in many areas of Computer Applications with emphasis to Computer Network and Computer Network Security, 3D Graphics Artificial Intelligence, Blockchain and ICT for Islam.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Encryption
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Multimedia ~ Computer Graphics and Animations
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Firewalls
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Hacking
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Intrusion Detection System
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Malware, Worms and Viruses
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics)
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Machine Learning
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Open System Interconnecting (OSI) Model
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Ethernet Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Data Hiding and Steganography


Professional Membership


  • 2014 - 2020: Member of Profesional Body / Association: (Member), Institute of Electrical and Electronics Engineers (IEEE)


Teaching Responsibilities


COMPUTER MEDIATED COMMUNICATION 2018/2019 2017/2018 2019/2020
COMPUTER NETWORKING 2019/2020 2020/2021 2017/2018 2016/2017 2021/2022 2018/2019
DATA COMMUNICATION IN BUSINESS 2015/2016 2012/2013
DATA MANAGEMENT 2016/2017
DATA STRUCTURE & ALGORITHM 2014/2015
DATA STRUCTURED & ALGORITHM 2014/2015
FINAL YEAR PROJECT 2018/2019 2016/2017 2017/2018
FINAL YEAR PROJECT I 2015/2016 2017/2018 2014/2015
FINAL YEAR PROJECT II 2015/2016 2019/2020 2017/2018 2014/2015
FOUNDATION OF QUANTITATIVE ANALYSIS 2015/2016
INDUSTRIAL ATTACHMENT 2015/2016 2017/2018 2016/2017 2014/2015
INFORMATION RESOURCE AND STRATEGY MANAGEMENT 2014/2015 2013/2014
INFORMATION RETRIEVAL TECHNOLOGIES 2015/2016 2014/2015 2013/2014
MANAGEMENT INFORMATION SYSTEM 2014/2015
OPERATING SYSTEM 2016/2017
OPERATING SYSTEM 2014/2015
WEB PROGRAMMING II 2011/2012 2012/2013


Research Projects


Completed
2016 - 2019 A Structured Large Data Volume Heterogeneity with Minimal Incompleteness in a Big Data Analytics
2015 - 2019 A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems
2015 - 2018 An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment
2014 - 2019 User Awareness on the Authenticity of Mobile Quran
2013 - 2016 Subjective Assessment Model of the Quranic Audio Watermarking
On-Going
2018 - Present Novel Over-sampling Methods for Classification of Quranic Topics
2017 - Present A semantic framework remodeling on GPS mobile outdoor navigation for blind pedestrians


Award & Recognition


31 Oct, 2020 Best Paper Award - Universiti Putra Malaysia (UPM) National
06 May, 2020 CCNA v7 Bridging Course Cisco - MDEC National
07 Feb, 2020 CCNA Cyber Ops Instructor Training Course - UMP National
01 Nov, 2019 CCENT 1: Routing & Switching: Train the Trainer Program - UNIKL National
04 Sep, 2019 CCENT 1 ITN: Train the Trainer Program - UNIKL National
26 Jul, 2019 Oracle Database Design & Programming with SQL: Premier-Pride Challenge 2019 - MDEC National
19 Jul, 2019 Oracle Java Fundamentals & Java Programming: Premier-Pride Challenge 2019 - MDEC National
17 Nov, 2017 Special Recognition Award - KICT University


Publications


Article

2021 Emoji's multi-interpretation effect on the intended emotion. International Journal on Perceptive and Cognitive Computing (IJPCC), 7 (1) pp. 92-98
2021 EXAMINING THE FACTORS INFLUENCING THE SUCCESS OF MOBILE MONEY IN AFGHANISTAN. Journal of Information Systems and Digital Technologies, 3 (1) pp. 40-64
2021 Subscribers' expectations of internet speed for multiplayer online battle arena (MOBA) game. International Journal on Perceptive and Cognitive Computing (IJPCC), 7 (1) pp. 1-7
2021 The internet of everything from Islamic perspective. International Journal of Perceptive and Cognitive Computing (IJPCC), 7 (1) pp. 66-71
2021 The static performance effect of hybrid-hierarchical interconnection by shifted completely connected network. IEEE, 9 () pp. 99249-99265
2021 Trust based security model for cloud systems in an organization. Journal of Information Systems and Digital Technologies, 3 (2) pp. 50-67
2020 AI-based techniques for DDoS Attack Detection in WSN: a systematic literature review. Journal of Computer Science, 16 (6) pp. 848-855
2020 Assessment of the influence of ICT facilities for sustainability of modern teaching excellence in education. International Journal on Perceptive and Cognitive Computing, 6 (1) pp. 28-36
2020 DDoS mitigation: a review of content delivery network and its DDoS defense techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 67-76
2020 Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8 () pp. 197554-197566
2020 End-to-end fully-informed network nodes associated with 433 MHz outdoor propagation environment. International Journal of Computing and Digital Systems, () pp.
2020 Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications, 4 (5) pp. 1-12
2020 Factors influencing adoption of cryptocurrency-based transaction from an Islamic perspective. Global Journal of Computer Science and Technology, 20 (4) pp. 21-32
2020 Internet of things: ideological prospects and its social implication to the Muslim community. International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 47-52
2020 Islamic approach toward purification of transaction with cryptocurrency. Journal of Theoretical and Applied Information Technology, 98 (6) pp. 1050-1067
2020 Machine translation in natural language processing by implementing artificial neural network modelling techniques: an Analysis. International Journal on Perceptive and Cognitive Computing, 6 (1) pp. 9-18
2020 Understanding Muslims self-presentation strategies in online dating. International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 81-89
2020 Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming. IEEE Access, 8 () pp. 83155-83166
2019 Cotton crop cultivation oriented semantic framework based on IoT smart farming application. International Journal of Engineering & Advanced Technology (IJEAT), 8 (3) pp. 480-484
2019 Limit behavior of the trajectories of extreme doubly stochastic quadratic operators on two dimensional simplex. International Journal of Recent Technology and Engineering (IJRTE), () pp.
2019 Recent advances in mobile touch screen security authentication methods: a systematic literature review. Computers & Security, 85 () pp. 1-24
2019 Rift: a high-performance consensus algorithm for Consortium Blockchain. International Journal of Recent Technology and Engineering, 7 (6S) pp. 989-997
2019 Sensor enhanced health information systems: issues and challenges. International Journal of Interactive Mobile Technologies, 13 (1) pp. 99-114
2019 The connectivity and the static-cost-effective analysis of a shifted completely connected network. International Journal of Computational Intelligence Studies, 8 (1/2) pp. 158-175
2019 Users perception of cryptocurrency system application from the Islamic views. International Journal on Islamic Applications in Computer Science And Technology, 7 (1) pp. 13-25
2018 BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network. International Journal of Engineering & Technology, 7 (4) pp. 888-892
2018 Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology, 96 (6) pp. 1633 -1646
2018 Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research, 8 (1) pp. 49-61
2018 Small and medium-sized enterprise: prioritization of Internet bandwidth needs for business purposes. International Journal of Advanced Science and Technology, 116 () pp. 151-166
2017 A Review on mobile SMS Spam filtering techniques. IEEE Access, 5 () pp. 15650-15666
2017 A review on soft set-based parameter reduction and decision making. IEEE ACCESS, 5 () pp. 4671-4689
2017 Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS, 5 () pp. 480-500
2017 Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm. Applied Soft Computing, 61 () pp. 149-173
2017 CPU scheduling with a round Robin algorithm based on an effective time slice. Journal of Information Processing Systems, 13 (4) pp. 941-950
2017 Dynamics of watermark position in audio watermarked files using neural networks. Applied Mathematics & Information Sciences, 11 (3) pp. 703-715
2017 Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology, 5 (2) pp. 26-36
2017 Neural networks optimization through genetic algorithm searches: A review. Applied Mathematics and Information Sciences, 11 (6) pp. 1543-1564
2017 Online fake news detection algorithm. Journal of Theoretical and Applied Information Technology, 95 (17) pp. 4114-4122
2017 Soft computing approach for predicting OPEC countries’ oil consumption. International Journal of Oil, Gas and Coal Technology, 15 (3) pp. 298-316
2017 The dynamics of data packet in transmission session. IEEE ACCESS, 5 () pp. 4329-4339
2016 A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm. Applied Soft Computing, 48 (November 2016) () pp. 50-58
2016 A review on artificial intelligence methodologies for the forecasting of crude oil price. Intelligent Automation & Soft Computing, 22 (3) pp. 449-462
2016 A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid. International Journal of Interactive Mobile Technologies, 10 (3) pp. 4-10
2016 An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus, 5 (1) pp. 868-1-868-25
2016 Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia. International Journal of Advanced Research, 4 (1) pp. 1443-1450
2016 Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm. International Review on Computers and Software (IRECOS), 11 (9) pp. 752-763
2016 Non-contact electrocardiogram (ECG) smart chair for ST segment elevation myocardial infarction detect. Journal of Theoretical and Applied Information Technology, 84 (3) pp. 315-320
2016 Studying the effect of training Levenberg Marquardt neural network by using hybrid meta-heuristic algorithms. Journal of Computational and Theoretical Nanoscience, 13 (1) pp. 450-460
2016 Utilising key climate element variability for the prediction of future climate change using a support vector machine model. International Journal of Global Warming, 9 (2) pp. 129-151
2016 Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science, 10 (2) pp. 34-51
2015 A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Computer Science, 62 () pp. 221-227
2015 An appraisal of Malaysian hospital websites as a new media tool for improving healthcare information: a systematic review. Australian Journal of Basic and Applied Sciences, 9 (2) pp. 151-156
2015 Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm. PLoS ONE, 10 (8) pp. 1-21
2015 Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology, 71 (1) pp. 87-96
2015 Intelligent decision support systems for oil price forecasting. International Journal of Information Science and Management (IJISM), Spec. () pp. 47-59
2015 Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences, 9 (5) pp. 2703-2714
2015 Malaria severity classification through Jordan-Elman neural network based on features extracted from thick blood smear. Neural Network World , 5 (15) pp. 565-584
2015 Optimization of neural network using cuckoo search for the classification of diabetes. Journal of Computational and Theoretical Nanoscience, 12 (12) pp. 5755-5758
2015 Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences, 9 (6) pp. 3133-3145
2014 A framework for realizing universal standardization for internet of things. Journal of Industrial and Intelligent Information, 2 (2) pp. 147-153
2014 A navigation-aided framework for 3D map views on mobile devices. International Review on Computers and Software (IRECOS), 9 (9) pp. 1605-1611
2014 Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1) pp. 37-43
2014 Empirical investigation of visualization quality for three-dimensional (3d) objects of 3d map on mobile device for navigation aid . Journal of Theoretical and Applied Information Technology, 63 (2) pp. 372-380
2014 Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies, 94 (2) pp. 1-10
2014 Investigating the impact of audience response system on student’s performance outcomes. World Applied Sciences Journal, 32 (7) pp. 1268-1283
2014 Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks. International Review on Computers and Software (I.RE.CO.S.), 9 (11) pp. 1904-1915
2014 Randomized text encryption: a new dimension in cryptography. International Review on Computers and Software (I.RE.CO.S.), 9 (2) pp. 365-373
2014 Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences, 13 (Sp. ed) pp. 75-90
2014 The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology, 2 (4) pp. 23-34
2013 Computational intelligence techniques with application to crude oil price projection: A literature survey from 2001-2012 . Neural Network World: International Journal On Non-Standard Computing And Artificial Intelligence , 23 (6) pp. 523-551
2013 Computational intelligence techniques with application to crude oil price projection: a literature survey from 2001–2012. Neural Network World, 6 (13) pp. 523-551
2013 Effective utilization of 3D representation in mobile device for pedestrian navigation aid. International Journal of Humanities and Social Science, 3 (4) pp. 182-188
2013 Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology, 1 (3) pp. 17-23
2012 3D graphics visualization for interactive mobile users navigation. WSEAS Transactions on Systems , 11 (8) pp. 453-464
Conference or Workshop Item

2021 A framework for adopting blockchain technology in medical health records in Nigeria. In: ICT4M,
2021 Bitcoin Adoption in Banking and Finance: The Critical Factors of its Implementation. In: International Conference on Innovative Research in Engineering and Technology (ICIRET-2021),
2021 The factors influencing the adoption of bitcoin investment during covid-19. In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT,
2020 Real-time video traffic communication over the Internet Protocol (IP) Network. In: 2020 International Conference on Communications, Information System and Computer Engineeringļ¼ˆCISCE 2020),
2019 Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
2019 Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
2019 Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective. In: Computer Vision Conference (CVC) 2019,
2018 An improved chaotic image encryption algorithm. In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018,
2018 Cloud computing platforms for delivering computer science and mathematics instructional course content to learners. In: 3rd IEEE International Conference on Electro-Technology for National Development, NIGERCON 2017,
2018 Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017),
2018 MapReduce a comprehensive review. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE 2018),
2018 Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018),
2018 Window size and round-trip-time in a network transmission session. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2017 Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017),
2017 The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering,
2016 An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015,
2016 Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals. In: 12th International Conference on Computing and Information Technology (IC2 IT),
2016 Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC),
2016 TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 User awareness in the authenticity of mobile Quran apps. In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016),
2016 VisUN-3D: User navigation with visualized 3D maps for mobile users. In: 2016 International Conference on Informatics and Computing (ICIC),
2015 A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
2015 A novel algorithm to detect a QPSK signal with the minimum number of samples. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014),
2015 A review of the applications of bio-inspired flower pollination algorithm. In: 2015 International Conference on Soft Computing and Software Engineering (SCSE'15),
2015 An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014),
2015 An evaluation of mobile Quran apps. In: CHIuXiD 2015 Conference, ACM In Coop International Conference in HCI and UX, Bandung, 8-10 April 2015,
2015 Comparing performances of neural network models built through transformed and original data. In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015,
2015 Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015,
2014 An empirical study of customers’ adoption of mobile money transfer services in Somaliland. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014),
2014 Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT),
2014 Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014),
2014 Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014),
2014 Investigating the act of deception in online-Islamic content. In: 2014 3rd International Conference on User Science and Engineering (i-USEr),
2014 Modified neural network activation function. In: 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology (ICAIET 2014),
2014 Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices. In: CF '14 Proceedings of the 11th ACM Conference on Computing Frontiers,
2014 Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 Text normalization algorithm for facebook chats in Hausa language. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on,
2014 Throughput analysis of TCP congestion control algorithms in a cloud based collaborative virtual environment. In: 2014 First International Conference on Systems Informatics, Modelling and Simulation,
2013 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS),
2013 Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013),
2013 Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA),
2013 Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
Empirical investigation on the barriers of adoption of cryptocurrency-based transaction from an Islamic perspective. In: 8th International Conference on Information and Communication Technology for the Muslim World,
Book Section

2019 A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 639-646
2019 A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption. In: Springer Verlag, ISBN: 978-3-319-69889-2, pp. 1-20
2019 Bio-inspired algorithm optimization of neural network for the prediction of Dubai crude oil price. In: Springer Nature Singapore, ISBN: 978-3-030-17794-2, pp. 151-162
2019 Estimation of Middle-East oil consumption using hybrid meta-heuristic algorithms. In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 139-150
2019 Visualizing pathway on 3D maps for an interactive user navigation in mobile devices. In: IGI Global, ISBN: 978-1522556930, pp. 237-260
2018 A new static cost-effective parameter for interconnection networks of massively parallel computer systems. In: Springer Nature, ISBN: 978-981-13-0513-9 / 978-981-13-0514-6, pp. 147-155
2015 Fundamentals of computer networks: wired/wireless. In: IIUM Press, ISBN: 9789674183134, pp. 1-15
2015 Fundamentals of multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 1-23
2015 Multimedia security and the internet. In: IIUM Press, ISBN: 9789674183134, pp. 48-62
2015 Practices of handling audio. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 126-138
2015 Spread spectrum audio watermarking using vector space projections. In: Springer International Publishing, ISBN: 978-3-319-11218-3, pp. 297-307
2015 Text in multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 64-72
2015 Video. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 139-148
2014 Kernel functions for the support vector machine: comparing performances on crude oil price data. In: Springer International Publishing, ISBN: 9783319076911, pp. 273-281
2014 Usability evaluation of hospital websites in Nigeria: what affects end users’ preferences?. In: Springer International Publishing, ISBN: 978-3-319-07853-3 (P), 978-3-319-07854-0 (O), pp. 430-434
2013 A framework for selecting the optimal technique suitable for application in a data mining task . In: SpringerLink, ISBN: 978-3-642-40860-1 (P), 978-3-642-40861-8 (O), pp. 163-169
2011 Web application development process. In: IIUM Press, ISBN: 978-967-418-112-3, pp. 189-197