Staff Directory


Adamu Abubakar Ibrahim

Academic Qualification

  • Information and Communication Technology - Doctor of Philosophy, International Islamic University Malaysia
  • Computer Science - Masters Degree, Bayero University
  • Computer Science - Post Graduate Diploma, Bayero University
  • Bsc - Bachelor Degree,

Adamu Abubakar Ibrahim (Assoc. Prof. Dr.)

Associate Professor
IIUM Gombak Campus

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY


adamu@iium.edu.my
6433


Expert Profile


Adamu Abubakar Ibrahim is currently an "Associate Professor" in the department of computer science International Islamic University Malaysia (IIUM). Dr Adamu is working in many areas of Computer Applications with emphasis to Computer Network and Computer Network Security, Artificial Intelligence, Blockchain and 3D Graphics.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Intrusion Detection System
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Hacking
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Malware, Worms and Viruses
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Data Hiding and Steganography
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics)
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Machine Learning
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Ethernet Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Open System Interconnecting (OSI) Model
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Encryption
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Multimedia ~ Computer Graphics and Animations
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Firewalls


Professional Membership


  • 2014 - 2020: Member of Profesional Body / Association: (Member), Institute of Electrical and Electronics Engineers (IEEE)


Teaching Responsibilities


COMPUTER MEDIATED COMMUNICATION 2019/2020 2018/2019 2017/2018
COMPUTER NETWORKING 2023/2024 2022/2023 2021/2022 2020/2021 2019/2020 2018/2019 2017/2018 2016/2017
DATA COMMUNICATION IN BUSINESS 2015/2016 2012/2013
DATA MANAGEMENT 2016/2017
DATA STRUCTURE & ALGORITHM 2014/2015
DATA STRUCTURED & ALGORITHM 2014/2015
FINAL YEAR PROJECT 2018/2019 2017/2018 2016/2017
FINAL YEAR PROJECT I 2017/2018 2015/2016 2014/2015
FINAL YEAR PROJECT II 2019/2020 2017/2018 2015/2016 2014/2015
FOUNDATION OF QUANTITATIVE ANALYSIS 2015/2016
INDUSTRIAL ATTACHMENT 2017/2018 2016/2017 2015/2016 2014/2015
INFORMATION RESOURCE AND STRATEGY MANAGEMENT 2014/2015 2013/2014
INFORMATION RETRIEVAL TECHNOLOGIES 2015/2016 2014/2015 2013/2014
MANAGEMENT INFORMATION SYSTEM 2014/2015
OPERATING SYSTEM 2016/2017
OPERATING SYSTEM 2014/2015
WEB PROGRAMMING II 2012/2013 2011/2012


Supervision


The Factors Influencing The Adoption Of Bitcoin In E-Commerce.
Ph.D Completed 2022 Main Supervisor
Word Sense Disambiguation To Enhanced Natural Language Questions For Pilgrims.
Ph.D Completed 2022 Co-supervisor
An Optimized Medical Images Watermarking Technique Utilizing A Constant Ratio Of Frequency Domain.
Ph.D Completed 2022 Co-supervisor
A Model For A Shariah-Compliant Cryptocurrency Adoption.
Ph.D Completed 2021 Supervisor Supervisory Committee
Prediction Of Sepsis Using Artificial Neural Network And Optimal Brain Surgeon .
Ph.D Completed 2021 Main Supervisor
Towards Automatic Mind Maps Generation Of The Holy Quran: The Case Study Of Surat Al-Baqarah.
Ph.D Completed 2021 Co-supervisor
Performance Optimization Of Wireless Sensor Networks For Multimedia Services Using Priority Schemes.
Ph.D Completed 2020 Member Supervisory Committee
Interoperability-Based Standards For Sensor Enhanced Health Information Systems .
Ph.D Completed 2020 Main Supervisor
Shifted Completely Connected Network (Sccn): Architecture Of Hierarchical Interconnection Network To Improve The Performance Of Massively Parallel Computer Systems.
Ph.D Completed 2020 Main Supervisor
Modelling Effective Utilization Of Ict Resources And Ict Capabilities In Saudi Arabia'S Institution Of Higher Learning.
Ph.D Completed 2019 Main Supervisor
The Distributed System'S Impact On Bitcoin'S Changing Transaction Network.
Ph.D In Progress Main Supervisor
Structuring Large Volume Hetero Geneity In Big Data.
Ph.D In Progress Main Supervisor
The Key Criteria For Networked System-State Of Implementation Of Egovernment In Afghanistan.
Ph.D In Progress Main Supervisor
Multimodal Event Detection In Social Media Using Ensemble Learning.
Ph.D In Progress Co-supervisor
Smeā€™S Digital Transformation Towards Effective Utilization Of Internet Broadband.
Ph.D In Progress Co-supervisor
Proposing Nlp Algorithms For Shariah Screening Platform (Sharsp) .
Master Completed 2024 Co-supervisor
Examining The Impact Of Digitally-Enable Service Delivery Of Agricultural Products And Proposing A Business Model For Fama.
Master Completed 2023 Main Supervisor
Trust Based Security Model For Cloud Systems In An Organization.
Master Completed 2021 Main Supervisor
The Key Cretera For Implementation Of E-Goverment In Afghanistan.
Master Completed 2021 Main Supervisor
Examining The Factors Influencing The Success Of Mobile Money In Afghanistan.
Master Completed 2021 Main Supervisor
The Use Of Robots In Food Industries That Lead To Job Loss..
Master Completed 2021 Main Supervisor
Examining The Behavior And Performance Of Sdn-Enabled Vlan In Switch Network.
Master Completed 2019 Main Supervisor
Electrocardiogram Attribute Extraction Using Big Data Analytics.
Master Completed 2018 Main Supervisor
The Task Oriented Data Packet Transmission For End-To-End Iot Networking.
Master Completed 2018 Main Supervisor
A Centralized, Multi -Nodal Communication Model Associated With Congested Network Environments.
Master Completed 2017 Main Supervisor
Blockchain-Based Model For Deep Packet Inspection System.
Master In Progress Main Supervisor


Research Projects


Completed
2018 - 2023 Novel Over-sampling Methods for Classification of Quranic Topics
2016 - 2019 A Structured Large Data Volume Heterogeneity with Minimal Incompleteness in a Big Data Analytics
2015 - 2019 A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems
2015 - 2018 An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment
2014 - 2019 User Awareness on the Authenticity of Mobile Quran
2013 - 2016 Subjective Assessment Model of the Quranic Audio Watermarking
On-Going
2022 - Present Blockchain-based Model for Deep Packet Inspection System
2017 - Present A semantic framework remodeling on GPS mobile outdoor navigation for blind pedestrians


Award & Recognition


31 Oct, 2020 Best Paper Award - Universiti Putra Malaysia (UPM) National
06 May, 2020 CCNA v7 Bridging Course Cisco - MDEC National
07 Feb, 2020 CCNA Cyber Ops Instructor Training Course - UMP National
01 Nov, 2019 CCENT 1: Routing & Switching: Train the Trainer Program - UNIKL National
04 Sep, 2019 CCENT 1 ITN: Train the Trainer Program - UNIKL National
26 Jul, 2019 Oracle Database Design & Programming with SQL: Premier-Pride Challenge 2019 - MDEC National
19 Jul, 2019 Oracle Java Fundamentals & Java Programming: Premier-Pride Challenge 2019 - MDEC National
17 Nov, 2017 Special Recognition Award - KICT University


Publications


Article

2024 Examining potential threats of eavesdropping in TCP stream of personal interactive transmission session. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (1) pp. 98-104
2024 Streams of data flow in transmission control protocol (TCP) request-response cycle efficiency. International Journal on Perceptive and Cognitive Computing, 10 (1) pp. 79-89
2023 An enhanced predictive analytics model for tax-based operations. International Journal on Perceptive and Cognitive Computing, 9 (2) pp. 44-49
2023 Attacks Notification of Differentiated Services Code Point (DSCP) values modifications. IEEE Access, 11 () pp. 126950-126966
2023 Electronic waste collection incentivization scheme based on the blockchain. Sustainability, 15 (13) pp. 1-29
2023 Email security issues, tools, and techniques used in investigation. Sustainability, 15 (13) pp. 1-28
2023 Non-fungible token based smart manufacturing to scale Industry 4.0 by using augmented reality, deep learning and industrial Internet of Things. International Journal on Perceptive and Cognitive Computing, 9 (2) pp. 62-72
2022 A high static performance hierarchical three-dimensional shifted completely connected network. IEEE Access, 10 () pp. 43812-43836
2022 A new concept of duplicate address detection processes in IPv6 link-local network. International Journal of Innovative Computing, 12 (2) pp. 9-16
2022 Analysis of business intelligence systems transmission session. Journal of Science and Technology, 27 (1) pp. 15-28
2022 Bitcoin investment during Covid-19: the critical factors influencing its adoption. Journal of Information System and Technology Management (JISTM), 7 (25) pp. 1-20
2022 Breast cancer prediction using machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC), 8 (1) pp. 24-28
2022 Business intelligence capabilities and critical success factors in public sector company of Malaysia. Journal of Science and Technology, 27 (1) pp. 29-44
2022 Effective utilization of an Unused Bandwidth in IEEE 802.16 network. Journal of Telecommunication, Electronic and Computer Engineering, 14 (2) pp. 15-22
2022 End-to-end fully-informed network nodes associated with 433 MHz outdoor propagation environment. International Journal of Computing and Digital Systems, 11 (1) pp. 1329-1373
2022 Examining the performance of software defined virtual local area network. International Journal of Innovative Computing, 12 (2) pp. 25-30
2022 Face authentication-based online voting system. International Journal on Perceptive and Cognitive Computing, 8 (1) pp. 19-23
2022 Heart murmur detection using supervised machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC), 8 (2) pp. 25-29
2022 Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model. International Journal of Interactive Mobile Technologies, 16 (22) pp. 75-93
2022 Islamic smart city innovation, concept, application and Shari’ah parameters: a theoretical assessment and technological advancement in artificial intelligence. Global Journal of Researches in Engineering: J General Engineering, 22 (1) pp.
2022 SDN multi-domain supervisory controller with enhanced computational security cunt. Journal of Telecommunication, Electronic and Computer Engineering, 14 (2) pp. 23-29
2022 The effective utilization of internet bandwidth in organizational demand services and applications. Journal of Information and Knowledge Management (JIKM), 12 (1) pp. 140-161
2022 The trade-off between robustness and imperceptibility performance of watermarking technique with DWT and SCHUR decomposition for medical images. Journal of Theoretical and Applied Information Technology, 100 (1) pp. 81-88
2022 The use of robots for delivery of packages in food industries and its impact on job loss. Journal of Information Systems and Digital Technologies, 4 (2) pp. 179-197
2022 Threats from unintentional insiders: an assessment of an organization’s readiness using machine learning. IEEE Access, 10 () pp. 110294 -110308
2021 Breast cancer prediction using machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC), () pp. 1-5
2021 Cryptocurrency adoption in e-payment: barrier of its implementation. Journal of Theoretical and Applied Information Technology, 99 (9) pp. 4461-4481
2021 Emoji's multi-interpretation effect on the intended emotion. International Journal on Perceptive and Cognitive Computing (IJPCC), 7 (1) pp. 92-98
2021 EXAMINING THE FACTORS INFLUENCING THE SUCCESS OF MOBILE MONEY IN AFGHANISTAN. Journal of Information Systems and Digital Technologies, 3 (1) pp. 40-64
2021 SRC voting system with face authentication. International Journal on Perceptive and Cognitive Computing (IJPCC), () pp.
2021 Subscribers' expectations of internet speed for multiplayer online battle arena (MOBA) game. International Journal on Perceptive and Cognitive Computing (IJPCC), 7 (1) pp. 1-7
2021 The internet of everything from Islamic perspective. International Journal of Perceptive and Cognitive Computing (IJPCC), 7 (1) pp. 66-71
2021 The static performance effect of hybrid-hierarchical interconnection by shifted completely connected network. IEEE, 9 () pp. 99249-99265
2021 Trust based security model for cloud systems in an organization. Journal of Information Systems and Digital Technologies, 3 (2) pp. 50-67
2020 AI-based techniques for DDoS Attack Detection in WSN: a systematic literature review. Journal of Computer Science, 16 (6) pp. 848-855
2020 Assessment of the influence of ICT facilities for sustainability of modern teaching excellence in education. International Journal on Perceptive and Cognitive Computing, 6 (1) pp. 28-36
2020 DDoS mitigation: a review of content delivery network and its DDoS defense techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 67-76
2020 Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8 () pp. 197554-197566
2020 Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications, 4 (5) pp. 1-12
2020 Factors influencing adoption of cryptocurrency-based transaction from an Islamic perspective. Global Journal of Computer Science and Technology, 20 (4) pp. 21-32
2020 Internet of things: ideological prospects and its social implication to the Muslim community. International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 47-52
2020 Islamic approach toward purification of transaction with cryptocurrency. Journal of Theoretical and Applied Information Technology, 98 (6) pp. 1050-1067
2020 Machine translation in natural language processing by implementing artificial neural network modelling techniques: an Analysis. International Journal on Perceptive and Cognitive Computing, 6 (1) pp. 9-18
2020 Understanding Muslims self-presentation strategies in online dating. International Journal on Perceptive and Cognitive Computing (IJPCC), 6 (2) pp. 81-89
2020 Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming. IEEE Access, 8 () pp. 83155-83166
2019 Cotton crop cultivation oriented semantic framework based on IoT smart farming application. International Journal of Engineering & Advanced Technology (IJEAT), 8 (3) pp. 480-484
2019 Limit behavior of the trajectories of extreme doubly stochastic quadratic operators on two dimensional simplex. International Journal of Recent Technology and Engineering (IJRTE), () pp.
2019 Recent advances in mobile touch screen security authentication methods: a systematic literature review. Computers & Security, 85 () pp. 1-24
2019 Rift: a high-performance consensus algorithm for Consortium Blockchain. International Journal of Recent Technology and Engineering, 7 (6S) pp. 989-997
2019 Sensor enhanced health information systems: issues and challenges. International Journal of Interactive Mobile Technologies, 13 (1) pp. 99-114
2019 The connectivity and the static-cost-effective analysis of a shifted completely connected network. International Journal of Computational Intelligence Studies, 8 (1/2) pp. 158-175
2019 Users perception of cryptocurrency system application from the Islamic views. International Journal on Islamic Applications in Computer Science And Technology, 7 (1) pp. 13-25
2018 BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network. International Journal of Engineering & Technology, 7 (4) pp. 888-892
2018 Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology, 96 (6) pp. 1633 -1646
2018 Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research, 8 (1) pp. 49-61
2018 Small and medium-sized enterprise: prioritization of Internet bandwidth needs for business purposes. International Journal of Advanced Science and Technology, 116 () pp. 151-166
2017 A Review on mobile SMS Spam filtering techniques. IEEE Access, 5 () pp. 15650-15666
2017 A review on soft set-based parameter reduction and decision making. IEEE ACCESS, 5 () pp. 4671-4689
2017 Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS, 5 () pp. 480-500
2017 Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm. Applied Soft Computing, 61 () pp. 149-173
2017 CPU scheduling with a round Robin algorithm based on an effective time slice. Journal of Information Processing Systems, 13 (4) pp. 941-950
2017 Dynamics of watermark position in audio watermarked files using neural networks. Applied Mathematics & Information Sciences, 11 (3) pp. 703-715
2017 Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology, 5 (2) pp. 26-36
2017 Neural networks optimization through genetic algorithm searches: A review. Applied Mathematics and Information Sciences, 11 (6) pp. 1543-1564
2017 Online fake news detection algorithm. Journal of Theoretical and Applied Information Technology, 95 (17) pp. 4114-4122
2017 Soft computing approach for predicting OPEC countries’ oil consumption. International Journal of Oil, Gas and Coal Technology, 15 (3) pp. 298-316
2017 The dynamics of data packet in transmission session. IEEE ACCESS, 5 () pp. 4329-4339
2016 A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm. Applied Soft Computing, 48 (November 2016) () pp. 50-58
2016 A review on artificial intelligence methodologies for the forecasting of crude oil price. Intelligent Automation & Soft Computing, 22 (3) pp. 449-462
2016 A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid. International Journal of Interactive Mobile Technologies, 10 (3) pp. 4-10
2016 An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus, 5 (1) pp. 868-1-868-25
2016 Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia. International Journal of Advanced Research, 4 (1) pp. 1443-1450
2016 Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm. International Review on Computers and Software (IRECOS), 11 (9) pp. 752-763
2016 Non-contact electrocardiogram (ECG) smart chair for ST segment elevation myocardial infarction detect. Journal of Theoretical and Applied Information Technology, 84 (3) pp. 315-320
2016 Studying the effect of training Levenberg Marquardt neural network by using hybrid meta-heuristic algorithms. Journal of Computational and Theoretical Nanoscience, 13 (1) pp. 450-460
2016 Utilising key climate element variability for the prediction of future climate change using a support vector machine model. International Journal of Global Warming, 9 (2) pp. 129-151
2016 Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science, 10 (2) pp. 34-51
2015 A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Computer Science, 62 () pp. 221-227
2015 An appraisal of Malaysian hospital websites as a new media tool for improving healthcare information: a systematic review. Australian Journal of Basic and Applied Sciences, 9 (2) pp. 151-156
2015 Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm. PLoS ONE, 10 (8) pp. 1-21
2015 Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology, 71 (1) pp. 87-96
2015 Intelligent decision support systems for oil price forecasting. International Journal of Information Science and Management (IJISM), Spec. () pp. 47-59
2015 Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences, 9 (5) pp. 2703-2714
2015 Malaria severity classification through Jordan-Elman neural network based on features extracted from thick blood smear. Neural Network World , 5 (15) pp. 565-584
2015 Optimization of neural network using cuckoo search for the classification of diabetes. Journal of Computational and Theoretical Nanoscience, 12 (12) pp. 5755-5758
2015 Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences, 9 (6) pp. 3133-3145
2014 A framework for realizing universal standardization for internet of things. Journal of Industrial and Intelligent Information, 2 (2) pp. 147-153
2014 A navigation-aided framework for 3D map views on mobile devices. International Review on Computers and Software (IRECOS), 9 (9) pp. 1605-1611
2014 Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1) pp. 37-43
2014 Empirical investigation of visualization quality for three-dimensional (3d) objects of 3d map on mobile device for navigation aid . Journal of Theoretical and Applied Information Technology, 63 (2) pp. 372-380
2014 Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies, 94 (2) pp. 1-10
2014 Investigating the impact of audience response system on student’s performance outcomes. World Applied Sciences Journal, 32 (7) pp. 1268-1283
2014 Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks. International Review on Computers and Software (I.RE.CO.S.), 9 (11) pp. 1904-1915
2014 Randomized text encryption: a new dimension in cryptography. International Review on Computers and Software (I.RE.CO.S.), 9 (2) pp. 365-373
2014 Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences, 13 (Sp. ed) pp. 75-90
2014 The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology, 2 (4) pp. 23-34
2013 Computational intelligence techniques with application to crude oil price projection: A literature survey from 2001-2012 . Neural Network World: International Journal On Non-Standard Computing And Artificial Intelligence , 23 (6) pp. 523-551
2013 Computational intelligence techniques with application to crude oil price projection: a literature survey from 2001–2012. Neural Network World, 6 (13) pp. 523-551
2013 Effective utilization of 3D representation in mobile device for pedestrian navigation aid. International Journal of Humanities and Social Science, 3 (4) pp. 182-188
2013 Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology, 1 (3) pp. 17-23
2012 3D graphics visualization for interactive mobile users navigation. WSEAS Transactions on Systems , 11 (8) pp. 453-464
Conference or Workshop Item

2023 Exploring blockchain for KYC: deepening client understanding. In: 2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE),
2023 Feature selection using generalized linear model for Machine Learning-based sepsis prediction. In: International Conference on Advances in Intelligent Computing and Applications (AICAPS),
2022 Islamic Smart City innovation, concept, application and Shari’ah parameters: a theoretical assessment and technological advancement in Artificial Intelligence. In: Ahlia University Conference on Business and Technology,
2021 A framework for adopting blockchain technology in medical health records in Nigeria. In: ICT4M,
2021 Analysis of watermarking techniques with wavelet and cosine transform for imperceptibility on image. In: 18th International Multi-Conference on Systems, Signals & Devices (SSD) 2021,
2021 Bitcoin Adoption in Banking and Finance: The Critical Factors of its Implementation. In: International Conference on Innovative Research in Engineering and Technology (ICIRET-2021),
2021 Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme. In: 18th IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2021,
2021 The factors influencing the adoption of bitcoin investment during covid-19. In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT,
2020 Analyzing DWT and IWT Techniques for Fitness Evaluation in Watermarking Technique Imperceptibility Performance for Medical Images. In: The 1st International Conference of Science and Technology toward New Normal Era,
2020 Real-time video traffic communication over the Internet Protocol (IP) Network. In: 2020 International Conference on Communications, Information System and Computer Engineeringļ¼ˆCISCE 2020),
2019 Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
2019 Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
2019 Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective. In: Computer Vision Conference (CVC) 2019,
2018 An improved chaotic image encryption algorithm. In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018,
2018 Cloud computing platforms for delivering computer science and mathematics instructional course content to learners. In: 3rd IEEE International Conference on Electro-Technology for National Development, NIGERCON 2017,
2018 Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017),
2018 MapReduce a comprehensive review. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE 2018),
2018 Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018),
2018 Window size and round-trip-time in a network transmission session. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M),
2017 Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017),
2017 The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering,
2016 An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015,
2016 Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals. In: 12th International Conference on Computing and Information Technology (IC2 IT),
2016 Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC),
2016 TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016),
2016 The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015),
2016 User awareness in the authenticity of mobile Quran apps. In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016),
2016 VisUN-3D: User navigation with visualized 3D maps for mobile users. In: 2016 International Conference on Informatics and Computing (ICIC),
2015 A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015),
2015 A novel algorithm to detect a QPSK signal with the minimum number of samples. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014),
2015 A review of the applications of bio-inspired flower pollination algorithm. In: 2015 International Conference on Soft Computing and Software Engineering (SCSE'15),
2015 An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014),
2015 An evaluation of mobile Quran apps. In: CHIuXiD 2015 Conference, ACM In Coop International Conference in HCI and UX, Bandung, 8-10 April 2015,
2015 Comparing performances of neural network models built through transformed and original data. In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015,
2015 Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015,
2014 An empirical study of customers’ adoption of mobile money transfer services in Somaliland. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014),
2014 Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT),
2014 Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014),
2014 Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014),
2014 Investigating the act of deception in online-Islamic content. In: 2014 3rd International Conference on User Science and Engineering (i-USEr),
2014 Modified neural network activation function. In: 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology (ICAIET 2014),
2014 Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices. In: CF '14 Proceedings of the 11th ACM Conference on Computing Frontiers,
2014 Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014 Text normalization algorithm for facebook chats in Hausa language. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on,
2014 Throughput analysis of TCP congestion control algorithms in a cloud based collaborative virtual environment. In: 2014 First International Conference on Systems Informatics, Modelling and Simulation,
2013 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS),
2013 Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013),
2013 Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013),
2013 Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA),
2013 Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),
Empirical investigation on the barriers of adoption of cryptocurrency-based transaction from an Islamic perspective. In: 8th International Conference on Information and Communication Technology for the Muslim World,
Book Section

2019 A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 639-646
2019 A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption. In: Springer Verlag, ISBN: 978-3-319-69889-2, pp. 1-20
2019 Bio-inspired algorithm optimization of neural network for the prediction of Dubai crude oil price. In: Springer Nature Singapore, ISBN: 978-3-030-17794-2, pp. 151-162
2019 Estimation of Middle-East oil consumption using hybrid meta-heuristic algorithms. In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 139-150
2019 Visualizing pathway on 3D maps for an interactive user navigation in mobile devices. In: IGI Global, ISBN: 978-1522556930, pp. 237-260
2018 A new static cost-effective parameter for interconnection networks of massively parallel computer systems. In: Springer Nature, ISBN: 978-981-13-0513-9 / 978-981-13-0514-6, pp. 147-155
2015 Fundamentals of computer networks: wired/wireless. In: IIUM Press, ISBN: 9789674183134, pp. 1-15
2015 Fundamentals of multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 1-23
2015 Multimedia security and the internet. In: IIUM Press, ISBN: 9789674183134, pp. 48-62
2015 Practices of handling audio. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 126-138
2015 Spread spectrum audio watermarking using vector space projections. In: Springer International Publishing, ISBN: 978-3-319-11218-3, pp. 297-307
2015 Text in multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 64-72
2015 Video. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 139-148
2014 Kernel functions for the support vector machine: comparing performances on crude oil price data. In: Springer International Publishing, ISBN: 9783319076911, pp. 273-281
2014 Usability evaluation of hospital websites in Nigeria: what affects end users’ preferences?. In: Springer International Publishing, ISBN: 978-3-319-07853-3 (P), 978-3-319-07854-0 (O), pp. 430-434
2013 A framework for selecting the optimal technique suitable for application in a data mining task . In: SpringerLink, ISBN: 978-3-642-40860-1 (P), 978-3-642-40861-8 (O), pp. 163-169
2011 Web application development process. In: IIUM Press, ISBN: 978-967-418-112-3, pp. 189-197
Monograph

2017 Final Report RAGS14-051-0114- User Awareness on the authenticity of mobile Quran. In: ,