Researchers

Researchers

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Asadullah Shah
Professor

Print CV Email Me

Staff Details

  • Engineering Tech ~ Applied Sciences And Technologies ~ Aerospace ~ Advance and Emerging Methods (Including Quantitative Analysis such as Forecasting, Modelling, Inference, Data Mining; Survey Techniques Complex Survey, Rank Set Sampling, Market Survey), and Performance Measurement (Hierarchical Modelling, Data Envelopment Analysis, Stochastic Frontier Analysis and Risk Analysis))
ADVANCED DATA MANAGEMENT 2017/2018 2018/2019 2019/2020
ADVANCED ENTERPRISE INTEGRATION 2018/2019 2019/2020 2020/2021
ANIMATION TECHNIQUE 2012/2013 2013/2014 2014/2015
CREATIVE DESIGN TECHNIQUES 2012/2013 2013/2014 2014/2015 2015/2016
DATA MANAGEMENT 2016/2017
DIGITAL AUDIO AND VIDEO TECHNOLOGY 2018/2019
ENTERPRISE INTEGRATION 2018/2019
FINAL YEAR PROJECT I 2012/2013 2013/2014 2014/2015 2016/2017 2019/2020
FINAL YEAR PROJECT II 2013/2014 2014/2015 2015/2016 2017/2018 2019/2020 2020/2021
ICT RESEARCH METHODS 2017/2018 2019/2020
INDUSTRIAL ATTACHMENT 2010/2011 2011/2012 2015/2016 2016/2017
ISLAMIC WORLDVIEW, IT AND SOCIETY 2016/2017
IT PROJECT AND CHANGE MANAGEMENT 2017/2018
IT SECURITY II 2011/2012 2012/2013
MOBILE COMMUNICATION 2016/2017 2017/2018
MOBILE COMMUNICATIONS AND NETWORKS 2018/2019 2019/2020 2020/2021
OPERATING SYSTEM 2012/2013
PROJECT & CHANGE MANAGEMENT 2016/2017 2017/2018
QUANTITATIVE RESEARCH METHODOLOGY 2013/2014 2014/2015
RESEARCH METHODOLOGY 2017/2018 2018/2019 2019/2020
RESEARCH METHODOLOGY FOR IT 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2017/2018
SIGNALS AND SYSTEMS 2011/2012
WEB PROGRAMMING 2011/2012
WEB PROGRAMMING FUNDAMENTAL 2011/2012 2012/2013
In Progress
2019 - Present Analysis of Video Game Design Styles on Learning Aptitude Using EEG
2015 - Present Re-engineering pre-marriage course learning for JAKIM: an investigation of multimedia lifelong mobile learning experience
Completed
2016 - 2019 Tori-Connected Flattened Butterfly Network (TFBN)
2015 - 2019 Re-engineering pre-marriage course learning for JAKIM: an investigation of multimedia lifelong mobile learning experience
2013 - 2014 Research Methodologies: An Islamic Perspective
2012 - 2016 A novel model of routing protocol for mobile ad hoc networks based on link reliability
2012 - 2016 A Novel Feedback Technique to Detect Unsatisfiable Submodels of UML/OCL Class Diagrams for Verification of UML/OCL Models
2011 - 2012 Mobile Hajj Dictionary (Arabic, Malay and English Based)
2011 - 2011 Research Methodologies : A Practical Approach (KVC Project 2011)
2011 - 2013 RU 2011: On Adverse and Non-Uniform Traffic Patterns on H3DM Network
2011 - 2015 RU 2011: Development of Text Compression Package for Tri-Language Text
Article
2020 Evaluating critical success factors in implementing E-learning system using multicriteria decision-making. PLOS ONE , 15 (5) pp.1-25
2020 A theoretical model of healthcare monitoring surveillance system for patients with severe allergies. international Journal of Advanced and Applied Sciences , 7 (6) pp.69-75
2020 Challenges and limitations in secure software development adoption - a qualitative analysis in Malaysian software industry prospect. Indian journal of Sciences and Technology , 13 (26) pp.2601-2608
2019 Deployment of social nets in multilayer model to identify key individuals using majority voting. Knowledge and Information Systems , 58 (1) pp.113-137
2019 Revised and extended social commerce technology adoption in e-business of Pakistan. International Journal on Perceptive and Cognitive Computing , 5 (2) pp.52-58
2019 A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments. Information , 10 (108) pp.1-34
2019 Big-five personality traits mapped with software development tasks to find most productive software development teams. International Journal of Innovative Technology and exploring Engineering (IJITEE) , 8 (12) pp.965-971
2019 A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder (ASD). Universal Access in the Information Society , 19 (2) pp.213-243
2019 Sliding mode control for 2 degrees of freedom upper limb rehabilitation robotics system under uncertainties. Intentional journal of Engineering and Advanced Technology (IJEAT) , 9 (2) pp.3268-3274
2019 A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder. Universal Access in the Information Society pp.1-31
2019 Key individual identification using dimensional relevance in the stratum of networks. Journal of Intelligent & Fuzzy systems pp.1-15
2019 Predicting most productive requirements elicitation teams using MBTI personality traits model. International Journal of Engineering and Advanced Technology (IJEAT) , 9 (1) pp.3809-3814
2019 Analysis of models for e-commerce adoption factors in developing countries. International Journal on Perceptive and Cognitive Computing (IJPCC) , 5 (2) pp.72-80
2019 A review on energy consumption optimization techniques in IoT based smart building environment. Information , 10 (3) pp.1-34
2019 Effects of socioeconomic characteristics on online purchase intention among Malaysians. Journal of Computational and Theoretical Nanoscience , 16 (3) pp.927-934
2019 Deployment of social nets in multi-layer model to identify Key individuals using majority voting. Knowledge and Information Systems An international Journal , 58 (1) pp.113-137
2019 Competitive algorithms for online conversion problems with interrelated prices. International Journal of Advanced Computer Science and Applications (IJACSA) , 10 (6) pp.582-589
2018 Performance optimization of wireless sensor network for multimedia services. International Journal of Engineering and Technology , 7 (4.15) pp.323-326
2018 Energy efficiency in virtualized data center. International Journal of Engineering & Technology , 7 (4.15) pp.315-317
2018 Performance evaluation of distributed mMulti media wireless sensor network. International Journal of Engineering and Technology , Vol 7 (4.15) pp.318-322
2018 Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation. International Journal of Advanced Computer and Applications , 9 (4) pp.221-229
2018 Visualization representation benefits of pre-requirement specification tractability. International Journal of Engineering & Technology , 7 (2.5 (Special Issue 5)) pp.44-52
2018 Identification of valued users to generate more telecom filigence. Sindh University Research Journal (Science Series) , 50 (3D) pp.224-226
2018 An assessment of proximity technology adoption from a user's perspective. Sindh University Research Journal (Science Series) , 50 (3D) pp.220-223
2018 A review of near field communication process: how do it works?. Sindh University Research Journal (Science Series) , 50 (3D) pp.237-240
2018 Visualization representing benefits of pre-requirement specification traceability. International Journal of Engineering and Technology(UAE) , 7 (2) pp.44-52
2018 Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies. International Journal of Engineering & Technology , 7 (2.34 (Special issue 34)) pp.89-92
2018 Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem. International Journal of control and Automation , 11 (3) pp.35-44
2018 Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review. International Journal of Control and Automation , 11 (2) pp.135-150
2018 A review on optimization of vehicle frontal crashworthiness for passenger safety. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34))
2018 Beyond traditional audits: the implications of information technology on auditing. International Journal of Engineering & Technology (UAE) , 7 (2.34) pp.5-11
2018 Integration social media technology and ethical collaborative learning. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.12-15
2018 An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.16-21
2018 Robotic exoskeleton control for lower limb rehabilitation of knee joint. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.56-59
2018 Near field communication enabled mobile payments: preliminary study. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.60-63
2018 Preliminary study for customer’s online shopping satisfaction from security perspective. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.64-68
2018 Analysis determinants of social media acceptance in higher educational institution of Pakistan. International Journal of Engineering and Technology , 7 (2.5 (Special Issue 5)) pp.32-36
2018 Unstructured source artifacts ontology for requirement validation in GDSD. International Journal of Engineering and Technology , 7 (2.5 (Special Issue 5)) pp.44-52
2017 Predicting the fraud volume in personal computer using different web browsers. Since International , 29 (3 (May-June)) pp.681-685
2017 Halal products recognition using RFID/NFC technology. Science International , 29 (3 (May-June)) pp.687-692
2017 WSN based sensing model for smart crowed movement with identification: an extended study. Journal of Theoretical and Applied Information Technology , 95 (5) pp.975-988
2017 Forensic analysis of offline signature using multi-layer perception and random forest. International Journal of Database Theory and Applications , 10 (1) pp.139-148
2017 Barriers effecting successful implementation of E-learning in Saudi Arabian universities. Internation Journalk of Educational Technology (iJET) , 12 (6) pp.94-107
2017 Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management , 34 (1) pp.50-64
2017 Reliability and validity of a questionnaire for empirical analysis of factors influencing IOT-based smart healthcare. Science International , 29 (6 Section B (November-December)) pp.1201-1206
2017 Artifact evaluation in information systems design science research: social constructivism environment. Science International , 29 (5) pp.1059-1064
2017 Assessing digital library acceptance by postgraduate students: a proposed framework. University of Sindh Journal of Information and Communication Technology , 1 (1) pp.47-50
2017 Selecting respondents for survey questionnaire in Islamic way. Journal of Islamic, Social an, Economics and Development , 2 (5) pp.40-46
2017 A mixed method study for investigating critical success factors (CSFs) of E-learning in Saudi Arabian Universities. International Journal of Advanced Computer Science and Applications , 8 (5) pp.171-178
2017 A hybrid method using kinect depth and color data stream for hand blobs segmentation. Science International , 29 (3 (May-June)) pp.515-519
2016 Towards using CMU sphinx tools for the Holy Quran recitation verification. International Journal on Islamic Applications in Computer Science And Technology (IJASAT) , 4 (2) pp.10-15
2016 HTM:a new hierarchical interconnection network for future generation parallel computers. IETE Technical Review , 33 (2) pp.93-104
2016 Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems. Sindh University Research Journal (Science Series) , 48 (4D) pp.17-26
2016 An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem. SINDH university Research Journal ( science series ) , 48 (4D) pp.175-182
2016 A study to investigate state of ethical Development in E-learning. International Journal of Advanced Computer Science and Applications , 7 (4) pp.284-290
2016 Testing desktop application: Police station information management system. International Journal of Software Engineering and Its Applications , 10 (7) pp.101-118
2016 Risk management policies of telecommunication and engineering laboratories . International Journal of Hybrid Information Technology , 9 (4) pp.281-290
2016 Analysis and enhancement of the denoising depth data using kinect through iterative technique. Jurnal Teknologi , 78 (9) pp.185-193
2016 Real-time hand detection by depth images: a survey. Jurnal Teknologi , 78 (2) pp.141-148
2016 Building CMU Sphinx language model for the Holy Quran using simplified Arabic phonemes. Egyptian Informatics Journal , 17 (3) pp.305-314
2016 Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science , 10 (2) pp.34-51
2016 Application service delivery in the modern virtualized data center-improving reliability and scalability. Sindh University Research Journal (Science Series) , 48 (3) pp.579-584
2016 Transitional approaches for PERN migration to SDN. Information Technology Journal , 15 (4) pp.137-143
2016 Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan . Sindh University Research Journal (Science Series) , 48 (2) pp.309-314
2016 An offline signature verification technique using pixels intensity levels. International Journal of Signal Processing, Image Processing and Pattern Recognition , 9 (8) pp.205-222
2016 A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm. International Journal of Signal Processing, Image Processing and Pattern Recognition , 9 (10) pp.11-20
2015 Transaction Management techniques and practices in current cloud computing environment: a survey . International Journal of Database Management Systems (IJDMS) , 7 (1) pp.41-49
2015 Automated animation of quadrupeds using procedural programming technique. Asian Journal of Scientific Research , 8 (2) pp.165-181
2015 Mobile agent based multi-layer security framework for cloud data centers. Indian Journal of Science & Technology , 8 (12) pp.52923-1
2015 Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology , 71 (1) pp.87-96
2015 An applications development for record keeping of police stations in Pakistan . Journal of Scientifc Research and Advances , 2 (4) pp.144-150
2015 Collaborative learning, using Facebook's page and Groups. International Journal of Computer System , 2 (2) pp.47-52
2015 Analyzing the weighted dark networks using scale-free network approach. WSEAS Transactions on Computers , 14 pp.748-759
2015 Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review. Renewable and Sustainable Energy Reviews , 51 pp.1553-1563
2015 A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students . Journal of Ecosystem & Ecography , 5 (3) pp.1-5
2015 An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait . Wulfenia Journal , 22 (3) pp.258-269
2015 Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering , 2 (3) pp.10-19
2015 Pervasive learning using cloud computing . Sindh University Research Journal (Science Series) , 47 (3) pp.567-570
2015 An appraisal of off-line signature verification techniques . International Journal on Modern Education and Computer Science , 4 pp.67-75
2015 Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework. Journal of Islamic Countries Society of Statistical Sciences (IJOSS) , 1 (2) pp.131-139
2015 Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation . International Journal of Computer Graphics & Animation , 5 (1) pp.47-67
2015 Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences , 9 (5) pp.2703-2714
2015 Computational modeling of mood from sequence of emotions. Advanced Science Letters , 21 (10) pp.2997-3001
2015 Resolving ethical dilemma in technology enhanced education through smart mobile devices . International Arab Journal of e-Technology , 4 (1) pp.25-31
2014 Cloud computing adoption model for universities to increase ICT proficiency. SAGE Open pp.1-10
2014 Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering , 2 (1) pp.1-7
2014 Cloud computing adaptation model for universities to increase ICT proficiency. SAGE Open , 4 (3) pp.1-10
2014 Gender and mobile payment system adoption among students of tertiary institutions in Nigeria. International journal of Computer and Information Technology , 3 (1) pp.13-20
2014 Metrics for computing performance of data center for instigating Energy Efficient Data center. Journal of Scientifc and Industrial Research , 73 pp.11-15
2014 Encryption method for SCADA security enhancement. Journal of Applied Sciences pp.1-9
2014 Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies , 94 (2) pp.1-10
2014 Deployment of new dynamic cryptography buffer for SCADA security enhancement . Journal of Applied Sciences pp.1-11
2014 Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal , 21 (3) pp.462-470
2014 ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal , 76 (5) pp.xx-xx
2014 Energy efficiency and environmental consideration for green data centres. International Journal of Green Economics , 8 (2) pp.144-157
2014 Contribution of cloud computing in the reduction of carbon dioxide emission . International Journal for Innovation Education and Research , 2 (8) pp.118-120
2014 Power usage effectiveness metrics to measure efficiency and performance of data centers. Applied Mathematics and Information Sciences , 8 (5) pp.2207-2216
2014 EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal , 7 (5) pp.88-103
2013 Selecting a mentor: guide for a Protégé. World Applied Sciences Journal , 24 (6) pp.732-738
2013 Prototyping of a situation awareness system in the maritime surveillance. IOP Conference Series: Materials Science and Engineering , 53 (012007) pp.1-6
2013 Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (1) pp.21-30
2013 Forward and Inverse Kinematics Seamless Matching using Jacobian. Sindh University Research Journal (Science Series) , 45 (2) pp.387-392
2013 Evaluating the effect of IP and IGP on the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (2) pp.71-82
2013 Measuring efficiency of tier level data centers to implement green energy efficient data centers. Middle-East Journal of Scientific Research , 15 (2) pp.200-207
2013 Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia. International Journal of Emerging Technologies in Learning , 8 (3) pp.8-12
2012 Information and communication technology workforce employability in Malaysia. Campus Wide Information Systems , 29 (2) pp.80-89
2012 Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm. International Journal of Innovative Computing, Information and Control , 8 (6) pp.4375-4389
2012 Virtualization implementation approach for data centers to maximize performance. Asian Journal of Scientific Research , 5 (2) pp.45-57
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences , 27 pp.233-240
2011 Green IT based energy efficiency model for data centers to reduce energy consumption & CO2 emissions. International Journal of Current Research and Review , 3 (10) pp.1-10
2011 Revisiting far/near infrared pyramid-based fusion types for night vision using matlab. Pakistan Journal of Engineering Technology & Science (PJETS) , 1 (1) pp.21-36
2011 A novel text steganography technique to Arabic language using reverse fatah . Pakistan Journal of Engineering Technology & Science (PJETS) , 1 (2) pp.106-113
2011 Internet banking in Pakistan: finding complexities. Journal of Internet Banking and Commerce , 16 (1) pp.1-14
2011 Differential image compression for telemedicine: a novel approach. Pakistan Journal of Engineering, Technology and Science , 1 (1) pp.14-20
2011 Command based line following robot using RF technology. Journal of Computer Science and Technology , 1 (1) pp.25-35
2006 Infective endocarditis in the East coast of peninsular Malaysia: a two year retrospective survey from Kuantan. JK-Practitioner , 13 (1) pp.5-8

Conference or Workshop Item

2019 A review of programming code assessment approaches. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2019 The effect of web-based social networking on consultancy. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Factors affecting secure software development practices among developers- an investigation. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Offline printed Sindhi optical text recognition: survey. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Disparity between theory & practice beyond the worst-case competitive analysis. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 A conceptual framework for measuring acceptance of contactless payment methods. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2019 Review on Natural Language Processing (NLP) and its toolkits for opinion mining and sentiment analysis. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Visualization: a tool to study nodes in multi-dimensional networks. In: Computing Conference 2019
2019 A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan. In: 2019 International Conference on Information Science and Communication Technology (ICISCT)
2019 A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life. In: 5 th IEEE International Conference on Engineering, Technologies and Applied Sciences ( ICETAS 2018 )
2019 Acceptance and use of information and communication technology in higher education institutes of Kuwait: a proposed framework. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2018 Near field communication enabled payment system adoption: A proposed framework. In: 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS)
2018 Security and privacy for IoT and fog computing paradigm. In: 15th Learning and Technology Conference (L&T) 2018
2018 Towards an accurate speaker-independent Holy Quran acoustic model. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017
2018 Preliminary study on factors affecting E-commerce success: a modified Delone and McLean model. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 An empirical study of Internet of Things (IoT) - based healthcare acceptance in Pakistan:pilot study. In: 3rd IEEE International Conference on Engineering Technologies and Social Sciences, ICETSS 2017
2018 Prediction-based resource allocation model for real time tasks. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2018 Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP). In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2018 The future of data privacy and security concerns in Internet of things. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD)
2018 Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD)
2018 Social commerce in e-business of Pakistan: opportunities, challenges and solutions. In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2018
2018 A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018
2018 A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2018 E-learning in Iraqi universities: a review. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
2018 Towards an integrated framework of e-learning through an international innovative collaboration: Iraqi perspective. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
2018 Health information system (HMS) in Malaysia. In: 1st International conference on Multidisciplinary Academic Research
2018 Using web crawlers for feature extraction of social nets for analysis. In: 14th International Conference on Information Technology - New Generations (ITNG 2017)
2018 Detecting change from social networks using temporal analysis of email data. In: 14th International Conference on Information Technology - New Generations (ITNG 2017)
2017 Testing Sphinx’s language model fault-tolerance for the Holy Quran. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2017 Important attributes of customer satisfaction in telecom industry: a survey based study. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2017 Development of a game for history course of secondary school students. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2017 Assimilating E-Learning Barriers using an Interpretive Structural Modelling (ISM). In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2016 WSN based sensing model for smart crowd movement with identification: a conceptual model. In: Multi Conference on Computer Science And Information Systems 2016
2016 An adoption of Halal food recognition system using Mobile Radio Frequency Identification (RFID) and near field communication (NFC). In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2016 Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Factors effecting fixed-line telecom services customer retention: A study of Pakistan . In: 14th International Conference on Statsitical Sciences
2016 Acceptance and use of information and communication technology by academicians: Towards a conceptual framework. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 Modeling user's trust in M-commerce acceptance: a conceptual framework in context of Pakistan. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
2015 A review of slicing techniques in software engineering. In: International Conference on Engineering and Technology
2015 Simulation of Resources Sharing Architecture (ReSa) between clouds using Java programming. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
2015 Relation mining using cross correlation of multi domain social networks . In: SAI Intelligent Systems Conference (IntelliSys), 2015
2015 SmartCrowd: novel approach to big crowd management using mobile cloud computing. In: International Conference on Cloud Computing 2015 (ICCC'2015)
2015 Predicting the fraud volume in the advent of internet enabled handheld devices . In: 4th International Conference on Advances in Engineering Sciences and applied Mathematics, ICAESAM' 2015
2015 Mobile online services and measuring user satisfaction: study of Kuwait. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
2015 A conceptual framework for the analysis of determinants of m-commerce acceptance. In: 13th International Conference on Statistical Sciences
2015 A model for handling overloading of literature review process for social science . In: The International Conference on Advanced Research in Business and Social Sciences 2015 (ICARBSS 2015)
2015 A conceptual framework for measuring the acceptance of pervasive learning. In: 5th International Conference on Computing and Informatics (ICOCI 2015)
2015 A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan. In: 5th International Conference on Computing and Informatics, ICOCI 2015
2015 Detecting changes in context using time series analysis of social network. In: SAI Intellegence Systems Conference 2015
2015 Towards using CMU Sphinx Tools for the Holy Quran recitation verification. In: 3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015)
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Identification of vessel anomaly behavior using support vector machines and Bayesian networks. In: International Conference on Computer and Communication Engineering (ICCCE 2014)
2014 Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science . In: 5th International Conference Information & Communication Technology for the Muslim World (ICT4M 2014)
2014 Calculus and its applications in scale-free networks . In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014)
2014 Anomaly detection in vessel tracking using Support Vector Machines (SVMs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2014 Node status detection and information diffusion in router network using scale-free network. In: 10th International Network Conference, INC 2014
2014 Sharing of attacks information across clouds for improving security:a conceptual framework. In: International Conference on Computer, Communication, and Control Technology (I4CT 2014)
2014 RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 ReSA: architecture for resources sharing between clouds. In: 2014 Conference on Information Assurance and Cyber Security (CIACS)
2014 Systematic review of computational modeling of mood and emotion. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
2013 Inculcating ethical values in the students through e-Learning platform. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Analysis of SNS popularity from different perspectives among users. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Towards quick response and secure online banking transactions: using data compression and cryptography. In: 2nd International Conference on Advances Information Technology (AIT 2013)
2013 Hierarchical 3D-Mesh Network. In: IRIIE2013
2013 10 c’s of social networking, interconnections and the impact on social networking. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Ethical perspective of students in Global Learning Environment. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2013 A 10 C’s of social networking, interconnections and the impact on social networking. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2013 Fault tolerant cloud auditing. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Prototyping of a situation awareness system in the maritime surveillance. In: 5th International Conference on Mechatronics
2013 A security-based survey and classification of cloud architectures, state of the art and future directions . In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 Template based procedural rigging of quadrupeds with custom manipulators. In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2013 A model for real-time recognition and textual representation of Malaysian sign language through image processing . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2012 High performance hierarchical torus network. In: IRIIE2012
2012 A deadlock-free dimension order routing for hierarchical 3D-mesh network. In: 2012 International Conference on Computer & Information Science (ICCIS)
2012 Widget based automated rigging of bipedal character with custom manipulators . In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;
2012 NoMadCar: the interactive design using human computer interaction techniques. In: International Multi-TopIc Conference (IMTIC 2012)
2012 Building wireless sensor networks application using Sun SPOTs. In: Second International Multi Topic Conference, IMTIC 2012
2012 On dynamic communication performance of a hierarchical 3D-mesh network. In: The 9th IFIP International Conference on Network and Parallel Computing (NPC 2012)
2012 Design and development of the FMCW Radar Scene Generator. In: 2012 IEEE Symposium on Industrial Electronics and Applications (ISIEA2012)
2011 Maximizing bandwidth efficiency of statistical multiplexer Architexture using frame dropping methods . In: KICT Seminar
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)

Book

2017 Predicting online banking fraud using adaptive neuro-fuzzy inference system (ANFIS). IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-791-0
2017 A model for social media in higher education institutions of Pakistan. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-795-8
2017 An integrated model of acceptance for pervasive learning from students’ perspective. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-792-7
2017 Factors affecting the acceptance of mobile commerce in Pakistan. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-794-1
2016 Research methodologies an Islamic perspective. IIUM Press . ISBN 9789674183868
2011 Research methodologies: a practical approach. IIUM Press . ISBN 9789674180171

Book Section

2013 Hierarchical Tori Connected Mesh Network. In: Computational Science and Its Applications – ICCSA 2013 : 13th International Conference, Ho Chi Minh City, Vietnam, June 24-27, 2013, Proceedings, Part V Springer-Verlag Berlin Heidelberg . ISBN 978-3-642-39640-3 (O), 978-3-642-39639-7 (P) , pp.197-210
2011 Digital multiplexing techniques. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.5-9
2011 Basic disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.135-140
2011 Low bit rate speech coding. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.10-11
2011 Exception handling. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.215-222
2011 Disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.141-146
2011 Low bit rate speech coding standards. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.12-14
2011 Cascade style sheets. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.147-155
2011 Codebook excited linear predictive coding. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.18-21
2011 Throw & throws keyword. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.223-229
2011 Image editing. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.157-164
2011 Pulse residual excited linear prediction. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.22-25
2011 Multi-pulse residual excitation model (MP-PRE). In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.26-30
2011 Image effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.165-172
2011 Low bit rate speech multiplexer tools. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.31-32
2011 Image tool function. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.173-179
2011 Discontinuous transmission and multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.33-35
2011 Local block and static block. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.231-235
2011 Measured temporal parameters. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.36-44
2011 Image clone 1. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.181-191
2011 Quality assessments in multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.45-46
2011 Image clone 2. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.193-197
2011 Simulation of speech activities using Markov Model. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.47-53
2011 Abstract class. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.237-244
2011 Packet loss and frame substitution techniques. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.54-59
2011 Speech quality in lossy multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.60-63
2011 Image and special effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.199-204
2011 Design of a low bit rate STDM multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.64-67
2011 Interfaces. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.245-257
2011 Basic text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.205-212
2011 Multiplexing and operational scenarios. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.68-69
2011 Low bit rate speech coders. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.70-72
2011 Text animation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.213-219
2011 Dynamic talker activity analysis. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.73-79
2011 Text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.221-226
2011 DSI advantage capability of LFR. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.80-83
2011 Image filtering. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.227-232
2011 Image quality improvement. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.233-239
2011 Concept of frames discarding and multiplexing efficiency. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.84-88
2011 Energy ad a criterion for frame discarding and multiplexing efissiency. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.89-91
2011 LPC envelope difference criterion and multiplexing efficiency. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.92-94
2011 Networking issue. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.95-101
2011 Cyclic frame discarding multiplexer design. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.102-105
2011 Speech frame sensitivity based on mean square error criterion. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.106-112
2011 Energy threshold sensitivity for frame loss. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.113-118
2011 Speech quality for energy criterion in multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.119-123
2011 Speech quality for LPC envelope criterion. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.124-126
2011 Introduction . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.1-3
2011 Arithmetic expressions and data types in C++ . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.1-3
2011 Sending the output to a print file . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.11-16
2011 Decision making: If-else statements and relational operators . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.17-24
2011 Logical operators and switch statements. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.25-31
2011 Iterative structures . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.39-48
2011 Review, summary & building skill . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.33-37
2011 The for loop . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.49-53
2011 The do-while loop . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.55-57
2011 Introduction to Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.15-20
2011 Review of variables, formatting. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.59-61
2011 Review of iterative structures . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.63-72
2011 Compiling and executing Java code. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.21-26
2011 Post-test and nested loops . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.73-82
2011 Introduction to data types in Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.27-32
2011 Functions . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.83-90
2011 Call-by-value and reference . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.91-97
2011 Arithmetic and relational operators. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.33-38
2011 More on functions. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.99-110
2011 Structures (struct) and files . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.111-118
2011 Relational and logical operators. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.39-44
2011 Arrays . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.119-125
2011 Exercise of array. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.127-135
2011 Familiarization with multimeter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.1-5
2011 Bitwise operators and type casting . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.45-50
2011 Conditional statements . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.51-54
2011 Using the multimeter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.6-12
2011 Familiarization with oscilloscope. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.13-17
2011 If-else statements . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.55-60
2011 Signals . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.18-22
2011 The If-Else-If statements . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.61-66
2011 Probes. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.23-28
2011 Switch statement . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.67-72
2011 Control panel of an oscilloscope. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.29-33
2011 Operation of an oscilloscope. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.34-38
2011 Measurement techniques. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.39-46
2011 Resistor color codes . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.47-51
2011 Soldering iron practice . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.52-55
2011 Procedure of soldering iron practice . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.56-59
2011 Ohm's law . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.60-61
2011 Using the multi-meter for Ohm's law . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.62-64
2011 Voltage divider rule (VDR). In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.65-68
2011 Common emitter amplifier with fixed bias . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.69-74
2011 Common emitter amplifier with self bias . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.75-77
2011 Common collector transistor amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.78-81
2011 Darlington common emitter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.82-86
2011 The use of genetic algorithm in autonomous robot navigation . In: Computer applications: theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.3-13
2011 Class-A amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.87-91
2011 Class-B power amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.92-96
2011 In-silico drug target design & its approaches . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.15-26
2011 Voltage follower. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.97-100
2011 Inverting amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.101-104
2011 Implementing DNA sequence using genetic algorithm. In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.27-36
2011 Summing amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.105-107
2011 Subtractor or differential amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.108-110
2011 Integrator. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.111-114
2011 Differentiator. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.115-120
2011 Read data from a file. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.137-141
2011 Comparator. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.121-122
2011 Object oriented programming. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.143-152
2011 Selection sorting. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.153-159
2011 Active low pass filter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.123-128
2011 Bubble sort algorithm. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.161-166
2011 Molecular docking . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.37-44
2011 Active high pass filter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.129-135
2011 Linear searching. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.179-188
2011 Review of arrays. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.167-177
2011 The use of genetic algorithm in improving medical image segmentation techniques . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.45-55
2011 Active band pass filter. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.136-141
2011 Binary search. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.189-197
2011 Vector class. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.199-202
2011 Loops in Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.73-78
2011 Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.59-69
2011 Pointers. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.203-211
2011 Function pointers. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.213-218
2011 Integration of ICT in education : an Islamic perspective.. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.61-71
2011 Internal structure of computer systems. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.1-8
2011 Polymorphism and virtual functions. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.219-221
2011 Do-While loops. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.79-83
2011 C++ references. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.223-227
2011 For loops. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.85-92
2011 Interfaces and protocols. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.9-16
2011 Const correctness. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.229-234
2011 Protection mechanisms using LSB and MD5 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.85-98
2011 More on const keywords. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.235-239
2011 Firmware program. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.17-22
2011 Loop pitfalls and exercise. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.93-97
2011 Goto statement. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.241-247
2011 Nested loops. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.99-104
2011 Graphical user interfaces. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.23-30
2011 Handling errors in C++. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.249-252
2011 Arrays in Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.105-110
2011 Static: the multipurpose keyword. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.253-255
2011 Short cut and hard drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.31-38
2011 Strings. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.119-125
2011 Methods of string class. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.127-134
2011 Windows explorer. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.39-46
2011 Object and classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.135-140
2011 Constructors. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.141-146
2011 Folder and directory. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.47-53
2011 Arguments passing. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.155-161
2011 User defined methods. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.147-154
2011 Return statement. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.163-167
2011 Security risk of ATM systems, case of study . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.129-138
2011 Folder operations. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.55-63
2011 Working with classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.169-175
2011 Control panel and screen savers. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.65-72
2011 Multiple classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.177-184
2011 Basic operating system setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.81-86
2011 Hardware configuration. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.73-79
2011 Method overloading and overriding. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.185-190
2011 Windows installation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.87-98
2011 Network security setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.99-106
2011 Modifiers for class data. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.191-197
2011 Task scheduling. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.107-112
2011 Inner classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.199-205
2011 Basic storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.113-118
2011 Logical drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.119-125
2011 Transmission bandwidth efficiency enhancement techniques. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.1-4
2011 Comparison between different class types. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.207-213
2011 Storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.127-134
2011 Linear predictive coding of speech. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.15-17