Researchers

Researchers

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Adamu Abubakar Ibrahim
Associate Professor

  • KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
  • IIUM Gombak Campus
  • adamu@iium.edu.my

Print CV Email Me

Staff Details

  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Ethernet Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Open System Interconnecting (OSI) Model
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Firewalls
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Hacking
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Intrusion Detection System
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Malware, Worms and Viruses
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics)
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Machine Learning
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Data Hiding and Steganography
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Encryption
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Multimedia ~ Computer Graphics and Animations
COMPUTER MEDIATED COMMUNICATION 2017/2018 2018/2019 2019/2020
COMPUTER NETWORKING 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021 2021/2022 2022/2023 2023/2024
DATA COMMUNICATION IN BUSINESS 2012/2013 2015/2016
DATA MANAGEMENT 2016/2017
DATA STRUCTURE & ALGORITHM 2014/2015
DATA STRUCTURED & ALGORITHM 2014/2015
FINAL YEAR PROJECT 2016/2017 2017/2018 2018/2019
FINAL YEAR PROJECT I 2014/2015 2015/2016 2017/2018
FINAL YEAR PROJECT II 2014/2015 2015/2016 2017/2018 2019/2020
FOUNDATION OF QUANTITATIVE ANALYSIS 2015/2016
INDUSTRIAL ATTACHMENT 2014/2015 2015/2016 2016/2017 2017/2018
INFORMATION RESOURCE AND STRATEGY MANAGEMENT 2013/2014 2014/2015
INFORMATION RETRIEVAL TECHNOLOGIES 2013/2014 2014/2015 2015/2016
MANAGEMENT INFORMATION SYSTEM 2014/2015
OPERATING SYSTEM 2016/2017
OPERATING SYSTEM 2014/2015
WEB PROGRAMMING II 2011/2012 2012/2013
In Progress
2018 - Present Novel Over-sampling Methods for Classification of Imbalanced Quranic Topics
2018 - Present Novel Over-sampling Methods for Classification of Imbalanced Quranic Topics
2018 - Present Novel Over-sampling Methods for Classification of Quranic Topics
Completed
2016 - 2019 A Structured Large Data Volume Heterogeneity with Minimal Incompleteness in a Big Data Analytics
2016 - 2019 A Structured Large Data Volume Heterogeneity with Minimal Incompleteness in a Big Data Analytics
2015 - 2019 A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems
2015 - 2018 An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment
2015 - 2019 A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems
2015 - 2018 An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment
2014 - 2019 User Awareness on the Authenticity of Mobile Quran
2014 - 2019 User Awareness on the Authenticity of Mobile Quran
2013 - 2016 Subjective Assessment Model of the Quranic Audio Watermarking
2013 - 2016 Subjective Assessment Model of the Quranic Audio Watermarking
Article
2022 The trade-off between robustness and imperceptibility performance of watermarking technique with DWT and SCHUR decomposition for medical images. Journal of Theoretical and Applied Information Technology , 100 (1) pp.81-88
2021 Heart murmur detection using supervised machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC)
2021 EXAMINING THE FACTORS INFLUENCING THE SUCCESS OF MOBILE MONEY IN AFGHANISTAN. Journal of Information Systems and Digital Technologies , 3 (1) pp.40-64
2021 Trust based security model for cloud systems in an organization. Journal of Information Systems and Digital Technologies , 3 (2) pp.50-67
2021 The static performance effect of hybrid-hierarchical interconnection by shifted completely connected network. IEEE , 9 pp.99249-99265
2021 Subscribers' expectations of internet speed for multiplayer online battle arena (MOBA) game. International Journal on Perceptive and Cognitive Computing (IJPCC) , 7 (1) pp.1-7
2021 The internet of everything from Islamic perspective. International Journal of Perceptive and Cognitive Computing (IJPCC) , 7 (1) pp.66-71
2021 Emoji's multi-interpretation effect on the intended emotion. International Journal on Perceptive and Cognitive Computing (IJPCC) , 7 (1) pp.92-98
2021 Cryptocurrency adoption in e-payment: barrier of its implementation. Journal of Theoretical and Applied Information Technology , 99 (9) pp.4461-4481
2021 SRC voting system with face authentication. International Journal on Perceptive and Cognitive Computing (IJPCC)
2021 Breast cancer prediction using machine learning. International Journal on Perceptive and Cognitive Computing (IJPCC) pp.1-5
2020 Internet of things: ideological prospects and its social implication to the Muslim community. International Journal on Perceptive and Cognitive Computing (IJPCC) , 6 (2) pp.47-52
2020 Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access , 8 pp.197554-197566
2020 Islamic approach toward purification of transaction with cryptocurrency. Journal of Theoretical and Applied Information Technology , 98 (6) pp.1050-1067
2020 Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming. IEEE Access , 8 pp.83155-83166
2020 Understanding Muslims self-presentation strategies in online dating. International Journal on Perceptive and Cognitive Computing (IJPCC) , 6 (2) pp.81-89
2020 DDoS mitigation: a review of content delivery network and its DDoS defense techniques. International Journal on Perceptive and Cognitive Computing (IJPCC) , 6 (2) pp.67-76
2020 End-to-end fully-informed network nodes associated with 433 MHz outdoor propagation environment. International Journal of Computing and Digital Systems
2020 Factors influencing adoption of cryptocurrency-based transaction from an Islamic perspective. Global Journal of Computer Science and Technology , 20 (4) pp.21-32
2020 Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications , 4 (5) pp.1-12
2020 AI-based techniques for DDoS Attack Detection in WSN: a systematic literature review. Journal of Computer Science , 16 (6) pp.848-855
2020 Machine translation in natural language processing by implementing artificial neural network modelling techniques: an Analysis. International Journal on Perceptive and Cognitive Computing , 6 (1) pp.9-18
2020 Assessment of the influence of ICT facilities for sustainability of modern teaching excellence in education. International Journal on Perceptive and Cognitive Computing , 6 (1) pp.28-36
2019 Cotton crop cultivation oriented semantic framework based on IoT smart farming application. International Journal of Engineering & Advanced Technology (IJEAT) , 8 (3) pp.480-484
2019 Rift: a high-performance consensus algorithm for Consortium Blockchain. International Journal of Recent Technology and Engineering , 7 (6S) pp.989-997
2019 Recent advances in mobile touch screen security authentication methods: a systematic literature review. Computers & Security , 85 pp.1-24
2019 Sensor enhanced health information systems: issues and challenges. International Journal of Interactive Mobile Technologies , 13 (1) pp.99-114
2019 Limit behavior of the trajectories of extreme doubly stochastic quadratic operators on two dimensional simplex. International Journal of Recent Technology and Engineering (IJRTE)
2019 The connectivity and the static-cost-effective analysis of a shifted completely connected network. International Journal of Computational Intelligence Studies , 8 (1/2) pp.158-175
2019 Users perception of cryptocurrency system application from the Islamic views. International Journal on Islamic Applications in Computer Science And Technology , 7 (1) pp.13-25
2018 BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network. International Journal of Engineering & Technology , 7 (4) pp.888-892
2018 Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology , 96 (6) pp.1633 -1646
2018 Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research , 8 (1) pp.49-61
2018 Small and medium-sized enterprise: prioritization of Internet bandwidth needs for business purposes. International Journal of Advanced Science and Technology , 116 pp.151-166
2017 Dynamics of watermark position in audio watermarked files using neural networks. Applied Mathematics & Information Sciences , 11 (3) pp.703-715
2017 Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS , 5 pp.480-500
2017 Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm. Applied Soft Computing , 61 pp.149-173
2017 A review on soft set-based parameter reduction and decision making. IEEE ACCESS , 5 pp.4671-4689
2017 The dynamics of data packet in transmission session. IEEE ACCESS , 5 pp.4329-4339
2017 CPU scheduling with a round Robin algorithm based on an effective time slice. Journal of Information Processing Systems , 13 (4) pp.941-950
2017 A Review on mobile SMS Spam filtering techniques. IEEE Access , 5 pp.15650-15666
2017 Neural networks optimization through genetic algorithm searches: A review. Applied Mathematics and Information Sciences , 11 (6) pp.1543-1564
2017 Soft computing approach for predicting OPEC countries’ oil consumption. International Journal of Oil, Gas and Coal Technology , 15 (3) pp.298-316
2017 Online fake news detection algorithm. Journal of Theoretical and Applied Information Technology , 95 (17) pp.4114-4122
2017 Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology , 5 (2) pp.26-36
2016 Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia. International Journal of Advanced Research , 4 (1) pp.1443-1450
2016 A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm. Applied Soft Computing , 48 (November 2016) pp.50-58
2016 Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm. International Review on Computers and Software (IRECOS) , 11 (9) pp.752-763
2016 Studying the effect of training Levenberg Marquardt neural network by using hybrid meta-heuristic algorithms. Journal of Computational and Theoretical Nanoscience , 13 (1) pp.450-460
2016 Utilising key climate element variability for the prediction of future climate change using a support vector machine model. International Journal of Global Warming , 9 (2) pp.129-151
2016 Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science , 10 (2) pp.34-51
2016 Non-contact electrocardiogram (ECG) smart chair for ST segment elevation myocardial infarction detect. Journal of Theoretical and Applied Information Technology , 84 (3) pp.315-320
2016 A review on artificial intelligence methodologies for the forecasting of crude oil price. Intelligent Automation & Soft Computing , 22 (3) pp.449-462
2016 An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus , 5 (1) pp.868-1-868-25
2016 A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid. International Journal of Interactive Mobile Technologies , 10 (3) pp.4-10
2015 Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences , 9 (6) pp.3133-3145
2015 Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences , 9 (5) pp.2703-2714
2015 Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm. PLoS ONE , 10 (8) pp.1-21
2015 Optimization of neural network using cuckoo search for the classification of diabetes. Journal of Computational and Theoretical Nanoscience , 12 (12) pp.5755-5758
2015 A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems. Procedia Computer Science , 62 pp.221-227
2015 Malaria severity classification through Jordan-Elman neural network based on features extracted from thick blood smear. Neural Network World , 5 (15) pp.565-584
2015 Intelligent decision support systems for oil price forecasting. International Journal of Information Science and Management (IJISM) , Spec. pp.47-59
2015 Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology , 71 (1) pp.87-96
2015 An appraisal of Malaysian hospital websites as a new media tool for improving healthcare information: a systematic review. Australian Journal of Basic and Applied Sciences , 9 (2) pp.151-156
2014 Investigating the impact of audience response system on student’s performance outcomes. World Applied Sciences Journal , 32 (7) pp.1268-1283
2014 Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks. International Review on Computers and Software (I.RE.CO.S.) , 9 (11) pp.1904-1915
2014 A framework for realizing universal standardization for internet of things. Journal of Industrial and Intelligent Information , 2 (2) pp.147-153
2014 Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology , 61 (1) pp.37-43
2014 Randomized text encryption: a new dimension in cryptography. International Review on Computers and Software (I.RE.CO.S.) , 9 (2) pp.365-373
2014 Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies , 94 (2) pp.1-10
2014 Empirical investigation of visualization quality for three-dimensional (3d) objects of 3d map on mobile device for navigation aid . Journal of Theoretical and Applied Information Technology , 63 (2) pp.372-380
2014 A navigation-aided framework for 3D map views on mobile devices. International Review on Computers and Software (IRECOS) , 9 (9) pp.1605-1611
2014 Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences , 13 (Sp. ed) pp.75-90
2014 The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology , 2 (4) pp.23-34
2013 Computational intelligence techniques with application to crude oil price projection: a literature survey from 2001–2012. Neural Network World , 6 (13) pp.523-551
2013 Effective utilization of 3D representation in mobile device for pedestrian navigation aid. International Journal of Humanities and Social Science , 3 (4) pp.182-188
2013 Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology , 1 (3) pp.17-23
2013 Computational intelligence techniques with application to crude oil price projection: A literature survey from 2001-2012 . Neural Network World: International Journal On Non-Standard Computing And Artificial Intelligence , 23 (6) pp.523-551
2012 3D graphics visualization for interactive mobile users navigation. WSEAS Transactions on Systems , 11 (8) pp.453-464

Conference or Workshop Item

2021 Analysis of watermarking techniques with wavelet and cosine transform for imperceptibility on image. In: 18th International Multi-Conference on Systems, Signals & Devices (SSD) 2021
2021 The factors influencing the adoption of bitcoin investment during covid-19. In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT
2021 A framework for adopting blockchain technology in medical health records in Nigeria. In: ICT4M
2021 Bitcoin Adoption in Banking and Finance: The Critical Factors of its Implementation. In: International Conference on Innovative Research in Engineering and Technology (ICIRET-2021)
2021 Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme. In: 18th IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2021
2020 Analyzing DWT and IWT Techniques for Fitness Evaluation in Watermarking Technique Imperceptibility Performance for Medical Images. In: The 1st International Conference of Science and Technology toward New Normal Era
2020 Real-time video traffic communication over the Internet Protocol (IP) Network. In: 2020 International Conference on Communications, Information System and Computer Engineering(CISCE 2020)
2019 Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective. In: Computer Vision Conference (CVC) 2019
2019 Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015)
2019 Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015)
2018 MapReduce a comprehensive review. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE 2018)
2018 Cloud computing platforms for delivering computer science and mathematics instructional course content to learners. In: 3rd IEEE International Conference on Electro-Technology for National Development, NIGERCON 2017
2018 Window size and round-trip-time in a network transmission session. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018)
2018 An improved chaotic image encryption algorithm. In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018
2018 Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017)
2017 Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017)
2017 The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering
2016 TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC)
2016 VisUN-3D: User navigation with visualized 3D maps for mobile users. In: 2016 International Conference on Informatics and Computing (ICIC)
2016 The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals. In: 12th International Conference on Computing and Information Technology (IC2 IT)
2016 User awareness in the authenticity of mobile Quran apps. In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016)
2016 An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015
2015 An evaluation of mobile Quran apps. In: CHIuXiD 2015 Conference, ACM In Coop International Conference in HCI and UX, Bandung, 8-10 April 2015
2015 A novel algorithm to detect a QPSK signal with the minimum number of samples. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)
2015 An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)
2015 Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015
2015 A review of the applications of bio-inspired flower pollination algorithm. In: 2015 International Conference on Soft Computing and Software Engineering (SCSE'15)
2015 A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015)
2015 Comparing performances of neural network models built through transformed and original data. In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015
2014 Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014)
2014 Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices. In: CF '14 Proceedings of the 11th ACM Conference on Computing Frontiers
2014 An empirical study of customers’ adoption of mobile money transfer services in Somaliland. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
2014 Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Text normalization algorithm for facebook chats in Hausa language. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on
2014 Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT)
2014 Modified neural network activation function. In: 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology (ICAIET 2014)
2014 Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2014 Investigating the act of deception in online-Islamic content. In: 2014 3rd International Conference on User Science and Engineering (i-USEr)
2014 Throughput analysis of TCP congestion control algorithms in a cloud based collaborative virtual environment. In: 2014 First International Conference on Systems Informatics, Modelling and Simulation
2014 Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014)
2013 Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS)
2013 Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA)
2013 Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013)
Empirical investigation on the barriers of adoption of cryptocurrency-based transaction from an Islamic perspective. In: 8th International Conference on Information and Communication Technology for the Muslim World

Book

Book Section

2019 Estimation of Middle-East oil consumption using hybrid meta-heuristic algorithms. In: Lecture Notes in Electrical Engineering Springer Nature Singapore . ISBN 978-981-13-1797-2 , pp.139-150
2019 Bio-inspired algorithm optimization of neural network for the prediction of Dubai crude oil price. In: Lecture Notes in Electrical Engineering Springer Nature Singapore . ISBN 978-3-030-17794-2 , pp.151-162
2019 A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Lecture Notes in Electrical Engineering Springer Nature Singapore . ISBN 978-981-13-1797-2 , pp.639-646
2019 A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption. In: Green Energy and Technology Springer Verlag . ISBN 978-3-319-69889-2 , pp.1-20
2019 Visualizing pathway on 3D maps for an interactive user navigation in mobile devices. In: Algorithms, Methods, and Applications in Mobile Computing and Communications IGI Global . ISBN 978-1522556930 , pp.237-260
2018 A new static cost-effective parameter for interconnection networks of massively parallel computer systems. In: Soft computing in data analytics Springer Nature . ISBN 978-981-13-0513-9 / 978-981-13-0514-6 , pp.147-155
2015 Fundamentals of multimedia. In: Multimedia and Its Applications IIUM Press . ISBN 978-967-418-312-7 , pp.1-23
2015 Text in multimedia. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.64-72
2015 Practices of handling audio. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.126-138
2015 Video. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.139-148
2015 Fundamentals of computer networks: wired/wireless. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.1-15
2015 Multimedia security and the internet. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.48-62
2015 Spread spectrum audio watermarking using vector space projections. In: Advances in Intelligent Informatics Springer International Publishing . ISBN 978-3-319-11218-3 , pp.297-307
2014 Usability evaluation of hospital websites in Nigeria: what affects end users’ preferences?. In: HCI International 2014 - Posters’ extended abstracts: International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, Part II Springer International Publishing . ISBN 978-3-319-07853-3 (P), 978-3-319-07854-0 (O) , pp.430-434
2014 Kernel functions for the support vector machine: comparing performances on crude oil price data. In: Recent advances on soft computing and data mining: proceedings of The First International Conference on Soft Computing and Data Mining (SCDM-2014) Universiti Tun Hussein Onn Malaysia, Johor, MalaysiaJune 16th-18th, 2014 Springer International Publishing . ISBN 9783319076911 , pp.273-281
2013 A framework for selecting the optimal technique suitable for application in a data mining task . In: Future information technology SpringerLink . ISBN 978-3-642-40860-1 (P), 978-3-642-40861-8 (O) , pp.163-169
2011 Web application development process. In: The Web : Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.189-197