IIUM Repository

Dr Adamu Abubakar

Computer Science

International Islamic University Malaysia

Profile Picture

Latest Additions

  1. Rahman, M.M. Hafizur and Al Naeem, Mohammed Abdul Aziz and Ibrahim, Adamu Abubakar (2026) Detection of DSCP-based traffic prioritization manipulations and their impact on network performance. Scientific reports, 16 (10637). pp. 1-21. E-ISSN 2045-2322
  2. Alarood, Ala Abdulsalam and Atoum, Mohammed Salem and Abdul Manaf, Azizah and Abubakar, Adamu and Alsmadi, Izzat (2025) Enhanced obstacle detection using bilateral vision-aided transformer neural network for visually impaired persons. Cluster Computing, 28 (997). pp. 1-23. ISSN 1386-7857 E-ISSN 1573-7543
  3. Al-Khasawneh, Mahmoud Ahmad and Faheem, Muhammad and Alsekait, Deema Mohammed and Abubakar, Adamu and Issa, Ghassan F. (2025) Hybrid neural network methods for the detection of credit card fraud. Security and Privacy, 8 (1). pp. 1-15. E-ISSN 2475-6725
  4. Ahmed, Mahfooz and Al-Hussaini, Abulfathi Ibrahim Saleh and Ibrahim, Adamu Abubakar and Abubakar, Raihanat Ahmad (2025) Mediating effect of emotionality on the intention to use the Nigerian central bank digital currency (e-Naira). International Journal of Business and Systems Research, 19 (2). pp. 95-110. ISSN 1751-200X E-ISSN 1751-2018
  5. Ahmed, Mahfooz and Othman, Roslina and Noordin, Mohamad Fauzan and Ibrahim, Adamu Abubakar and Al-Hussaini, Abulfathi Ibrahim Saleh (2025) Factors influencing open science participation through research data sharing and reuse among researchers: a systematic literature review. Knowledge and Information Systems, 67 (3). pp. 2801-2853. ISSN 0219-1377 E-ISSN 0219-3116
  6. Atoum, Mohammed Salem and Alarood, Ala Abdulsalam and Alsolami, Eesa and Abubakar, Adamu and Al Hwaitat, Ahmad K. and Izzat, Alsmadi (2025) Cybersecurity intelligence through textual data analysis: a framework using machine learning and terrorism datasets. Future Internet, 17 (4). pp. 1-31. ISSN 1999-5903
  7. Gumaida, Bassam and Ibrahim, Adamu Abubakar (2025) Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review. International Journal of Innovative Computing, 15 (1). pp. 1-15. ISSN 2180-4370
  8. Zaidi, Nurul Syafiqah and Mubarak Ali, Al-Fahim and Ahmad, Firdaus and Abubakar, Adamu and AlDharhani, Ghassan Saleh and Ab Razak, Mohd Faizal (2025) Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems. Mesopotamian journal of Cybersecurity, 5 (2). 577-589.. ISSN 2958-6542
  9. Abubakar, Adamu and Ahmed Khan, Fazeel (2025) Detecting shifts in public discourse from offline to online using deep learning. Electronics, 14 (20). pp. 1-31. E-ISSN 2079-9292
  10. Alarood, Ala Abdulsalam and Ibrahim, Ahmed and Abubakar, Adamu and Alsulami, Abdulkream (2025) Examining the factor’s influencing IoT-blockchain based secure transmission services. Scientific Reports, 15 (1). pp. 1-18. E-ISSN 2045-2322
  11. Jasim Abdullah, Maryam and Ismail, Amelia Ritahani and Ibrahim, Adamu Abubakar (2025) Analyzing watermarking color image channels with wavelet and Schur decomposition technique. In: The 2025 IEEE International Conference on Artificial Intelligence for Learning and Optimization (ICoAILO), 7th to 9th August, 2025, Bali, Indonesia.
  12. Ahmed, Mahfooz and Al-Hussaini, AbulFathi Ibrahim Saleh and Abubakar, Adamu (2025) Factors influencing the intention to use the Nigerian central bank digital currency (E‑Naira) among Nigerian retailers. Journal of Financial Services Marketing, 30 (1). pp. 1-16. ISSN 1363-0539 E-ISSN 1479-1846
  13. Ahmed Khan, Fazeel and Abubakar, Adamu (2024) Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection. International Journal of Innovative Computing, 14 (2). pp. 15-24. E-ISSN 2180-4370
  14. Wan Ibrahim, Wan Aiman and Ahmad Khalil, Ahmad Nazrin and Abubakar, Adamu (2024) Design and development of cybersecurity suite. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 104-112. E-ISSN 2462-229X
  15. Mohd Nasharuddin, Muhammad Zafran Syahmi and Abubakar, Adamu (2024) Analyzing threat level of the backdoor attack method for an organization’s operation. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 51-59. E-ISSN e-ISSN: 2462-229X
  16. Gumaida, Bassam and Abubakar, Adamu (2024) A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network. International Journal of Sensors, Wireless Communications and Control, 14 (1). pp. 21-35. ISSN 2210-3279 E-ISSN 2210-3287
  17. Gumaida, Bassam and Ibrahim, Adamu Abubakar (2024) IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks. International Journal of Applied Information Technology, 8 (1). pp. 14-42. E-ISSN 2581-1223
  18. Khan, Fazeel Ahmed and Abubakar, Adamu (2024) Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management. Journal of Telecommunication, Electronic and Computer Engineering, 16 (2). pp. 5-12. ISSN 2180-1843 E-ISSN 2289-8131
  19. Almuqren, Almaha and Alsuwaelim, Hanan and Rahman, M M Hafizur and Abubakar Ibrahim, Adamu (2024) A systematic literature review on digital forensic investigation on android devices. In: 2nd International Conference on Machine Learning and Data Engineering (ICMLDE 2023), 23rd - 24th November 2023, Dehradun, India.
  20. Jauro, Fatsuma and Abdullahi, Usman Ali and Abdulsalami, Aminu Onimisi and Ibrahim, Adamu Abubakar and Abdullahi, Mohammed and Chiroma, Haruna (2024) Modified symbiotic organisms search optimization for automatic construction of convolutional neural network architectures. Intelligent Systems with Applications, 22. pp. 1-20. ISSN 2667-3053

Most Viewed Items

Item titleViews
1A high static performance hierarchical three-dimensional shifted completely connected network1934
2Islamic approach toward purification of transaction with cryptocurrency1464
3Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device1434
4Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection1387
5A Review on mobile SMS Spam filtering techniques1345
6An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price1342
7A review on artificial intelligence methodologies for the forecasting of crude oil price1329
8Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things1310
9Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network1308
10Dynamics of watermark position in audio watermarked files using neural networks1305
11BSCL: Blockchain-Oriented SDN Controlled cloud based Li-Fi communication architecture for smart city network1295
12Software defined-network for real-time operations of business intelligence tasks1285
13Factors influencing adoption of cryptocurrency-based transaction from an Islamic perspective1280
14Cryptocurrency adoption in e-payment: barrier of its implementation1277
15Advances in teaching and learning on facebook in higher institutions1275
16Exploring the challenges of MP3 audio steganography1274
17A new static cost-effective parameter for interconnection networks of massively parallel computer systems1271
18Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm1267
19Modified neural network activation function1259
20A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid1249
21Sensor enhanced health information systems: issues and challenges1244
22An appraisal of Malaysian hospital websites as a new media tool for improving healthcare information: a systematic review1236
23Online fake news detection algorithm1232
24Critical factors influencing effective of ICT resources and capabilities1232
25Text normalization algorithm for facebook chats in Hausa language1231
26VisUN-3D: User navigation with visualized 3D maps for mobile users1218
27Malaria severity classification through Jordan-Elman neural network based on features extracted from thick blood smear1217
28An intermediate significant bit (ISB) watermarking technique using neural networks1211
29Comparing performances of neural network models built through transformed and original data1207
30CPU scheduling with a round Robin algorithm based on an effective time slice1198