IIUM Repository

Ahmad Nazreen Mohd Shamsuri (PT)

KULLIYYAH OF INFORMATION & COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Zeki, Akram M. , ed. (2015) Multimedia and its applications. IIUM Press, International Islamic University Malaysia. ISBN 9789674183127
  2. Zeki, Akram M. , ed. (2015) Internet applications. IIUM Press, International Islamic University Malaysia. ISBN 978-967-418-313-4
  3. Ahmed, Aldossary Alia and Zeki, Akram M. (2014) The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 23rd-24th December 2013, Kuching, Sarawak.
  4. Wan Mamat, Wan Ali (2014) Sejarah perkembangan perpustakaan Tan Sri Omar Mohd Hashim, persatuan sejarah Malaysia1. Warkah PSM, 42 (14). pp. 5-7. ISSN 1675-0594
  5. Wan Mamat, Wan Ali (2013) Kutai Inscriptions. Warkah PSM, 37 (13). pp. 11-15. ISSN 1675-0594
  6. Wan Mamat, Wan Ali (2014) An introduction to Malay manuscripts. IIUM Press, International Islamic University Malaysia. ISBN 9789674183158
  7. Abdul Rahman, Abdul Wahab and Kamaruddin, Norhaslinda and M. Nor, Norzaliza and Abut, Huseyin (2014) Pre-and postaccident emotion analysis on driving behavior. In: Smart Mobile In-Vehicle Systems. Next Generation Advancements, 4 . Springer New York, New York Heidelberg Dordrecht London, pp. 225-239. ISBN 978-1-4614-9119-4 (P), 978-1-4614-9120-0 (O)
  8. Basamh, Saeed S. and Qudaih, Hani A. and Ibrahim, Jamaludin (2014) An overview on cyber security awareness in Muslim countries. International Journal of Information and Communication Technology Research, 4 (1). pp. 21-24. ISSN 2223-4985
  9. Sylla, Mohamed and Muhammad, Gul and Habib, Kaleem and Ibrahim, Jamaludin (2013) Combinatoric Drag–Pattern-Graphical-Password (DPGP). Journal of Emerging Trends in Computing and Information Sciences, 4 (12). pp. 939-943. ISSN 2218-6301 (O), 2079-8407 (P)
  10. Safitri, Cutifa and Shoukat Ali, Haroon and Ibrahim, Jamaludin (2013) A study: cryptology techniques and methodologies. International Journal of Science and Research (IJSR), 2 (12). pp. 352-357. ISSN 2319-7064
  11. Muataz Hazza, Zubaidah and Abdul Aziz, Normaziah (2012) Detecting computer generated images for image spam filtering. In: 2012 International Conference on Advanced Computer Science Applications and Technologies, 26-28 Nov. 2012, Kuala Lumpur.
  12. Abdul Rahman, Abdul Wahab and Tan, Eng Chong and Ngiam, Chong Wah and Ong, Swee Eng and Wong, Kin Keong (1997) A low-cost yet accurate approach to a vehicle location tracking system. In: 1997 International Conference on Information, Communications and Signal Processing (ICICS'97), 9-12 September 1997, Singapore.
  13. E., C.Tan and Abdul Rahman, Abdul Wahab and G. , H. Goh and S., H. Wong (1998) PC-controlled scent system. IEEE Transactions on Consumer Electronis, 44 (1). pp. 130-136. ISSN 0098-3063
  14. Abdul Rahman, Abdul Wahab and Eng, Chong Tan and Abut, Huseyin (2001) CMAC spectral subtraction for speech enhancement. In: 6th International Symposium on Signal Processing and Its Applications (ISSPA 2001), 13 Aug.-16 Aug. 2001, Kuala Lumpur.
  15. Kai, Keng Ang and Quek, Chai and Abdul Rahman, Abdul Wahab (2002) MCMAC–CVT: a novel on-line associative memory based CVT transmission control system. Neural Networks, 15 (2). pp. 219-236. ISSN 0893-6080
  16. Geok, See Ng and Shi, Daming and Abdul Rahman, Abdul Wahab and Singh, H. (2003) Entropy learning in neural network. ASEAN Journal for Science and Technology Development, 20 (3&4). pp. 307-322. ISSN 0217-5460 (P), 0976-3376 (O)
  17. Geok, See Ng and Abdul Rahman, Abdul Wahab and Shi, Daming (2003) Entropy learning and relevance criteria for neural network pruning. Internation Journal of Neural Systems, 13 (5). pp. 291-305. ISSN 0129-0657 (P), 1793-6462 (O)
  18. Geok, See Ng and Murali, T. and Shi, Dingding and Abdul Rahman, Abdul Wahab (2004) Application of EFUNN for the classification of handwritten digits. International Journal of Computers, Systems and Signals, 5 (2). pp. 27-35.
  19. Abdul Rahman, Abdul Wahab and Kong, Y. K. and Quek, Chai (2006) Model reference adaptive control on glucose for the treatment of diabetes mellitus. In: 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS'06), 22–23 June 2006, Salt Lake City, Utah.
  20. Kamaruddin, Norhaslinda and Abdul Rahman, Abdul Wahab (2008) Speech emotion verification system (SEVS) based on MFCC for real time applications. In: 4th International Conference on Intelligent Environments, IE 08, 21-22 July 2008, Seattle, WA.

Most Viewed Items

Item titleViews
1An overview on cyber security awareness in Muslim countries1067
2Cloud computing adoption model for universities to increase ICT proficiency635
3Pre-and postaccident emotion analysis on driving behavior611
4An introduction to Malay manuscripts609
5Visual interactive Islamic learning system for children579
6Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices572
7Effective utilization of 3D representation in mobile device for pedestrian navigation aid556
8Computational intelligence techniques with application to crude oil price projection: A literature survey from 2001-2012 537
9MCMAC–CVT: a novel on-line associative memory based CVT transmission control system529
10Sejarah perkembangan perpustakaan Tan Sri Omar Mohd Hashim, persatuan sejarah Malaysia1512
11A study: cryptology techniques and methodologies501
12Valence-arousal approach for speech emotion recognition system496
13EEG emotion recognition system494
14PC-controlled scent system493
15Affective face processing analysis in autism using electroencephalogram491
16Detecting computer generated images for image spam filtering489
17Randomized text encryption: a new dimension in cryptography479
18Kernel functions for the support vector machine: comparing performances on crude oil price data476
19The dynamic emotion recognition system based on functional connectivity of brain regions473
20Feature ranking through weights manipulations for artificial neural networks-based classifiers468
21Concomitant aorto-axillary bypass and beating heart total arterial coronary artery bypass grafting by RIMA-LIMA “Y” graft457
22Kutai Inscriptions454
23The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia447
24Web interactive multimedia technology evolution446
25Investigation on dynamic speech emotion from the perspective of brain associative memory.443
26A framework for realizing universal standardization for internet of things441
27Low cost softswitch using SIP protocol441
28Does software design complexity have effects on defects438
29Combinatoric Drag–Pattern-Graphical-Password (DPGP)432
30Entropy learning in neural network426