IIUM Repository

Professor Imad Taha

Head of Research

Department of Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

PhD in Computer Science

Profile Picture

Latest Additions

  1. Alshaikhli, Imad Fakhri Taha (2020) Phd journey: from problem statement to viva. [Copyright] (Unpublished)
  2. Taha Alshaikhli, Imad Fakhri (2017) Structure of research proposal. [Copyright] (Unpublished)
  3. Rahiman, Musharaf Unissa and Alyaseen, Imad Fakhri Taha and Eljadi, Fardous Mohamed (2019) The scalability challenge of the blockchain: a review. Journal of Advanced Computer Science and Technology Research, 9 (2). pp. 13-19. ISSN 2314-7350 E-ISSN 2231-8852
  4. hattab, Siham and Alyaseen, Imad Fakhri Taha (2019) Consensus algorithms blockchain: a comparative study. International Journal on Perceptive and Cognitive Computing (IJPCC), 5 (2). pp. 66-71. E-ISSN 2462-229X
  5. Mattar, Safar S. and Taha Alshaikhli, Imad Fakhri and Hassan Abdalla Hashim, Aisha (2019) Theoretical review of routing protocols used for wireless community networks. Journal of Computational and Theoretical Nanoscience, 16 (9). pp. 3656-3662. ISSN 1546-1955 E-ISSN 1546-1963
  6. Abdulrazzaq, M. M. and Alshaikhli, Imad Fakhri Taha and Mohd Noah, Shahrul Azman and Fadhil, M. A. and Ashour, M. U. (2019) XMIAR: X-ray medical image annotation and retrieval. In: Computer Vision Conference, CVC 2019, 25-26 April 2019, Las Vegas, USA.
  7. al-enizi, Khalid and Taha Alshaikhli, Imad Fakhri and Mahmood Aldabbagh, Sufyan Salim and Mohammad Alwuhaib, Jassim (2019) The influence of Internet and social media on purchasing decisions in Indonesia and a comparison between Indonesia and Kuwait. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 1029-1034. ISSN 1546-1955 E-ISSN 1546-1963
  8. abdulwahab, Nawafil and Taha Alshaikhli, Imad Fakhri and Hassan, Raini and Ismail, Amelia Ritahani (2019) Detection of cracked digitized paintings and manuscripts based on threshold techniques. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 1108-1113. ISSN 1546-1955 E-ISSN 1546-1963
  9. Alawadhi, Nayef and Taha Alshaikhli, Imad Fakhri and Alkandari, Abdulrahman and Tahir, Mahnaz (2019) Optimal path planning for urban vehicles using Internet of Things: a new navigation perspective. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 1074-1080. ISSN 1546-1955 E-ISSN 1546-1963
  10. Islam, Mohammad Rabiul and Taha Alshaikhli, Imad Fakhri and Mohd Nor, Rizal and Tumian, Afidalina (2019) Neural network and principle component analysis based numerical data analysis for stock market prediction with machine learning techniques. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 806-812. ISSN 1546-1955 E-ISSN 1546-1963
  11. Taha Alshaikhli, Imad Fakhri (2019) Scientific research in view of Quran and the creation of Allah s w t. [Copyright] (Unpublished)
  12. Al-Khayyat, Kamal A. and Alshaikhli, Imad Fakhri Taha (2019) Increasing the runs in compressed data using a dedicated move to front algorithm. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 903-906. E-ISSN 1546-1955
  13. Varadarajan, Vijayakumar and Neelanarayanan, Venkataraman and Doyle, Ron and Alshaikhli, Imad Fakhri Taha and Groppe, Sven (2019) Editorial: mobile networks in the era of big data. Mobile Networks and Applications, 24 (4). pp. 1135-1138. ISSN 1383-469X E-ISSN 1572-8153
  14. Alyaseen, Imad Fakhri Taha (2019) A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience, 16 (3). 799-799(1). ISSN 1546-1955 E-ISSN 1546-1963 (In Press)
  15. Vijayakumar, Varadarajan and Neelanarayanan, Venkataraman and Doyle, Ron and Alshaikhli, Imad Fakhri Taha and Sven, Groppe (2019) Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications, 24 (3). pp. 1015-1017. ISSN 1383-469X E-ISSN 1572-8153
  16. Al-Dabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha and Al-Enezi, Khalid Abdulkareem and Alyaqoup, Mohammed Jasem (2016) Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015, 8th-10th Dec. 2015, Kuala Lumpur.
  17. Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2018) Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology, 7 (4.15). pp. 519-523. ISSN 2227-524X
  18. Rabiul Islam, Mohammad and Taha Alshaikhli, Imad Fakhri and Mohd. Nor, Rizal and Mohammad, Kabir Sardar (2018) Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 23rd-25th July 2018, Kuala Lumpur.
  19. Alahmad, Mohammad and Taha Alshaikhli, Imad Fakhri (2017) Protection of the digital holy Quran using IT techniques. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-789-7
  20. Taha Alshaikhli, Imad Fakhri and Al-Dabbagh, Sufyan Salim Mahmood and Zaba, Muhammad Reza (2017) Enhancement of lightweight block cipher algorithms. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-695-1

Most Viewed Items

Item titleViews
1Smart cities: a survey2000
2Feige-Fiat-Shamir identification scheme1581
3Protection of the digital holy Quran using SAB hash function1559
4A practical method for the analysis of genetic algorithms1545
5Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia1533
6The ethical dilemma of software piracy: an inquiry from an Islamic perspective1519
7EEG emotion recognition based on the dimensional models of emotions1451
8Zero-knowledge-proof1435
9Emotion recognition model using source-temporal features and fuzzy1430
10An improved genetic algorithm for solving the multiprocessor scheduling problem1422
11Security threats of finger print biometric in network system environment1396
12Biodynamics of HCV infection in haemodialysis patients in Pahang1365
13Joux multicollisions attack in sponge construction1363
14Affective computing model using source-temporal domain1310
15Hash function of finalist SHA-3: analysis study1292
16Multicollisions in sponge construction1283
17MOIM: a novel design of cryptographic hash function1278
18Evaluation of usability problems of labor portal in Saudi Arabia1273
19Block and stream cipher1266
20Broad view of cryptographic hash functions1263
21Background of zero-knowledge proof1262
22Achieving security by combining Huffman and SLSB algorithms1257
23Quality evaluation of “safeer” portal for Saudi students studying abroad 1255
24Achieving security for images by LSB and MD51252
25Introduction1249
26Traffic management system based on wsn in Kuwait: an initial design1241
27Cryptanalysis of RSA1223
28Blakely’s secret sharing scheme1217
29SHA family hash function1202
30Protection of text using SHA1 and Base641201