IIUM Repository

Professor Imad Taha

Head of Research

Department of Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

PhD in Computer Science

Profile Picture

Latest Additions

  1. Varadarajan, Vijayakumar and Neelanarayanan, Venkataraman and Doyle, Ron and Alshaikhli, Imad Fakhri Taha and Groppe, Sven (2019) Editorial: mobile networks in the era of big data. Mobile Networks and Applications, 24 (4). pp. 1135-1138. ISSN 1383-469X E-ISSN 1572-8153
  2. Alyaseen, Imad Fakhri Taha (2019) A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience, 16 (3). 799-799(1). ISSN 1546-1955 E-ISSN 1546-1963 (In Press)
  3. Vijayakumar, Varadarajan and Neelanarayanan, Venkataraman and Doyle, Ron and Alshaikhli, Imad Fakhri Taha and Sven, Groppe (2019) Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications, 24 (3). pp. 1015-1017. ISSN 1383-469X E-ISSN 1572-8153
  4. Al-Dabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha and Al-Enezi, Khalid Abdulkareem and Alyaqoup, Mohammed Jasem (2016) Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015, 8th-10th Dec. 2015, Kuala Lumpur.
  5. Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2018) Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology, 7 (4.15). pp. 519-523. ISSN 2227-524X
  6. Rabiul Islam, Mohammad and Taha Alshaikhli, Imad Fakhri and Mohd. Nor, Rizal and Mohammad, Kabir Sardar (2018) Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 23rd-25th July 2018, Kuala Lumpur.
  7. Alahmad, Mohammad and Taha Alshaikhli, Imad Fakhri (2017) Protection of the digital holy Quran using IT techniques. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-789-7
  8. Taha Alshaikhli, Imad Fakhri and Al-Dabbagh, Sufyan Salim Mahmood and Zaba, Muhammad Reza (2017) Enhancement of lightweight block cipher algorithms. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-695-1
  9. Taha Alshaikhli, Haifa and Alzuabi, Imad Fakhri (2017) Effectiveness and performance of e-government in Saudi Arabia. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-680-7
  10. Taha Alshaikhli, Imad Fakhri and Alenezi, Khalid (2017) Minimum capabilities and requirements for establishing a national cert for AGC. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-682-1
  11. Taha Alshaikhli, Imad Fakhri and Alkandari, Abdulrahman (2017) Dynamic fuzzy logic traffic light integrated system with accident detection and action. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-673-9
  12. Taha Alshaikhli, Imad Fakhri (2018) Structure of research proposal. In: Postgraduate Development Program (Package 2), 9th Dec. 2018, Kuala Lumpur. (Unpublished)
  13. Taha Alshaikhli, Imad Fakhri (2018) Scientific research in view of Quran and the creation of Allah s w t. In: Seminar of Information Retrieval and knowledge management SIRKM 2018, 13th September 2018, Kuala Lumpur. (Unpublished)
  14. Taha Alshaikhli, Imad Fakhri (2018) Scientific research in view of Quran and the creation of Allah s.w.t. In: International Conference on Computer Assisted Systems in Health (CASH 2018), 1st-2nd September 2018, Seri Kembangan, Selangor,. (Unpublished)
  15. Beroual, Abdessalam and Alshaikhli, Imad Fakhri Taha (2018) A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1). pp. 1-6. E-ISSN 2462-229X
  16. Farajalla Ali, Nawafil Abdulwahab and Taha Alshaikhli, Imad Fakhri and Hassan, Raini (2018) Detection and restoration of cracked digitized paintings and manuscripts using image processing. International Journal of Engineering & Technology, 7 (2.34). pp. 39-43. ISSN 2227-524X
  17. Al-Khayyat, Kamal and Alshaikhli, Imad Fakhri Taha and V, Vijaykumar V (2018) Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal. International Journal of Engineering & Technology, 7 (2 (Special Issue 34)). pp. 34-38. ISSN 2227-524X
  18. Islam, Muhammad Rabiul and Taha Alshaikhli, Imad Fakhri and Abdulkadir, A. (2018) A scientific review of soft-computing techniques and methods for stock market prediction. International Journal of Engineering and Technology, 7 (2.5). pp. 27-31. ISSN 2227-524X
  19. Sulaiman, Alyaa Ghanim and Taha Alshaikhli, Imad Fakhri and Wahiddin, Mohamed Ridza and Houri, S and Jamil, Norziana and Ismail, Ahmad Fadzil (2018) A novel secret key generation based on image link. International Journal of Engineering and Technology, 7 (2.5). pp. 23-26. ISSN 2227-524X
  20. Abdulkareem Al-Enezi, Khalid and Taha Alshaikhli, Imad Fakhri and AlDabbagh, SufyaSalim Mahmood (2018) The influence of internet and social media on purchasing decisions in Kuwait. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2). pp. 792-797. ISSN 2502-4752

Most Viewed Items

Item titleViews
1Smart cities: a survey1821
2A practical method for the analysis of genetic algorithms1393
3Protection of the digital holy Quran using SAB hash function1377
4The ethical dilemma of software piracy: an inquiry from an Islamic perspective1369
5Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia1349
6Feige-Fiat-Shamir identification scheme1274
7Emotion recognition model using source-temporal features and fuzzy1271
8EEG emotion recognition based on the dimensional models of emotions1270
9An improved genetic algorithm for solving the multiprocessor scheduling problem1254
10Security threats of finger print biometric in network system environment1235
11Biodynamics of HCV infection in haemodialysis patients in Pahang1208
12Joux multicollisions attack in sponge construction1194
13Affective computing model using source-temporal domain1154
14Zero-knowledge-proof1148
15Multicollisions in sponge construction1146
16Hash function of finalist SHA-3: analysis study1138
17Evaluation of usability problems of labor portal in Saudi Arabia1124
18MOIM: a novel design of cryptographic hash function1124
19Achieving security by combining Huffman and SLSB algorithms1103
20Achieving security for images by LSB and MD51102
21Broad view of cryptographic hash functions1099
22Quality evaluation of “safeer” portal for Saudi students studying abroad 1098
23Background of zero-knowledge proof1090
24Traffic management system based on wsn in Kuwait: an initial design1084
25Block and stream cipher1084
26Introduction1080
27Cryptanalysis of RSA1057
28SVG and Arabic font challenges and improvements1054
29Data Encryption Standard (DES)1040
30Blakely’s secret sharing scheme1039