IIUM Repository

Professor Imad Taha

Head of Research

Department of Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

PhD in Computer Science

Profile Picture

Latest Additions

  1. abdulwahab, Nawafil and Taha Alshaikhli, Imad Fakhri (2020) Image De-Noising techniques: a comparative study. Journal of Advanced Computer Science And Technology Research, 10 (2). pp. 21-37. ISSN 2314-7350 E-ISSN 2231-8852
  2. Alshaikhli, Imad Fakhri Taha (2020) Phd journey: from problem statement to viva. [Copyright] (Unpublished)
  3. Taha Alshaikhli, Imad Fakhri (2017) Structure of research proposal. [Copyright] (Unpublished)
  4. Rahiman, Musharaf Unissa and Alyaseen, Imad Fakhri Taha and Eljadi, Fardous Mohamed (2019) The scalability challenge of the blockchain: a review. Journal of Advanced Computer Science and Technology Research, 9 (2). pp. 13-19. ISSN 2314-7350 E-ISSN 2231-8852
  5. hattab, Siham and Alyaseen, Imad Fakhri Taha (2019) Consensus algorithms blockchain: a comparative study. International Journal on Perceptive and Cognitive Computing (IJPCC), 5 (2). pp. 66-71. E-ISSN 2462-229X
  6. Mattar, Safar S. and Taha Alshaikhli, Imad Fakhri and Hassan Abdalla Hashim, Aisha (2019) Theoretical review of routing protocols used for wireless community networks. Journal of Computational and Theoretical Nanoscience, 16 (9). pp. 3656-3662. ISSN 1546-1955 E-ISSN 1546-1963
  7. Abdulrazzaq, M. M. and Alshaikhli, Imad Fakhri Taha and Mohd Noah, Shahrul Azman and Fadhil, M. A. and Ashour, M. U. (2019) XMIAR: X-ray medical image annotation and retrieval. In: Computer Vision Conference, CVC 2019, 25-26 April 2019, Las Vegas, USA.
  8. al-enizi, Khalid and Taha Alshaikhli, Imad Fakhri and Mahmood Aldabbagh, Sufyan Salim and Mohammad Alwuhaib, Jassim (2019) The influence of Internet and social media on purchasing decisions in Indonesia and a comparison between Indonesia and Kuwait. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 1029-1034. ISSN 1546-1955 E-ISSN 1546-1963
  9. abdulwahab, Nawafil and Taha Alshaikhli, Imad Fakhri and Hassan, Raini and Ismail, Amelia Ritahani (2019) Detection of cracked digitized paintings and manuscripts based on threshold techniques. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 1108-1113. ISSN 1546-1955 E-ISSN 1546-1963
  10. Alawadhi, Nayef and Taha Alshaikhli, Imad Fakhri and Alkandari, Abdulrahman and Tahir, Mahnaz (2019) Optimal path planning for urban vehicles using Internet of Things: a new navigation perspective. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 1074-1080. ISSN 1546-1955 E-ISSN 1546-1963
  11. Islam, Mohammad Rabiul and Taha Alshaikhli, Imad Fakhri and Mohd Nor, Rizal and Tumian, Afidalina (2019) Neural network and principle component analysis based numerical data analysis for stock market prediction with machine learning techniques. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 806-812. ISSN 1546-1955 E-ISSN 1546-1963
  12. Taha Alshaikhli, Imad Fakhri (2019) Scientific research in view of Quran and the creation of Allah s w t. [Copyright] (Unpublished)
  13. Al-Khayyat, Kamal A. and Alshaikhli, Imad Fakhri Taha (2019) Increasing the runs in compressed data using a dedicated move to front algorithm. Journal of Computational and Theoretical Nanoscience, 16 (3). pp. 903-906. E-ISSN 1546-1955
  14. Varadarajan, Vijayakumar and Neelanarayanan, Venkataraman and Doyle, Ron and Alshaikhli, Imad Fakhri Taha and Groppe, Sven (2019) Editorial: mobile networks in the era of big data. Mobile Networks and Applications, 24 (4). pp. 1135-1138. ISSN 1383-469X E-ISSN 1572-8153
  15. Alyaseen, Imad Fakhri Taha (2019) A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience, 16 (3). 799-799(1). ISSN 1546-1955 E-ISSN 1546-1963 (In Press)
  16. Vijayakumar, Varadarajan and Neelanarayanan, Venkataraman and Doyle, Ron and Alshaikhli, Imad Fakhri Taha and Sven, Groppe (2019) Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications, 24 (3). pp. 1015-1017. ISSN 1383-469X E-ISSN 1572-8153
  17. Al-Dabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha and Al-Enezi, Khalid Abdulkareem and Alyaqoup, Mohammed Jasem (2016) Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015, 8th-10th Dec. 2015, Kuala Lumpur.
  18. Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2018) Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology, 7 (4.15). pp. 519-523. ISSN 2227-524X
  19. Rabiul Islam, Mohammad and Taha Alshaikhli, Imad Fakhri and Mohd. Nor, Rizal and Mohammad, Kabir Sardar (2018) Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 23rd-25th July 2018, Kuala Lumpur.
  20. Alahmad, Mohammad and Taha Alshaikhli, Imad Fakhri (2017) Protection of the digital holy Quran using IT techniques. IIUM Press, International Islamic University Malaysia, Kuala Lumpur, Malaysia. ISBN 978-967-418-789-7

Most Viewed Items

Item titleViews
1Smart cities: a survey2048
2Feige-Fiat-Shamir identification scheme1626
3Protection of the digital holy Quran using SAB hash function1618
4A practical method for the analysis of genetic algorithms1606
5Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia1582
6The ethical dilemma of software piracy: an inquiry from an Islamic perspective1573
7EEG emotion recognition based on the dimensional models of emotions1508
8Zero-knowledge-proof1494
9Emotion recognition model using source-temporal features and fuzzy1485
10An improved genetic algorithm for solving the multiprocessor scheduling problem1477
11Security threats of finger print biometric in network system environment1448
12Joux multicollisions attack in sponge construction1413
13Biodynamics of HCV infection in haemodialysis patients in Pahang1409
14Affective computing model using source-temporal domain1360
15Hash function of finalist SHA-3: analysis study1342
16Multicollisions in sponge construction1332
17MOIM: a novel design of cryptographic hash function1327
18Evaluation of usability problems of labor portal in Saudi Arabia1325
19Broad view of cryptographic hash functions1315
20Block and stream cipher1312
21Achieving security by combining Huffman and SLSB algorithms1308
22Achieving security for images by LSB and MD51306
23Background of zero-knowledge proof1304
24Quality evaluation of “safeer” portal for Saudi students studying abroad 1301
25Traffic management system based on wsn in Kuwait: an initial design1290
26Introduction1283
27Cryptanalysis of RSA1258
28Blakely’s secret sharing scheme1253
29Monoalphabetic substitution cipher1253
30Protection of text using SHA1 and Base641247