IIUM Repository (IREP)

Items where Subject is "Q Science > QA Mathematics > QA75 Electronic computers. Computer science"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator/Author | Item Type
Jump to: | , | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | W | Y | Z
Number of items at this level: 591.

AlAhmad, Mohammad A. and Alshaikhli, Imad Fakhri Taha and Nandi, Mridul (2013) Joux multicollisions attack in sponge construction. In: 6th International Conference on Security of Information and Networks, 26-28 November 2013, Aksaray University, Turkey.

,

, Abdul Hafeez and Muhammad, Muhd. Rosydi and Shah, Asadullah (2011) Integration of ICT in education : an Islamic perspective. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 61-71. ISBN 978-967-418-105-5

A

A. Halim, Fatin Nudra Syafiqah and Zeki, Akram M. (2011) Learning PMR history subject using multimedia. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 51-54. ISBN 978-967-418-105-5

A. Kadir, Andi Fitria and R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Behavioral analysis and visualization of Fast-Flux DNS. In: Intelligence and Security Informatics Conference (EISIC), 2012 European, 22 - 24 August, 2012, Odense, Denmark.

AL-Badareen, Anas Bassam and Selamat, Mohd Hasan and Din, Jamilah and A. Jabar, Marzanah and Turaev, Sherzod (2012) Maintainability and reusability: The relationships. In: Workshop on Advanced Information Technology (WIT - A2012), 25 – 26 June 2012, Sydney, Australia.

Abawajy, Jemal and Pathan, Mukaddim and Rahman, Mustafizur and Pathan, Al-Sakib Khan and Deris, Mustafa Mat (2012) Internet and distributed computing advancements : theoretical frameworks and practical applications. IGI Global, USA, USA. ISBN ISBN13: 9781466601611, ISBN10: 1466601612

Abawajy, Jemal H. and Pathan, Mukaddim and Rahman, Mustafizur and Pathan, Al-Sakib Khan and Mat Deris, Mustafa (2013) Network and traffic engineering in emerging distributed computing applications. IGI Global, USA, USA. ISBN 9781466618886

Abd Malik, Sofianiza (2012) Effects of culture and age on attitudes to mobile technology. In: International Conference on Computer and Information Sciences (ICCIS 2012), 12-14 June 2012, Kuala Lumpur Convention Centre.

Abd Malik, Sofianiza (2010) Investigation of cultural dependency in mobile technology and older adults. In: Proceedings of the 28th of the International Conference Extended Abstracts on Human Factors in Computing System, April 10 - 15, 2010 , Atlanta, GA, USA .

Abd Malik, Sofianiza and Azuddin, Muna (2013) The use of technology by older people. International Journal of Interactive Digital Media, 1 (3). pp. 65-68. ISSN 2289-4101 (O), 2289-4098 (P)

Abdalla , Al-kindy Athman and Pathan, Al-Sakib Khan (2014) On protecting data storage in mobile cloud computing paradigm. IETE Technical Review, 31 (1). pp. 82-91. ISSN 0256-4602 (P); 0974-5971 (O)

Abdel-Shafi F., Obada and Wahiddin, Mohamed Ridza and Abdel-Aty, Mahmoud (2008) Transient entropy squeezing of a single-Cooper-pair box placed inside a phase-damped cavity. Optics Communications, 281 (24). pp. 6019-6023. ISSN 0030-4018

Abdelgadir , Tageldin and Pathan, Al-Sakib Khan (2013) A pragmatic approach of performance evaluation of MPI-OpenMP on a 12 nodes multi-core cluster. In: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, USA, USA. ISBN 9781466507616

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) Data hiding within color images based on MCT with x-or operations. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak, Malaysia.

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2014) Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach. Computers & Electrical Engineering, 40 (4). pp. 1390-1404. ISSN 0045-7906 (In Press)

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) Reversible data hiding scheme based on 3-Least significant bits and mix column transform. In: 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013, Sydney, Australia. (Unpublished)

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) A new data hiding technique based on irreducible polynomials. Journal of Emerging Technologies in Web Intelligence. ISSN 1798-0461 (In Press)

Abdul Aziz, Normaziah and Adebayo, Surajudeen Adebayo (2015) The trend of mobile malwares and effective detection techniques. In: Critical Socio-Technical Issues Surrounding Mobile Computing. IGI-Global, pp. 219-233. ISBN 9781466694385

Abdul Aziz, Normaziah and Ali, Aniyath and Abdul Wahab, Mahmoud (2011) Investigating computer forensic tools and their searching technique. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 69-85. ISBN 9789674181062

Abdul Aziz, Normaziah and Ishraf Shuib, Ahmad Hasnul and Awalluddin, Mohd Fazlie (2011) Pronouncing dictionary for minority languages of Muslim community. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 157-166. ISBN 9789674181062

Abdul Aziz, Normaziah and Mansor, Yushiana and Sarif Abdullah, Sharifah Nur Amirah and Mohd Shah, Siti Raihana and Aersid, Nurul Farhana (2014) Normalizing library records display using FRBR model for al-Qur'an work-set. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov 2014, Kuching.

Abdul Aziz, Normaziah and Mohamad, Noranidah and Ahmad Murad, Nur Afifah (2011) Web and mobile based phrase dictionary. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 1-9. ISBN 9789674181062

Abdul Aziz, Normaziah and Mohd Kanafia, Milly Ahfizah and Haseng, Salmiah (2011) Secure coding in cross site scripting. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 143-156. ISBN 9789674181062

Abdul Aziz, Normaziah and Mokti, Fakhrulrazi and M. Nozri, Mohd Nadhar (2015) Mobile device forensics: extracting and analysing data from an android-based smartphone. In: The Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2015), 29-30 October 2015, Jakarta.

Abdul Aziz, Normaziah and Odenan, M. Amar and M. Khadafi, Taufiq (2011) Computerized observation and motion in badminton tracking system. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 11-20. ISBN 9789674181062

Abdul Aziz, Normaziah and Odenan, M. Amar and M. Khadafi, Taufiq (2011) An online badminton motion tracking system. In: The Web: Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 149-158. ISBN 978-967-418-112-3

Abdul Aziz, Normaziah and Zainuddin, Nor Harisah (2011) Web application - What makes it secure or insecure? In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 263-271. ISBN 978-967-418-112-3

Abdul Fatin, Ahmad Faridi and Zuhra, Aqqiela and Alshaikhli, Imad Fakhri Taha and Shah, Asadullah (2011) Implementing DNA sequence using genetic algorithm. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 27-36. ISBN 978-967-418-107-9

Abdul Hamid, Mohd Naim and Othman, Roslina (2011) Malaysian teachers network portal. In: Issues of Human Computer Interactions and System Developments. IIUM Press, Kuala Lumpur, pp. 91-107. ISBN 978-967-418-082-9

Abdul Karim, Nor Shahriza and Ahmad Zamzuri, Nurul Hidayah and Muhamad Nor, Yakinah (2009) Exploring the relationship between Internet ethics in university students and the big five model of personality. Computers & Education, 53 (1). pp. 86-93. ISSN 0360-1315

Abdul Karim, Nor Shariza and Raja Othman, Raja Zarina and Ismail, Mohd Shukri and Maidin, Ainul Jaria (2011) Identifying and overcoming the risk of fraud in the Malaysian electronic land administration. In: 2011 International Conference on Research and Innovation in Information Systems, ICRIIS'11, 23-24 Nov. 2011 , Kuala Lumpur.

Abdul Rahman, Abdul Wahab (2010) Motor movement for autism spectrum disorder (ASD) detection. In: 3rd International Conference on Information and Communication Technology for the Moslem World: ICT Connecting Cultures, ICT4M 2010; , 13-14 Dec 2010, Jakarta.

Abdul Rahman, Abdul Wahab and Abdul Majid, Hariyati Shahrima (2012) Understanding meditation through neural computing approach. Research Report. [s.n]. (Unpublished)

Abdul Rahman, Abdul Wahab and Basiron, Nor Fadilah and Ishak, Nor Ashikin (2011) Emotion speech recognition using KDE and MLP neural networks. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 55-67. ISBN 9789674181062

Abdul Rahman, Abdul Wahab and Harun, Nor Akmal and Lipoh, Norasyikin (2011) A study using driving simulator to understand driver's perception a priori and post priori of accidents. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 125-141. ISBN 9789674181062

Abdul Rahman, Abdul Wahab and Md Nor, Norzaliza and Ismail, Asma' (2011) Driver identification and driver's emotion verification using KDE and MLP neural networks. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 35-53. ISBN 9789674181062

Abdul Rahman, Abdul Wahab and Nuji, Norazilah and Ahmad, Kadijah Adibah (2011) Analyzing driving behaviour using speech recognition through KDE and MLP. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 21-34. ISBN 9789674181062

Abdul Rahman, Abdul Wahab and Quek, Chai (2009) A novel associative memory approach to speech enhancement in a vehicular environment. Expert System with Application, 36 (10). pp. 12120-12130. ISSN 09574174

Abdul Rahman, Abdul Wahab and Roslan, Nur Izrin and Mohd Hasnan, Siti Nor Haizum (2011) Brainwave study on the effect of music on perception. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 95-111. ISBN 9789674181062

Abdul-Rahman Abed, Bassam and Ismail, Amelia Ritahani and Abdul Aziz, Normaziah (2015) Real time astrocyte in spiking neural network. In: 2015 SAI Intelligent Systems Conference (IntelliSys 2015), 10th-11th Nov. 2015, London, United Kingdom.

Abdulghafor, Rawad and Shahidi, Farruh and M.Khedher, Akram M. Zeki and Turaev, Sherzod (2016) Dynamics of doubly stochastic quadratic operators on a finite-dimensional simplex. Open Mathematics, 14 (1). pp. 509-519. ISSN 2391-5455

Abdulghafor, Rawad and Shahidi, Farruh and Zeki, Akram M. and Turaev, Sherzod (2016) Dynamics classifications of extreme doubly stochastic quadratic operators on 2D simplex. In: Advanced Computer and Communication Engineering Technology, LNEE. Springer International Publishing, Switzerland, pp. 323-335. ISBN 978-3-319-24582-9

Abdulghafor, Rawad and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin (2016) Nonlinear consensus for multi-agent systems using positive intractions of doubly stochastic quadratic operators. International Journal on Perceptive and Cognitive Computing (IJPCC), 2 (1). pp. 19-22. ISSN 2462 - 229X

Abdulkareem Alenezi, Khaled and Taha Alshaikhli , Imad Fakhri and Abdullah, Lili Marziana and AlAhmad, Mohammad A. (2015) CERT team involving GEs structured. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 3 (3). pp. 12-26. ISSN 2349-730

Abdullah, Lili Marziana (2011) Applying multiple case studies research to investigate IT development outsourcing project risks. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 163-186. ISBN 9789674180034

Abdullah, Matin Saad and Pathan, Al-Sakib Khan (2013) Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), 25-27 March 2013, Rabat, Morocco.

Abdullah, Matin Saad and Pathan, Al-Sakib Khan and Rahman, Muhammad Abdur (2012) Using the web for critical learning of al-Qur’an’s ‎language: an ‎‎ exploratory case study. In: World Conference on Islamic Thought 2012 (WCIT 2012), 11-12 September 2012, Ipoh, Perak. (In Press)

Abdullateef, Adoyele Isqeel and Salami, Momoh Jimoh Eyiomika and Musse, Mohamud Ahmed and Onasanya, Mobolaji Agbolade and Alebiosu, M. I. (2013) New consumer load prototype for electricity theft monitoring. IOP Conference Series: Materials Science and Engineering, 57 (012061). pp. 1-10. ISSN 1757-8981

Abduvaliyev, Abror and Pathan, Al-Sakib Khan and Jianying, Zhou and Roman, Rodrigo and Wai-Choong, Wong (2012) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15 (3). pp. 1223-1237. ISSN 1553-877X

Abduvaliyev, Abror and Pathan, Al-Sakib Khan and Zhou, Jianying and Roman, Rodrigo and Wong, Wai-Choong (2013) Intrusion detection and prevention in wireless sensor networks. In: Wireless Sensor Networks: Current Status and Future Trends. CRC Press, New York, USA, pp. 487-510. ISBN 9781466506060 (Hardback)

Abu Bakar, Mohd Danel and Othman, Roslina (2011) Bab E-Syifa’ clinic administration system. In: Issues of Human Computer Interactions and System Developments. IIUM Press, Kuala Lumpur, pp. 71-89. ISBN 978-967-418-082-9

Abubakar, Adamu and Haruna, Chiroma and Abdulkareem, Sameem (2015) Comparing performances of neural network models built through transformed and original data. In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015, 21-23 April 2015, Kuching.

Abubakar, Adamu and Waili, T. and Mantoro, Teddy (2012) Unveiling the support of 3D representation in mobile devices for pedestrians navigation aid. In: International Conference on Multimedia Computing and Systems (ICMCS), 2011, 7-9 April 2011, Ouarzazate, Morocco.

Abuzaraida, Mustafa Ali and Zeki, Akram M. and Zeki, Ahmed M. (2013) Feature extraction techniques of online handwriting arabic text recognition. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Accardi, Luigi and Ohno, Hiromichi and Mukhamedov, Farrukh (2010) Quantum Markov fields on graphs. Infinite Dimensional Analysis, Quantum Probability and Related Topics, 13 (2). pp. 165-189. ISSN 0219-0257

Adamu, Abubakar Ibrahim and Mantoro, Teddy and SHAFI’I, M.A. (2012) Dynamic interactive 3D mobile navigation aid. Journal of Theoretical and Applied Information Technology, 37 (2). ISSN 1992-8645 (Print) 1817-3195 (Online)

Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization. In: 2014 World Congress on Information and Communication Technologies (WICT 2014), 8-10 December 2014, Melaka, Malaysia.

Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2015) Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization. Journal of Information Assurance and Security, 10. pp. 152-163. ISSN 1554-1010

Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) Techniques for analysing Android malware. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.

Adebayo, Olawale Surajudeen and Abdul Aziz, Normaziah (2014) An intelligence based model for the prevention of advanced cyber-attacks. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, 17-18 Nov. 2014, Kuching, Sarawak, Malaysia.

Aditiawarman, Umar (2011) Online learning adoption in a developing countries : a case of the Indonesian Open University. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 133-138. ISBN 978-967-418-105-5

Ahmad, Azmi and Ali, Borhanuddin M. and Khatun, Sabira and Hassan, Azmi (2005) Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm. In: 2005 13th International Conference on Networks, 2005, jointly held with the 2005 7th Malaysian International Conference on Communication, 16-18 Nov. 2005, Berjaya Times Square Hotel and Convention Center, Kuala Lumpur.

Ahmad Kamaruddin, Saadi and Md Ghani, Nor Azura and Liong, Choong-Yeun and Jemain, Abdul Aziz (2011) Artificial neural network implementation on firearm recognition system with respect to ring firing pin impression image. In: Kolokium Kebangsaan Pasca Siswazah Sains dan Matematik 2011, 1 Oktober 2011, Dewan Konvensyen, Bangunan E-Learning, UPSI. (Unpublished)

Ahmad Kamaruddin, Saadi and Md Ghani, Nor Azura and Liong, Choong-Yeun and Jemain, Abdul Aziz (2011) Firearm recognition based on whole firing pin impression image via backpropagation neural network. In: 2011 International Conference on Pattern Analysis and Intelligence Robotics (ICPAIR 2011). Institute of Electrical and Electronics Engineers ( IEEE ) , Kuala Lumpur, Malaysia, pp. 117-182. ISBN 9781612844077

Ahmad Kamaruddin, Saadi and Md Ghani, Nor Azura and Liong, Choong-Yeun and Jemain, Abdul Aziz (2011) Firearm recognition based on whole firing pin impression image via backpropagation neural network. In: 2011 International Conference on Pattern Analysis and Intelligent Robotics, ICPAIR 2011, 28-29 June 2011, Putrajaya, Malaysia.

Ahmad Zabidi, Muhammad Najmi and Maarof, Mohd Aizaini and Zainal, Anazida (2011) Ensemble based categorization and adaptive model for malware detection. 2011 7th International Conference on Information Assurance and Security (IAS), 978-1-. pp. 80-85.

Ahmad Zabidi, Muhammad Najmi and Maarof, Mohd Aizaini and Zainal, Anazida (2012) Malware Analysis with Multiple Features. In: UKSim 14th International Conference on Computer Modelling and Simulation, UKSim2012 (UKSim2012), 28-30th March 2012, University of Cambridge, United Kingdom. (Unpublished)

Ahmed, Mohiuddin and Khan, Md. Raisuddin and Billah, Md. Masum (2010) Autonomous reconnaissance mission: development of an algorithm for collaborative multi robot communication. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Ahmed, Mohuiddin and Zahda, Showayb and Abbas, Majed (2008) Server consolidation using OpenVZ: performance evaluation. Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008. pp. 341-346. ISSN 1424421367

Ahmed, Tarem and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2014) Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms. International Journal of Control and Automation, 7 (3). pp. 389-400. ISSN 2005-4297

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Automated intruder detection from image sequences using minimum volume sets. International Journal of Communication Networks and Information Security, 4 (1). pp. 11-17. ISSN 2073-607X (O), 2076-0930 (P)

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2013) Automated visual surveillance using kernel tricks. In: ENS/INRIA Visual Recognition and Machine Learning (CVML 2013), Summer School, 22-26 July, 2013, Paris, France.

Ahmed, Tarem and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2013) Automated surveillance in distributed, wireless visual networks: a comparative study. In: Proceedings International Workshop Mobile and Wireless 2013, 11-13 December 2013, Jeju Island, South Korea.

Ahmed, Tarem and Pathan, Al-Sakib Khan and Ahmed, Supriyo (2014) Adaptive algorithms for automated intruder detection in surveillance networks. In: ICACCI 2014 Doctoral Consortium; 3rd International Conference on Advances in Computing, Communications & Informatics (ICACCI 2014), September 24-27, 2014, Delhi, India, 24-27 Sept. 2014, Delhi, India.

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Efficient and effective automated surveillance agents using kernel tricks. SIMULATION: Transactions of the SCS. ISSN Print ISSN: 0037-5497, Online ISSN: 1741-3133 (In Press)

Akhlaq, Mohammed ather and Shah, Asadullah (2011) Internet banking in Pakistan: finding complexities. Journal of Internet Banking and Commerce, 16 (1). pp. 1-14. ISSN 1204-5357

Al Haek, Mohammed and Ismail , Amelia Ritahani (2014) Understanding the immune responses in granuloma formation through agent-based simulation. In: International Research, Invention and Innovation Exhibition 2014 (IRIIE2014), 11th -13th June 2014, Gombak, Kuala Lumpur.

Al Haek, Mohammed and Ismail , Amelia Ritahani and Ahmed Basalib, Ahmed Omar and Makarim, Nabiel (2015) Exploring energy charging problem in swarm robotic systems using foraging simulation. Jurnal Teknologi, 76 (1). pp. 239-244. ISSN 2180–3722 (O), 0127–9696 (P)

Al Haek, Mohammed and Ismail , Amelia Ritahani and Nordin, Azlin (2014) Agent based modeling and simulation of granuloma formation for the development of energy charging mechanism in Swarm Robots. In: 3rd International Conference on Computer Engineering & Mathematical Sciences (ICCEMS 2014), 4-5 Dec. 2014, Langkawi Malaysia.

Al Haek, Mohammed and Ismail , Amelia Ritahani and Nordin, Azlin and Sulaiman, Suriani and Hui, Keng Lau (2014) Modelling immune systems responses for the development of energy sharing strategies for swarm robotic systems. In: International Conference on Computational Science and Technology (ICCST’14), 27 - 28 August 2014, Kota Kinabalu, Sabah.

Al Muataz, Zubaidah and Abdul Aziz, Normaziah (2015) A new efficient text detection method for image spam filtering. International Review on Computers and Software, 10 (1). pp. 1-8. ISSN 1828-6003

Al-Enezi, Khaled Abdulkareem and Alshaikhli, Imad Fakhri Taha and Al-Kandari, Abdul Rahman and Al-Mutairi, Hessa Mutlaq (2013) e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak.

Al-Enezi , Khalid Abdulkareem and Alshaikhli, Imad Fakhri Taha and Alhatem, Khaled and Al-kandari, Abdulrahman (2014) Security risk analysis used by Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan.

Al-Galal, Sabaa Ahmed Yahya and Alshaikhli, Imad Fakhri Taha and Abdul Rahman, Abdul Wahab and Dzulkifli, Mariam Adawiah (2016) EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies, 8th-10th Dec. 2015, Kuala Lumpur.

Al-Safi, Hassen Mohammed and Alshaikhli, Imad Fakhri Taha (2012) Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences, 3 (7). pp. 1093-1102. ISSN 2218-6301 (O), 2079-8407 (P)

Al-Safi, Hassen Mohammed and Setiabudi, Arya and , Detarbeqo and Krasniqi, Arber and Yusuf, Habibullah and Mahmood Sanusi, Mohamed and Muhammad, Muhd. Rosydi (2011) The influence of information technology towards better Muslims community. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 73-78. ISBN 978-967-418-105-5

Al-Shawabkeh, Mahmoud (2014) Big data security. In: Seminar on Big data Security, 28-30 Dec 2014, Guangxi Province. (Unpublished)

Al-Shawabkeh, Mahmoud and Mohd Saudi, Madihah and Moha Alwi, Najwa Hayaati (2014) Computer security factors effects towards online usage of internet banking system. In: Advancement in Information Technology International Conference , 16-18 December 2014, Bandung, Indonesia.

Al-Shawabkeh, Mahmoud and Mohd Saudi, Madihah and Moha Alwi, Najwa Hayaati (2015) Computer security factors effects towards online usage of internet banking system. ARPN Journal of Engineering and Applied Sciences, 10 (2). pp. 532-539. ISSN 1819-6608

Al-Shawabkeh, Mahmoud M. M. and Mohd Saudi, Madihah and Mohd Alwi, Najwa Hayati and Azman, Norhidayah (2016) Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison. In: 2016 3rd International Conference on Computer, Communication and Control Technology (I4CT), 19th-21st Apr. 2016, Kota Kinabalu, Sabah. (Unpublished)

AlDabbagh, S.S.M. and Taha Alshaikhli , Imad Fakhri and Zaba, Muhammad Reza (2014) Key-dependent s-box in lightweight block ciphers. Journal of Theoretical and Applied Information Technology, 62 (2). pp. 554-559. ISSN 1992-8645 (Print) 1817-3195 (Online)

AlDabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha (2013) Improving PRESENT lightweight algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak.

AlDabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha (2013) Improving the security of LBlock lightweight algorithm using bit permutation. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak.

AlDabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha (2014) OLBCA: a new lightweight block cipher algorithm. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan.

AlDabbagh, Sufyan Salim Mahmood and Alshaikhli, Imad Fakhri Taha and Al-Enezi, Khalid Abdulkareem and Alyaqoup, Mohammed Jasem (2015) Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015, 8th-10th Dec 2015, Kuala Lumpur, Malaysia.

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) MOIM: a novel design of cryptographic hash function. International Journal of Computer Engineering & Technology (IJECT), 4 (4). pp. 1-19. ISSN 0976–6375 (O), 0976–6367 (P)

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Alduwaikh, Amal E. (2013) A new fragile digital watermarking technique for a PDF digital Holy Quran. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 23-24 Dec. 2013, Kuching, Sarawak.

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Moh. Jumaah, Bashayer (2013) Protection of the digital Holy Quran hash digest by using cryptography algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak, Malaysia.

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and O. Alhussainan, Sondos (2012) Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (3). pp. 127-139. ISSN 2231-8852

Alahmad, Mohammad A. and Alshaikhli, Imad Fakhri Taha and Nandi, Mridul (2013) Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia.

Aldhlan, Kawther A. and Zeki, Akram M. and Zeki, Ahmed M. (2011) Introduction to E- learning. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 1-4. ISBN 978-967-418-105-5

Alenezi, Khalid and Alshaikhli, Imad Fakhri Taha and Abdullah, Lili Marziana and AlAhmad, Mohammad A. (2015) CERT Technologies. International Journal of Innovation in Science and Mathematics, 3 (6). pp. 275-282. ISSN 2347–9051

Alenezi, Khalid and Alshaikhli, Imad Fakhri Taha and AlAhmad, Mohammad A. (2014) Kuwait government entities e-business continuity and disaster recovery plan. Journal of Advanced Computer Science and Technology Research (JACSTR), 4 (3). pp. 62-75. ISSN 2231-8852

Alenezi, Khalid and Taha Alshaikhli , Imad Fakhri and al-kandari, Abdul Rahman and Al-Tayyar, Lulwa Ziad (2014) A survey of intrusion detection system using case study Kuwait governments entiteis. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference , 29-30 Dec. 2014, Amman, Jordan.

Aleshidi, Hamad A. and Zeki, Akram M. (2011) Virtual learning environment. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 5-9. ISBN 978-967-418-105-5

Aleshidi, Hamad A. and Zeki, Akram M. (2011) The effect of external factors on the students' acceptance of virtual learning. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 15-20. ISBN 978-967-418-105-5

Alharaki, Omarah Omar and Hweidi, Mohammed and Zeki, Akram M. and Shah, Asadullah (2011) Security risk of ATM systems, case of study. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 129-138. ISBN 978-967-418-107-9

Aliyu, Mansur and Abdallah, Nahel A. O. and Lasisi, Nojeem A. and Diyar, Dahir and Zeki, Ahmed M. (2010) Computer security and ethics awareness among IIUM students: an empirical study. In: 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 13-14 December 2010, Jakarta, Indonesia.

Aliyu, Mansur and Mahmud, Murni (2011) The use of SAS for enterprise data management. In: The web: Its utilisation, evaluation and security. IIUM Press, Kuala Lumpur, pp. 168-179. ISBN 978-967-418-112-3

Alkalbani, Abdullah Said and Mantoro , Teddy and Md Tap, Abu Osman (2012) Improving the lifetime of wireless sensor networks based on routing power factor. In: Int Conference on Network Digital Technologies 2012, 24 - 26 April 2012, Canadian Univ Dubai.

Alkandari, Abdulaziz Ali and Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. (2013) Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia.

Alkandari, Abdulaziz M and Alkandari, Khalil Ibrahim and Taha Alshaikhli , Imad Fakhri and Alahmad, Mohammad A. (2015) A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 29-34. ISSN 2462 - 229X

Alkandari, Abdulaziz M and Alkandari, Khalil Ibrahim and Taha, Imad and Alahmad, Mohammad A. (2015) A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 29-34. ISSN 2462 - 229X

Alkandari, Abdulrahman and Alnasheet, Meshal and Alshaikhli, Imad Fakhri Taha (2012) Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (2). pp. 79-90. ISSN 2231-8852

Alkandari, Abdulrahman and Alshaikhli, Imad Fakhri Taha (2012) Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR), 2 (3). pp. 116-126. ISSN 2231-8852

Abdulrahman Abdullah Mohamed Alkandari and Imad Fakhri Taha (2014) Accident detection system and method for accident detection. US 8903636 B1.

Alsafi, Hassen Mohammed and Abduallah, Wafaa Mustafa and Pathan, Al-Sakib Khan (2012) IDPS: an integrated intrusion handling model for cloud computing environment. International Journal of Computing & Information Technology (IJCIT), 4 (1). pp. 1-16. ISSN 0974-696X

Alshaikhli, Imad Fakhri Taha (2011) A practical method for the analysis of genetic algorithms. Journal of Advanced Computer Science and Technology Research(JACSTR), 1 ( ). pp. 1-9. ISSN 2227-4332

Alshaikhli, Imad Fakhri Taha and Al-Enezi , Khalid Abdulkareem and Al-kandari, Abdulrahman and Mahmood Al Dabbagh, Sufyan Salim (2014) Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan.

Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad (2014) Design and analysis of a new hash function gear. In: 7th International Conference on Security of Information and Networks (SIN'14), 9-11 Sept 2014, Glaslow, UK.

Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad (2013) Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies, 1-2 July 2013, Palace of the Golden Horses, Mines Resort City, Kuala Lumpur.

Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. and Munthir, Khansaa (2013) Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology, 2 (2). pp. 1-12. ISSN 2296-1739

Alshaikhli, Imad Fakhri Taha and Alnasheet, Meshal M Y and Alahmad, Mohammad and Alashram, Sarah M. (2013) Achieving security by combining Huffman and SLSB algorithms. Journal of Advanced Computer Science and Technology Research (JACSTR), 3 (4). pp. 163-172. ISSN 2231-8852

Alshaikhli, Imad Fakhri Taha and Eljadi, Firdous (2014) Dynamic linear feedback shift registers: a review. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), 17th - 19th November 2014, Kuching, Sarawak, Malaysia.

Alshaikhli, Imad Fakhri Taha and Khalil, Ismail (2011) An improved genetic algorithm for solving the multiprocessor scheduling problem. Australian Journal of Basic and Applied Sciences. ISSN 1991-8178 (In Press)

Alshaikhli, Imad Fakhri Taha and Mahmood Al Dabbagh, Sufyan Salim and Alahmad, Mohammad (2014) HISEC: a new lightweight block cipher algorithm. In: The 7th International Conference on Security of Information and Networks (SIN'14), 9-11 Sep. 2014, University of Glasgow, UK.

Alshaikhli, Imad Fakhri Taha and ahmad, Saba and Pamusu, Irma (2014) A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), 17th - 19th November 2014, Kuching, Sarawak, Malaysia. (Unpublished)

Alshammari, Mohammad M. and Alwan, Ali Amer and Taha Alshaikhli, Imad Fakhri (2016) Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT), 8 (5). pp. 80-94. ISSN 2005-8039

AlzeerAlhouseini, Amjad M.R. and Alshaikhli, Imad Fakhri Taha and Abdul Rahman, Abdul Wahab and Dzulkifli, Mariam Adawiah (2016) Emotion detection using physiological signals EEG & ECG. International Journal of Advancements in Computing Technology (IJACT), 8 (3). pp. 103-112. ISSN 2005-8039

Alzuabi, Haifa Fahad and Alshaikhli, Imad Fakhri Taha (2013) Evaluation of usability problems of labor portal in Saudi Arabia. International Journal of Advanced Computer Science and Information Technology, 2 (1). pp. 14-25. ISSN 2296-1739

Amri, A’inur A’fifah and Ismail, Amelia Ritahani and Abdullah, Ahmad Zarir (2016) Exploring imbalanced class issue in handwritten dataset using convolutional neural networks and deep belief networks. In: The 3rd International Multi-Conference on Artificial Intelligence Technology (M-CAIT 2016), 23rd-24th August 2016, Malacca, Malaysia. (Unpublished)

Anwar, Farhat and Rahman, Md. Arafatur and Azad, Md. Saiful (2009) Multibiometric systems based verification technique. European Journal of Scientific Research, 34 (2). pp. 260-270. ISSN 1450-216X, 1450-202X

Aos Alaa, Zaidan and Ahmad, Nurul Nadia and Hezerul, Abdul Karim and M. Larbani, Moussa and Bilal Bahaa, Zaidan and Aduwati, Sali (2014) Image skin segmentation based on multi-agent learning Bayesian and neural network. Engineering Applications of Artificial Intelligence , 32. pp. 136-150. ISSN 0952-1976

Awang Abu Bakar, Normi Sham (2011) Using language-based search in mining large software repositories. In: Pacific Association for Computational Linguistics (PACLING 2011), 19-21 July 2011, Kuala Lumpur.

Awang Abu Bakar, Normi Sham (2011) Using language-based search in mining large software repositories. Procedia - Social and Behavioral Sciences, 27. pp. 160-168. ISSN 18770428

Awang Abu Bakar , Normi Sham (2011) Empirical analysis of object- oriented coupling and cohesion measures in determining the quality of open source systems. In: Software Engineering and Applications (SEA), 27-29 December 2011, Kuala Lumpur, Malaysia.

Ayu, Media Anugerah and Al-Azab, Mohammed Fadwa Gamal (2011) Web-based AHP system. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 35-48. ISBN 978-967-418-112-3

Ayu, Media Anugerah and Al-Azab, Mohammed Fadwa Gamal (2011) A guideline for using web-based AHP system. In: TheWeb : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 49-57. ISBN 978-967-418-112-3

Ayu, Media Anugerah and Ismail, Siti Aisyah and Md. Tap, Abu Osman (2011) eSurvia : a web-based survey tool using fuzzy conjoint analysis. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 1-10. ISBN 978-967-418-112-3

Ayu, Media Anugerah and Jamil, Mohd Faisal (2011) Intelligent public transport guide system for Kuala Lumpur. In: The Web: Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 131-140. ISBN 978-967-418-112-3

Ayu, Media Anugerah and Md. Tap, Abu Osman and Ismail, Aisyah (2010) A web based survey using fuzzy set model. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Ayu, Media Anugerah and Mohamed, Elgharabawy and Mohammad, Al-Mohaifer and Rameez, Mamdooh (2011) A single door to the Kulliyyah of Information and Communication Technology (KICT) online services. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 272-284. ISBN 978-967-418-112-3

Ayu, Media Anugerah and Zakaria, Noor Azura (2011) Web usability survey measurement. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 234-239. ISBN 978-967-418-112-3

Ayu, Media Anugerah and Zakaria, Noor Azura (2011) A research framework for user centered web development. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 219-225. ISBN 978-967-418-112-3

Azad, Saiful and Hasan, Khandaker Tabin and Nandi, Dip and Pathan, Al-Sakib Khan (2015) A high-throughput routing metric for multi-hop underwater acoustic networks. Computers and Electrical Engineering, 44. pp. 24-33. ISSN 0045-7906

Azuddin, Muna and Abd Malik, Sofianiza (2012) The use of technology by older people. In: International Conference on Interactive Digital Media, 3-4 December 2012, Langkawi, Kedah. (Unpublished)

B

Baali, Hamza and Khorshidtalab, Aida and Mesbah, Mustafa and Salami, Momoh Jimoh Eyiomika (2015) A transform-based feature extraction approach for motor imagery tasks classification. IEEE Journal of Translational Engineering in Health and Medicine, 3. pp. 2100108-1. ISSN 2168-2372

Badi, Hana J. and Zeki, Akram M. (2011) The high impact of using animation in enhancing education in schools. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 45-50. ISBN 978-967-418-105-5

Bakar, Noor Hasrina and Hassan, Noor Azimah and Idris, Mohd Norhaedir and Al-Shawabkeh, Mahmoud (2014) Programming in C for foundation. IIUM Press, Kuala Lumpur. ISBN 9789674182946

Batcha, Nowshath Kadhar and Abdul Aziz, Normaziah (2014) An algebraic approach for sentence based feature extraction applied for automatic text summarization. Advanced Science Letters, 20 (1). pp. 139-143. ISSN 1936-6612

Benseghir, A and Umarov, Bakhram and Messikh, Azeddin (2009) Statics and dynamics solitons in Bose-Einstein condensates. In: National conference of Post Graduate Research - NCON-PGR, 1st October 2009, Pahang.

Bhatti, Zeeshan and Shah, Asadullah (2011) Bitwise operators and type casting. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 45-50. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Comparison between different class types. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 207-213. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Do-While loops. In: JAVA programming lab manual. IIUM Press, International Islamic University Malaysia, pp. 79-83. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) The If-Else-If statements. In: JAVA programming lab manual. IIUM Press, International Islamic University Malaysia, pp. 61-66. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Inner classes. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 199-205. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Local block and static block. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 231-235. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Method overloading and overriding. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 185-190. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Object and classes. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 135-140. ISBN 9789674180867

Bilal, Sara Mohammed Osman Saleh and Abu-Bakar, Syed A.R (2005) Classification of moving objects using active vision. In: Computers, Communications, & Signal Processing with Special Track on Biomedical Engineering (CCSP 2005), 14-16 Nov 2005 , Kuala Lumpur- Malaysia.

Bilal, Sara Mohammed Osman Saleh and Akmeliawati, Rini and Shafie, Amir Akramin and Salami, Momoh Jimoh Eyiomika (2011) Modeling of human upper body for sign language recognition. In: Proceedings of the 5th International Conference on Automation, Robotics and Applications, 6-8 Dec, 2011, Wellington, New Zealand.

Bilal, Sara Mohammed Osman Saleh and Munir, Fatin and Khalifa, Othman Omran (2014) Mathematical snalysis of blood vessels segmentation based on three retinal images datasets. In: 3rd International Conference on Mathematical Applications in Engineering (ICMAE'14), 23-25 Sept. 2014, Kuala Lumpur. (Unpublished)

Boubiche, Djallel Eddine and Boubiche, Sabrina and Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Bilami, Azzedine and Athmani, Samir (2015) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication Systems. ISSN 1572-9451 (O), 1018-4864 (P) (In Press)

Bujang, Yanti Rosmunie and Hussin, Husnayati (2010) Spam e-mail: how Malaysian e-mail users deal with it? World Academy of Science, Engineering and Technology, 67. pp. 1007-1013. ISSN 1307-6884

C

Chandio, Fida Hussain and Irani, Zahir and Zeki, Akram M. and Shah, Asadullah and Shah, Sayed Chhattan (2017) Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management, 34 (1). pp. 50-64. ISSN 1058-0530

Che Azemin, Mohd. Zulfaezal and Kumar, Dinesh Kant and Wong, Tien Yin and Wang, Jie Jin and Kawasaki, Ryo and Mitchell, Paul and Arjunan, Sridhar P. (2010) Fusion of multiscale wavelet-based fractal analysis on retina image for stroke prediction. In: 32nd Annual International Conference of the IEEE EMBS, 31st Aug. - 4 Sept.2010, Buenos Aires, Argentina.

Chen, Yuh-Wen and Larbani, Moussa and Hsieh, Cheng-Yen and Chen, Chao-Wen (2009) Introduction of affinity set and its application in data-mining example of delayed diagnosis. Expert Systems with Application, 36. pp. 10883-10889. ISSN 0957-4174

Cragg, Paul and King, Malcolm and Hussin, Husnayati (2002) IT alignment and firm performance in small manufacturing firms. Journal of Strategic Information Systems, 11 (2). pp. 109-132. ISSN 0963-8687

D

Danzomo, Bashir A. and Salami, Momoh Jimoh Eyiomika and Khan, Md. Raisuddin (2015) Identification and predictive control of spray tower system using artificial neural network and differential evolution algorithm. In: 2015 10th Asian Control Conference (ASCC 2015), 31st May- 3rd June 2015, Kota Kinabalu, Sabah.

Dassow, Juergen and Mavlankulov, Gairatzhan and Othman, Mohamed and Turaev, Sherzod and Selamat, Mohd Hasan and Stiebe, Ralf (2012) Grammars controlled by Petri Nets. In: Petri nets: Manufacturing and Computer Science. INTECH, Croatia, pp. 337-358. ISBN 978-953-51-0700-2

Diallo, Laouratou and Abdalla Hashim, Aisha-Hassan and Olanrewaju, Rashidah Funke (2015) An enhanced architecture for big data task scheduling in cloud environment. Advanced Science Letters. pp. 1-6.

Diallo, Laouratou and Hassan Abdalla Hashim, Aisha and Olanrewaju, Rashidah Funke and Islam, Shayla and Zarir, Abdullah Ahmad (2016) Two objectives big data task scheduling using swarm intelligence in cloud computing. Indian Journal of Science and Technology, Indian Journal of Science and Technology, Vol 9(28, 9 (28). pp. 1-10. ISSN 0974-6846

Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2011) A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies. Information Journal. ISSN 1343-4500 (P), 1344-8994 (O) (In Press)

Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2013) A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies. International Journal of Communication Networks and Information Security, 5 (2). pp. 80-92. ISSN ISSN: 2076-0930 (Print) ISSN: 2073-607X (Online)

Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2013) A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks. In: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, USA, USA. ISBN 9781466507616

Din, Rosseni and Nordin, Mohamad Sahari and Abu Kassim, Noor Lide and Tunku Ahmad, Tunku Badariah and Jusoff, Kamaruzzaman and Johar, Nur Ayu and Kamarul Zaman, Muhammad Faizal and Zakaria, Mohamad Shanudin and Ahmad, Mazalah and Abdul Karim, Aidah and Mastor, Khairul Anwar (2010) Development and validation of meaningful hybrid e-training model for computer education. International Journal of Computer Science and Information Technologies (IJCSIT), 1 (3). pp. 179-184. ISSN 0975-9646

Dwi Handayani, Dini Oktarina and Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab and Alshaikhli, Imad Fakhri Taha (2016) Statistical approach for a complex emotion recognition based on EEG features. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), 8th-10th Dec. 2015, Kuala Lumpur.

E

Elagib, Sara B. and Najeeb, Athaur Rahman and Abdalla Hashim, Aisha-Hassan and Olanrewaju, Rashidah Funke (2014) Big data analysis solutions using mapReduce framework. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014), 23th - 25th September 2014, Sunway Putra Hotel, Kuala Lumpur.

Elfaki, Faiz Ahmed Mohamed (2015) Subdistribution to cox's model for partly interval-censored data with application to aids studies. ARPN Journal of Engineering and Applied Sciences, 10 (21). pp. 10143-10146. ISSN 1819-6608

Elgharabawy, Mohamed and Ayu, Media Anugerah (2011) E-Government initiatives in Palestine. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 141-148. ISBN 978-967-418-112-3

Elgharabawy, Mohamed Ahmed and Ayu, Media Anugerah (2011) Open source Content Management Systems (CMS): Issues and challenges. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 180-188. ISBN 978-967-418-112-3

Ezani, Muhammad Faheem Mohd and Pathan, Al-Sakib Khan and Haseeb, Shariq (2012) Comparative analysis of IEEE 802.11g multimedia multicast performance using RTP with an implemented test-bed. In: The 2012 IEEE Conference on Open Systems (ICOS 2012), Kuala Lumpur, Malaysia, 21-24 October, 2012, Kuala Lumpur, Malaysia. (In Press)

F

Farooqui, N.K. and Noordin, Mohamad Fauzan and Muhammad, AbdulHafeez (2015) Ontology matching: in search of challenges ahead. Journal of Theoretical and Applied Information Technology, 74 (2). pp. 140-148. ISSN 1992-8645

Fayaz, Muhammad and Arshad, S and Shah, A.S and Shah, Asadullah (2016) Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems. Sindh University Research Journal (Science Series), 48 (4D). pp. 17-26. ISSN 1813-1743

Fayaz, Muhammad and Arshad, S and Shah, Abdul Salam and Shah, Asadullah (2016) An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem. SINDH university Research Journal ( science series ), 48 (4D). pp. 175-182. ISSN 1813-1743

Fong, Wan Heng and Gan, Yee Siang and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Automata diagram for finite groups. In: International Seminar on Mathematics and Natural Sciences, 15-17 August 2013, Samarkand, Uzbekistan.

Fong, Wan Heng and Gan, Yee Siang and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Automata for subgroups. AIP Conference Proceedings , 1602. pp. 632-639. ISSN 0094-243X (P), 1551-7616 (O)

Fong, Wan Heng and Gan, Yee Siang and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Automata representation for Abelian groups. In: The 20th National Symposium on Mathematical Sciences - Research in Mathematical Sciences: A Catalyst for Creativity and Innovation, 18–20 Dec. 2012, Palm Garden Hotel, Putrajaya, Malaysia .

Fong, Wan Heng and Gan, Yee Siang and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Variants of weighted sticker systems with different weighting spaces. In: The 3rd International Conference on Computer Engineering and Mathematical Sciences (ICCEMS 2014), 4-5 Dec 2014, Langkawi, Kedah.

Fong, Wan Heng and Gan, Yee Siang and Sarmin, Nor Haniza and Turaev, Sherzod (2016) Variants of weighted sticker systems with different weighting spaces. ScienceAsia. pp. 1-10. (In Press)

Fong, Wan Heng and Gan, Yee Siang and Sarmin, Nor Haniza and Turaev, Sherzod (2016) The generative capacity of weighted simple and semi-simple splicing systems. Advances in Industrial and Applied Mathematics, 1750. pp. 1-6. ISSN 0094-243X

Fong, Wan Heng and Gan, Yee Siang and Turaev, Sherzod (2014) Weighted splicing systems. In: Recent Advances In DNA Splicing System. Universiti Teknologi Malaysia, pp. 27-42. ISBN 978-983-52-1000-6 (In Press)

Fong, Wan Heng and Selvarajoo, Mathuri and Turaev, Sherzod (2014) Probabilistic splicing systems. In: Recent Advances In DNA Splicing System. Universiti Teknologi Malaysia, pp. 15-26. ISBN 978-983-52-1000-6 (In Press)

Fouda, Mostafa M. and Fadlullah, Zubair Md. and Pathan, Al-Sakib Khan and Kato, Nei (2013) Peer-to-peer video-on-demand in future internet. In: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, USA, USA. ISBN 9781466507616

Foughalia, Aissa and Ibrahim, Siti Noorjannah and Khan, Sheroz (2016) Simulation of magnetophoretic blood cells sorter platform. In: The 3 rd International Conference on Mathematical Applications in Engineering 2014 (ICMAE’14), Universiti Putra Malaysia.

G

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Automata diagram for groups. In: 2nd Biennial International Group Theory Conference 2013, February 4-8, 2013, Istanbul, Turki.

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2016) Generative capacity of sticker systems with the presence of weights. Science Asia. pp. 1-8. (In Press)

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2012) Geometrical representation of automata over some abelian groups. Malaysian Journal of Fundamental and Applied Sciences, 8 (1). pp. 24-30. ISSN 1823-626X

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Permutation groups in automata diagrams. Malaysian Journal of Fundamental and Applied Sciences, 9 (1). pp. 35-40. ISSN 1823-626X

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Some properties and variants of weighted sticker systems. International Journal of Applied Mathematics and Statistics, 45 (15). pp. 367-375. ISSN 0973-7545 (O), 0973-1377 (P)

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Weighted simple and semi-simple splicing systems. Malaysian Journal of Fundamental and Applied Sciences, 10 (4). pp. 201-206. ISSN 2289-5981 (P) 2289-599X (O)

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2012) Weighted sticker system. In: International Science Postgraduate Conference 2012 (ISPC 2012), 27-30 November 2012, Skudai, Johor.

Gan, Yee Siang and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) The generative power of weighted one-sided and regular sticker systems. AIP Conference Proceedings , 1602. pp. 855-862. ISSN 0094-243X (P), 1551-7616 (O)

Gan, Yee Siang and Turaev, Sherzod and Fong, Wan Heng and Sarmin, Nor Haniza (2014) Computational power of weighted splicing systems. Comptes rendus de l’Acad'emie bulgare des Sciences, 67 (6). pp. 753-762. ISSN 1310-1331

Ganiev, Inomjon and Egamberdiev, Odiljon (2013) The Arens algebras of vector-valued functions. Journal of Function Spaces and Applications , 2013. pp. 1-4. ISSN 0972-6802

Ganiev, Inomjon and Kudaybergenov, Karimbergen (2012) Measurable bundles of *-homomorphisms C*-algebras. In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012), 3 - 5 July 2012, Seri Pacific Hotel Kuala Lumpur, Malaysia.

Ganiev, Inomjon and Othman, Raihan (2012) Weight martigale-ergodic and ergodic-martingale theorems. In: International Conference on Mathematical Applications in Engineering (ICMAE2012), 3-5 Jul 2012, Gombak, Kuala-Kumpur.

Ganiev, Inomjon and Othman, Raihan (2013) Weight martingale-ergodic and ergodic-martingale theorems. Middle East Journal of Scientific Research (MEJSR), 13. pp. 70-76. ISSN 1990-9233

Ghaffar, Abid and Wahiddin, Mohamed Ridza and Shaikh, Asadullah (2013) Computer assisted alerts using mental model approach for customer service improvement. Journal of Software Engineering and Applications, 6. pp. 21-25. ISSN 1945-3116

Ghanim, Alyaa and Alshaikhli, Imad Fakhri Taha (2014) Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications, 5 (7). pp. 7-10. ISSN 2047-3338

Guerroumi, Mohamed and Pathan, Al-Sakib Khan and Badache, Nadjib and Moussaoui, Samira (2014) On the medium access control protocols suitable for wireless sensor networks – a survey. International Journal of Communication Networks and Information Security, 6 (2). pp. 89-103. ISSN ISSN:2076-0930 (Print); ISSN:2073-607X (Online)

Guerroumi, Mohamed and Pathan, Al-Sakib Khan and Badache, Nadjib and Moussaoui, Samira (2013) Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5 (3). pp. 158-177. ISSN ISSN: 2076-0930 (Print) ISSN: 2073-607X (Online)

Gunawan, Teddy Surya (2013) Bimodal person identification system based on speech and signature recognition's. Research Report. s.n, Kuala Lumpur. (Unpublished)

Gündüz, Feyza and Pathan, Al-Sakib Khan (2013) On the key factors of usability in small-sized mobile touch-screen application. International Journal of Multimedia and Ubiquitous Engineering. ISSN 1975-0080 (In Press)

Gündüz, Feyza and Pathan, Al-Sakib Khan (2012) Usability improvements for touch-screen mobile flight booking application: a case study. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), 26-28 November 2012, Kuala Lumpur, Malaysia. (In Press)

H

Hamith, Amina and Hayiyusuh, Nur-Adib and Abd Rahim, Noor Hayani and Mata, Reem and Ahmad Dahlan, Abdul Rahman and Muhammad, Muhd. Rosydi (2011) End-to-end enhancement of International Islamic Digital Library at the National Library of Malaysia. In: Collaboration, communities, well-beings and information systems. IIUM Press, Kuala Lumpur, pp. 210-219. ISBN 9789674181024

Hamzah, Nur Zatul Akmar and Mohd Sebry, Nurul Afidah and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2012) Splicing systems over permutation groups of length two. Malaysian Journal of Fundamental and Applied Sciences, 8 (2). pp. 83-88. ISSN 1823-626X

Han, Guangjie and Shu, Lei and Pathan, Al-Sakib Khan and Rodrigues, Joel J. P. C. and Mellouk, Abdelhamid (2013) Editorial: Wireless sensor networks based on environmental energy harvesting. International Journal of Distributed Sensor Networks, 2013 (816063). pp. 816063-1. ISSN 1550-1477 (O), 1550-1329 (P)

Handayani, Dini and Kartiwi, Mira and Hakim, S. (2010) An implementation of natural language processing on ontology-based electronic health website: a case of female-related diseases domain. In: Proceedings of International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010, 13-14 Dec 2010 , Jakarta, Indonesia.

Hasan, M.K. and Saeed, Rashid Abdelhaleem and Abdalla Hashim, Aisha-Hassan and Khalifa, Othman Omran and Islam, Shayla and Nafi, Nazmus Shaker (2012) Inter-cluster synchronization scheme for femtocell network. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.

Hassan, Mohammad Mehedi and Pathan, Al-Sakib Khan and Huh, Eui-Nam and Abawajy, Jemal (2014) Emerging sensor-cloud technology for pervasive services and applications. International Journal of Distributed Sensor Networks, 2014. pp. 1-2. ISSN 1550-1477 (O), 1550-1329 (P)

Hassan, Raini and Alshaikhli, Imad Fakhri Taha and Shah, Asadullah (2011) The use of genetic algorithm in autonomous robot navigation. In: Computer applications: theories and applications. IIUM Press, Kuala Lumpur, pp. 3-13. ISBN 978-967-418-107-9

Hassan, Raini and Ambaras Khan, Hanna and Al Shaikhli, Imad Fakhri Taha and Abdul Hak, Nora (2013) Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia. In: 5th International Conference on Information and Communication Technology for the Muslim World, 26-28 March 2013, Morocco.

Hijazi, Musab Mustafa and Zeki, Akram M. and Ismail, Amelia Ritahani (2016) Arabic text classification: Review study. Journal of Engineering and Applied Science, 11 (3). pp. 528-536. ISSN 1816-949X

Hoq, S.M. Afzal and Sulaeman, Erwin and Okhunov, Abdurahim (2016) Error analysis of heat conduction partial differential equations using Galerkin’s Finite Element method. Indian Journal of Science and Technology, 9 (36). pp. 1-6. ISSN 0974-6846

Hossain, M. Shamim and Pathan, Al-Sakib Khan and Goebel, Stefan and Rahman, Shawon M. and Murshed, Manzur (2015) Advances in multimedia sensor networks for health-care and related applications. International Journal of Distributed Sensor Networks. pp. 1-2. ISSN 1550-1329 (P)

Hussein, Ramlah and Mohamed, Norshidah and Ahlan, Abdul Rahman and Mahmud, Murni (2010) Modeling E-Government adoption: trust, perceived risk and political efficacy. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Hussin, Husnayati and Abdul Molok, Nurulnuha (2011) IT outsourcing practices among Malaysia SMEs : some empirical evidence. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 139-162. ISBN 9789674180034

Hussin, Husnayati and Musa, Amila Norjihah and Wan Ahmad Puad, Wan Nur Asma (2011) Angkatan Belia Islam Malaysia (ABIM) membership management system. In: TheWeb : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 119-130. ISBN 978-967-418-112-3

I

Ibrahim, Adamu Abubakar and Mantoro, Teddy (2011) Web application development process. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 189-197. ISBN 978-967-418-112-3

Ibrahim, Siti Noorjannah (2011) The quadrupole microelectrode design on a multilayer biochip for dielectrophoretic trapping of single cells. MIcroelectronic Engineering, 97. pp. 369-374. ISSN 0167-9317

Idris, Mohd Norhaedir and Bakar, Noor Hasrina and Omar, Mazlinah and Yahya, Norzariyah and Hashim, Nafaizatulnananiah (2012) Accommodating student's learning experience through personalized learning style adaptation in computer programming course at Centre for Foundation Studies, IIUM. In: 5th International Conference of Education, Research and Innovation (ICERI), 19-21 November 2012, Madrid, Spain.

Isa, Hafizuddin and Zeki, Akram M. and Hameed, Shihab A. (2011) Teaching Islamic concepts electronically : hajj as an example. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 55-60. ISBN 978-967-418-105-5

Islam, Md. Rafiqul and Adam, Ibrahim A. H. (2009) Performance study of direction of arrival (DOA) estimation algorithms for linear array antenna. In: 2009 International Conference on Signal Processing Systems (ICSPS 2009), 15 - 17 May 2009, Singapore.

Islam, Md. Rafiqul and Shakib, M. A. E and Rahaman, Md. Azizur and Rahman, Md. Obaidur and Pathan, Al-Sakib Khan (2014) A neighbour discovery approach for cognitive radio network using tower of Hanoi (ToH) sequence based channel Rendezvous. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014), 17-19 November 2014, Sarawak.

Ismail, Amelia Ritahani and Timmis, Jon (2010) Towards self-healing swarm robotics systems inspired by granuloma formating. In: International Conference on Engineering of Complex Computer Systems, March 2010, St Anne's College, University of Oxford, United Kingdom.

Ismail , Amelia Ritahani and Bjerknes, J and Timmis , Jon and Winfield, Alan (2015) An artificial immune system for self-healing in swarm robotic systems. In: 10th International Conference on Information Processing in Cells and Tissues, IPCAT 2015, 14-16 September 2015, San Diego, CA, USA,.

Ismail , Amelia Ritahani and Desia, Recky and Zuhri, Muhammad Fuad Reza and Daniel, Raja Muhammad (2014) Implementation of Cognitive Mapping Algorithm for Robot Navigation System. In: 2014 4th World Congress on Information and Communication Technologies, WICT 2014, 8-11 Dec. 2014, Melaka.

Ismail , Amelia Ritahani and Desia, Recky and Zuhri, Muhammad Fuad Reza and Daniel, Raja Muhammad (2014) Designing and implementation of robot mapping algorithm for mobile robot. In: International Research Invention & Innovation Exhibition for 2014 (IRIIE 2014), 11-13 June 2014, Gombak, Kuala Lumpur. (Unpublished)

Ismail , Amelia Ritahani and Desia, Recky and Zuhri, Muhammad Fuad Riza (2015) The initial investigation of the design and energy sharing algorithm using two-ways communication mechanism for Swarm Robotic System. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014), 7th-9th November 2014, Institut Teknologi Brunei.

Ismail , Amelia Ritahani and Timmis, J and TyrrellA, A (2010) An artifical immune systems for robot organisms. In: Symbiotic multi-robot organisms : realibility, adaptability and evalution. Springer, UK, pp. 279-302. ISBN 978-3642-11691-9

Issoufa, Youssouf Hamidou and Messikh, Azeddin (2011) Single-qubit rotation gate using three-level lambda systems. Australian Journal of Basic and Applied Sciences, 5 (6). pp. 360-364. ISSN 1991-8178

Issoufa, Youssouf Hamidou and Messikh, Azeddin (2014) Effect of dephasing on superadiabatic three-level quantum driving. Physical Review A - Atomic, Molecular, and Optical Physics, 90 (055402). ISSN 1050-2947

J

J. Badi, Maimona and Zeki, Akram M. (2011) Multimedia elements and internet. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 198-201. ISBN 978-967-418-112-3

Jamil, Rokiah and Jarot, Sigit Puspito Wigati (2012) Intelligent decision support system for degree selection using AHP technique. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Seri Pacific Hotel Kuala Lumpur.

Jarot, Sigit Puspito Wigati and Siddiqi, Mohammad Umar (2012) Study on security of IPv6 address management in enterprise WLAN. Research Report. s.n, Kuala Lumpur. (Unpublished)

Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2014) Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), 17th-19th Nov. 2014, Kuching, Sarawak.

Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2016) Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), 8th-10th Dec. 2015, Kuala Lumpur.

K

K., Farooqui Najam and Noordin, Mohamad Fauzan (2015) Knowledge exploration: selected works on Quran ontology development. Journal of Theoretical and Applied Information Technology, 72 (3). pp. 385-393. ISSN 1817-3195 (O), 1992-8645 (P)

Kamaruddin, Norhaslinda and Abdul Rahman, Abdul Wahab (2012) Human behavior state profile mapping based on recalibrated speech affective space model. In: 34th Annual International Conference of the IEEE EMBS, 28 August - 1 September, 2012, San Diego, California USA.

Kamaruzaman, Fadhlan and Shafie, Amir Akramin and Mohd Mustafah, Yasir (2015) Coincidence detection using spiking neurons with application to face recognition. Journal of Applied Mathematics (534198). pp. 1-20. ISSN 1110-757X

Karbasi, Mostafa and Bhatti, Zeeshan and Aghababaeyan, Reza and Bilal, Sara and Rad, Abdolvahab Ehsani and Shah, Asadullah and Waqas, Ahmad (2016) Real-time hand detection by depth images: a survey. Jurnal Teknologi, 78 (2). pp. 141-148.

Karbasi, Mostafa and Bilal, Sara Mohammed Osman Saleh and Aghababaeyan, Reza and Rad, Abdolvahab Ehsani and Bhatti, Zeeshan and Shah, Asadullah (2016) Analysis and enhancement of the denoising depth data using kinect through iterative technique. Jurnal Teknologi, 78 (9). pp. 185-193. ISSN 0127-9696

Karimi, Fariba and Turaev, Sherzod and Sarmin, Nor Haniza and Fong, Wan Heng (2014) Fuzzy splicing systems. In: Lecture Notes in Artificial Intelligence. Springer International Publishing, Switzerland, pp. 20-29. ISBN 9783319112886

Kartiwi, Mira and Esati, Elfat (2011) An implementation of e-learning application in a Macedonian higher-education institution : a case study of State University of Tetova. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 139-144. ISBN 978-967-418-105-5

Karuppiah, A. Babu and Dalfiah, J. and Yuvashri, K. and Rajaram, S. and Pathan, Al-Sakib Khan (2014) A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks. In: 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS 2014), 18th-21st December 2014, Mangalore, India.

Kazi Shahzabeen, Rahnuma and Abdul Rahman, Abdul Wahab and Abd. Majid, Hariyati Shahrima and Björn, Crüts (2011) Analyzing brain activity in understanding cultural and language interaction for depression and anxiety. Procedia Social and Behavioral Sciences, 27. pp. 299-305. ISSN 1877-0428

Kh. Abdulatif, Zaidoon and Ayif, Mustafa Nasser and Mahmud, Murni (2011) A survey on Islamic Websites for children. In: The web: Its utilisation, evaluation and security. IIUM Press, Kuala Lumpur, pp. 202-210. ISBN 978-967-418-112-3

Khaleel, Ghassan and Turaev, Sherzod and Alshaikhli, Imad Fakhri Taha and Mohd Tamrin, Mohd Izzuddin (2016) An overview of cryptosystems based on finite automata. Journal of Advanced Review on Scientific Research, 27 (1). pp. 1-7. ISSN 2289-7887

Khaleel, Ghassan and Turaev, Sherzod and Alshaikhli, Imad Fakhri Taha and Zhukabayeva, Tamara and Mohd Tamrin, Mohd Izzuddin (2017) A symmetric cryptosystem based on nondeterministic finite automata. Journal of Theoretical and Applied Information Technology ( JATIT ). pp. 1-10. ISSN 1992-8645 (In Press)

Khaleel, Ghassan and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Alshaikhli, Imad Fakhri Taha (2016) Performance and security improvements of Dӧmӧsi’s cryptosystem. International Journal of Applied Mathematics and Statistics, 55 (2). pp. 32-45. ISSN 0973-1377

Khaleel, Ghassan and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Alshaikhli, Imad Fakhri Taha (2016) A new block cipher based on finite automata systems. International Journal on Perceptive and Cognitive Computing (IJPCC), 2 (1). pp. 23-26. ISSN 2462 - 229X

Khaleel, Ghassan and Turaev, Sherzod and Mohd. Tamrin, Mohd. Izzuddin and Alshaikhli, Imad Fakhri Taha (2016) A performance improvement of Dömösi’s cryptosystem. In: Progress in Applied Mathematics in Science and Engineering 2015, 29th Sept-1st Oct. 2015, Bali, Indonesia.

Khalifa, Othman Omran and Olanweraju, Rashidah Funke and Abdul Rahman @ Suliman, Husna and Hamdan, Moussa (2012) Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. In: Proceedings of the International Conference on Mathematical Applications in Engineering (ICMAE 2012), 3-5th July 2012, Seri Pacific Hotel Kuala Lumpur, Malaysia.

Khan, Shafiullah and Pathan, Al-Sakib Khan (2012) Wireless Networks and Security: Issues, Challenges and Research Trends. Signals and Communication Technology . Springer, USA. ISBN ISBN 978-3-642-36168-5 (In Press)

Khan, Sher Afghan and Crasta , Asha (2010) Oscillating supersonic delta wings with curved leading edges. Advanced Studies in Contemporary Mathematics, 20 (3). pp. 359-372. ISSN 1229-3067

Khan, Sheroz and Alam, A. H. M. Zahirul and Khalifa, Othman Omran and Islam, Md. Rafiqul (2007) A high accuracy measurement circuit for soil moisture detection. World Academy of Science, Engineering and Technology, 1 (11). pp. 947-950. ISSN 1307-6884

Khanam, Shapla and Saleem, Habibullah Yusuf and Pathan, Al-Sakib Khan (2012) An efficient detection model of selective forwarding attacks in wireless mesh networks. Lecture Notes in Computer Science (LNCS), 7646. pp. 1-14. ISSN 1611-3349 (O), 0302-9743 (P) (In Press)

Kharimah, Faiga and Usman, Mustofa and Widiarti, Widiarti and Elfaki, Faiz Ahmed Mohamed (2015) Time series modeling and forecasting of the consumer price index Bandar Lampung. Science International Lahore, 27(5) (5). pp. 4619-4624. ISSN 1013-5316

Khasanah, Ana Uswatun and Paiizi, Madihah and Nasoha, Nurnajihan and Noordin, Noor Salina and Sari, Maya Novia and Muhammad, Muhd. Rosydi (2011) Parents and children relationships in social networking : an analysis from Islamic perspective. In: Advancement in E-Learning. IIUM Press, Kuala Lumpur, pp. 95-102. ISBN 978-967-418-105-5

Khosrowabadi, Reza and Abdul Rahman, Abdul Wahab (2011) Classification of EEG correlates on emotion using features from Gaussian mixtures of EEG spectrogram. In: 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 13-14 December 2010, Jakarta, Indonesia.

Khosrowabadi, Reza and Quek, Chai and Ang, Kai Keng and Abdul Rahman, Abdul Wahab (2014) ERNN: A biologically inspired feedforward neural network to discriminate emotion from EEG signal. IEEE Transactions on Neural Networks and Learning Systems, 25 (3). pp. 609-620. ISSN 2162-237X

Kim, Hyung Seok and Ejaz, Waleed and Al-Begain, Khalid and Pathan, Al-Sakib Khan and Hasan, Najam ul (2014) Advances in cognitive radio sensor networks. International Journal of Distributed Sensor Networks, 2014 (631624). pp. 1-3. ISSN 1550-1477 (O), 1550-1329 (P)

Kumar, Neeraj and Pathan, Al-Sakib Khan and Duarte Jr., Elias. P. and Shaikh, Riaz Ahmed (2014) Critical applications in vehicular ad hoc/sensor networks. Telecommunication Systems, Nov. ISSN 1018-4864 (P) 1572-9451 (O)

L

Lajis, Adidah and Abdul Aziz, Normaziah (2012) NL scoring and Bloom competency test: an experimental result. In: The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC '12 ), 20-22th February 2012, Kuala Lumpur.

Lajis, Adidah and Abdul Aziz, Normaziah (2014) Competency assessment of short free text answers. In: 2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T), 27-29 Aug. 2014, Kuala Lumpur.

Larbani, Moussa and Huang, Chi-Yo and Tzeng, Gwo-Hshiung (2011) A Novel Method for Fuzzy Measure Identification. International Journal of Fuzzy Systems, 13 (1). pp. 24-34. ISSN 1562-2479

M

Mabrouk, Ahmed Hassan and Hassim, Norhidayah (2011) A low-complexity, hardware architecture for a parametric, real-time LSF speech decoder. In: The 15th IEEE International Symposium on Consumer Electronics (ISCE 2011), 14-17 June 2011, Singapore.

Madi, Elissa Nadia and Md. Tap, Abu Osman (2011) Fuzzy TOPSIS method in the selection of Investment Boards by incorporating operational risks. In: Proceedings of the World Congress on Engineering 2011, WCE 2011, 6-8 July 2011, London, U.K..

Mahmud, Murni (2011) Interaction design of the Malaysian e-government portal. In: Information Technology Issues and Applications in Malaysia : A Collection of Articles. IIUM Press, Kuala Lumpur, pp. 23-48. ISBN 9789674180034

Mahmud, Murni and Hussein, Idyawati and Abd Malik, Sofianiza (2011) User experience on educational websites’ search engine. In: Issues of human computer interactions and system developments. IIUM Press, Kuala Lumpur. ISBN 978-967-418-082-9

Mahmud, Murni and Hussein, Idyawati and Md Tap, Abu Osman (2011) Human-Computer interaction within the Malaysian university curriculum. In: Issues of Human Computer Interactions and System Developments. IIUM Press, Kuala Lumpur, pp. 51-63. ISBN 9789674180829

Mahmud, Murni and Hussein, Idyawati and Md Tap, Abu Osman (2011) A prelimenary study : Malaysian women in human-computer interaction practices. In: Issues of human computer interactions and system developments. IIUM Press, Kuala Lumpur, pp. 65-70. ISBN 978-967-418-082-9

Mahmud, Murni and Md Tap, Abu Osman and Aliyu, Mansur (2011) A framework for heuristic evaluation on Islamic websites. In: The web: Its utilisation, evaluation and security. IIUM Press, Kuala Lumpur, pp. 226-233. ISBN 978-967-418-112-3

Mahmud, Murni and Muhammed Nasser, Rasheed and Md. Tap, Abu Osman (2011) Verification of scholars and references in Islamic websites. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Gombak, pp. 250-256. ISBN 978-967-418-112-3

Mahmud, Murni and Raja Mohd, Noorhazwani and Md. Tap, Abu Osman (2011) Fuzzy computing with expressions for evaluating fonts styles on children websites. In: The web: Its utilisation, evaluation and security. IIUM Press, Kuala Lumpur, pp. 211-218. ISBN 978-967-418-112-3

Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2015) Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1/2). pp. 3-22. ISSN 1743-8233 (O) 1743-8225 (P)

Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2013) On the key revocation schemes in wireless sensor networks. In: The 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013): Security, Privacy, and Trust Computing Symposium, 20-23 August 2013, Beijing, China.

Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2014) SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks. In: International Symposium on Biometrics and Security Technologies 2014 (ISBAST'14), 26-27 Aug. 2014, Kuala Lumpur, Malaysia.

Mansouri, Houssem and Badache, Nadjib and Aliouat, Makhlouf and Pathan, Al-Sakib Khan (2015) A new efficient checkpointing algorithm for distributed mobile computing. Journal of Control Engineering and Applied Informatics , 17 (2). pp. 43-54. ISSN 1454-8658

Mantikayan, Jonathan Mamangkiang and Ayu, Media Anugerah (2011) Web-based application that support active learning. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 159-167. ISBN 978-967-418-112-3

Mantoro, Teddy (2009) Metrics evaluation for context-aware computing. In: Proceedings of MOMM2009. ACM New York, NY, USA, New York, pp. 574-578. ISBN 9781605586595

Mantoro, Teddy and Abubakar, Adamu and Ayu, Media Anugerah (2011) 3D mobile navigation for dynamic users interaction. In: TENCON 2011, 21-24 November 2011, Bali . (In Press)

Mantoro, Teddy and Ayu, Media Anugerah and Yusop, Ahmad Haitham (2011) Kulliyyah of Information and Communication Technology (KICT) postgraduate system. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 71-80. ISBN 978-967-418-112-3

Mantoro, Teddy and Borovac, Amir (2010) iLukBa ver 1.1 : indoor user location system with speech recognition for mobile users. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Mantoro, Teddy and Shoukat Ali, Haroon (2009) BitTorrent: extra-locality P2P approach for grid content distribution networks. In: The ACM International Symposium Emerging Research Projects, Applications and Services (ERPAS), 14-16 Dec 2009, Kuala Lumpur.

Mat Ali, Nur Izzah and Abdul Malek, Marlinda and Ismail , Amelia Ritahani (2015) Immune network algorithm in monthly streamflow prediction at Johor river. ARPN Journal of Engineering and Applied Sciences, 10 (3). pp. 1352-1356. ISSN 1819-6608

Mat Ali, Nur Izzah and Abdul Malik, Marlinda and Ismail , Amelia Ritahani (2014) Immune network algorithm in monthly streamflow prediction at Johor river. In: Advancement in Information Technology International Conference , 16-18 December 2014, Bandung, Indonesia.

Mathuri, S. and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2012) Some properties of probabilistic semi-simple splicing systems. In: International Science Postgraduate Conference 2012 (ISPC 2012), 27-30 November 2012, Skudai, Johor.

Mavlankulov, Gairatzhan and Othman, Mohamed and Selamat, Mohd Hasan and Turaev, Sherzod (2014) Concurrent context-free grammars. In: First International Conference on Advanced Data and Informatgion Engineering (Da-Eng 2013), 16th-18th Dec. 2013, Kuala Lumpur.

Mavlankulov, Gairatzhan and Othman, Mohamed and Selamat, Mohd Hasan and Turaev, Sherzod (2014) Some properties of the concurrent grammars. In: International Conference On Mathematical Sciences And Statistics 2013, 5th-7th Feb. 2013, Kuala Lumpur.

Mavlankulov, Gairatzhan and Turaev, Sherzod and Zhumabaeva, Laula and Zhukabayeva, Tamara (2015) Parallel firing strategy on petri nets: a review. In: International Conference on Mathematics, Engineering and Industrial Applications, ICoMEIA 2014, 28-30 May 2014, Penang.

Mavlankulov, Gairatzhan and Zhumabayeva, Laula and Othman, Mohamed and Zhukabayeva, Tamara and Selamat, Mohd Hasan and Turaev, Sherzod (2016) Context-free petri net controlled grammars under parallel firing strategy. Applied Mathematics & Information Sciences: an international journal, 10 (5). pp. 1757-1762. ISSN 1935-0090

Md Nor, Norzaliza and Abdul Rahman, Abdul Wahab (2010) Driver identification and driver's emotion verification using KDE and MLP neural networks. In: 2010 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 13-14 December 2010, Jakarta, Indonesia.

Md Zin, Shazana and Anuar, Nor Badrul and Mat Kiah, Miss Laiha and Pathan, Al-Sakib Khan (2014) Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications, 41 (1). pp. 517-530. ISSN 1084-8045

Md. Tap, Abu Osman (2011) The potential of fuzzy evaluation approach in information systems. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 239-256. ISBN 9789674180034

Md. Tap, Abu Osman and Aliyu, Mansur and Mahmud, Murni (2010) Quality rating of Islamic websites features : a single-user evaluation. In: Proceedings 3rd International Conference on ICT4M 2010, 13 - 14, December 2010, Jakarta, Indonesia.

Mehfooz, Osama and Shah, Asadullah (2011) Revisiting far/near infrared pyramid-based fusion types for night vision using matlab. Pakistan Journal of Engineering Technology & Science (PJETS), 1 (1). pp. 21-36. ISSN 1995-1302

Misman, Ahmad Fatzilah and Blanchfield, Peter (2011) Adapting web images for blind people. In: WEBIST 2011, Proceedings of the 7th International Conference on Web Information Systems and Technologies, 6-9 May 2011, Noordwijkerhout, Netherlands.

Misman, Ahmad Fatzilah and Blanchfield, Peter (2011) Tagging web images for blind users. In: Issues of human computer interactions and system developments. IIUM Press, Kuala Lumpur, pp. 41-49. ISBN 978-967-418-082-9

Mohamad Jan, Nurhidaya and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Languages of watson-crick petri net. Jurnal Teknologi, 70 (5). pp. 97-101. ISSN 2180–3722 (O), 0127–9696 (P)

Mohamad Jan, Nurhidaya and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Reverse Watson-Crick Petri nets. In: 2nd International Science Postgraduate Conference 2014 (ISPC2014), 10th-12th Mar. 2014, Ibnu Sina Institute, Universiti Teknologi Malaysia Johor Bahru, Johor.

Mohamad Jan, Nurhidaya and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2016) Structural subclass of place-labelled petri net controlled grammars: State machine. In: 6th International Graduate Conference on Engineering Science and Humanities (IGCESH 2016), 15th-17th August 2016, Johor Baru, Johor.

Mohamad Jan, Nurhidaya and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Watson-Crick Petri net languages with finite sets of final markings. In: 3rd International Conference on Mathematical Sciences, 17th-19th Dec. 2013, UKM, Kuala Lumpur.

Mohamad Jan, Nurhidaya and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Watson-Crick petri net languages: the effect of labeling strategies. AIP Conference Proceedings , 1605. pp. 690-695. ISSN 0094-243X (P), 1551-7616 (O)

Mohamad Jan, Nurhidaya and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2015) k-Watson-Crick Petri net controlled grammars. International Journal of Applied Mathematics and Statistics, 53 (3). pp. 99-106. ISSN 0973-7545 (O), 0973-1377 (P)

Mohamad Jan, Nurhidaya and Turaev, Sherzod and Fong, Wan Heng and Sarmin, Nor Haniza (2016) Place-Labeled Petri Net Controlled Grammars. ScienceAsia. ISSN 1513-1874 (In Press)

Mohamad Jan, Nurhidaya and Turaev, Sherzod and Fong, Wan Heng and Sarmin, Nor Haniza (2014) Structural properties of place-labeled Petri net controlled grammars. In: The 3rd International Conference on Computer Engineering and Mathematical Sciences (ICCEMS 2014), 4-5 Dec 2014, Langkawi, Kedah.

Mohamad Jan, Nurhidaya and Turaev, Sherzod and Fong, Wan Heng and Sarmin, Nor Haniza (2015) A new variant of Petri net controlled grammars. AIP Conference Proceedings , 1682. 040015-1. ISSN 0094-243X

Mohamad Zulkufli, Nurul Liyana and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Az Eddine, Azeddin and Alshaikhli, Imad Fakhri Taha (2016) Computational properties of Watson-Crick context-free grammars. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), 8th-10th Dec. 2015, Kuala Lumpur.

Mohamad Zulkufli, Nurul Liyana and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Messikh, Azeddin (2015) Closure properties of Watson-Crick grammars. AIP Conference Proceedings , 1691. 040032-1. ISSN 0094-243X

Mohamad Zulkufli, Nurul Liyana and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Messikh, Azeddin (2015) Watson-Crick linear grammars. In: The Second International Conference on Advanced Data and Information, 25-26 April 2015 , Bali, Indonesia. (Unpublished)

Mohamad Zulkufli, Nurul Liyana and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Messikh Azeddine, Azeddine (2016) Generative power and closure properties of Watson-Crick grammars. Applied Computational Intelligence and Soft Computing, 2016. pp. 1-12. ISSN 1687-9724

Mohamad Zulkufli, Nurul Liyana and Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Messikh Azeddine, Azeddine (2016) The computational power of Watson-Crick grammars: Revisited. In: The 5th Asian Conference on Membrane Computing (ACMC2016), 14th-16th November 2016, Bangi, Selangor Malaysia. (Unpublished)

Mohamadali, Noor Azizah (2015) Exploring awareness and perception on palliative care - Internet as source of knowledge. In: 3rd International Conference on Internet Services Technology and Information Engineering 2015, 30-31 May 2015, Bali, Indonesia. (Unpublished)

Mohamadali, Noor Azizah and Adebiyi, Lookman (2015) ICT intervention and palliative care: a review. In: 3rd International Conference on Internet Services Technology and Information Engineering 2015, 30-31 May 2015, Bali, Indonesia. (Unpublished)

Mohamed, Norshidah and Abdul Karim, Nor Shahriza and Hussein, Ramlah (2010) Linking Islamic work ethic to computer use ethics, job satisfaction and organisational commitment in Malaysia. Journal of Business Systems, Governance and Ethics, 5 (1). pp. 13-23. ISSN 1833-4318

Mohamed Eljadi, Fardous and Alshaikhli, Imad Fakhri Taha (2015) SCDSP: a novel stream cipher with dynamic structure and parameters. International Journal of Advancements in Computing Technology (IJACT), 7 (5). pp. 49-56. ISSN 2233-9337 (O), 2005-8039 (P)

Mohamed Eljadi, Fardous and Alshaikhli, Imad Fakhri Taha (2016) Statistical analysis of the eSTREAM competition winners. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), 8th-10th Dec. 2015, Kuala Lumpur.

Mohamed Hassan, Ahmed Abbas and Abdul Aziz, Normaziah (2012) Ground penetrating radar system using OFDM technology. Research Report. [s.n]. (Unpublished)

Mohammad Nassr, Rasheed and Mahmud, Murni and Md Tap, Abu Osman and Aliyu, Mansur (2014) The perception of Muslim users on reliability of Islamic websites. Wulfenia Journal, 21 (11). pp. 243-261. ISSN 1561-882X

Mohammed, Mohssen and Pathan, Al-Sakib Khan (2013) Automatic defense against zero-day polymorphic worms in communication networks. CRC Press, USA, USA. ISBN 9781466557277 (In Press)

Mohammed, Mohssen M. Z. E. and Chan, H. Anthony and Ventura , Neco and Pathan, Al-Sakib Khan (2013) An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak, Malaysia.

Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In: 20114 IEEE UIC/ATC/ScalCom Multi Conference, 9th-12th December 2014, Bali, Indonesia.

Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) Using routers and honeypots in combination for collecting Internet worm attacks. In: The state of the art in intrusion prevention and detection. CRC Press, Taylor & Francis Group, USA, USA, pp. 47-84. ISBN 9781482203516

Mohammed Jama, Abdirisaq and Khalifa, Othman Omran (2011) Real-time MPEG-4 transmission over wireless LAN. In: Multimedia Encryption, Transmission and Authentication. IIUM Press, Kuala Lumpur, pp. 263-272. ISBN 978-967-418-160-4

Mohd Khidzir, Ainul Bahiah and Abdul Malek, Marlinda and Ismail , Amelia Ritahani and Juneng, Liew and Ting , Sie Chun, (2015) Utilization of artificial immune system in prediction of paddy production. ARPN Journal of Engineering and Applied Sciences, 10 (3). pp. 1462-1467. ISSN 1819-6608

Mohd Khidzir, Ainul Bahiah and Abdul Malek, Marlinda and Ismail , Amelia Ritahani and Liew, Juneng and Sie Chun, Ting (2014) Utilization of artificial immune system in prediction of paddy production. In: Advancement in Information Technology International Conference , 16-18 December 2014, Bandung, Indonesia.

Mohd Nor, Rizal and Nesterenko, Mikhail (2016) Unattended sensors in marine environments: oxybuoy for hypoxia study. In: Critical Socio-Technical Issues Surrounding Mobile Computing. IGI Global, Hershey, pp. 285-308. ISBN 9781466694385/ 9781466694392

Mohd Saad, Nurul Husna and Ibrahim, Hamidah and Alwan, Ali Amer and Sidi, Fatimah and Yaakob, Razali (2014) A framework for evaluating skyline query over uncertain autonomous databases. Procedia Computer Science, 29. pp. 1546-1556. ISSN 1877-0509

Mohd Saad, Nurul Husna and Ibrahim, Hamidah and Sidi, Fatimah and Yaakob, Razali and Alwan Aljuboori, Ali Amer (2016) Reporting skyline on uncertain dimension with query interval. Journal of Telecommunication, Electronic and Computer Engineering, 8 (6). pp. 17-21. ISSN 2180 – 1843

Mohd Sebry, Nurul Afidah and Hamzah, Nur Zatul Akmar and Sarmin, Nor Haniza and Fong, Wan Heng and Turaev, Sherzod (2012) Sticker systems over monoids. Malaysian Journal of Fundamental and Applied Sciences, 8 (3). pp. 127-132. ISSN 1823-626X

Mohd Tamrin, Mohd Izzuddin and Tengku Sembok, Tengku Mohd and Kartiwi, Mira (2013) Collaboration algorithms between intermediaries for supporting flexible supply chain management. International Journal of Applied Mathematics and Informatics, 7 (2). pp. 33-43. ISSN 2074-1278

Mohd Tamrin, Mohd Izzuddin and Tengku Sembok, Tengku Mohd and Kartiwi, Mira (2013) Hierarchical structural driven model for integrative information management architecture. International Journal of Advanced Computer Science and Information Technology, 2 (1). pp. 1-13. ISSN 2296-1739

Mohd Tamrin, Mohd Izzuddin and Turaev, Sherzod and Tengku Sembok, Tengku Mohd (2014) Weighted Watson-Crick automata. AIP Conference Proceedings , 1605. pp. 302-306. ISSN 0094-243X (P), 1551-7616 (O)

Mohd. Nor, Rizal and Nesterenko, Mikhail and Lavrentyev, Peter (2010) Oxybuoy: constructing a real-time inexpensive hypoxia monitoring platform. In: Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 28 . Springer Berlin Heidelberg, Berlin, German, pp. 795-804. ISBN 9783642117237 (O), 9783642117220 (P)

Mohd. Nor, Rizal and Nesterenko, Mikhail and Scheideler, Christian (2013) Corona: a stabilizing deterministic message-passing skip list. Theoretical Computer Science, 512. 119 - 129. ISSN 0304-3975

Mohd. Nor, Rizal and Nesterenko, Mikhail and Tixeuil, Sébastien (2013) Linearizing peer-to-peer systems with Oracles. In: 15th Internationl Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2013), 13-16 Nov 2013, Osaka.

Morshidi, Malik Arman and Tjahjadi, Tardi (2015) Feature points selection for markerless hand pose estimation. In: 2015 International Conference on Smart Sensors and Application (ICSSA), 26th-28th May 2015, Grand Seasons Hotel, Kuala Lumpur.

Muhammad, Muhd. Rosydi (2011) Understanding fit between technology, organization and people (F-TOP) factors in e-government : the case of judicial information systems. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 1-22. ISBN 9789674180034

Muhammad, Muhd. Rosydi and Ali Munassar, Fatima Hasan (2011) Al-Islam Hospital human resource system. In: The Web : Its Utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 58-70. ISBN 978-967-418-112-3

Muhammad Hidayat Khan, Sumaira and Hussain, Ayyaz and Alshaikhli, Imad Fakhri Taha (2015) An adequate approach to image retrieval based on local level feature extraction. Mehran University Research Journal of Engineering & Technology, 34 (4). pp. 337-348. ISSN 2413-7219 (O), 0254-7821 (P)

Muhammed Yusof, Zulkefli and ., Mohd Asyraf (2011) Mobile data service in Java 2 Platform Micro Edition (J2ME): mobile order. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 177-187. ISBN 9789674181062

Muhammed Yusof, Zulkefli and Mat Rawi, Ammar (2011) Content management system minisite. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 189-203. ISBN 9789674181062

Muhammed Yusof, Zulkefli and Mat Zin, Nur Nazmah (2011) The impact of transmission range over node density in Vehicular Ad Hoc Network (VANET) with obstruction of road infrastucture. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 167-176. ISBN 9789674181062

Muhammed Yusof, Zulkefli and Mat Zin, Nur Nazmah and S. Baharun, Nor Hanini and M Khairi, Nur Syahirah (2013) Implementation issues of vehicular ad hoc network applications: selected case studies in Malaysia. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Muhd Adnan, Hafizuddin and Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab and Othman, Marini (2016) Revolving traditional EEG device into mobile architecture. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016), 22nd-24th Nov. 2016, Jakarta, Indonesia.

N

Najeeb, Athaur Rahman and Salami, Momoh Jimoh Emiyoka and Gunawan, Teddy Surya and Aibinu, Abiodun Musa (2016) Review of parameter estimation techniques for time-varying autoregressive models of Biomedical signals. International Journal of Signal Processing Systems, 4 (3). pp. 220-225. ISSN 2315-4535

Naji, Ahmed Wathik and Gunawan, Teddy Surya and Zaidan, A.A. and O-Khalifa, Othman and Zaidan, B.B. and Al-Khateeb, Wajdi Fawzi Mohammed and Hameed, Shihab A. (2009) New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique. International Journal of Computer Science and Network Security (IJCSNS), 9 (7). pp. 218-224. ISSN 1738-7906

Nawaz, Naeem A. and Waqas, Ahmad and Muhammed Yusof, Zulkefli and Shah, Asadullah (2016) WSN based sensing model for smart crowd movement with identification: a conceptual model. In: Multi Conference on Computer Science And Information Systems 2016, 1-4Jul 2016, Portugal.

Nessaha, Rabia and Larbani, Moussa and Tazdait, Tarik (2007) A note on Berge equilibrium. Applied Mathematics Letters, 20 (8). pp. 926-932. ISSN 1350-4851

Nik Idris, Nik Ruzni and Saidin, Norraida (2010) An empirical study of the choice of meta analysis model on the overall estimates for continuous data with missing standard deviations. In: 2nd International Conference on Knowledge Discovery(ICKD 2010), 19-21 March, 2010, Bali, Indonesia.

Nik Ruzni, Nik Idris and Sarudin, Norraida (2010) The effects of the choice of meta analysis model on the overall estimates for continuous data with missing standard deviations. In: 2010 Second International Conference on Computer Engineering and Applications, 19-21 March, 2010, Bali Island, Indonesia.

Nizam, Anis Adma and Omar, Nurfarhana and Sharin, Nur Hafazah and Ab Kadir, Nor Adila Hanim and Abdul Halim, Siti Sarah and Muhammad, Muhd. Rosydi (2011) Potential of using ICT in Islamic-based education. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 79-86. ISBN 978-967-418-105-5

Noor Rodi, Nur Syazwani and Abdul Malik, Marlinda and Sie Chun, Ting and Ismail , Amelia Ritahani and Tang, Chao-Wei (2014) A clonal selection algorithm model for daily rainfall data prediction. Water Science and Technology , 70 (10). pp. 1641-1647. ISSN 0273-1223

Noor Rodi, Nur Syazwani and Ismail , Amelia Ritahani and Abdul Malik, Marlinda (2012) Daily rainfall prediction using clonal selection algorithm. In: International Conference on Water Resources (ICWR 2012), 5-9 November 2012, BayView Hotel, Langkawi, Kedah. (In Press)

Noordin, Mohamad Fauzan and Abd Karim, Zulkarnain (2014) The effect of IQ vs. EQ on knowledge management and innovation. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014), 17-19 November 2014, Sarawak.

Noordin, Mohamad Fauzan and Karim, Z.A (2015) Modeling the relationship between human intelligence, knowledge management practices, and innovation performance. Journal of Information & Knowledge Management, 14 (1). pp. 1-6. ISSN 1550-0126

Noordin, Mohamad Fauzan and Othman, Roslina and Zakaria, Noor Azura (2013) Investigating key success factors in adopting knowledge management system. World Applied Sciences Journal (WASJ), 21 (2). pp. 221-229. ISSN 1818-4952

Noordin, Mohamad Fauzan and Othman, Roslina and Zakaria, Noor Azura (2011) Peopleware & heartware - The philosophy of knowledge management. In: 2011 International Conference on Research and Innovation in Information Systems, ICRIIS'11, 23-24 Nov. 2011 , Kuala Lumpur.

Nordin, Azlin and K. K, Lau and Keng Yap, Ng (2011) Component-based systems from natural language requirements. In: Proceedings of 37th Euromicro Conference on Software Engineering and Advanced Applications , 2011, Finland.

Nordin, Azlin and K. K, Lau and Keng Yap, Ng (2010) Constructing component-based systems from natural language requirements using incremental composition. In: Proceedings of 36th Euromicro Conference on Software Engineering and Advanced Applications , 2010, France.

O

Olanrewaju, Rashidah Funke and Khalifa, Othman Omran and Abdul Latif, Khairun Nisaa’ (2013) Computational intelligence: It’s application in digital watermarking. Middle East Journal of Scientific Research (MEJSR), 13. pp. 25-30. ISSN 1990-9233

Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Anwar, Farhat and Khan, Abdul Raouf and Ahmed Shaikh, Faraz and Mir, Mohammad Shuaib (2016) MANET – A cogitation of its design and security issues. Middle-East Journal of Scientific Research, 24 (10). pp. 3094-3107. ISSN 1990-9233

Olanweraju, Rashidah Funke and Ali Aburas, Abdurazzag and Khalifa, Othman Omran and Hassan Abdalla Hashim, Aisha (2010) Damageless digital watermarking using complex-valued artificial neural network. Journal of Information and Communication Technology, 9. pp. 111-137. ISSN 2180-3862 (O), 1675-414X (P)

Olanweraju, Rashidah Funke and Khalifa, Othman Omran and Abdul Rahman @ Sulaiman, Husna (2013) Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal , 21. pp. 78-83. ISSN 1818-4952

Oluwo, Adeyinka Abdulquadri and Khan, Md. Raisuddin and Salami, Momoh Jimoh Eyiomika (2015) Intelligent temperature control of a tropical post-harvest storage system. In: 2015 10th Asian Control Conference (ASCC 2015), 31st May- 3rd June 2015, Kota Kinabalu, Sabah.

Onumanyi, A. J. and Onwuka, E. N. and Aibinu, Abiodun Musa and Ugweje, O. C. and Salami, Momoh Jimoh Emiyoka (2014) Comparative sensitivity analysis of energy detection techniques for cognitive radio application. International Journal of Mechatronics, Electrical and Computer Technology, 4 (12). pp. 762-785. ISSN 2305-0543

Othman, Marini and Abdul Rahman, Abdul Wahab and Karim, Izzah and Dzulkifli, Mariam Adawiah and Taha, Imad (2013) EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences, 97. pp. 30-37. ISSN 1877-0428

P

Pathan, Al-Sakib Khan (2013) Analyzing trust and security in computing and communications systems. In: Managing Trust in Cyberspace. Chapman and Hall/CRC Press, USA, USA, pp. 1-11. ISBN 9781466568440

Pathan, Al-Sakib Khan (2014) Basics of security and cryptography. In: Practical Cryptography: Algorithms and Implementations using C++. CRC Press, Taylor & Francis Group, USA, USA, pp. 1-10. ISBN 978-1-48-222889-2

Pathan, Al-Sakib Khan (2015) Building customer trust in cloud computing model. In: 2nd IEEE International Conference on Advances in Computing & Communication Engineering (ICACCE-2015), May 1-2, 2015, Dehradun, India, 1-2 May 2015, Dehradun, India. (Unpublished)

Pathan, Al-Sakib Khan (2014) Computer science and IT today: research issues and publication tips. In: International Conference on Innovations in Electronics, Communication & Computing (ICIECC 2014), 10-11 April 2014, Madurai, India.

Pathan, Al-Sakib Khan (2014) Editorial article: on the boundaries of trust and security in computing and communications systems. International Journal of Trust Management in Computing and Communications (IJTMCC), 2 (1). pp. 1-6. ISSN 2048-8378 (P) 2048-8386 (O)

Pathan, Al-Sakib Khan (2013) Editorial: when the cloud computing becomes mobile! International Journal of Internet and Distributed Systems, 1 (3). p. 17. ISSN ISSN Print: 2327-7157, ISSN Online: 2327-716

Pathan, Al-Sakib Khan (2013) Fi-Wi Network for future cloud. International Journal of Applied Research on Information Technology and Computing, 4 (3). pp. 122-132. ISSN 0975-8089 (O), 0975-8070 (P)

Pathan, Al-Sakib Khan (2011) Securing WSN with lightweight resource-efficient schemes. LAP LAMBERT Academic Publishing , VDM Verlag, Germany, Saarbrucken, Germany. ISBN 9783846516812

Pathan, Al-Sakib Khan (2012) Tackling the threats of Internet worms. International Journal on Internet and Distributed Computing Systems, 3 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)

Pathan, Al-Sakib Khan (2005) Where is the intelligence in computational intelligence? In: World ENFORMATIKA Joint Conferences (WEC 2005), June, 2005, Istanbul, Turkey. (Unpublished)

Pathan, Al-Sakib Khan (2012) Wireless network security: 3G, 4G, wireless PAN/LAN/MAN. In: Special Invited Lecture at Universiti Teknologi Malaysia, Johor Bahru, Malaysia, 23 May 2012, Johor Bahru, Malaysia. (Unpublished)

Pathan, Al-Sakib Khan (2013) Wireless sensor network security: Current status and future trends. In: International Conference on Electronics, Communication and Information Technology (ICECIT-2013), 4-5 October, 2013, Patiala, Punjab, India.

Pathan, Al-Sakib Khan (2013) The need-to-know issues for publishing books and book chapters. In: 2013 Springer SEA eBooks Seminar, 20 September 2013, IIUM Library Auditorium, Kuala Lumpur, Malaysia. (Unpublished)

Pathan, Al-Sakib Khan and Abduallah, Wafaa Mustafa and Khanam, Shapla and Saleem, Habibullah Yusuf (2012) A pay-and-stay model for tackling intruders in hybrid wireless mesh networks. Simulation-Transactions of the Society for Modeling and Simulation International, 89 (5). pp. 616-634. ISSN 0037-5497

Pathan, Al-Sakib Khan and Abdullah , Matin Saad and Al Shaikhli, Imad Fakhri (2015) Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969). Research Report. RMC, IIUM, IIUM. (Unpublished)

Pathan, Al-Sakib Khan and Ahmed, Tarem (2014) An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors. In: The state of the art in intrusion prevention and detection. CRC Press, Taylor & Francis Group, USA, USA, pp. 449-472. ISBN 9781482203516

Pathan, Al-Sakib Khan and Diallo , Abdoulaye Kindy (2014) Lethality of SQL injection against current and future Internet-technologies. International Journal of Computational Science and Engineering, 9 (4). pp. 386-394. ISSN 1742-7193 (O), 1742-7185 (P)

Pathan, Al-Sakib Khan and Fadlullah, Zubair Md. and Fouda, Mostafa M. and Lee, Hae Young (2013) Defending against wireless network intrusion. Journal of Computer and System Sciences, Online. ISSN 0022-0000 (In Press)

Pathan, Al-Sakib Khan and Fadlullah, Zubair Muhammad and Fouda, Mostafa M. and Monowar, Muhammad Mostafa and Korn, Philip (2015) Information integrity in smart grid systems. Information Systems. ISSN 0306-4379 (In Press)

Pathan, Al-Sakib Khan and Fadzal, Ahmad Nazmi (2011) Brute force password search using multithreading and grid computing. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 113-124. ISBN 9789674181062

Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Bilinear-pairing-based remote user authentication schemes using smart cards. In: ICUIMC '09 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM New York, New York, USA, pp. 366-371. ISBN 9781605584058

Pathan, Al-Sakib Khan and Kamarudin, Nurul Nabilah and Hassan, Hasfaizaidah and Ali, Nadilatul Eliana (2011) A web-based approach for the KICT evaluation system. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 87-93. ISBN 9789674181062

Pathan, Al-Sakib Khan and Khanam, Shapla and Saleem, Habibullah Yusuf and Abduallah, Wafaa Mustafa (2013) Tackling Intruders in Wireless Mesh Networks. In: Distributed Network Intelligence, Security and Applications. CRC Press, USA, USA, pp. 167-190. ISBN 9781466559578

Pathan, Al-Sakib Khan and Mohammed, Mohssen M. Z. E. (2015) Building customer trust in cloud computing with an ICT-enabled global regulatory body. Wireless Personal Communications. ISSN 0929-6212 (p); 1572-834X (e)

Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa (2012) Future trends in security issues in internet and web applications. International Journal of Computational Science and Engineering. ISSN ISSN online: 1742-7193, ISSN print: 1742-7185 (In Press)

Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Alzaid, Hani and Hoque, Mohammad Asadul (2015) Editorial. International Journal of Computational Science and Engineering, 10 (3). pp. 231-233. ISSN 1742-7193 (O), 1742-7185 (P)

Pathan, Al-Sakib Khan and Saeed, Rashid Abdelhaleem and Feki, Mohamed Ali and Tran, Nguyen H. (2014) Guest editorial: Special issue on integration of IoT with future Internet. Journal of Internet Technology, 15 (2). pp. 145-147. ISSN 1607-9264

Purnomo, Muhammad Ridwan Andi and Abdul Wahab, Dzuraidah and Hassan, Azmi and Rahmat, Riza Atiq (2009) A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling. European Journal of Scientific Research, 28 (4). pp. 628-642. ISSN 1450-216X, 1450-202X

Purnomo, Muhammad Ridwan Andi and Wahab, Dzuraidah and Hassan, Azmi and Rahmat, Riza Atiq (2009) Development of a low cost smart traffic controller system. European Journal of Scientific Research, 32 (4). pp. 490-499. ISSN 1450-216X, 1450-202X

Q

Qabajeh, Mohammad M. and Abdalla Hashim, Aisha-Hassan and Khalifa, Othman Omran (2011) Multicast security : issues and solutions. In: Multimedia Encryption, Transmission and Authentication. IIUM Press, Kuala Lumpur, pp. 257-262. ISBN 978-967-418-160-4

R

R. Othman, R. Azrina and A. Aziz, Normaziah (2012) Network forensics: detection and mitigation of botnet malicious code via darknet. In: Trustworthy Ubiquitous Computing. 1875-7669, 6 . Atlantis Press, Paris, France, pp. 65-78. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)

Rahmat, Riza Atiq and Jumari, K. and Hassan, Azmi and Basri, H. (2001) Video detection system for traffic Iight sensor. Traffic Engineering and Control, 42 (11). pp. 386-390. ISSN 0041-0683

Rahnuma , Kazi Shahzabeen and Abdul Rahman, Abdul Wahab and Kamaruddin, Norhaslinda and Abdul Majid, Hariyati Shahrima (2011) EEG analysis for understanding stress based on affective model basis function. In: 2011 IEEE 15th International Symposium on Consumer Electronics, 14-17 June 2011, Singapore.

Ramli, Alyaa Nadirah and Mohd Ghani, Asma' Salsabilla and Abdul Aziz, Famieza Azieta and Ahmad, Norhayati and Saidon, Norfaezah and Muhammad, Muhd. Rosydi (2011) Social networks in education : survey on students at the International Islamic University Malaysia (IIUM). In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 103-112. ISBN 978-967-418-105-5

Ramli, Noraza and A. Aziz, Normaziah (2012) Risk identification for an information security management system implementation. In: SECURWARE 2012 , The Sixth International Conference on Emerging Security Information, Systems and Technologies , 19 August 2012, Rome, Italy.

Razali, Najwani and Abdul Rahman, Abdul Wahab (2011) 2D affective space model (ASM) for detecting autistic children. In: 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), 14-17 June 2011, Singapore.

S

Sahalan, Muhammad Irsyad and Mat Idris, Mohamad Hilmi and Zainal Abidin, Zulkifli and Che Kamarudin, M.A.A. (2016) Tilt compensated mechanical measurement mechanism for very shallow water USV bathymetry. In: 2016 IEEE 6th International Conference on Underwater System Technology: Theory and Applications (IEEE USYS 2016), 13th-14th December 2016, Pulau Pinang. (Unpublished)

Said Alkalbani, Abdullah and Md Tap, Abu Osman and Mantoro, Teddy (2014) Evaluated reputation-based trust for WSN security. Journal of Theoretical and Applied Information Technology, 70 (3). pp. 434-442. ISSN 1992-8645 (Print) 1817-3195 (Online)

Saidin, Aznan Zuhid and Muhammad, Amran (2011) Foundations of Islamic values for ICT development. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 257-286. ISBN 9789674180034

Salami, Momoh Jimoh Eyiomika and Danzomo, Bashir Ahmed and Khan, Md. Raisuddin (2015) Adaptive neuro-fuzzy control of wet scrubbing process. In: 2015 10th Asian Control Conference (ASCC), 29th May-3rd June 2015, Kota Kinabalu, Sabah.

Salami, Momoh Jimoh Eyiomika and Tijani, Ismaila and Isqeel , Abdullateef Ayodele and Aibinu, Abiodun Musa (2013) Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm. IOP Conference Series: Materials Science and Engineering, 57 (012062). pp. 1-10. ISSN 1757-8981

Salim, Sufya and Taha, Imad (2012) Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (4). pp. 159-165. ISSN 2231-8852

Salim, Sufyan and Taha Alshaikhli , Imad Fakhri and Sulaiman, Alyaa Ghanim (2016) Lightweight block cipher algorithms: review paper. International Journal of Enhanced Research in Science, Technology & Engineering, 5 (5). pp. 136-143. ISSN 2319-7463

Sanni, Mistura L. and Abdalla Hashim, Aisha-Hassan and Naji, Ahmed Wathik and Mahmoud Ahmed, Gharib Subhi (2011) Mobility management in multicast environment. In: Multimedia Encryption, Transmission and Authentication. IIUM Press, Kuala Lumpur, pp. 249-256. ISBN 978-967-418-160-4

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2015) Computational power of probabilistic bidirectional sticker system in DNA computing. International Journal of Applied Mathematics and Statistics, 53 (3). pp. 66-72. ISSN 0973-7545 (O), 0973-1377 (P)

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Probabilistic regular sticker system and its properties. In: 2nd International Science Postgraduate Conference 2014 (ISPC2014), 10th-12th Mar. 2014, Ibnu Sina Institute, Universiti Teknologi Malaysia Johor Bahru, Johor.

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Probabilistic semi-simple splicing system and its characteristics. Jurnal Teknologi, 62 (3). pp. 21-26. ISSN 2180–3722 (O), 0127–9696 (P)

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Probabilistic simple splicing systems. AIP Conference Proceedings , 1602. pp. 760-766. ISSN 0094-243X (P), 1551-7616 (O)

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Probabilistic sticker systems. Malaysian Journal of Fundamental and Applied Sciences, 9 (3). pp. 150-155. ISSN 1823-626X

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Some characteristics of probabilistic one-sided splicing systems. In: 20th National Symposium on Mathematical Sciences, 18–20 December 2012 , Palm Garden Hotel, Putrajaya, Malaysia .

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Some properties of probabilistic one-sided sticker systems. In: International Conference on Biotechnology Engineering (ICBioE 2013), 2 – 4 Jul 2013, Kuala Lumpur, Malaysia.

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Some properties of probabilistic one-sided sticker systems. Advances in Environmental Biology, 8 (3). pp. 717-724. ISSN 1995-0756

Selvarajoo, Mathuri and Fong, Wan Heng and Sarmin, Nor Haniza and Turaev, Sherzod (2013) Some properties of semi-simple splicing system over some permutation groups. In: Biennial International Group Theory Conference 2013, 4-8 Feb 2013, Istanbul, Turkey.

Selvarajoo, Mathuri and Turaev, Sherzod and Fong, Wan Heng and Sarmin, Nor Haniza (2015) The generative capacity of probabilistic splicing systems. Applied Mathematics & Information Sciences, 9 (3). pp. 1191-1198. ISSN 1935-0090

Selvarajoo, Mathuri and Wan, Heng Fong and Sarmin, Nor Haniza and Turaev, Sherzod (2015) The properties of probabilistic simple regular sticker system. AIP Conference Proceedings , 1682. 020047-1. ISSN 0094-243X

Sembok, Tengku Mohd Penyebaran ilmu dan penerusan tamadun indigenus melalui teknologi maklumat dan komunikasi. In: MABBIM Public Lecture Series. (Unpublished)

Shah, Abdul Salam and Khan, M.N.A. and Subhan, Fazli and Fayaz, Muhammad and Shah, Asadullah (2016) An offline signature verification technique using pixels intensity levels. International Journal of Signal Processing, Image Processing and Pattern Recognition, 9 (8). pp. 205-222. ISSN 2005-4254

Shah, Asadullah and Bhatti, Zeeshan and Alshaikhli, Imad Fakhri Taha (2011) Firmware program. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 17-22. ISBN 9789674180850

Shah, Asadullah and Bhatti, Zeeshan and Alshaikhli, Imad Fakhri Taha (2011) Graphical user interfaces. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 23-30. ISBN 9789674180850

Shah, Asadullah and Bhatti, Zeeshan and Alshaikhli, Imad Fakhri Taha (2011) Interfaces and protocols. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 9-16. ISBN 9789674180850

Shah, Asadullah and Bhatti, Zeeshan and Alshaikhli, Imad Fakhri Taha (2011) Internal structure of computer systems. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 1-8. ISBN 9789674180850

Shah, Asadullah and Bhatti, Zeeshan and Alshaikhli, Imad Fakhri Taha (2011) Short cut and hard drive. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 31-38. ISBN 9789674180850

Shah, Asadullah and Khowaja, Kamran and Alshaikhli, Imad Fakhri Taha (2011) Basic disk management. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 135-140. ISBN 9789674180850

Shah, Asadullah and Khowaja, Kamran and Alshaikhli, Imad Fakhri Taha (2011) Cascade style sheets. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 147-155. ISBN 9789674180850

Shah, Asadullah and Khowaja, Kamran and Alshaikhli, Imad Fakhri Taha (2011) Disk management. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 141-146. ISBN 9789674180850

Shah, Asadullah and Khowaja, Kamran and Alshaikhli, Imad Fakhri Taha (2011) Logical drive. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 119-125. ISBN 9789674180850

Shah, Asadullah and Khowaja, Kamran and Alshaikhli, Imad Fakhri Taha (2011) Storage management. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 127-134. ISBN 9789674180850

Shah, Asadullah and Khowaza, Khamran (2011) Iterative structures. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 39-48. ISBN 9789674180904

Shah, Asadullah and Khowaza, Khamran (2011) Review of variables, formatting. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 59-61. ISBN 9789674180904

Shah, Asadullah and Khowaza, Khamran (2011) Review, summary & building skill. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 33-37. ISBN 9789674180904

Shah, Asadullah and Khowaza, Khamran (2011) The do-while loop. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 55-57. ISBN 9789674180904

Shah, Asadullah and Khowaza, Khamran (2011) The for loop. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 49-53. ISBN 9789674180904

Shah, Asadullah and Khowaza, Sumbul (2011) Functions. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 83-90. ISBN 9789674180904

Shah, Asadullah and Khowaza, Sumbul (2011) Post-test and nested loops. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 73-82. ISBN 9789674180904

Shah, Asadullah and Khowaza, Sumbul (2011) Review of iterative structures. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 63-72. ISBN 9789674180904

Shah, Asadullah and Rauf, Adnan (2011) Common emitter amplifier with fixed bias. In: Understanding basic concept of electrical and electronic systems. IIUM Press, Kuala Lumpur, pp. 69-74. ISBN 9789674181161

Shah, Asadullah and Rauf, Adnan (2011) Ohm's law. In: Understanding basic concept of electrical and electronic systems. IIUM Press, Kuala Lumpur, pp. 60-61. ISBN 9789674181161

Shah, Asadullah and Sagir, Mohamad (2011) Using the multimeter. In: Understanding basic concept of electrical and electronic systems. IIUM Press, Kuala Lumpur, pp. 6-12. ISBN 9789674181161

Shah, Asadullah and Saidin, Aznan Zuhid and Alshaikhli, Imad Fakhri Taha and Zeki, Akram M. (2011) Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. Procedia - Social and Behavioral Sciences, 27. pp. 233-240. ISSN 18770428

Shah, Asadullah and Shah, Faisal and Alshaikhli, Imad Fakhri Taha (2011) Basic text effects. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 205-212. ISBN 9789674180850

Shah, Asadullah and Shah, Faisal and Alshaikhli, Imad Fakhri Taha (2011) Image and special effects. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 199-204. ISBN 9789674180850

Shah, Asadullah and Shah, Faisal and Alshaikhli, Imad Fakhri Taha (2011) Image filtering. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 227-232. ISBN 9789674180850

Shah, Asadullah and Shah, Faisal and Alshaikhli, Imad Fakhri Taha (2011) Image quality improvement. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 233-239. ISBN 9789674180850

Shah, Asadullah and Shah, Faisal and Alshaikhli, Imad Fakhri Taha (2011) Text animation. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 213-219. ISBN 9789674180850

Shah, Asadullah and Shah, Faisal and Alshaikhli, Imad Fakhri Taha (2011) Text effects. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 221-226. ISBN 9789674180850

Shah, Asadullah and Shah, Zoya and Alshaikhli, Imad Fakhri Taha (2011) Image clone 1. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur , pp. 181-191. ISBN 9789674180850

Shah, Asadullah and Shah, Zoya and Alshaikhli, Imad Fakhri Taha (2011) Image clone 2. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 193-197. ISBN 9789674180850

Shah, Asadullah and Shah, Zoya and Alshaikhli, Imad Fakhri Taha (2011) Image editing. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 157-164. ISBN 9789674180850

Shah, Asadullah and Shah, Zoya and Alshaikhli, Imad Fakhri Taha (2011) Image effects. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 165-172. ISBN 9789674180850

Shah, Asadullah and Shah, Zoya and Alshaikhli, Imad Fakhri Taha (2011) Image tool function. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 173-179. ISBN 9789674180850

Shah, Asadullah and Shaikh, Asadullah (2011) Control panel of an oscilloscope. In: Understanding basic concept of electrical and electronic systems. IIUM Press, Kuala Lumpur, pp. 29-33. ISBN 9789674181161

Shah, Asadullah and Shaikh, Asadullah (2011) Measurement techniques. In: Understanding basic concept of electrical and electronic systems. IIUM Press, Kuala Lumpur, pp. 39-46. ISBN 9789674181161

Shah, Asadullah and Shaikh, Asadullah (2011) Soldering iron practice. In: Understanding basic concept of electrical and electronic systems. IIUM Press, Kuala Lumpur, pp. 52-55. ISBN 9789674181161

Shah, Asadullah and Shaikh, Asadullah and Alshaikhli, Imad Fakhri Taha (2011) Basic storage management. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 113-118. ISBN 9789674180850

Shah, Asadullah and Shaikh, Asadullah and Alshaikhli, Imad Fakhri Taha (2011) Network security setting. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 99-106. ISBN 9789674180850

Shah, Asadullah and Shaikh, Asadullah and Alshaikhli, Imad Fakhri Taha (2011) Task scheduling. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 107-112. ISBN 9789674180850

Shah, Asadullah and Shaikh, Asadullah and Alshaikhli, Imad Fakhri Taha (2011) Windows installation. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 87-98. ISBN 9789674180850

Shah, Asadullah and Shaikh, Assadullah (2011) Arithmetic expressions and data types in C++. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 1-3. ISBN 9789674180904

Shah, Asadullah and Shaikh, Assadullah (2011) Decision making: If-else statements and relational operators. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 17-24. ISBN 9789674180904

Shah, Asadullah and Shaikh, Assadullah (2011) Sending the output to a print file. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 11-16. ISBN 9789674180904

Shah, Asadullah and Shaikh, Muniba (2013) 10 c’s of social networking, interconnections and the impact on social networking. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Shah, Asadullah and Shaikh, Muniba and Alshaikhli, Imad Fakhri Taha (2011) Basic operating system setting. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 81-86. ISBN 9789674180850

Shah, Asadullah and Shaikh, Muniba and Alshaikhli, Imad Fakhri Taha (2011) Control panel and screen savers. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 65-72. ISBN 9789674180850

Shah, Asadullah and Shaikh, Muniba and Alshaikhli, Imad Fakhri Taha (2011) Folder and directory. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 47-53. ISBN 9789674180850

Shah, Asadullah and Shaikh, Muniba and Alshaikhli, Imad Fakhri Taha (2011) Folder operations. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 55-63. ISBN 9789674180850

Shah, Asadullah and Shaikh, Muniba and Alshaikhli, Imad Fakhri Taha (2011) Hardware configuration. In: Introduction of computer systems and applications. IIUM Press, Kuala Lumpur, pp. 73-79. ISBN 9789674180850

Shah, Asadullah and Shaikh, Muniba and Alshaikhli, Imad Fakhri Taha (2011) Windows explorer. In: Introduction of computer systems and applications. IIUM Press, IIUM , pp. 39-46. ISBN 9789674180850

Shah, Asadullah and Shaikh, assadullah (2011) Logical operators and switch statements. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 25-31. ISBN 9789674180904

Shahidi, Farruh (2013) On infinite-dimensional dissipative quadratic stochastic operators. Advances in Difference Equations , 272. pp. 1-13. ISSN 1687-1839

Shahidi, Farruh and Ganiev, Inomjon (2012) Vector valued martingale-ergodic and ergodic-martingale theorems. Stochastic Analysis and Applications, 30 (5). pp. 916-932. ISSN 1532-9356 (O), 0736-2994 (P)

Shahidi, Farruh and Ganikhodzhaev, Rasul and Abdulghafor, R. (2013) The Dynamics of Some Extreme Doubly Stochastic Quadratic Operators. Middle East Journal of Scientific Research (MEJSR), 13 (SpIssu). pp. 59-63. ISSN 1990-9233

Shaikh, Muniba and Dar, Humaira and Shah, Asadullah (2013) Analysis of SNS popularity from different perspectives among users. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Shams, Wafa Khazal and Abdul Rahman, Abdul Wahab (2012) Characterizing autistic disorder based on principle component analysis. Australian Journal of Basic and Applied Sciences, 6 (1). pp. 149-155. ISSN 1991-8178

Shams, Wafa Khazal and Abdul Rahman, Abdul Wahab and Qidwai, Uvais A. (2012) Detecting Different Tasks Using EEG-Source-Temporal Features. In: Proceedings of Neural Information Processing - 19th International Conference, ICONIP 2012, November 12-15, 2012, Doha, Qata.

Shams, Wafa Khazal and Abdul Rahman, Abdul Wahab and Taha, Imad (2013) Emotion recognition model using source-temporal features and fuzzy. Lecture Notes in Computer Science (LNCS), 8226 (1). pp. 577-584. ISSN 1611-3349 (O), 0302-9743 (P)

Shams, Wafaa Khazaal and Abdul Rahman, Abdul Wahab and A. Qidwai, Uvais (2012) Fuzzy model for detection and estimation of the degree of autism spectrum disorder. In: Proceedings of the 19th International Conference on Neural Information Processing (ICONIP 2012), November 12-15, 2012, Doha, Qatar.

Shams, Wafaa Khazaal and Abdul Rahman, Abdul Wahab and Alshaikhli, Imad Fakhri Taha (2013) Affective computing model using source-temporal domain. Procedia - Social and Behavioral Sciences, 97. pp. 54-62. ISSN 1877-0428

Shamsudin, Ahmad Faizul and Ibrahim, Jamaludin and Sembok, Tengku Mohd and Noordin, Mohamad Fauzan and Hashim, Jamil and Wan Yusof, Wan Sabri (2013) Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Shamsudin, Ahmad Faizul and Suhaimi, Mohd Adam and M., Huweldi and Seth, Salam and N., Aishah and A. F., AlyaKhadijah and R., Hidayah and Noorbatcha, Ibrahim Ali (2012) Developing an emergent theoretical framework for artificial pseudo-gene communication pathway in DNA computing. In: International Conference on Advanced Computer Science and Informations (ICACSIS 2012), 1-2 December 2012, University of Indonesia.

Shamsudin, Ahmad Faizul and Suhaimi, Mohd Adam and Makarin, Rusydi Hasan and Jaafar, Abi Dzar (2010) Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Shamsudin, Ahmad Faizul and Suhaimi, Mohd Adam and Salih, Falah and Saxena, Anil Kumar and Luddin, Fahmi and Abdul Razak, Johan Effendi (2010) Computer generated degenerative brain (DBrain) solution for people with memory loss and related impairements. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Shuib, Ahmad Hasanul Ishraf and Abdul Aziz, Normaziah and Mat Daud, Nuraihan and Hasan, Haslin (2014) CART - an Arabic teaching-learning tool for non-native Arabic speakers. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 17-18 Nov 2014, Kuching.

Shuriye, Abdi Omar (2008) Study of Islamic perspectives of professional code of ethics in the field of computing and informatics. Australian Journal of Islamic Studies, 1 (2). pp. 71-80. ISSN 1834-6170

Sie Chun, Ting and Ismail , Amelia Ritahani and A. Malek, Marlinda (2013) Development of effluent removal prediction model efficiency in septic sludge treatment plant through clonal selection algorithm. Journal of Environmental Management, 129. pp. 260-265. ISSN 0301-4797

Sie Chun, Ting and Ismail , Amelia Ritahani and Abdul Malik, Marlinda (2012) Analysis of sequence batch reactor for COD and TSS removal identification from septic sludge treatment plant using bio inspired algorithm: a case study in Sarawak. In: National Graduate Conference 2012 (NATGRAD 2012), 8-11 Novermber 2012, Selangor, Malaysia.

Sofianiza, Abd Malik and Alistair, Edwards (2012) Investigation of cultural dependency in mobile technology and older adults. In: CHI (ACM Conference on Human Factors in Computing Systems) 2010, April 14-15, 2010, Georgia, Atlanta.

Sophian, Ali (2016) Automotive mechatronics: a green technology? In: The 1st Green Development International Conference 2016, 25th-26th Oct. 2016, Jambi, Indonesia. (Unpublished)

Suhaimi, Mohd Adam and Hussin, Husnayati and Abu Bakar, Fazidah (2011) An empirical study on strategic information systems planning practices on Malaysian government agencies. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 49-76. ISBN 9789674180034

Sulaiman, Suriani and Ahmed Yahya, Saba and Mohd Shukor, Nur Sakinah and Ismail , Amelia Ritahani and Zaahirah, Qazi and Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab and Dzulkifli, Mariam Adawiah (2015) Clustering natural language morphemes from EEG signals using the Artificial Bee Colony algorithm. In: Computational intelligence in information systems: proceedings of the Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014). Advances in Intelligent Systems and Computing (331). Switzerland, Springer International Publishing, pp. 51-60. ISBN 978-3-319-13152-8

Sulaiman, Suriani and Gasser, Michael and Kubler, Sandra (2011) Towards a Malay derivational lexicon: learning affixes using expectation maximization. In: 2nd Workshop on South and Souteast Asian Natural Language Processing (WSSANLP), IJCNLP 2011, 8th-13th Nov. 2011, Chiang Mai, Thailand.

Sutjipto, Agus Geter Edy and Jufriadi, . and Muhida, Riza and Adesta, Erry Yulian Triblas (2009) Modeling electric field distribution on insulator under electron bombardment in vacuum. In: Proceedings of World Academy of Science, Engineering and Technology.

T

Taha, Imad (2014) Brain & heart from computer science perspective. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014, 29-30 Dec 2014, Amman- Jordan.

Taha, Imad and Ahmad, Mohammad A. (2011) Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1). pp. 36-51. ISSN 2231-8852

Taha, Imad and Alahmad, Mohammad (2013) SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World, 26-28 March 2013, Morocco.

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi.

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852

Taha, Imad and Alahmad, Mohammad and Munther, Khansaa (2012) Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5

Taha, Imad and Alkandari, Abdulrahman (2012) An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alkandari, Abdulrahman and alnasheet, Meshal (2012) Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012, 3-5 June 2012, Kuala Terengganu, Malaysia.

Taha, Imad and Alzuabi, Haifa (2012) Quality evaluation of “safeer” portal for Saudi students studying abroad. In: International Conference on Advanced Computer Science Applications and Technologies .

Taha, Imad and Farid, Sumaira and Hussain, Ayyaz (2012) Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.

Taha, Imad and Hasan, Luay (2006) New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18). pp. 81-101. ISSN 1681-6870

Taha, Imad and Ibrahim Habra, Hind Saleem (2006) Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College, 8 (19). pp. 87-98. ISSN 1681-6870

Taha, Imad and Inazy, Qabas (2006) Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College, 8 (19). pp. 217-232. ISSN 1681-6870

Taha, Imad and Naef, Asaad (2004) Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq, 7 (15). pp. 51-60. ISSN 1681-6870

Taha, Imad and Sahasrabuddhe, H.V. (1999) A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99, 23-26 September 2009, New Delhi.

Taha, Imad and Salim, Sufyan (2012) Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL.

Taha, Imad and Zeki, Akram M. and Pathan, Al-Sakib Khan and makarim, rusydi (2012) Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim), 28-30 March 2012, Cambridge, UK. (In Press)

Taha Alshaikhli , Imad Fakhri and Alkandari, Abdulrahman and Najaa, Anas (2013) Comparative study between traffic control methods Using simulation software. International Journal of Machine Learning and Computing (IJMLC), 3 (5). pp. 424-429. ISSN 2010-3700

Tahghighi, Muhammad and Turaev, Sherzod and Jaafar, Azmi and Mahmod, Ramlan and Said, M. Md. (2012) On the security of golden cryptosystems. International Journal of Contemporary Mathematical Sciences, 7 (7). pp. 327-335. ISSN 1312-7586

Tan, Chin Keng and Yeoh, Kah Ching (2015) A comparison between quantity surveying and information technology students on web application in learning process. Malaysian Online Journal of Educational Technology, 3 (1). pp. 1-11. ISSN 2289 - 2990 (O)

Tengku Sembok, Tengku Mohd and Noordin, Mohamad Fauzan and Othman, Roslina and Abdul Kadir, Rabiah (2012) Logical-linguistic semantic in search engine. In: Mathematical Models and Methods in Modern Science. WSEAS Press, pp. 221-225. ISBN 978-1-61804-106-7

Timmis, Jon and Ismail, Amelia Ritahani and Bjerknes, Jan Dyre and Winfield, Alan F T (2016) An immune-inspired swarm aggregation algorithm for self-healing swarm robotic systems. Biosystems, 146. pp. 60-76. ISSN 0303-2647

Ting, Sie Chun and Abdul Malik, Marlinda and Ismail , Amelia Ritahani (2015) A comparative study of clonal selection algorithm for effluent removal forecasting in septic sludge treatment plant. Water Science and Technology , 71 (4). pp. 524-528. ISSN 0273-1223

Ting, Sie Chun and Ismail , Amelia Ritahani and Abdul Malik, Marlinda (2012) Bio-engineered solution in enhancement of septic sludge with artificial immune system. In: International Conference on Water Resources (ICWR 2012), 5-9 November 2012, BayView Hotel, Langkawi, Kedah. (In Press)

Ting , Sie Chun, and A. Malek, Marlinda and Ismail, Amelia Ritahani (2014) Prediction analysis of effluent removal in a septic sludge treatment plant: a biomimetics engineering approach. Environmental Science: Processes & Impacts , 16 (9). pp. 2208-2214. ISSN 2050-7887

Tiong, Sieh Keong and Ismail, Mahamod and Hassan, Azmi (2005) Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system. In: 2005 13th International Conference on Networks, 2005, jointly held with the 2005 7th Malaysian International Conference on Communication, 16-18 Nov. 2005, Kuala Lumpur.

Tiong, Sieh Keong and Ismail, Mahamod and Hassan, Azmi (2005) WCDMA downlink capacity improvement by using smart antenna. In: 2005 13th International Conference on Networks, 2005, jointly held with the 2005 7th Malaysian International Conference on Communication, 16-18 Nov. 2005, Kuala Lumpur.

Tiong, Sieh Keong and Koh, Johnny and Ismail, Mahamod and Hassan, Azmi (2006) Downlink capacity improvement of WCDMA system by using adaptive antenna with novel MDPC beamforming technique. In: Third IEEE International Workshop on Electronic Design, Test and Applications, 2006. DELTA 2006. , 17-19 Jan. 2006 , Kuala Lumpur.

Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Pacheco, Julio C. Ramírez (2012) Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models. Mathematical and Computer Modelling Journal. ISSN 0895-7177 (In Press)

Toral-Cruz, Homero and Ramirez-Pacheco, Julio and Velarde-Alvarado, Pablo and Pathan, Al-Sakib Khan (2013) VoIP in next generation converged networks. In: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, USA, USA. ISBN 9781466507616

Turaev, Sherzod and Dassow, Juergen and Manea, Florin and Selamat, Mohd Hasan (2012) Language classes generated by tree controlled grammars with bounded nonterminal complexity. Theoretical Computer Science, 449 (2012). pp. 134-144. ISSN 0304-3975

Turaev, Sherzod and Gan, Y.S. and Othman, Mohamed and Sarmin, Nor Haniza and Fong, Wan Heng (2012) Weighted splicing systems. In: 6th International Symposium on Intelligence Computation and Applications (ISICA 2012, , October 27-28, 2012, Wuhan, China.

Turaev, Sherzod and Mohd Tamrin, Mohd Izzuddin and Salleh, Norsaremah (2014) Nonterminal complexity of weakly conditional grammars. In: 6th Asian Conference, ACIIDS 2014, 7th-9th April 2014, Bangkok, Thailand.

Turaev, Sherzod and Othman, Mohamed and Selamat, Mohd Hasan and Krassovitskiy, Alexander (2011) Parsing algorithms for grammars with regulated rewriting. In: 11th WSEAS International Conference on Applied Computer Science (ACS '11), 3-5 October 2011, Penang.

Turaev, Sherzod and Selvarajoo, Mathuri and Selamat, Mohd Hasan and Sarmin, Nor Haniza and Fong, Wan Heng (2013) Probabilistic splicing systems. In: Advanced methods for computational collective intelligence. Springer-Verlag Berlin Heidelberg, Berlin Heidelberg, pp. 259-268. ISBN 978-3-642-34300-1

U

Uddin, Mueen and Abdul Rahman, Azizah and Alarifi, Abdulrahman and Talha, Muhammad and Shah, Asadullah and Iftikhar, Mohsin and Zomaya, Albert (2012) Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm. International Journal of Innovative Computing, Information and Control, 8 (6). pp. 4375-4389. ISSN 1349-4198

Uddin, Mueen and Abdul Rahman, Azizah and Shah, Asadullah and Memon, Jamshed (2012) Virtualization implementation approach for data centers to maximize performance. Asian Journal of Scientific Research, 5 (2). pp. 45-57. ISSN 1992-1454

W

Wahiddin, Mohamed Ridza and Geong, Sen Poh and Abdullah, Nik Nailah and Zaba, Muhammad Reza (2012) Reasoning of collaborative human behaviour in security-critical work practices: a framework. In: Trustworthy Ubiquitous Computing. Atlantis Press, Paris, France, pp. 99-106. ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online)

Wahiddin, Mohamed Ridza and Noor Sham, Noor Shamilla Shanaz and Saeb, Magdy M. and Mior Hamdan, Mior Hadi (2010) A protocol for secret key infusion from satellite transmissions. International Journal of Computer and Network Security (IJCNS), 2 (7). pp. 99-101. ISSN 2076-9199

Wali, Tuerxun and Mohd Nor, Rizal and Sidek, Khairul Azami and Abubakar, Adamu (2016) Non-contact electrocardiogram (ECG) smart chair for ST segment elevation myocardial infarction detect. Journal of Theoretical and Applied Information Technology, 84 (3). pp. 315-320. ISSN 1992-8645

Wali, Tuerxun and Mohd. Nor, Rizal and Sidek, Khairul Azami and Abubakar, Adamu and Chiroma, Haruna and Herawan, Tutut (2015) A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015), 25th April 2015 - 26th April 2015, Bali, Indonesia. (Unpublished)

Wani, Sharyar and Wahiddin, Mohamed Ridza and Sembok, Tengku Mohd (2016) Logico-linguistic semantic representation of documents. In: 2nd International Conference on Big Data Intelligence and Computing (DataCom 2016), 8-10 Aug 2016, Auckland.

Waqas, Ahmad and Majeed, Nahdia and Muhammed Yusof, Zulkefli and Wahees Mahesar, Abdul (2013) Dynamic object replica placement using underlying routing protocols: ensuring the reliability. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2011) PMDA: A malicious peer detection algorithm for P2P systems. INFORMATION JOURNAL. ISSN ISSN 1343-4500 (print), ISSN 1344-8994 (electronic) (In Press)

Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2012) PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA. In: International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA.

Wei, Xianglin and Fan, Jianhua and Chen, Ming and Ahmed, Tarem and Pathan, Al-Sakib Khan (2013) SMART: a subspace based malicious peers detection algorithm for P2P systems. International Journal of Communication Networks and Information Security (IJCNIS). ISSN ISSN: 2076-0930 (Print), ISSN: 2073-607X (Online) (In Press)

Win, Harry Tin and Pathan, Al-Sakib Khan (2013) On the issues and challenges of Fiber-Wireless (Fi-Wi) networks. Journal of Engineering, 2013. pp. 645745-1. ISSN 1584-2673

Y

Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab and Alshaikhli, Imad Fakhri Taha and Kamaruddin, Norhaslinda (2014) CMAC-based computational model of affects (CCMA) for profiling emotion from EEG signals. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), 17th - 19th November 2014, Kuching, Sarawak, Malaysia. (Unpublished)

Yaacob, Hamwira Sakti and Kamaruddin, Norhaslinda and Abdul Rahman, Abdul Wahab (2013) Brain Topographic Mapping of Emotions using Computational Cerebellum. In: The Tenth International Conference on Electronics Computer and Computation (ICECCO 2013), 7-9 November 2013, Turgut Özal University, Ankara, Turkey.

Yee, Sian Gang and Wan, Hen Fong and Sarmin, Nor Haniza and Turaev, Sherzod (2014) Weighted one-sided splicing systems. In: 2nd International Science Postgraduate Conference 2014, 10th-12th Mar. 2014, Ibnu Sina Institute For Fundamental Science Studies , Universiti Teknologi Malaysia.

Yee, Sian Gang and Wan, Heng Fong and Sarmin, Nor Haniza and Turaev, Sherzod (2015) Some characteristics on the generative power of weighted one-sided splicing systems. AIP Conference Proceedings , 1682. 020044-1. ISSN 0094-243X

Yee, Sian Gang and Wan, Heng Fong and Sarmin, Nor Haniza and Turaev, Sherzod (2014) The generative capacity of sticker systems with weights. In: The 3rd International Conference on Computer Engineering and Mathematical Sciences (ICCEMS 2014), 4-5 Dec 2014, Langkawi, Kedah.

Yosman, Ahmad Firdaus and Holzer, Marcus and Truthe, Bianca and Fong, Wan Heng and Sherzod Turaev, Sherzod (2016) Two variants of bonded parallel insertion systems and their generative power. In: 6th International Graduate Conference on Engineering Science and Humanities (IGCESH 2016), 15th-17th August 2016, Johor Baru, Johor.

Yunus, Yasmin and Ayu, Media Anugerah (2011) Multimedia courseware for children. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 125-132. ISBN 978-967-418-105-5

Yusof, Imran and Pathan, Al-Sakib Khan (2014) Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014), 17-19 November 2014, Sarawak.

Z

Zahari, Ammar and Ismail , Amelia Ritahani and Desia, Recky (2015) Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space. Jurnal Teknologi, 77 (20). pp. 33-38. ISSN 0127–9696

Zaidan , A. A. and Ahmad, N. N. and Abdul Karim, Hazerul and Larbani, Moussa and Zaidan, B.B. (2014) On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: an automated anti-pornography system. Neurocomputing, 131. pp. 397-418. ISSN 0925-2312

Zainuddin @ Zenah, Nor Harisah and Abdul Aziz, Normaziah (2011) Secure coding in software development. In: 2011 5th Malaysian Conference in Software Engineering (MySEC), 13-14 Dec. 2011 , Johor Bahru.

Zamali, T. and Lazim, M. A. and Md Tap, Abu Osman (2012) Sensitivity analysis using fuzzy linguistic hedges. In: 2012 IEEE Symposium on Humanities, Science and Engineering Research, 24-27 June 2012, Kuala Lumpur.

Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Zeki, Akram M. and Abdullah, Shahidan (2009) A genetic-algorithm-based approach for audio steganography. World Academy of Science, Engineering and Technology, 54. pp. 360-363. ISSN 1307-6884

Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Zeki, Akram M. and Magalingam, Pritheega (2009) A Novel Approach for Audio Watermarking. In: Firth International Conference on Information Assurance and Security, 18-20 August, 2009, Xi'an, China.

Zamzami, Ikhlas and Mahmud, Murni (2011) Measuring information contents quality of E-Services through mobile devices. In: The web: Its utilisation, evaluation and security. IIUM Press, Gombak, pp. 240-249. ISBN 978-967-418-112-3

Zangana, Hewa Majeed and Alshaikhli, Imad Fakhri Taha (2013) A new algorithm for human face detection using skin color tone. IOSR-Journal of Computer Engineering, 11 (6). pp. 31-38. ISSN 2278- 0661 (O), 2278-8727 (P)

Zangana, Hewa Majeed and Alshaikhli, Imad Fakhri Taha and Graha, Yuliana Isma (2013) The ethical dilemma of software piracy: an inquiry from an Islamic perspective. Creative Communication and Information Technology, 7 (1). pp. 59-76. ISSN 1978 - 8282

Zangana, Hewa Majeed and Graha, Yuliana Isma and Taha Alshaikhli, Imad Fakhri (2015) Blogging: a new platform for spreading rumors! CCIT Journal, 9 (1). pp. 71-76. ISSN 1978 -8282

Zeadally, Sherali and Pathan, Al-Sakib Khan and Alcaraz, Cristina and Badra, Mohamad (2012) Towards privacy protection in smart grid. Wireless Personal Communications, 73 (1). pp. 23-50. ISSN 0929-6212 (Print) 1572-834X (Online)

Zeki, Ahmed M. (2005) The segmentation problem in Arabic Character Recognition the state of the art. In: 1st International Conference on Information and Communication Technology, ICICT 2005, 08/27/2005 - 08/28/2005, Karachi.

Zeki, Ahmed M. and Serda Ali, Ruzanna and Appalasamy, Patma (2012) K-Means approach to facial expressions recognition. In: 2012 International Conference on Information Technology and e-Services, 24-26 March 2012, Sousse, Tunisia.

Zeki, Ahmed M. and Zeki, Akram M. and Hameed, Shihab A. (2011) Ethical issues in e-learning. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 145-149. ISBN 978-967-418-105-5

Zeki, Akram M. (2011) Security of multimedia in the web. In: The web : Its utilisation, Evaluation and Security. IIUM Press, Kuala Lumpur, pp. 257-262. ISBN 978-967-418-112-3

Zeki, Akram M. and Abdul Manaf, Azizah and Olanweraju, Rashidah Funke (2010) Watermarking technique based on ISB (Intermediate Significant Bit). In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Zeki, Akram M. and Alsafi, Hassen Mohammed and Nassr, R.M. and Mantoro, Teddy (2012) A mobile dictionary for pilgrims. In: 2012 International Conference on Information Technology and e-Services, 24-26 March 2012, Sousse, Tunisia.

Zeki, Akram M. and Chebil, Jalel and Ishari, Abd Wahab and Zeki, Ahmed M. (2011) Justification of voice recognition system : case study of the Quran. In: Information technology issues and applications in Malaysia : a collection of articles. IIUM Press, Kuala Lumpur, pp. 287-301. ISBN 9789674180034

Zeki, Akram M. and Ibrahim, Hazeeha and Senam, Shayma (2011) E-Books systems. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 39-44. ISBN 978-967-418-105-5

Zeki, Akram M. and Mustakim, Farah Nadiah (2011) Online management systems for primary school students. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 113-116. ISBN 978-967-418-105-5

Zeki, Akram M. and Rosdi, Iffah Nadhirah and Aszenan, Azliza and Hassan A. Hashim, Aishah (2011) Development of user friendly e-lectures notes. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 33-38. ISBN 978-967-418-105-5

Zeki, Akram M. and Saleh, Nor Hatini and Senan, Shayma (2011) Online teaching notes. In: Advancement in E- learning. IIUM Press, Kuala Lumpur, pp. 27-31. ISBN 978-967-418-105-5

Zuhedy Zay, Aqqiela Zuhra and Mohd. Nor, Rizal and Mohamed Razi, Mohamed Jalaldeen and Mantoro, Teddy and Ayu, Media Anugerah (2015) NFC based attendance: more than just a touch. In: 4th International Conference on Research and Innovation in Information Systems – 2015 (ICRIIS’15). , 8th December 2015 - 10th December 2015, Melaka, Malaysia. (Unpublished)

Zuhri, Muhammad Fuad Reza and Zahari, Ammar and Desia, Recky and Ismail , Amelia Ritahani and Al Haek, Mohammed (2015) The swarm-based exploration algorithm with expanded circle pattern for searching activities. Jurnal Teknologi, 77 (20). pp. 61-65. ISSN 0127-9696

This list was generated on Sun Mar 26 03:47:48 2017 MYT.