IIUM Repository (IREP)

Items where Subject is "Q Science > QA Mathematics > QA76 Computer software"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator/Author | Item Type
Jump to: . | A | B | C | D | E | F | G | H | I | J | K | M | N | O | P | R | S | T | U | V | W | Y | Z
Number of items at this level: 308.

.

., Lily Amelia and Wahab, Dzuraidah and Hassan, Azmi (2008) Pembangunan model pengoptimman pengeluaran minyak sawit dan isirong sawit menggunakan pendekatan genetik kabur. Jurnal Teknologi, 48. pp. 71-89. ISSN 2180–3722 (O), 0127–9696 (P)

., Lily Amelia and Wahab, Dzuraidah and Hassan, Azmi (2008) The application of hybrid artificial intelligence techniques in the optimisation of crude palm oil production. In: International Symposium on Information Technology 2008 (ITSim), Vol.1, 26-28 Aug. 2008, Kuala Lumpur.

A

A. Ahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Mohammad Ahmed, Hanady (2011) Developed system for Quran protection using MD5 and Base64. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 71-84. ISBN 978-967-418-107-9

A. Ahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Mohammad Ahmed, Hanady and Shah, Asadullah (2011) Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 59-69. ISBN 978-967-418-107-9

A. Aziz, Normaziah and Hassan, Nur Asnida and Shamsuddin, Siti Nurul Zulaikha (2017) Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), 28th-29th Oct. 2016, Mataram, Indonesia.

Abawajy, Jemal and Pathan, Mukaddim and Rahman, Mustafizur and Pathan, Al-Sakib Khan and Deris, Mustafa Mat (2012) Internet and distributed computing advancements : theoretical frameworks and practical applications. IGI Global, USA, USA. ISBN ISBN13: 9781466601611, ISBN10: 1466601612

Abd Ghani, Ahmad Termimi and Md. Tap, Abu Osman and Mohamad, Mahadzirah and Abdullah, Mohd Lazim (2009) Rough fuzzy approach in tourism demand analysis. Matematika, 25 (1). pp. 1-8. ISSN 0127-8274

Abd Samad, Zaharah and Hazmi, Norzelatun Rodhiah (2015) Use of open software for information literacy in academic libraries: issues and challenges. In: International Conference on Libraries (ICOL 2015), 25-26 August 2015, Vistana Hotel, Penang. (Unpublished)

Abdelgadir , Tageldin and Mohiuddin , Ahmed2 and Pathan, Al-Sakib Khan and Mohd Ariff, Abdullah and Shariq, Haseeb (2011) Performance analysis of a highly available home agent in mobile networks. American Journal of Applied Sciences , 8 (12). pp. 1388-1397. ISSN 1554-3641(O), 1546-9239 (P)

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) A new data hiding technique based on irreducible polynomials. Journal of Emerging Technologies in Web Intelligence. ISSN 1798-0461 (In Press)

Abduallah Alsafi, Hassen Mohammed and Alshaikhli, Imad Fakhri Taha and Shah, Asadullah (2011) Molecular docking. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 37-44. ISBN 978-967-418-107-9

Abdul Halim, Syafrina and Mohd Daud, Zalina (2016) Spatial interpolation of advanced weather generator parameters in Peninsular Malaysia using locally weighted regression. In: The 6th International Conference on Mathematics and Natural Sciences (ICMNS 2016), 2nd-3rd November 2016, Bandung, Indonesia. (Unpublished)

Abdul Rahman, Abdul Wahab and Saad, Siti Norhidayah and N. Zahari, Syuwaida (2011) Basic emotions varification and identifiction using Gaussian Mixture Model (GMM) features extraction. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 219-232. ISBN 978-967-418-106-2

Abdul Rahman, Ayub and Abdul Aziz, Normaziah and Hamzah, Mohd. Syarqawy (2016) Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1). pp. 19-27. ISSN 2288-7202

Abdul-Rahman Abed, Bassam and Ismail, Amelia Ritahani and Abdul Aziz, Normaziah (2015) Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA), 2nd-4th Sept. 2015, Madrid, Spain.

Abdulaziz, O. and Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Momani, Shaher Mohammad (2009) Direct solution of second-order BVPs by homotopy-perturbation method (Penyelesaian Secara Langsung MNS Berperingkat-Dua Melalui Kaedah Homotopi-usikan). Sains Malaysiana, 38 (5). pp. 717-721. ISSN 0126-6039

Abdulaziz, O. and Hashim, Ishak and Chowdhury, Md. Sazzad Hossien (2008) Solving variational problems by homotopy–perturbation method. International Journal For Numerical Methods In Engineering , 75. pp. 7709-721. ISSN 1097-0207 (O) , 0029-5981

Abdulaziz, O. and Hashim, Ishak and Chowdhury, Md. Sazzad Hossien and Zulkifle, A. K. (2007) Assessment of decomposition method for linear and nonlinear fractional differential equations. Far East Journal of Applied Mathematical Sciences (FJAMS), 28 (1). pp. 95-112. ISSN 0972-0960

Abdullah, Lazim and Md. Tap, Abu Osman (2009) Fuzzy human development index: a numerical example of Southeast Asian countries. International Journal Ecological Economics & Statistics, 14 (9). pp. 104-113. ISSN 0973-7537 (O), 0973-1385 (P)

Abdullah, Matin Saad and Pathan, Al-Sakib Khan (2013) Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), 25-27 March 2013, Rabat, Morocco.

Abdullah, Matin Saad and Pathan, Al-Sakib Khan and Rahman, Muhammad Abdur (2012) Using the web for critical learning of al-Qur’an’s ‎language: an ‎‎ exploratory case study. In: World Conference on Islamic Thought 2012 (WCIT 2012), 11-12 September 2012, Ipoh, Perak. (In Press)

Abdullah, Mohd Lazim and Tarmudi, Zamali and Md. Tap, Abu Osman (2009) Model pembuat keputusan kabur berdaya teguh: pendekatan penegasan linguistik. In: Simposium Kebangsaan Sains Matematik Ke-17, 15-17 Dicember 2009, Melaka Bandar Bersejarah.

Aboaba, A. A. and Hameed, Shihab A. and Khalifa, Othman Omran and Hassan Abdalla Hashim, Aisha and Chowdhury, Md. Sazzad Hossien (2012) Formulation of hybrid 3D image segmentation algorithm based partial differential equation. In: International Conference on Mathematical Application in Engineering (ICMAE2012), 03-05 July 2012, Kuala Lumpur.

Aboaba, Abdulfattah A. and Chowdhury, M. S. H. and Hameed, Shihab A. and Khalifa, Othman Omran and Hassan Abdalla Hashim, Aisha (2012) Spatial sectoring: A innovative extension of Simpson’s rule for determining area of irregular close shape. In: IIUM Research, Invention and Innovation Exhibition, IRIIE 2012, 21-22 February 2012, Cultural Activity Centre (CAC) and KAED Gallery, IIUM.

Abu Bakar, Juliana Aida and Jahn Kassim, Puteri Shireen (2008) Three dimensional user interface for Islamic heritage education and exhibition applications - a proposal. In: 7th Annual Conference Management in Construction Researchers’ Association MICRA 2008, 18 - 19 June 2008, Kuala Lumpur.

Abubakar, Adamu and Chiroma, Haruna and Khan, Abdullah and Mohamed, Elbaraa Eldaw Elnour (2016) Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm. International Review on Computers and Software (IRECOS), 11 (9). pp. 752-763. ISSN 1828-6003

Abubakar, Adamu and Haruna, Chiroma and Abdullah, Khan and Fatihu, Mukhtar and Dauda, Ali Baba and Mahmood, Nadeem and Shah, Asadullah and Maitama, Jaafar Zubairu and Herawan, Tutut (2016) Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science, 10 (2). pp. 34-51. ISSN 1913-1844 (P), 1913-1852 (O)

Abubakar, Adamu and Khan, Abdullah and Nawi, Nazri Mohd and Rehman, M. Z. and Teh , Ying Wah and Chiroma , Haruna and Herawan, Tutut (2016) Studying the effect of training Levenberg Marquardt neural network by using hybrid meta-heuristic algorithms. Journal of Computational and Theoretical Nanoscience, 13 (1). pp. 450-460. ISSN 1546-1955

Abubakar, Adamu and Mantoro, Teddy and Moedjiono, Sardjoeni and Anugerah Ayu, Media and Chiroma, Haruna and Waqas, Ahmad and Abdulhamid, Shafi’i Muhammad and Hamza, Mukhtar Fatihu and Ya’u Gital, Abdulsalam (2016) A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid. International Journal of Interactive Mobile Technologies, 10 (3). pp. 4-10. ISSN 1865-7923

Abuzaraida, Mustafa Ali and Zeki, Akram M. and Zeki, Ahmed M. (2013) Feature extraction techniques of online handwriting arabic text recognition. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Ahmad Kamaruddin, Saadi and Tolos, Siti Marponga and Hee, Pah Chin and Md Ghani, Nor Azura and Ramli, Norazan Mohamed and Mohamed Nasir, Noorhamizah and Ksm Kader, Babul Salam and Huq, Mohammad Saiful (2017) The quadriceps muscle of knee joint modelling using Hybrid Particle Swarm Optimization-Neural Network (PSO-NN). In: 37th International Conference on Quantum Probability and Related Topics (QP37) 2016, 22nd-26th August 2016, Kuantan, Pahang, Malaysia.

Ahmad Zabidi, Muhammad Najmi and Maarof, Mohd Aizaini and Zainal, Anazida (2012) Malware Analysis with Multiple Features. In: UKSim 14th International Conference on Computer Modelling and Simulation, UKSim2012 (UKSim2012), 28-30th March 2012, University of Cambridge, United Kingdom. (Unpublished)

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Automated intruder detection from image sequences using minimum volume sets. International Journal of Communication Networks and Information Security, 4 (1). pp. 11-17. ISSN 2073-607X (O), 2076-0930 (P)

Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Efficient and effective automated surveillance agents using kernel tricks. SIMULATION: Transactions of the SCS. ISSN Print ISSN: 0037-5497, Online ISSN: 1741-3133 (In Press)

Ahsan, Md. Rezwanul and Ibrahimy, Muhammad Ibn and Khalifa, Othman Omran (2009) EMG signal classification for human computer interaction: a review. European Journal of Scientific Research, 33 (3). pp. 480-501. ISSN 1450-216X, 1450-202X

Alharaki, Omarah Omar and Hweidi, Mohammed and Zeki, Akram M. (2011) An overview of ATM systems security. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 113-128. ISBN 978-967-418-107-9

Ali, Sellami and Ahmed, Abdallah Hassen and Mohammed, Sellami and Chowdhury, Md. Sazzad Hossien and Hassan Abdalla Hashim, Aisha and Mahmoud, Omer (2012) Fiber based practical QKD system. In: International Conference on Mathematical Applications in Engineering (ICMAE2012), 3-5 July 2012, Kuala Lumpur.

Ali, Sellami and Mahmoud, Omer and Wahid, Zaharah and Chowdhury, Md. Sazzad Hossien (2013) Enhancement of multicast network security. Wulfenia Journal, 20 (3). pp. 378-391. ISSN 1561-882X

Ali, Sellami and Saharudin, Shuhairi and Wahiddin, Mohamed Ridza (2009) Decoy state quantum key distribution. IIUM Engineering Journal, 10 (2). pp. 81-86. ISSN 1511-788X

Ali, Sellami and Saharudin, Shuhairi and Wahiddin, Mohamed Ridza (2009) Quantum key distribution using decoy state protocol. American Journal of Engineering and Applied Sciences, 2 (4). pp. 694-698. ISSN 1941-7020

Aliyu, Mansur and Abdallah, Nahel A. O. and Lasisi, Nojeem A. and Diyar, Dahir and Zeki, Ahmed M. and Zeki, Akram M. (2011) Investigating the student’s awareness on computer security and ethics. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 155-177. ISBN 978-967-418-107-9

Aljuboori, Ali A.Alwan and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2018) Missing values estimation for skylines in incomplete database. The International Arab Journal of Information Technology, 15 (1). pp. 1-11. ISSN 1683-3198

Alshammari, Mohammad M. and Alwan, Ali Amer and Taha Alshaikhli, Imad Fakhri (2016) Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT), 8 (5). pp. 80-94. ISSN 2005-8039

Alshammari, Mohammad Matar and Alwan, Ali Amer (2016) IT disaster recovery and business continuity based on VMware SRM solution for Kuwait Oil Company (KOC). In: The 2nd International Conference on Open Source Software Computing (OSSCOM 2016), 1st-3rd Dec. 2016, Beirut, Lebanon.

Altalmas, Tareq, M. and Jamil, Muhammad Ammar and Ahmad, Salmiah and Sediono, Wahju and Salami, Momoh Jimoh Emiyoka and Shahbudin Hassan, Surul and Embong, Abdul Halim (2017) Lips tracking identification of a correct pronunciation of Quranic alphabets for tajweed teaching and learning. IIUM Engineering Journal, 18 (1). pp. 177-191. ISSN 1511-788X

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura (2015) A model for processing skyline queries over a database with missing data. Journal of Advanced Computer Science and Technology Research (JACSTR), 5 (3). pp. 71-82. ISSN 2231-8852

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2016) Processing skyline queries in incomplete distributed databases. Journal of Intelligent Information Systems. pp. 1-22. ISSN 0925-9902 (In Press)

Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2016) An efficient approach for processing skyline queries in incomplete multidimensional database. Arabian Journal for Science and Engineering, 41 (8). pp. 2927-2943. ISSN 1319-8025

Amin, Syed Obaid and Pathan, Al-Sakib Khan and Rahman, Syed M. (2011) Special issue on recent advances in next-generation and resource-constrained converged networks. International Journal of Communication Networks and Distributed Systems. ISSN 1754-3924 (O), 1754-3916 (P) (In Press)

Awang Abu Bakar, Normi Sham (2011) Defect handling mechanisms in various open source projects. In: Malaysian Open Source Conference (MOSC 2011), 2-3 July 2011, Penang, Malaysia. (Unpublished)

Awang Abu Bakar, Normi Sham (2011) Empirical analysis of object-oriented coupling and cohesion measures in determining the quality of open source systems. In: The 15th IASTED International Conference on Software Engineering and Applications (SEA 2011), 14-16 December 2011, Dallas, USA.

Awang Abu Bakar, Normi Sham (2012) The effects of object-oriented coupling and cohesion measures on the quality of open source systems. Research Report. s.n, Kuala Lumpur. (Unpublished)

Awang Abu Bakar, Normi Sham and Mahmud, Iqram (2013) OSSGrab: software repositories and app store mining tool. Lecture Notes on Software Engineering, 1 (3). pp. 219-223. ISSN 2301-3559

Azman, Amelia Wong and Bigdeli, Abbas and Mohd-Mustafah, Yasir and Biglari-Abhari, Morteza and Lovell, Brian (2010) A Bayesian network-based framework with Constraint Satisfaction Problem (CSP)formulations for FPGA system design. In: 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP 2010), 7-9 July 2010, Rennes, France.

B

Baali, Hamza and Khorshidtalab, Aida and Mesbah, Mustafa and Salami, Momoh Jimoh Eyiomika (2015) A transform-based feature extraction approach for motor imagery tasks classification. IEEE Journal of Translational Engineering in Health and Medicine, 3. pp. 2100108-1. ISSN 2168-2372

Babanejad, Ghazaleh and Ibrahim, Hamidah and Alwan, Ali Amer and Udzir, Nur Izura and Sidi, Fatimah and Babanejad, Ghoncheh (2015) Identifying skylines in dynamic incomplete database. In: 9th International Conference on Computer Engineering and Applications (CEA '15), 22th - 24th Feb 2015, Dubai, United Arab Emirates.

Babanejad, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Aljuboori, Ali A.Alwan (2017) Deriving skyline points over dynamic and incomplete databases. In: The 6th International Conference on Computing and Informatics, ICOCI 2017, 25th-27th April 2017, Kuala Lumpur.

Bakar, Noor Hasrina and Hassan, Noor Azimah and Idris, Mohd Norhaedir and Al-Shawabkeh, Mahmoud (2014) Programming in C for foundation. IIUM Press, Kuala Lumpur. ISBN 9789674182946

Bakar, Noor Hasrina and Kasirun, Zarinah M. (2014) Exploring software practitioners perceptions and experience in requirements reuse : a survey in Malaysia. International Journal of Software Engineering and Technology, 1 (2). pp. 33-42. ISSN 2289-2842

Bakar, Noor Hasrina and Mohd Kasirun, Zarinah and Salleh, Norsaremah (2016) Terms extractions: an approach for requirements reuse. In: 2nd International Conference on Information Science and Security (ICISS), 2015, 14th-16th December 2015, Seoul, Korea (South).

Bakar, Noor Hasrina and Zarinah, Kasirun and Salleh, Norsaremah (2015) Feature extraction approaches from natural language requirements for reuse in software product lines: a systematic literature review. Journal of Systems and Software, 106. pp. 132-149. ISSN 0164-1212

Bhatti, Zeeshan and Shah, Asadullah (2011) Abstract class. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 237-244. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Arguments passing. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 155-161. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Arithmetic and relational operators. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 33-38. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Conditional statements. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 51-54. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Constructors. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 141-146. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Exception handling. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 215-222. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) For loops. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 85-92. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) If-else statements. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 55-60. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Introduction to Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 15-20. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Introduction to data types in Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 27-32. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Loop pitfalls and exercise. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 93-97. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Methods of string class. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 127-134. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Modifiers for class data. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 191-197. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Multiple classes. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 177-184. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Nested loops. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 99-104. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Relational and logical operators. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 39-44. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Return statement. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 163-167. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Strings. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 119-125. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Switch statement. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 67-72. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Throw & throws keyword. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 223-229. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) User defined methods. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 147-154. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah (2011) Working with classes. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 169-175. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah and Dwi, Dini Oktarina (2011) Interfaces. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 245-257. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah and Phatan, Agha Javed (2011) Loops in Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur , pp. 73-78. ISBN 9789674180867

Bhatti, Zeeshan and Shah, Asadullah and Soomro, Waseem Javaid (2011) Arrays in Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 105-110. ISBN 9789674180867

Bilal, Sara Mohammed Osman Saleh and Bahri, Nurshafiqah and Khalifa, Othman Omran (2014) A comparative study on eye tracking existing techniques. In: 3rd International Conference on Mathematical Applications in Engineering (ICMAE'14), 23-25 Sept. 2014, Kuala Lumpur. (Unpublished)

C

Che Noh, Che Hafizah and Mohamed Azmin, Nor Fadhillah and Asnawi, Ani Liza (2015) A review: fourier transform infrared application on bioactive compound. In: International Postgraduate Conference on Engineering Research (IPCER) 2015 , 27th-28th Oct. 2015, Gombak Campus, IIUM. (Unpublished)

Che Taib, Che Mohd Imran and Md. Tap, Abu Osman and Abd Rahman, Ahmad Fakharuddin (2009) Mengukur Risiko Kabur Kadar Tukaran Asing (Measuring Fuzzy Foreign Exchange Rate Risk). Matematika, 25 (2). pp. 113-124. ISSN 0127-8274

Chowdhury, M. S. H. (2009) A new reliable numeric-analytic technique to solve nonlinear system of ordinary differential equations. In: Kulliyyah of Engineering Research and Innovation Exhibition ( KERIE 2009), 21-22 January 2009, Culture Activity Centre (CAC), IIUM . (Unpublished)

Chowdhury, Md. Sazzad Hossien (2015) Homotopy-perturbation method for solving linear and nonlinear differential equation. In: 2nd International Conference on Mathematical Sciences & Computer Engineering, 05-06 February 2015, Langkawi, Malaysia,. (Unpublished)

Chowdhury, Md. Sazzad Hossien (2008) Simulation of the predator-prey problem by the homotopy-perturbation method revised. Topological Methods in Nonlinear Science, 31 (2). pp. 263-270. ISSN 1230-3429

Chowdhury, Md. Sazzad Hossien (2007) Solution of classical Lane-Emden equation by homotopy-perturbation method. In: 3rd International Conference on Research and Education in Mathematics, 10 - 12th April 2007, The Legend Hotel, Kuala Lumpur.

Chowdhury, Md. Sazzad Hossien (2007) Solution of predator-prey problem by multistage Adomian decomposition method. In: International Conference on Mathematical Biology 2007, 4 - 6th September 2007 , Putrajaya.

Chowdhury, Md. Sazzad Hossien (2012) An accurate solution to the Lotka-Volterra equations by modified Homotopy perturbation method. International Journal of Modern Physics: Conference Series, 9. pp. 326-333. ISSN 2010-1945

Chowdhury, Md. Sazzad Hossien (2011) A comparison between the modified homotopy perturbation method and adomian decomposition method for solving nonlinear heat transfer equations. Journal of Applied Sciences, 11 (7). pp. 1416-1420. ISSN 1812-5662 (O), 1812-5654 (P)

Chowdhury, Md. Sazzad Hossien (2010) The multistage homotopy-perturbation method: A powerful scheme for handling the Chaotic Lorenz system. In: IIUM Research, Invention and Innovation Exhibition (IRIIE 2010), 26-27 January 2010, Culture Activity Centre, IIUM, Gombak.

Chowdhury, Md. Sazzad Hossien (2012) A powerful Numeric-analytic Technique for handling prey-predator problems. In: IIUM Research, Invention and Innovation Exhibition IRIIE 2012, 21-22 February 2012, Kuala Lumpur, Malaysia.

Chowdhury, Md. Sazzad Hossien and Hashim, I. and Hosen, Md. Alal (2016) Solving linear and non-linear stiff system of ordinary differential equations by multi stage homotopy perturbation method. In: ISERD International Conference, 24-25 December 2016, Jeddah, Saudi Arabia.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2008) Adaptation of homotopy-perturbation method for numeric–analytic solution of system of ODEs. Physics Letters A, 372 . pp. 470-481. ISSN 0375-9601

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Analytical solution of the fin problem by extended homotopy perturbation method. In: Kolokium Siswazah Ke-7, 26 June 2007, UKM, Bangi.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2008) Analytical solutions to heat transfer equations by homotopy-perturbation method revisited. Physics Letters A, 372. pp. 1240-1243. ISSN 0375-9601

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2009) Application of homotopy-perturbation method to Klein–Gordon and sine-Gordon equations. Chaos, Solitons and Fractals, 39. pp. 1928-1935. ISSN 0960-0779

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Application of homotopy-perturbation method to the time-dependent singular initial value problems. In: International Conference on Mathematical Sciences 2007, 28 - 29th November 2007, Equatorial Hotel, Bangi.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2009) Application of multistage homotopy-perturbation method for the solutions of the Chen system. Nonlinear Analysis: Real World Applications, 10 (1). pp. 381-391. ISSN 1468-1218

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2010) Direct solutions of nth-order IVPs by homotopyperturbation method. International Journal of Computer Mathematics, 87 (4). pp. 756-762. ISSN 1029-0265

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Homotopy-perturbation method applied to system of ordinary differential equations (ODEs). In: 3rd International Conference on Research and Education in Mathematics, 10 - 12th April 2007, The Legend Hotel, Kuala Lumpur.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Homotopy-perturbation method for direct solution of nonlinear initial value problem. In: The 3rd IMT-GT 2007 Regional Conference on Mathematics, Statistics and Applications, 5 - 6th December 2007, The Gurney Hotel, Penang.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Homotopy-perturbation solution of the isothermal gas sphetres. In: Simposium Kebangsaan Sains Matematik ke-15 (SKSM15), 5 - 7th June 2007, Hotel Concorde Shah Alam.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2006) Numerical solution of fin problem using decomposition method. In: Simposium Kebangsaan Sains Matematik ke-14 (SKSM14), 6 - 8th June 2006, PNB Darby Park, Kuala Lumpur.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2006) On decomposition solutions of fins with temperature dependent surface 232 heat flux: Multi-boiling heat transfer. In: The 2nd IMT-GT 2006 Regional Conference on Mathematics, Statistics and Applications, 13 - 15th June 2006, Penang.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2009) Solutions of Emden–Fowler equations by homotopy-perturbation methods. Nonlinear Analysis: Real World Applications, 10 (1). pp. 104-115. ISSN 1468-1218

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Solutions of a class of singular second-order IVPs by homotopy-perturbation method. Physics Letters A, 365. pp. 439-447. ISSN 0375-9601

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Solutions of time-dependent Emden–Fowler type equations by homotopy-perturbation method. Physics Letters A, 368. pp. 305-313. ISSN 0375-9601

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) A modified homotopy perturbation method for purely nonlinear fin-type problems. JP Journal of heat and mass transfer, 1 (3). pp. 285-296. ISSN 0973-5763

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Abdulaziz, O. (2007) Application of homotopy-perturbation method to nonlinear population dynamics models. Physics Letters A, 368. pp. 251-258. ISSN 0375-9601

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Abdulaziz, O. (2009) Comparison of homotopy analysis method and homotopy-perturbation method for purely nonlinear fin-type problems. Communications in Nonlinear Science and Numerical Simulation, 14 (2). pp. 371-378. ISSN 1007-5704

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris (2010) Analytical treatment of system of linear and nonlinear PDEs by Homotopy-Perturbation method. In: World Congress on Engineering (WCE) 2010, June 30 - July 2, 2010,, London, U.K..

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris (2009) Comparing numerical methods for the solution of Cauchy reaction-diffusion problems. In: 4th International Conference on Mathematics and Statistics 2009, 13-15 August 2009, Bandar Lampung, Indonesia.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris (2009) Solving linear system of partial differential equations by homotopy-pertubation method. In: 4th International Conference on Research and Education in Mathematics, 21-23 October 2009, Renaissance Hotel, Kuala Lumpur.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris and Rahman, M. M. and Momani, Shaher Mohammad (2011) Exact solution for linear and nonlinear systems of PDEs by homotopy-perturbation method. Australian Journal of Basic and Applied Sciences, 5 (12). pp. 3295-3305. ISSN 1991-8178

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Mawa, S. (2007) Homotopy-perturbation method for power-law fin-type problems. In: Asian Symposium on Computer Mathematics, 15 - 17th December 2007, Singapore.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Mawa, S. (2009) Solution of prey–predator problem by numeric–analytic technique. Communications in Nonlinear Science and Numerical Simulation, 14. pp. 1008-1012. ISSN 1007-5704

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Momani, Shaher Mohammad (2009) The multistage homotopy-perturbation method: a powerful scheme for handling the Lorenz system. Chaos, Solitons and Fractals, 40 (4). pp. 1929-1937. ISSN 0960-0779

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Momani, Shaher Mohammad and Rahman, M. M. (2012) Application of multistage homotopy perturbation method to the chaotic Genesio System. Abstract and Applied Analysis, 2012 (974293). pp. 1-10. ISSN 1085-3375 (Print) 1687-0409 (Online)

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Rahman, M. M. (2012) A reliable modification of the homotopy perturbation method for differential and integral equations. In: 2nd Regional Conference on Applied and Engineering Mathematics (RCAEM-II) 2012, 30-31 May, 2012, Penang, Malaysia.

Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Rahman, Md. Mahmudur (2011) On the numerical solution of linear stiff IVPs by modified homotopy perturbation method. In: The 7th IMT-GT International Conference on Mathematics, Statistics and its Applications, 21 - 23 July 2011, The Pullman Bangkok King Power Hotel, Thailand.

Chowdhury, Md. Sazzad Hossien and Hassan, Talib Hashim and Ismail, Ahmad Faris (2010) A modified algorithm for the homotopy perturbation method with applications to Lotka-Volterra systems. In: 6th IMT-GT Conference on Mathematics, Statistics and its Applications (ICMSA2010), 3-4 November, 2010, Kuala Lumpur, Malaysia.

Chowdhury, Md. Sazzad Hossien and Hassan, Talib Hashim and Mawa, S. (2010) A new application of homotopy perturbation method to the reaction-diffusion Brusselator model. Procedia Social and Behavioral Sciences, 8 . pp. 648-653. ISSN 1877-0428

Chowdhury, Md. Sazzad Hossien and Rahman, M. M. (2011) An accurate solution to the Lotka-Volterra equations by modified homotopy perturbation method. In: The International Conference on Mathematical and Computational Biology 2011 (ICMCB2011), 12-14 April, 2011, Melaka, malaysia.

Chowdhury, Md. Sazzad Hossien and Rahman, Mahmudur and Muhida, Rifki and Kasai, Hideaki (2010) First principles study on influence of magnetic materials on the dissociative adsorption of oxygen. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

Chowdhury, Md. Sazzad Hossien and Razali, Nur Isnida and Ali, Sellami and Rahman, M. M. (2013) An accurate analytic solution for differential and integral equations by modified homotopy perturbation method. Middle East Journal of Scientific Research (MEJSR), 13. 50-58. ISSN 1990-9233

Chowdhury, Md. Sazzad Hossien and Razali, NurIsnida and Ali, Sellami and Rahman, Mohammad Mustafizur (2013) A new reliable algorithm for analytical treatment of differential and integral equations. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2013), 19-20 February 2010, Kuala Lumpur.

Chowdhury, Md. Sazzad Hossien and Siddiquei, Hasin Reza and Rahman, M. M. and Ismail, A. F. (2010) Homotopy-perturbation method for heat transfer equations. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.

D

Dai, Tran Thanh and Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks. Lecture Notes in Computer Science (LNCS), 4238. pp. 546-549. ISSN 1611-3349 (O), 0302-9743 (P)

Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2011) A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies. Information Journal. ISSN 1343-4500 (P), 1344-8994 (O) (In Press)

Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2013) A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies. International Journal of Communication Networks and Information Security, 5 (2). pp. 80-92. ISSN ISSN: 2076-0930 (Print) ISSN: 2073-607X (Online)

Djeddar, Afrah and Bendjenna, Hakim and Amirat, Abdelkrim and Alwan, Ali Amer (2015) Developing context-aware mobile applications using composition process based-on heterogeneous software entities. Journal of Advanced Computer Science and Technology Research (JACSTR), 5 (3). pp. 93-103. ISSN 2231-8852

Dwi Handayani, Dini Oktarina and Abdul Rahman, Abdul Wahab and Yaacob, Hamwira Sakti (2015) Recognition of emotions in video clips: the self-assessment manikin validation. Telkomnika (Telecommunication Computing Electronics and Control), 13 (4). pp. 1343-1351. ISSN 1693-6930

d'Auriol, Brian J. and Pathan, Al-Sakib Khan (2007) Embedded processor security. In: 2007 International Conference on Security and Management (SAM'07), June 25-28, 2007, Las Vegas, Nevada, USA.

E

Estrada-Vargas, Leopoldo and Toral-Cruz, Homero and Pathan, Al-Sakib Khan (2011) A generator of cauchy-distributed time series with specific Hurst index. In: Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy. (In Press)

F

Fadhli, Mohammad and Omar, Ashraf Ali and Asrar, Waqar (2015) Flowfield-dependent variation method for moving-boundary problems. AIAA Journal, 53 (4). pp. 1026-1036. ISSN 1533-385X (O), 0001-1452 (P)

G

Ghaffar, Abid and Wahiddin, Mohamed Ridza and Shaikh, Asadullah (2013) Computer assisted alerts using mental model approach for customer service improvement. Journal of Software Engineering and Applications, 6. pp. 21-25. ISSN 1945-3116

Ghazali, Masitah and Sivaji, Ashok and Hussein, Idyawati and Lim , Tek Yong and Mahmud, Murni and Md Noor, Nor Laila (2015) HCI practice at MIMOS berhad: A symbiotic collaboration between academia and industry. In: Crossing HCI4D in Asia Pacific: ASEAN CHI Symposium (ACHIS) 2015, 19th April 2015, Seoul, Korea.

Gulzar, Yonis and Aljuboori, Ali A.Alwan and Salleh, Norsaremah and Alshaikhli, Imad Fakhri Taha (2017) Skyline query processing for incomplete data in cloud environment. In: The 6th International Conference on Computing and Informatics, ICOCI 2017, 25th-27th April 2017, Kuala Lumpur.

Gulzar, Yonis and Alwan, Ali Amer and Salleh, Norsaremah and Alshaikhli, Imad Fakhri Taha and Alvi, Idrees Mairaj (2016) A framework for evaluating skyline queries over incomplete data. Procedia Computer Science, 94. pp. 191-198. ISSN 1877-0509

Gündüz, Feyza and Pathan, Al-Sakib Khan (2013) On the key factors of usability in small-sized mobile touch-screen application. International Journal of Multimedia and Ubiquitous Engineering. ISSN 1975-0080 (In Press)

Gündüz, Feyza and Pathan, Al-Sakib Khan (2012) Usability improvements for touch-screen mobile flight booking application: a case study. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), 26-28 November 2012, Kuala Lumpur, Malaysia. (In Press)

H

Handayani, Dini and Kartiwi, Mira (2015) Natural language question and answer system on semantic health website. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 18-23. ISSN 2462 - 229X

Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Choi, Byung Goo and Hong, Choong Seon (2007) An efficient PKC-based security architecture for wireless sensor networks. In: IEEE Military Communications Conference (IEEE MILCOM 2007), October 23-25, 2006, Orlando, Florida, USA.

Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) S-PkSec: an asymmetric key based security management scheme for sensor network operation. In: KNOM (Korean Network Operations and Management) Conference 2008, April 24-25, 2008, Changwon, Korea.

Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Securing U-Healthcare sensor networks using public key based scheme. In: 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), February 17-20, 2008, Phoenix Park, Korea.

Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) An efficient public key based security architecture for wireless sensor networks. In: 27th KIPS Spring Conference 2007, 11-12 May 2007, Seongnam, Korea.

Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon and Huh, Eui-Nam (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Transactions on Internet and Information Systems, 2 (5). pp. 265-279. ISSN 1976-7277

Haruna, Chiroma and Khan, Abdullah and Abubakar, Adamu and Saudi, Younes and Hamza, Mukhtar Fatihu and Shuiba, Liyana and Gital, Abdulsalam and Herawan, Tutut (2016) A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm. Applied Soft Computing, 48 (November 2016). pp. 50-58. ISSN 1568-4946

Hasan, Talib Hashim and Chowdhury, Md. Sazzad Hossien (2010) Taylor-newton homotopy method for computing the depth of flow rate for a channel. In: Global Conference on Power Control and Optimization, 2-4 February 2010, Gold Coast, Australia.

Hasan, Talib Hashim and Chowdhury, Md. Sazzad Hossien and Yamamura, Kiyotaka (2010) Taylor -Fixed point homotopy for solving nonlinear algebraic problems. In: International Conference on Mathematical Applications in Engineering (ICMAE’10), 3 - 4 August 2010, Kuala Lumpur, Malaysia.

Hashim, Ishak and Chowdhury, Md. Sazzad Hossien and Mawa, S. (2008) On multistage homotopy-perturbation method applied to nonlinear biochemical reaction model. Chaos, Solitons and Fractals , 36. pp. 823-827. ISSN 0960-0779

Hassan, Azmi and Basri, Hassan and Rahmat, Riza Atiq and Kasmiran, Jumari (2001) Traffic Detectors Using Image Processing Method (Pengesan Lalu Lintas Dengan Kaedah Pemprosesan Imej). Jurnal Kejuruteraan (13). pp. 3-20. ISSN 0128-0198

Hassan, Azmi and Pham, Duc Trung (2000) Optimisation of multi-stage production-inspection stations using genetic algorithm. Journal of Industrial Technology, 9 (2). pp. 59-73. ISSN 0128-4940

Hassan, Raini and Alshaikhli, Imad Fakhri Taha and Shah, Asadullah (2011) The use of genetic algorithm in improving medical image segmentation techniques. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 45-55. ISBN 978-967-418-107-9

Hosen, M. A and Chowdhury, Md. Sazzad Hossien (2016) Solution of nonlinear cubic-quintic duffing oscillators using harmonic balance method. Malaysian journal of Mathematical sciences, 10 (Special Issue). pp. 181-192. ISSN 1823-8343

Hossain, Md Anowar and Elshafiey, Ibrahim and Alkanhal, Majeed A. and Mabrouk, Ahmed Hassan (2011) Adaptive UWB-OFDM synthetic aperture radar. In: The First Saudi International Electronics, Communications and Electronics Conference (SIECPC 2011), 24-26 April 2011 , Riyad, Saudi Arabia.

Hossain, Md Anowar and Elshafiey, Ibrahim and Alkanhal, Majeed A. and Mabrouk, Ahmed Hassan (2011) Anti-jamming capabilities of UWB-OFDM SAR. In: The 8th European radar Conference (EuRAD 2011), 12-14 October 2011, Manchester, United Kingdom .

Hussein, Idyawati and Mahmud, Murni and Md Tap, Abu Osman (2014) HCI knowledge for UX practices in the web development process. In: 3rd International Conference on Design, User Experience, and Usability: User Experience Design for Diverse Interaction Platforms and Environments, DUXU 2014, 22 -27 June 2014, Heraklion, Crete; Greece.

I

Ibrahim, Mansor and Jahn Kassim, Puteri Shireen and Ali, Maisarah and Abdul Latif, Nurul Syala and Zainal Abidin, Nor Zalifa (2007) Virtual reality in heritage studies and historical reconstruction through animation – A case study of a 16th century university complex in the Ottoman world. In: 7th International Conference on Construction Applications of Virtual Reality: 0ctober 22-23, 2007, 22-23 Oct 2007, USA.

Imam Yau'u, Badamasi and Nordin, Azlin and Salleh, Norsaremah (2016) Software requirements patterns and meta model: a strategy for enhancing Requirements Reuse (RR). In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), 22nd-24th November 2016, Jakarta, Indonesia.

Islam, Humayun Kadir and Pathan, Al-Sakib Khan (2004) Technological impact on disaster management information system. In: 2nd International Conference on Information and Communication Technology (ICT 2004), Bangkok, Thailand, November 18-19, 2004, Assumption University, Bangkok, Thailand. (Unpublished)

J

Jaafar, Samsuddin (2012) The use of non-authoring software for the production of an interactive digital image map. Research Report. s.n, Kuala Lumpur. (Unpublished)

Jahn Kassim, Puteri Shireen and Ali, Maisarah and Abdul Majid, Noor Hanita and Ibrahim, Mansor (2006) Integrating a computational fluid dynamics simulation and visualization with a 3D virtual walkthrough - a case study of Putrajaya. In: Innovations in 3D Geo Information Systems. Lecture Notes in Geoinformation and Cartography . Springer, Verlag, pp. 599-614. ISBN 978-3-540-36997-4

Jamil, Nursuriati and Tengku Sembok, Tengku Mohd and Abu Bakar, Zainab (2012) Digital archiving of traditional songket motifs using image processing tool. In: Recent Researches in Chemistry, Biology, Environment, & Culture. WSEAS Press, pp. 33-39. ISBN 9781618040602

K

Kamal Ismail, Normaly and Tengku Sembok, Tengku Mohd (2012) 2D text visualization for the retrieval of Malay documents. In: Applied Mathematics in Electrical and Computer Engineering. WSEAS, pp. 116-121. ISBN 978-1-61804-064-0

Kartia, Felizardo and Salleh, Norsaremah and Rafael, Martins and Mendes, Emilia and MacDonel, Stephen G. and Maldonado, José C. (2011) Using Visual Text Mining to Support the Study Selection in Systematic Literature Reviews. In: 2011 International Symposium on Empirical Software Engineering and Measurement, 22 - 23 September 2011, Banff, Canada.

Khamis, Norazlina and Lee , Chin Yang and Nordin, Azlin (2014) Automated call receiving and forwarding mechanism for supporting integrated disaster management system. International Journal of Information and Electronics Engineering, 4 (4). pp. 302-307. ISSN 2010-3719

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Baba, Asifa Mehraj and Ahmad Lone, Sajad and Zulkurnain, Nurul Fariza (2015) SSM: Secure-Split-Merge data distribution in cloud infrastructure. In: 2015 IEEE Conference on Open Systems (ICOS), 24th–26th Aug. 2015, Melaka.

Kindy, Diallo Abdoulaye and Pathan, Al-Sakib Khan (2011) A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques. In: The 15th IEEE Symposium on Consumer Electronics (IEEE ISCE2011), June 14-17, 2011, Singapore.

M

Mabrouk, Ahmed Abbas and Hassim, Norhidayah (2011) A simplified computational technique for an LSF-based speed decoder. In: 54th IEEE International Midwest Symposium on Circuits and Systems (IEEE MWSCAS 2011), 7-10 August 2011, Seoul, Korea.

Mantoro, Teddy (2010) Distributed context processing for intelligent environments. LAP LAMBERT Academic Publishing AG & Co., Sarrbrucken, Germany. ISBN 9783838300757

Mantoro, Teddy and Ayu, Media Anugerah and Azziz, Umran and Muhic, Mithat and AbdulBagi, Moaz and Abubakar, Adamu (2016) VisUN-3D: User navigation with visualized 3D maps for mobile users. In: 2016 International Conference on Informatics and Computing (ICIC), 28 Oct - 29 Oct 2016, Hotel Lombok Raya Jalan Panca Usaha No. 11 Lombok Nusa Tenggara Barat Mataram, Indonesia.

Mantoro, Teddy and Permadi, Didit Dwi and Abubakar, Adamu (2016) Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC), 28-29 Oct. 2016, Hotel Lombok Raya Jalan Panca Usaha No. 11 Lombok Nusa Tenggara Barat Mataram, Indonesia.

Mantoro, Teddy and Shoukat Ali, Haroon (2009) BitTorrent: extra-locality P2P approach for grid content distribution networks. In: The ACM International Symposium Emerging Research Projects, Applications and Services (ERPAS), 14-16 Dec 2009, Kuala Lumpur.

Masrom, Maslin and Ismail, Zuraini and Hussein, Ramlah and Mohamed, Norshidah (2010) An ethical assessment of computer ethics using scenario approach. International Journal of Electronic Commerce Studies, 1 (1). pp. 25-36. ISSN 2073-9729

Md. Alal, Hosen and Chowdhury, Md. Sazzad Hossien (2015) Analytical approximate solutions for the Helmholtz-Duffing oscillator. ARPN Journal of Engineering and Applied Sciences, 10 (23). pp. 17363-17369. ISSN 1819-6608

Mior Nazri, Mior Nasir and Hamid, Zarinah (2015) Alignment between data warehouse design and business strategy. International Journal of Information Technology & Computer Science, 19 (1). pp. 21-29. ISSN 2091-1610

Mior Nazri, Mior Nasir and Noah, Shahrul Azman and Hamid, Zarinah (2010) Using lexical ontology for semi-automatic logical data warehouse design. In: 5th International Conference on Rough Set and Knowledge Technology, RSKT 2010; Beijing; 15 October 2010 through 17 October 2010.

Misra, Sudip and Balakrishnan, N. and Pathan, Al-Sakib Khan (2011) Recent advances in simulation and mathematical modeling of wireless networks. Mathematical and Computer Modelling Journal, 53 (11-12). pp. 2057-2058. ISSN 0895-7177

Mohamad Zain, Jasni and Abdul Rani, Mohammed Fauzi and Abd. Aziz, Azian (2009) Clinical assessment of watermarked medical images. Journal of Computer Science, 5 (11). pp. 857-863. ISSN 1549-3636

Mohamed, Norshidah and Hussein, Ramlah and Ahlan, Abdul Rahman and Hazza, Zubaidah Muataz (2009) A descriptive analysis of IT adoption in Malaysian small software firms. In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 8-11 August, 2009, Beijing, China.

Mohammed, Mohssen and Pathan, Al-Sakib Khan (2013) Automatic defense against zero-day polymorphic worms in communication networks. CRC Press, USA, USA. ISBN 9781466557277 (In Press)

Mohd Saad, Nurul Husna and Ibrahim, Hamidah and Sidi, Fatimah and Yaakob, Razali and Alwan Aljuboori, Ali Amer (2016) Computing range skyline query on uncertain dimension. In: Database and Expert Systems Applications: 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II. Lecture Notes in Computer Science, 9828 (9828). Springer International Publishing, Switzerland, pp. 377-388. ISBN 978-3-319-44405-5

Mohd Saad, Nurul Husna and Ibrahim, Hamidah and Sidi, Fatimah and Yaakob, Razali and Alwan Aljuboori, Ali Amer (2016) Reporting skyline on uncertain dimension with query interval. Journal of Telecommunication, Electronic and Computer Engineering, 8 (6). pp. 17-21. ISSN 2180 – 1843

Mohd Tamrin, Mohd Izzuddin and Sembok, Tengku Mohd (2012) Collaboration of integrative processes intermediaries supporting supply chain management. In: Mathematical Methods for Information Science & Economics. WSEAS Press, pp. 59-64. ISBN 978-1-61804-148-7

Monowar, Muhammad Mostafa and Rahman, Md. Obaidur and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic. In: 2nd International Symposium on Security and Multimodality in Pervasive Environments (SMPE'08) Workshop in conjunction with MobiQuitous 2008, July 21-25, 2008, Trinity College Dublin, Ireland.

N

Naji, Ahmed Wathik and Zaidan, B.B. and Hameed, Shihab A. and O-Khalifa, Othman (2009) Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography. International Journal of Computer Science and Network Security (IJCSNS), 9 (5). pp. 294-300. ISSN 1738-7906

Nordin, Azlin (2012) Analysis of Existing Approaches to Constructing Component-based Systems Directly from Natural Language Requirements. In: The 6th Malaysian Software Engineering Conference (MySec12), 4-5 December 2012, UKM.

Nordin, Azlin and Abdullah, Lili Marziana and Mohamad Fadzil, Farihin Diayana and Roselan, Nor Aqila Syamira (2014) Requirements elicitation and analysis: towards the automation of software project risk management. In: 2014 8th Malaysian Software Engineering Conference (MySEC), 23rd-24th September 2014, Resort World Langkawi, MAlaysia.

Nordin, Azlin and Harasid, Haizir and Anuar, Mohamad Ruzaini and Kamis, Norazlina (2014) An application of Bloom's taxanomy in generation and assessment of examination question items. International Journal of Innovative Computing, 4 (1). pp. 1-8. ISSN 2180-4370

Nordin, Azlin and Omar, Amirul Ikhwan and Megat Mohamed Amin, Megat Usaamah (2014) Scenario Management and Requirements Tool (SMaRT). In: International Research, Invention and Innovation Exhibition 2014 (IRIIE2014), 11th -13th June 2014, Cultural Activity Center (CAC), International Islamic University Malaysia. (Unpublished)

O

Ong, Jiunn Chit and Omar, Ashraf Ali E. and Asrar, Waqar (2013) A BGK-based two-equation turbulence model algorithm for solving compressible navier-stokes equations. CFD Letters, 6 (2). pp. 46-61. ISSN 2180-1363

P

Pathan, Al-Sakib Khan (2014) Editorial article: on the boundaries of trust and security in computing and communications systems. International Journal of Trust Management in Computing and Communications (IJTMCC), 2 (1). pp. 1-6. ISSN 2048-8378 (P) 2048-8386 (O)

Pathan, Al-Sakib Khan (2011) Energy-efficient secure routing in heavily deployed wireless sensor networks. In: KICT Research Seminar, IIUM, June 22-23, 2011, June 22-23, 2011, KICT Conference Room.

Pathan, Al-Sakib Khan (2007) Heterogeneous Distributed Sensor Networks (HDSN). Technical Report. Kyung Hee University, South Korea, South Korea.

Pathan, Al-Sakib Khan (2010) Introduction to wireless sensor network security. In: BRAC University Seminar series, 17 February, 2010, BRAC University Dhaka Bangladesh. (Unpublished)

Pathan, Al-Sakib Khan (2012) Multi-dimensional networking and distributed computing services. International Journal on Internet and Distributed Computing Systems, 2 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)

Pathan, Al-Sakib Khan (2008) Security attacks and challenges in wireless sensor networks. Technical Report. Kyung Hee University, South Korea, South Korea.

Pathan, Al-Sakib Khan (2008) Security wireless sensor networks: prospects, challenges, and future. Technical Report. Kyung Hee University, South Korea, South Korea.

Pathan, Al-Sakib Khan (2012) Tackling the threats of Internet worms. International Journal on Internet and Distributed Computing Systems, 3 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)

Pathan, Al-Sakib Khan and Alam, Md. Mahbub and Monowar, Md. Mostafa and Rabbi, Md. Forhad (2004) An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting. Proceedings of IEEE E-Tech, Karachi Pakistan 2004. pp. 97-100.

Pathan, Al-Sakib Khan and Alam, Md. Mahbub and Monowar, Mostafa and Rabbi, Forhad and Ahmed, Sabbir and Khan, Tareq Hasan (2004) 12-segment display for the Bengali numerical characters. In: National Conference on Computer Processing of Bangla (NCCPB-2004). Independent University Bangladesh (IUB), Dhaka, Bangladesh, pp. 82-88. ISBN 9843211124

Pathan, Al-Sakib Khan and Dai, Tran Thanh and Hong, Choong Seon (2006) An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks. In: Proceedings of The Sixth IEEE International Conference on Computer and Communication Technology (CIT'06). Institute of Electrical and Electronics Engineers ( IEEE ), Washington D.C., USA, pp. 227-232. ISBN 076952687X

Pathan, Al-Sakib Khan and Dai, Tran Thanh and Hong, Choong Seon (2006) A key management scheme with encoding and improved security for wireless sensor networks. Lecture Notes in Computer Science (LNCS), 4317. pp. 102-115. ISSN 1611-3349 (O), 0302-9743 (P)

Pathan, Al-Sakib Khan and Diallo, Abdoulaye Kindy (2014) Lethality of SQL injection against current and future Internet-technologies. International Journal of Computational Science and Engineering, 9 (4). pp. 386-394. ISSN 1742-7193 (O), 1742-7185 (P)

Pathan, Al-Sakib Khan and Heo, Gihyuk and Hong, Choong Seon (2007) A secure lightweight approach of node membership verification in Dense HDSN. In: IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, 2007, Orlando, Florida, USA.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards. In: 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), February 17-20, 2008, Phoenix Park, Korea.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Cryptanalysis of improved password authentication scheme with smart cards. In: Korea Computer Congress 2008 (KCC 2008), June 30-July 2, 2008, Phoenix Park, Korea.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Designing an efficient DMCIS with wireless sensor and ad hoc networks. Ubiquitous Computing and Communication Journal. ISSN 1992-8424

Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) Developing an efficient DMCIS with next-generation wireless networks. In: IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, 2006, Washington, DC, USA.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Feasibility of PKC in resource-constrained wireless sensor networks. In: IEEE International Workshop on Internet and Distributed Computing Systems (IEEE IDCS'08) in conjunction with 11th IEEE ICCIT'08, December 24, 2008, Khulna, Bangladesh.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Public key cryptography in resource-constrained WSN. Technical Report. Kyung Hee University, South Korea, South Korea.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annals of Telecommunications, 63 (9-10). pp. 529-541. ISSN 1958-9395 (O), 0003-4347 (print version)

Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) Secure clustering in DSN with key predistribution and WCDS. In: IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, 2006, Washington, DC, USA.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) Securing sensor reports in wireless sensor networks. In: Lecture Notes in Computer Science (LNCS). Springer-Verlag, Berlin, Germany, pp. 881-890.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Weakly connected dominating set-based secure clustering and operation in distributed sensor networks. International Journal of Communication Networks and Distributed Systems, 3 (2). pp. 175-195. ISSN 1754-3924 (O), 1754-3916 (P)

Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) An efficient scheme for secure data transmission in wireless sensor networks. In: 17th Joint Conference on Communication & Information (JCCI 2007), 2-4 May 2007, PyeongChang, Korea.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) An improved timestamp-based password authentication scheme with two-party verification using smart cards. In: The 9th International Conference on Advanced Communication Technology (IEEE ICACT 2007), February 12-14, 2007, Phoenix Park, Korea.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) A key-predistribution-based weakly connected dominating set for secure clustering in DSN. Lecture Notes in Computer Science (LNCS), 4208. pp. 270-279. ISSN 1611-3349 (O), 0302-9743 (P)

Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) A secure and efficient way of node membership verification in wireless sensor networks. In: 27th KIPS Spring Conference 2007, 11-12 May 2007, Seongnam, Korea.

Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) A secure energy-efficient routing protocol for WSN. In: Lecture Notes in Computer Science (LNCS). LNCS, 4742 . Springer-Verlag, Berlin, Germany, pp. 407-418. ISBN 9783540747413

Pathan, Al-Sakib Khan and Hong, Choong Seon and Haque, Md Mokammel and Heo, Gihyuk (2010) "무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법" (Translated TITLE: Message encryption/ecryption method between sensor nodes in wireless sensor networks). Patent No. 10-0941764, Republic of Korea Intellectual Property Office, 03/02/2010 (Patent : Industry-Academic Cooperation Foundation, Kyung Hee University).

Pathan, Al-Sakib Khan and Hong, Choong Seon and Lee, Hyung-Woo (2006) Towards developing smart environment using wireless sensor and ad hoc networks. In: International Conference on Computational Science and its Applications 2006, (ICCSA 2006), 8-11 May, 2006, Glasgow, Scotland (UK). (Unpublished)

Pathan, Al-Sakib Khan and Hong, Choong Seon and Lee , Hyung-Woo (2006) Smartening the environment using wireless sensor networks in a developing country. In: 2006 8th International Conference Advanced Communication Technology (ICACT 2006). Institute of Electrical and Electronics Engineers ( IEEE ), Piscataway, New Jersey , pp. 705-709. ISBN 8955191294

Pathan, Al-Sakib Khan and Hong, Choong Seon and Suda, Tatsuya (2007) A novel and efficient bilateral remote user authentication scheme using smart cards. In: 2007 IEEE International Conference on Consumer Electronics (IEEE ICCE 2007), January 10-14, 2007, Las Vegas, USA.

Pathan, Al-Sakib Khan and Islam, Humayun Kadir and Sayeed, Sabit Anjum and Ahmed, Farruk and Hong, Choong Seon (2006) A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. In: First International Conference on Next-Generation Wireless Systems (IEEE ICNEWS 2006), 2-4 January, 2006, Dhaka, Bangladesh.

Pathan, Al-Sakib Khan and Lee, Hyung-Woo and Hong, Choong Seon (2006) Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology. Institute of Electrical and Electronics Engineers ( IEEE ), National Computerization Agency, Electronics and Telecommunications Research Institute, Korea, pp. 1043-1048. ISBN 8955191294

Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Jiang, Jinfang and Lei, Shu and Han, Guangjie (2011) An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network. Security and Communication Networks. ISSN 1939-0122

Pathan, Al-Sakib Khan and Ryu, Jae Hyun and Haque, Md. Mokammel and Hong, Choong Seon (2007) Security management in wireless sensor networks with a public key based scheme. In: Proceedings of Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Lecture Notes in Computer Science, 4773 . Springer-Verlag, Berlin, Germany, pp. 503-506. ISBN 9783540754756

Priyono, Agus and Ridwan, Muhammad and Alias, Ahmad Jais and Rahmat, Riza Atiq and Hassan, Azmi and Mohd Ali, Mohd Alaudin (2005) Application of LVQ neural network in real–time adaptive traffic signal control. Jurnal Teknologi, 42. pp. 57-73. ISSN 2180–3722 (O), 0127–9696 (P)

Priyono, Agus and Ridwan, Purnomo and Alias, Ahmad Jais and Rahmat, Riza Atiq and Hassan, Azmi and Mohd Ali, Mohd Alaudin (2005) Penggunaan penggugusan subtraktif bagi menjana peraturan kabur. Jurnal Kejuruteraan, 17. pp. 47-58. ISSN 0128-0198

Purnomo, Muhammad Ridwan Andi and Saleh, Chairul and Lagaida, R.L. and Hassan, Azmi (2013) Knowledge-based genetic algorithm for multidimensional data clustering. In: 1st International Materials, Industrial, and Manufacturing Engineering Conference (MIMEC2013), 4-6 December 2013, Johor Bahru, Johor.

Purnomo, Muhammad Ridwan Andi and Saleh, Chairul and Lagaida, Reny Lituhayu and Hassan, Azmi (2014) Knowledge-based genetic algorithm for multidimensional data clustering. Applied Mechanics and Materials, 606. pp. 277-280. ISSN 1660-9336

R

Rahman, Mohammad Ziaur and Pathan, Al-Sakib Khan (2010) A case study: establishing redundant access networks in the telecommunication sector of a developing country. International Journal of Information Technology, Communications and Convergence, 1 (1). pp. 108-126. ISSN 2042-3225 (O), 2042-3217 (P)

Rahmat, Riza Atiq and Jumari, K. and Hassan, Azmi and Basri, Hassan (2002) Optimising traffic control for a congested intersectton. Traffic Engineering and Control, 43 (9). pp. 357-362. ISSN 0041-0683

Rasul, Khadija and Nuerie, Nujhat and Pathan, Al-Sakib Khan (2010) Securing wireless sensor networks with an efficient B+ tree-based key management scheme. International Journal of Communication Networks and Information Security, 2 (3). pp. 162-168. ISSN 2073-607X (O), 2076-0930 (P)

Rasul, Khadija and Nuerie, Nujhat and Pathan, Al-Sakib Khan (2010) An enhanced tree-based key management scheme for secure communication in wireless sensor network. In: 3rd IEEE International Workshop on Internet and Distributed Computing Systems (IDCS'10) in conjunction with the 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), September 01-03, 2010, Melbourne, Australia.

Razali, Nur Isnida and Chowdhury, Md. Sazzad Hossien and Asrar, Waqar (2016) Solutions of higher order boundary value problems by homotopy perturbation method. Malaysian Journal of Mathematical Sciences, 10 (Special Issue). pp. 373-387. ISSN 1823-8343

Razali, Nur Isnida and Chowdhury, Md. Sazzad Hossien and Asrar, Waqar (2013) The multistage Adomian Decomposition Method for solving chaotic Lü System. Middle-East Journal of Scientific Research, 13. pp. 43-49. ISSN 1990-9233

Razali, Nur Iznida and Chowdhury, M. S. H. and Asrar, Waqar (2012) The modified Adomian decomposition method for solving Chaotic Lü system. In: International Conference on Mathematical Application in Engineering (ICMAE 2012), 3-5 July 2012, Kuala Lumpur.

Razali, NurIsnida and Chowdhury, Md. Sazzad Hossien and Asrar, Waqar (2013) Hybrid numeric-analytic method for solving chaotic system. In: IIUM Research, Invention and Innovation Exhibition (IRIIE) 2013, 19-20th February 2013, Cultural Activity Centre (CAC) and KAED Gallery, IIUM.

Riaz, Mehwish and Sulayman, Muhammad and Salleh, Norsaremah and Mendes, Emilia (2010) Experiences conducting systematic reviews from novices' perspective. In: 14th International Conference on Evaluation and Assessment in Software Engineering (EASE), 12-13 April, 2010, Keele University, UK.

S

Sakib, Md. Sabbir Rahman and Saquib, Nazmus and Pathan, Al-Sakib Khan (2010) A new visual simulation tool for performance evaluation of MANET routing protocols. In: 10th International Conference Algorithms and Architectures for Parallel Processing, ICA3PP 2010; Busan; 21 May 2010 through 23 May 2010.

Salami, Momoh Jimoh Emiyoka and Tijani, Ismaila and Jibia, Abdussamad Umar (2011) Development of real-time software interface for multicomponent transient signal analysis using Labview and Matlab. In: 4th International Conference on Mechatronics (ICOM) , 17-19 May, 2011 , Kuala Lumpur.

Salleh, Norsaremah and Mendes, Amelia and Grundy, John and Burch, Giles St. J (2009) An empirical study of the effects of personality in pair programming using the five-factor model. In: 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009; Lake Buena Vista, FL; 15 October 2009 through 16 October 2009.

Salleh, Norsaremah and Mendes, Emilia and Grundy, John (2011) The effects of openness to experience on pair programming in a higher education context. In: 2011 24th IEEE-CS Conference on Software Engineering Education and Training, CSEE and T 2011, 22 - 24 May 2011, Waikiki, Honolulu.

Salleh, Norsaremah and Mendes, Emilia and Grundy, John and Burch, Giles St. J (2010) The effects of neuroticism on pair programming: an empirical study in the higher education context. In: 4th International Symposium on Empirical Software Engineering and Measurement (ESEM2010), 15-17 Sept., 2010, Bolzano, Italy.

Salleh, Norsaremah and Mendes, Emilia and Grundy, John and Burch, Giles St. J. (2010) An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model. In: 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010, 1 - 8 May 2010, Cape Town.

Saquib, Nazmus and Sakib, Md. Sabbir Rahman and Pathan, Al-Sakib Khan (2011) ViSim: a user-friendly graphical simulation tool for performance analysis of MANET routing protocols. Mathematical and Computer Modelling Journal, 53 (11-12). pp. 2204-2218. ISSN 0895-7177

Saquib, Nazmus and Sakib, Md. Sabbir Rahman and Pathan, Al-Sakib Khan (2009) ViSim: a user-friendly simulation tool for MANET routing protocols. Technical Report. BRAC University, Dhaka, Bangladesh.

Saquib, Nazmus and Sakib, Md. Sabbir Rahman and Pathan, Al-Sakib Khan (2010) Demo abstract: ViSiM, A MANET routing simulation demonstration tool for naive users. In: The 29th IEEE Conference on Computer Communications (IEEE INFOCOM 2010), March 15-19, 2010, San Diego, USA.

Shah, Asadullah and Ahmed, Ejaz (2011) C++ references. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 223-227. ISBN 9789674180904

Shah, Asadullah and Ahmed, Ejaz (2011) Function pointers. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 213-218. ISBN 9789674180904

Shah, Asadullah and Ahmed, Ejaz (2011) Pointers. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 203-211. ISBN 9789674180904

Shah, Asadullah and Ahmed, Ejaz (2011) Polymorphism and virtual functions. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 219-221. ISBN 9789674180904

Shah, Asadullah and Ahmed, Ejaz (2011) Vector class. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 199-202. ISBN 9789674180904

Shah, Asadullah and Ali, Syed Ifthar (2011) Binary search. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 189-197. ISBN 9789674180904

Shah, Asadullah and Ali, Syed Ifthar (2011) Linear searching. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 179-188. ISBN 9789674180904

Shah, Asadullah and Ali, Syed Ifthar (2011) Selection sorting. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 153-159. ISBN 9789674180904

Shah, Asadullah and Khawaja, Sumbul (2011) Exercise of array. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 127-135. ISBN 9789674180904

Shah, Asadullah and Khowaza, Sumbul (2011) Call-by-value and reference. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 91-97. ISBN 9789674180904

Shah, Asadullah and Khowaza, Sumbul (2011) More on functions. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 99-110. ISBN 9789674180904

Shah, Asadullah and Mahfooz, Osama (2011) Const correctness. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 229-234. ISBN 9789674180904

Shah, Asadullah and Mahfooz, Osama (2011) Goto statement. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 241-247. ISBN 9789674180904

Shah, Asadullah and Mahfooz, Osama (2011) Handling errors in C++. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 249-252. ISBN 9789674180904

Shah, Asadullah and Mahfooz, Osama (2011) More on const keywords. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 235-239. ISBN 9789674180904

Shah, Asadullah and Mahfooz, Osama (2011) Static: the multipurpose keyword. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 253-255. ISBN 9789674180904

Shah, Asadullah and Shaikh, Muniba (2013) 10 c’s of social networking, interconnections and the impact on social networking. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Shah, Asadullah and Shaikh, Muniba (2011) Arrays. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 119-125. ISBN 9789674180904

Shah, Asadullah and Shaikh, Muniba (2011) Object oriented programming. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 143-152. ISBN 9789674180904

Shah, Asadullah and Shaikh, Muniba (2011) Read data from a file. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 137-141. ISBN 9789674180904

Shah, Asadullah and Shaikh, Muniba (2011) Structures (struct) and files. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 111-118. ISBN 9789674180904

Shah, Asadullah and Shaikh, Syed Ifthar (2011) Bubble sort algorithm. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 161-166. ISBN 9789674180904

Shah, Asadullah and Shaikh, Syed Ifthar (2011) Review of arrays. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 167-177. ISBN 9789674180904

Shah, Asadullah and Zeeshan Ahmed, Bhatti (2012) Widget based automated rigging of bipedal character with custom manipulators. In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;, 2 - 4 Dec 2012, Singapore.

Shah , Asadullah and Khatri, Krishan Lal (2011) Digital speech interpolation advantage of statistical time division multiplexer. Pakistan Journal of Engineering ,Technology and Science, 1 (1). pp. 9-13. ISSN 2222-9930

Shamsudin, Ahmad Faizul and Ibrahim, Jamaludin and Sembok, Tengku Mohd and Noordin, Mohamad Fauzan and Hashim, Jamil and Wan Yusof, Wan Sabri (2013) Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.

Shuriye, Abdi Omar (2008) Study of Islamic perspectives of professional code of ethics in the field of computing and informatics. Australian Journal of Islamic Studies, 1 (2). pp. 71-80. ISSN 1834-6170

Suhaizad, Farah Nur Atiqah and Burhanudin, Raida Rasyiqa and Nordin, Azlin (2016) Deriving domain specific requirement pattern for Collaborative Meeting and Appointment Scheduler Domain (CMASD). In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), 22nd-24th November 2016, Jakarta, Indonesia.

T

Tageldin, Abdelgadir and Pathan, Al-Sakib Khan and Ahmed, Mohiuddin (2011) On the performance of MPI-OpenMP on a 12 nodes multi-core cluster. Lecture Notes in Computer Science (LNCS), 7017 (pt II). pp. 225-234. ISSN 0302-9743

Tan, Chin Keng and Yeoh, Kah Ching (2011) A study on the use of measurement software in the preparation of bills of quantities among Malaysian quantity surveying firms. In: 2011 The 9th International Conference on ICT and Knowledge Engineering (ICTKE 2011), 12-13 January 2011, Bangkok, Thailand.

Tarmudi, Zamali and Abdullah, Mohd Lazim and Md. Tap, Abu Osman (2009) A new sensitivity analysis approach for fuzzy decision-making model. In: Proceeding of ICORAFSS 2009, 2 - 4 June 2009, The ZON Regency Hotel, Johor bahru.

Tengku Sembok, Tengku Mohd and Kadir, Rabiah (2013) A unified logical-linguistic indexing for search engines and question answering. International Journal of Mathematical Models and Methods in Applied Sciences, 7 (1). pp. 22-29. ISSN 1998-0140

Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Pacheco, Julio C. Ramírez (2012) Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models. Mathematical and Computer Modelling Journal. ISSN 0895-7177 (In Press)

Tunku Ahmad, Tunku Badariah and Madarsha, Kamal Basha and Zainuddin, Ahmad Marzuki and Ismail, Nik Ahmad Hisham and Nordin, Mohamad Sahari (2010) Faculty's acceptance of computer based technology: cross-validation of an extended model. Australasian Journal of Education Technology (AJET), 26 (2). pp. 268-279. ISSN 1449-3098

U

Uddin, Mohammad Moshee and Pathan, Al-Sakib Khan and Ahmed, Mohiuddin and Haseeb, Shariq (2011) Experimental analysis of MIPL based mobile IPv6 using single vs dual interface with practical test-beds. International Journal of Applied Research on Information Technology and Computing, 3 (1). pp. 1-16. ISSN 0975-8070 (Print), 0975-8089 (Online) (In Press)

Ungku , Abdul Hafiz and Hoda, Asif and Asrar, Waqar (2015) A numerical investigation of explicit pressure-correction projection methods for incompressible flows. Engineering Applications of Computational Fluid Mechanics . pp. 1-16. ISSN 1994-2060 (P) 1997-003X (O)

V

Verner, June M. and Abdullah, Lili Marziana (2012) Exploratory case study research: outsourced project failure. Information and Software Technology, 54 (8). pp. 866-886. ISSN 0950-5849

W

Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2011) PMDA: A malicious peer detection algorithm for P2P systems. INFORMATION JOURNAL. ISSN ISSN 1343-4500 (print), ISSN 1344-8994 (electronic) (In Press)

Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2012) PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA. In: International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA.

Y

Ya'au, Badamasi Imam and Nordin, Azlin and Salleh, Norsaremah (2017) Investigation of Requirements Reuse (RR) challenges and existing RR approaches. Advanced Science Letters, 23 (5). pp. 4101-4105. ISSN 1936-6612 (In Press)

Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab (2015) Computational model of affective states profiling using commercial 14-channel wireless EEG. In: 28th International Conference on Computer Applications in Industry and Engineering, 12-14 October 2015, San Diego, California, USA.

Z

Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Jaryani, Farhang and Taherdoost, Hamed and Zeki, Akram M. (2009) A secure audio steganography approach. In: UNSPECIFIED.

Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Zeki, Akram M. (2009) An approach to improve the robustness of substitution techniques of audio steganography. In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 8 - 11 August, 2009, Beijing, China.

Zangana, Hewa Majeed and Graha, Yuliana Isma and Taha Alshaikhli, Imad Fakhri (2015) Blogging: a new platform for spreading rumors! CCIT Journal, 9 (1). pp. 71-76. ISSN 1978 -8282

Zeki, Akram M. and Abdul Manaf, Azizah (2009) A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology, 50. pp. 989-996. ISSN 1307-6884

Zeki, Akram M. and Abubakar, Adamu and Chiroma , Haruna (2016) An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus, 5 (1). pp. 1-25. ISSN 2193-1801

Zulhuda, Sonny (2015) Developing PDPA-friendly moblie application: key takeaways for mobile apps developers. In: KL Converge! 2015 Talk, 27-29 August 2015, Kuala Lumpur Convention Centre Malaysia. (Unpublished)

Zulkifli, Mohammad and Omar, Ashraf Ali and Asrar, Waqar (2014) Arbitrary Lagrangian-Eulerian Form of Flowfield Dependent Variation (ALE-FDV) Method for 3D Problems. In: 22nd Annual Conference of the CFD Society of Canada, 1-4 Jun 2014, Toronto Canada. (In Press)

Zulkifli, Mohammad and Omar, Ashraf Ali and Asrar, Waqar (2015) Flowfield dependent variation method for one dimensional stationary and moving boundary problems. International Journal of Computational Science and Engineering, 10 (1/2). pp. 130-144. ISSN 1742-7193 (O), 1742-7185 (P)

Zulkifli, Mohd fadhli and Omar, Ashraf Ali and Asrar, Waqar (2014) Arbitrary lagrangian-eulerian form of flowfield dependent variation method for moving boundary problems. In: Aviation 2014 - 32nd AIAA Applied Aerodynamics Conference 2014, 16 June - 20 June 2014, Atlanta, GA; United States.

This list was generated on Fri Oct 20 00:31:28 2017 +08.