Items where Subject is "Q Science > QA Mathematics > QA76 Computer software"
Up a level |
- Library of Congress (491)
- Q Science (491)
- QA Mathematics (491)
- QA76 Computer software (491)
- QA Mathematics (491)
- Q Science (491)
Article
., Lily Amelia and Wahab, Dzuraidah and Hassan, Azmi (2008) Pembangunan model pengoptimman pengeluaran minyak sawit dan isirong sawit menggunakan pendekatan genetik kabur. Jurnal Teknologi, 48. pp. 71-89. ISSN 2180–3722 (O), 0127–9696 (P)
A. Moh, Abdul Nasser and Ali, Borhanuddin M. and Abualkishik, Abedallah Zaid and Abdullah, Radhwan and Alwan, Ali Amer (2019) Algorithm for enhancing the QoS of video traffic over wireless mesh networks. International Journal of Advanced Computer Science and Applications, 10 (4). pp. 451-456. ISSN 2158-107X E-ISSN 2156-5570
A. Saif, Faten and Derahman, Mohd Noor and Alwan, Ali Amer and Latip, Rohaya (2019) Performance evaluation of task scheduling using hybrid meta-heuristic in heterogeneous cloud environment. International Journal of Advanced Trends in Computer Science and Engineering, 8 (6). pp. 3249-3257. E-ISSN 2278-3091
Abd Ghani, Ahmad Termimi and Md. Tap, Abu Osman and Mohamad, Mahadzirah and Abdullah, Mohd Lazim (2009) Rough fuzzy approach in tourism demand analysis. Matematika, 25 (1). pp. 1-8. ISSN 0127-8274
Abd Malik, Sofianiza and Nordin, Azlin and Al-Ehaidib, Reem Nasser (2019) Requirements engineering (RE) process for the adaptation of hospital information system (HIS). International Journal on Advanced Science, Engineering and Information Technology, 9 (1). pp. 8-17. ISSN 2088-5334 E-ISSN 2460-6952
Abdelgadir , Tageldin and Mohiuddin , Ahmed2 and Pathan, Al-Sakib Khan and Mohd Ariff, Abdullah and Shariq, Haseeb (2011) Performance analysis of a highly available home agent in mobile networks. American Journal of Applied Sciences , 8 (12). pp. 1388-1397. ISSN 1554-3641(O), 1546-9239 (P)
Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) A new data hiding technique based on irreducible polynomials. Journal of Emerging Technologies in Web Intelligence. ISSN 1798-0461 (In Press)
Abdul Rahman, Ahmad Fadzli Nizam and Shibghatullah, Abdul Samad and Abal Abas, Zuraida and Eldabi, Tillai and Chit, Su Mon and Amir Hussin, Amir Aatieff (2020) Solving late for relief event in bus crew rescheduling using multi agent system. Journal of Engineering Science and Technology, 15 (3). p. 1466. ISSN 1823-4690
Abdul Rahman, Aqilahfarhana and Fong, Wan Heng and Sarmin, Nor Haniza and Sherzod Turaev, Sherzod and Mohamad Zulkufli, Nurul Liyana (2019) Static watson-crick linear grammars and its computational power. MATEMATIKA, 35 (3). pp. 283-296. E-ISSN 0127-9602
Abdul Rahman, Ayub and Abdul Aziz, Normaziah and Hamzah, Mohd. Syarqawy (2016) Emotion graph models for bipedal walk cycle animation. International Journal of Advanced Culture Technology, 4 (1). pp. 19-27. ISSN 2288-7202 E-ISSN 2288-7318
Abdulaziz, O. and Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Momani, Shaher Mohammad (2009) Direct solution of second-order BVPs by homotopy-perturbation method (Penyelesaian Secara Langsung MNS Berperingkat-Dua Melalui Kaedah Homotopi-usikan). Sains Malaysiana, 38 (5). pp. 717-721. ISSN 0126-6039
Abdulaziz, O. and Hashim, Ishak and Chowdhury, Md. Sazzad Hossien (2008) Solving variational problems by homotopy–perturbation method. International Journal For Numerical Methods In Engineering , 75. pp. 7709-721. ISSN 1097-0207 (O) , 0029-5981
Abdulaziz, O. and Hashim, Ishak and Chowdhury, Md. Sazzad Hossien and Zulkifle, A. K. (2007) Assessment of decomposition method for linear and nonlinear fractional differential equations. Far East Journal of Applied Mathematical Sciences (FJAMS), 28 (1). pp. 95-112. ISSN 0972-0960
Abdullah, Lazim and Md. Tap, Abu Osman (2009) Fuzzy human development index: a numerical example of Southeast Asian countries. International Journal Ecological Economics & Statistics, 14 (9). pp. 104-113. ISSN 0973-7537 (O), 0973-1385 (P)
Abualkishik, Abedallah Zaid and Aljuboori, Ali A.Alwan and Gulzar, Yonis (2020) Disaster recovery in cloud computing systems: an overview. International Journal of Advanced Computer Science and Applications (IJASA), 11 (9). pp. 702-710. ISSN 2158-107X E-ISSN 2156-5570
Abubakar, Adamu and Ahmed, Mohamud Abdulkadir (2022) Examining the performance of software defined virtual local area network. International Journal of Innovative Computing, 12 (2). pp. 25-30. E-ISSN 2180-4370
Abubakar, Adamu and Chiroma, Haruna and Khan, Abdullah and Mohamed, Elbaraa Eldaw Elnour (2016) Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm. International Review on Computers and Software (IRECOS), 11 (9). pp. 752-763. ISSN 1828-6003 E-ISSN 1828-6011
Abubakar, Adamu and Haruna, Chiroma and Abdullah, Khan and Fatihu, Mukhtar and Dauda, Ali Baba and Mahmood, Nadeem and Shah, Asadullah and Maitama, Jaafar Zubairu and Herawan, Tutut (2016) Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science, 10 (2). pp. 34-51. ISSN 1913-1844 (P), 1913-1852 (O)
Abubakar, Adamu and Khan, Abdullah and Nawi, Nazri Mohd and Rehman, M. Z. and Teh , Ying Wah and Chiroma , Haruna and Herawan, Tutut (2016) Studying the effect of training Levenberg Marquardt neural network by using hybrid meta-heuristic algorithms. Journal of Computational and Theoretical Nanoscience, 13 (1). pp. 450-460. ISSN 1546-1955 E-ISSN 1546-1963
Abubakar, Adamu and Mantoro, Teddy and Moedjiono, Sardjoeni and Anugerah Ayu, Media and Chiroma, Haruna and Waqas, Ahmad and Abdulhamid, Shafi’i Muhammad and Hamza, Mukhtar Fatihu and Ya’u Gital, Abdulsalam (2016) A support vector machine classification of computational capabilities of 3D map on mobile device for navigation aid. International Journal of Interactive Mobile Technologies, 10 (3). pp. 4-10. ISSN 1865-7923
Abubakar Ibrahim, Adamu and Abdulghafor, Rawad Abdulkhaleq Abdulmolla and Wani, Sharyar (2022) A new concept of duplicate address detection processes in IPv6 link-local network. International Journal of Innovative Computing, 12 (2). pp. 9-16. E-ISSN 2180-4370
Ahmad, Ashfaq and Othman, Roslina and Noordin, Mohamad Fauzan and Mudassar Ilyas, Qazi (2019) A semantic ontology for disaster trail management system. International Journal of Advanced Computer Science and Applications, 10 (10). pp. 77-90. ISSN 2158-107X E-ISSN 2156-5570
Ahmad Kamaruddin, Saadi and Md Ghani, Nor Azura and Ramli, Norazan Mohamed (2018) Consolidated backpropagation neural network for Malaysian construction costs indices data with outliers problem. Pertanika Journal of Science and Technology, 26 (1). pp. 353-366. ISSN 0128-7680
Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Automated intruder detection from image sequences using minimum volume sets. International Journal of Communication Networks and Information Security, 4 (1). pp. 11-17. ISSN 2073-607X (O), 2076-0930 (P)
Ahmed, Tarem and Wei, Xianglin and Ahmed, Supriyo and Pathan, Al-Sakib Khan (2012) Efficient and effective automated surveillance agents using kernel tricks. SIMULATION: Transactions of the SCS. ISSN Print ISSN: 0037-5497, Online ISSN: 1741-3133 (In Press)
Ahsan, Md. Rezwanul and Ibrahimy, Muhammad Ibn and Khalifa, Othman Omran (2009) EMG signal classification for human computer interaction: a review. European Journal of Scientific Research, 33 (3). pp. 480-501. ISSN 1450-216X, 1450-202X
Al Naeem, Mohammed Abdul Aziz and Abubakar, Adamu and Hafizur Rahman, M. M. (2020) Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8. pp. 197554-197566. E-ISSN 2169-3536
Ali, Mohammed N. M. and Rahman, M. M. Hafizur and Abubakar, Adamu and Al-Naeem, Mohammed and Hossain, Eklas (2022) A high static performance hierarchical three-dimensional shifted completely connected network. IEEE Access, 10. pp. 43812-43836. ISSN 2169-3536 E-ISSN 2169-3536
Ali, Sellami and Mahmoud, Omer and Wahid, Zaharah and Chowdhury, Md. Sazzad Hossien (2013) Enhancement of multicast network security. Wulfenia Journal, 20 (3). pp. 378-391. ISSN 1561-882X E-ISSN 1561-882X
Ali, Sellami and Saharudin, Shuhairi and Wahiddin, Mohamed Ridza (2009) Quantum key distribution using decoy state protocol. American Journal of Engineering and Applied Sciences, 2 (4). pp. 694-698. ISSN 1941-7020
Ali, Sellami and Saharudin, Suhairi and Wahiddin, Mohamed Ridza (2009) Decoy state quantum key distribution. IIUM Engineering Journal, 10 (2). pp. 81-86. ISSN 1511-788X
Aljuboori, Ali Alwan and Nordin, Azlin and Alzeber, Mogahed and Zaid Abualkishik, Abedallah (2017) A Survey of schema matching research using database schemas and instances. International Journal of Advanced Computer Science and Applications, 8 (10). pp. 102-111. ISSN 2156-5570
Aljuboori, Ali A.Alwan and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2018) Missing values estimation for skylines in incomplete database. The International Arab Journal of Information Technology, 15 (1). pp. 66-75. ISSN 1683-3198
Alshammari, Mohammad M. and Alwan, Ali Amer and Taha Alshaikhli, Imad Fakhri (2016) Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT), 8 (5). pp. 80-94. ISSN 2005-8039 E-ISSN 2233-9337
Alshammari, Mohammad Matar and Aljuboori, Ali A.Alwan and Nordin, Azlin and Abualkishik, Abedallah Zaid (2020) Data backup and recovery with a minimum replica plan in a multi-cloud environment. International Journal of Grid and High Performance Computing, 12 (2). pp. 102-120. ISSN 1938-0259 E-ISSN 1938-0267
Altalmas, Tareq, M. and Jamil, Muhammad Ammar and Ahmad, Salmiah and Sediono, Wahju and Salami, Momoh Jimoh Emiyoka and Shahbudin Hassan, Surul and Embong, Abd Halim (2017) Lips tracking identification of a correct pronunciation of Quranic alphabets for tajweed teaching and learning. IIUM Engineering Journal, 18 (1). pp. 177-191. ISSN 1511-788X E-ISSN 2289-7860
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura (2015) A model for processing skyline queries over a database with missing data. Journal of Advanced Computer Science and Technology Research (JACSTR), 5 (3). pp. 71-82. ISSN 2231-8852
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2016) Processing skyline queries in incomplete distributed databases. Journal of Intelligent Information Systems. pp. 1-22. ISSN 0925-9902 E-ISSN 1573-7675 (In Press)
Alwan, Ali Amer and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah (2016) An efficient approach for processing skyline queries in incomplete multidimensional database. Arabian Journal for Science and Engineering, 41 (8). pp. 2927-2943. ISSN 1319-8025 E-ISSN 2191-4281
Alzeber, Mogahed and Aljuboori, Ali A.Alwan and Nordin, Azlin and Abualkishik, Abedallah Zaid (2018) An empirical comparative study of instance-based schema matching. Indonesian Journal of Electrical Engineering and Computer Science, 10 (3). pp. 1266-1277. ISSN 2502-4752 E-ISSN 2502-4760
Amer, Ahmed and Abdul Aziz, Normaziah (2019) Malware detection through machine learning techniques. International Journal of Advanced Trends in Computer Science and Engineering, 8 (5). pp. 2408-2413. ISSN 2278-3091
Amin, Syed Obaid and Pathan, Al-Sakib Khan and Rahman, Syed M. (2011) Special issue on recent advances in next-generation and resource-constrained converged networks. International Journal of Communication Networks and Distributed Systems. ISSN 1754-3924 (O), 1754-3916 (P) (In Press)
Arkok, Bassam and Khedher, Akram M Z M (2020) Classification of Qur’anic topics based on imbalanced classification. Indonesian Journal of Electrical Engineering and Computer Science, 22 (2). pp. 678-687. ISSN 2502-4752 E-ISSN 2502-4760
Arkok, Bassam and Zeki, Akram M. and Othman, Roslina and Aborujilah, Abdulaziz (2023) An extended oversampling method for imbalanced Quranic text classification based on a genetic algorithm. European Chemical Bulletin, 12 (Special Issue 4). pp. 16771-16789. ISSN 2063-5346
Asnawi, Ani Liza and Ahmad, Amalina and Mohamed Azmin, Nor Fadhillah and Ismail, Kamsiah and Jusoh, Ahmad Zamani and Ibrahim, Siti Noorjannah and Mohd Ramli, Huda Adibah (2019) The needs of collaborative tool for practicing pair programming in educational setting. International Journal of Interactive Mobile Technologies (iJIM), 13 (07). pp. 17-30. ISSN 18657923 E-ISSN 1865-7923
Awang Abu Bakar, Normi Sham and Mahmud, Iqram (2013) OSSGrab: software repositories and app store mining tool. Lecture Notes on Software Engineering, 1 (3). pp. 219-223. ISSN 2301-3559
Aziz, Nur Atikah and Yusof, Yuhani and Mohd Radzuan, Hazulin and Noviantri, Viska (2024) Optimizing diabetes cupping point from graph colouring perspective. Journal of Advanced Research in Applied Sciences and Engineering Technology, 48 (1). pp. 205-212. ISSN 2462-1943
Azizan, Adis Nabawi and Shah, Asadullah (2020) A study on effectiveness in using continuous integration and deployment for software development: a state of the art review. Journal of Information Systems and Digital Technologies, 2 (2). pp. 18-27. E-ISSN 2682-8790
Baali, Hamza and Khorshidtalab, Aida and Mesbah, Mustafa and Salami, Momoh Jimoh Eyiomika (2015) A transform-based feature extraction approach for motor imagery tasks classification. IEEE Journal of Translational Engineering in Health and Medicine, 3. pp. 2100108-1. ISSN 2168-2372
Babanejad, Ghazaleh and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura and Aljuboori, Ali A.Alwan and Gulzar, Yonis (2020) Efficient computation of skyline queries over a dynamic and incomplete database. IEEE Access Journal, 8. pp. 141523-141546. ISSN 2169-3536 E-ISSN 2169-3536
Badamasi, Imam Ya'au and Nordin, Azlin and Salleh, Norsaremah and UNSPECIFIED (2019) Validation of RP-SPF framework: a systematic method for requirements reuse in software product lines. International Journal of Engineering and Advanced Technology, 9 (1). pp. 3423-3426. E-ISSN 2249-8958
Badamasi, Imam Ya'au and Nordin, Azlin and Salleh, Norsaremah and Khamis, Norazlina (2019) Experimenting application engineering with requirements pattern for software product families. Journal of Advanced Research in Dynamical and Control Systems, 11. pp. 1206-1217. ISSN 1943-023X
Badamasi, Imam Ya'au and Nordin, Azlin and Salleh, Norsaremah and Mustapha, Saleh Waziri (2019) Requirement patterns: an approach for streamlining requirements engineering in software product families. International Journal of Advanced Trends in Computer Science and Engineering, 8 (1.4). pp. 507-514. ISSN 2278-3091
Badamasi, Imam Ya'au and Salleh, Norsaremah and Nordin, Azlin and Alwan, Ali Amer and Idris, Norbik Bashah and Abas, Hafiza (2019) A systematic mapping study on cloud-based mobile application testing. Journal of Information and Communication Technology, 18 (8). pp. 485-527. ISSN 1675-414X E-ISSN 2180-3862
Bakar, Noor Hasrina and Kasirun, Zarinah M. (2014) Exploring software practitioners perceptions and experience in requirements reuse : a survey in Malaysia. International Journal of Software Engineering and Technology, 1 (2). pp. 33-42. ISSN 2289-2842
Bakar, Noor Hasrina and Zarinah, Kasirun and Salleh, Norsaremah (2015) Feature extraction approaches from natural language requirements for reuse in software product lines: a systematic literature review. Journal of Systems and Software, 106. pp. 132-149. ISSN 0164-1212
Basri, Atikah Balqis and Handayani, Dini Oktarina Dwi (2022) Community engagement at Bintan Island, Indonesia. KICT Newsletter, 2022 (9). pp. 4-5.
Bouthiba Farouq, Douma and Alarood, Ala Abdusalam and Aljojo, Nahla and Ibrahim, Adamu Abubakar (2020) Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming. IEEE Access, 8. pp. 83155-83166. ISSN 2169-3536
Che Taib, Che Mohd Imran and Md. Tap, Abu Osman and Abd Rahman, Ahmad Fakharuddin (2009) Mengukur Risiko Kabur Kadar Tukaran Asing (Measuring Fuzzy Foreign Exchange Rate Risk). Matematika, 25 (2). pp. 113-124. ISSN 0127-8274
Chiroma, Haruna and Mohd Nor, Ahmad Shukri and Abdul Kareem, Sameem and Abubakar, Adamu and Hermawan, Arief and Qin, Hongwu and Hamza, Mukhtar Fatihu and Herawan, Tutut (2017) Neural networks optimization through genetic algorithm searches: A review. Applied Mathematics and Information Sciences, 11 (6). pp. 1543-1564. ISSN 1935-0090 E-ISSN 2325-0399
Chowdhury, Md. Sazzad Hossien (2008) Simulation of the predator-prey problem by the homotopy-perturbation method revised. Topological Methods in Nonlinear Science, 31 (2). pp. 263-270. ISSN 1230-3429
Chowdhury, Md. Sazzad Hossien (2012) An accurate solution to the Lotka-Volterra equations by modified Homotopy perturbation method. International Journal of Modern Physics: Conference Series, 9. pp. 326-333. ISSN 2010-1945
Chowdhury, Md. Sazzad Hossien (2011) A comparison between the modified homotopy perturbation method and adomian decomposition method for solving nonlinear heat transfer equations. Journal of Applied Sciences, 11 (7). pp. 1416-1420. ISSN 1812-5662 (O), 1812-5654 (P)
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2008) Adaptation of homotopy-perturbation method for numeric–analytic solution of system of ODEs. Physics Letters A, 372 . pp. 470-481. ISSN 0375-9601
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2008) Analytical solutions to heat transfer equations by homotopy-perturbation method revisited. Physics Letters A, 372. pp. 1240-1243. ISSN 0375-9601
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2009) Application of homotopy-perturbation method to Klein–Gordon and sine-Gordon equations. Chaos, Solitons and Fractals, 39. pp. 1928-1935. ISSN 0960-0779
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2009) Application of multistage homotopy-perturbation method for the solutions of the Chen system. Nonlinear Analysis: Real World Applications, 10 (1). pp. 381-391. ISSN 1468-1218
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2010) Direct solutions of nth-order IVPs by homotopyperturbation method. International Journal of Computer Mathematics, 87 (4). pp. 756-762. ISSN 1029-0265
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2009) Solutions of Emden–Fowler equations by homotopy-perturbation methods. Nonlinear Analysis: Real World Applications, 10 (1). pp. 104-115. ISSN 1468-1218
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Solutions of a class of singular second-order IVPs by homotopy-perturbation method. Physics Letters A, 365. pp. 439-447. ISSN 0375-9601
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Solutions of time-dependent Emden–Fowler type equations by homotopy-perturbation method. Physics Letters A, 368. pp. 305-313. ISSN 0375-9601
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) A modified homotopy perturbation method for purely nonlinear fin-type problems. JP Journal of heat and mass transfer, 1 (3). pp. 285-296. ISSN 0973-5763
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Abdulaziz, O. (2007) Application of homotopy-perturbation method to nonlinear population dynamics models. Physics Letters A, 368. pp. 251-258. ISSN 0375-9601
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Abdulaziz, O. (2009) Comparison of homotopy analysis method and homotopy-perturbation method for purely nonlinear fin-type problems. Communications in Nonlinear Science and Numerical Simulation, 14 (2). pp. 371-378. ISSN 1007-5704
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris and Rahman, M. M. and Momani, Shaher Mohammad (2011) Exact solution for linear and nonlinear systems of PDEs by homotopy-perturbation method. Australian Journal of Basic and Applied Sciences, 5 (12). pp. 3295-3305. ISSN 1991-8178
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Mawa, S. (2009) Solution of prey–predator problem by numeric–analytic technique. Communications in Nonlinear Science and Numerical Simulation, 14. pp. 1008-1012. ISSN 1007-5704
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Momani, Shaher Mohammad (2009) The multistage homotopy-perturbation method: a powerful scheme for handling the Lorenz system. Chaos, Solitons and Fractals, 40 (4). pp. 1929-1937. ISSN 0960-0779
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Momani, Shaher Mohammad and Rahman, M. M. (2012) Application of multistage homotopy perturbation method to the chaotic Genesio System. Abstract and Applied Analysis, 2012 (974293). pp. 1-10. ISSN 1085-3375 (Print) 1687-0409 (Online)
Chowdhury, Md. Sazzad Hossien and Hassan, Talib Hashim and Mawa, S. (2010) A new application of homotopy perturbation method to the reaction-diffusion Brusselator model. Procedia Social and Behavioral Sciences, 8 . pp. 648-653. ISSN 1877-0428
Chowdhury, Md. Sazzad Hossien and Razali, Nur Isnida and Ali, Sellami and Rahman, M. M. (2013) An accurate analytic solution for differential and integral equations by modified homotopy perturbation method. Middle East Journal of Scientific Research (MEJSR), 13. 50-58. ISSN 1990-9233
Dai, Tran Thanh and Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks. Lecture Notes in Computer Science (LNCS), 4238. pp. 546-549. ISSN 1611-3349 (O), 0302-9743 (P)
Dehaki, Ghazaleh Babanejad and Ibrahim, Hamidah and Alwan, Ali Amer and Sidi, Fatimah and Udzir, Nur Izura (2021) Efficient skyline computation over an Incomplete database with changing states and structures. Efficient Skyline Computation Over an Incomplete Database With Changing States and Structures, 9. pp. 88699-88723. ISSN 2169-3536 E-ISSN 2169-3536
Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2011) A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies. Information Journal. ISSN 1343-4500 (P), 1344-8994 (O) (In Press)
Diallo , Abdoulaye Kindy and Pathan, Al-Sakib Khan (2013) A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies. International Journal of Communication Networks and Information Security, 5 (2). pp. 80-92. ISSN ISSN: 2076-0930 (Print) ISSN: 2073-607X (Online)
Din, Nur Atikah and Abdul Rashid, Nur Ziana Syuhadah and Zakaria, Noor Azura (2023) Short sensory profile assessment system for autism children. International Journal on Perceptiveand Cognitive Computing (IJPCC), 9 (2). pp. 104-108. E-ISSN 2462-229X
Djeddar, Afrah and Bendjenna, Hakim and Amirat, Abdelkrim and Alwan Aljuboori, Ali Amer (2015) Developing context-aware mobile applications using composition process based-on heterogeneous software entities. Journal of Advanced Computer Science and Technology Research (JACSTR), 5 (3). pp. 93-103. ISSN 2231-8852
Dwi Handayani, Dini Oktarina and Abdul Rahman, Abdul Wahab and Yaacob, Hamwira Sakti (2015) Recognition of emotions in video clips: the self-assessment manikin validation. Telkomnika (Telecommunication Computing Electronics and Control), 13 (4). pp. 1343-1351. ISSN 1693-6930 E-ISSN 2302-9293
Ehteram, Mohammad and Banadkooki, Fatemeh Barzegari and Fai, Chow Ming and Moslemzadeh, Mohsen and Sapitang, Michelle and Ahmed, Ali Najah and Irwan, Dani and El-Shafie, Ahmed (2021) Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy. Energy Reports, 7. pp. 3703-3725. ISSN 2352-4847
Elfaki, Mohamed and Abdellatief, Majdi and Alwan, Ali Amer and Wahaballa, Abubaker (2019) A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries. Engineering, Technology & Applied Science Research, 9 (5). pp. 4729-4734. ISSN 2241-4487 E-ISSN 1792-8036
Fadhli, Mohammad and Omar, Ashraf Ali and Asrar, Waqar (2015) Flowfield-dependent variation method for moving-boundary problems. AIAA Journal, 53 (4). pp. 1026-1036. ISSN 1533-385X (O), 0001-1452 (P) E-ISSN 1533-385X
Fooks, Ian and Mohd. Asraf, Ratnawati (2018) Using computer analysis of student writing to improve lesson planning. Asian EFL Journal, 20 (12.3). pp. 44-65. ISSN 1738-1460
Ghaffar, Abid and Wahiddin, Mohamed Ridza and Shaikh, Asadullah (2013) Computer assisted alerts using mental model approach for customer service improvement. Journal of Software Engineering and Applications, 6. pp. 21-25. ISSN 1945-3116
Ghosh, Indranil and Chowdhury, Md Sazzad Hossien and Mt Aznam, Suazlan (2022) Numerical treatment on a chaos model of fluid flow using new iterative method. Journal of Advanced Research in Fluid Mechanics and Thermal Sciences, 96 (1). pp. 25-35. ISSN 2289-7879
Gulzar, Yonis and Aljuboori, Ali A.Alwan and Salleh, Norsaremah and Alshaikhli, Imad Fakhri Taha (2017) Processing skyline queries in incomplete database: issues, challenges and future trends. Journal of Computer Science, 13 (11). pp. 590-601. ISSN 1549-3636 E-ISSN 1552-6607
Gulzar, Yonis and Alwan, Ali Amer and Ibrahim, Hamidah and Turaev, Sherzod and Wani, Sharyar and Soomro, Arjumand Bano and Hamid, Yasir (2021) IDSA: an efficient algorithm for skyline queries computation on dynamic and incomplete data with changing states. IEEE Access, 9. pp. 57291-57310. ISSN 2169-3536 E-ISSN 2169-3536
Gulzar, Yonis and Alwan, Ali Amer and Mohamed Abdullah, Radhwan and Xin, Qin and Swidan, Marwa (2019) SCSA: Evaluating skyline queries in incomplete data. Applied Intelligence Journal, 49 (5). pp. 1636-1657. ISSN 0924-669X E-ISSN 1573-7497 (In Press)
Gulzar, Yonis and Alwan, Ali Amer and Salleh, Norsaremah and Alshaikhli, Imad Fakhri Taha and Alvi, Idrees Mairaj (2016) A framework for evaluating skyline queries over incomplete data. Procedia Computer Science, 94. pp. 191-198. ISSN 1877-0509
Gulzar, Yonis and Alwan, Ali Amer and Salleh, Norsaremah and Alyaseen, Imad Fakhri Taha (2018) A model for skyline query processing in a partially complete database. Advanced Science Letters, 24 (2). pp. 1339-1343. ISSN 1936-6612 E-ISSN 1936-7317
Gulzar, Yonis and Alwan, Ali Amer and Turaev, Sherzod (2019) Optimizing skyline query processing in incomplete data. IEEE Access Journal, 7. pp. 178121-178138. E-ISSN 2169-3536
Gulzar, Yonis and Alwan Aljuboori, Ali Amer and Salleh, Norsaremah and Alshaikhli, Imad Fakhri Taha (2019) Identifying skylines in cloud databases with incomplete data. Journal of Information and Communication Technology, 18 (1). pp. 19-34. ISSN 1675-414X E-ISSN 2180-3862
Gulzar, Yonis and Hamid, Yasir and Soomro, Arjumand Bano and Aljuboori, Ali A.Alwan and Journaux, Ludovic (2020) A convolution neural network-based seed classification system. Symmetry, 12 (12). pp. 1-18. ISSN 2073-8994
Gündüz, Feyza and Pathan, Al-Sakib Khan (2013) On the key factors of usability in small-sized mobile touch-screen application. International Journal of Multimedia and Ubiquitous Engineering. ISSN 1975-0080 (In Press)
Haini, Mohammad Shazreen and Mon, Chit Su and Shibghatullah, Abdul Samad and Jalil, Abdurrahman and Subaramaniam, Kasthuri and Amir Hussin, Amir 'Aatieff (2019) An investigation into requirement of mobile app for apartment residents. International Journal on Advanced Science, Engineering and Information Technology, 9 (6). pp. 1841-1848. ISSN 2088-5334
Handayani, Dini and Kartiwi, Mira (2015) Natural language question and answer system on semantic health website. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 18-23. ISSN 2462 - 229X
Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon and Huh, Eui-Nam (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Transactions on Internet and Information Systems, 2 (5). pp. 265-279. ISSN 1976-7277
Haruna, Chiroma and Khan, Abdullah and Abubakar, Adamu and Saudi, Younes and Hamza, Mukhtar Fatihu and Shuiba, Liyana and Gital, Abdulsalam and Herawan, Tutut (2016) A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm. Applied Soft Computing, 48 (November 2016). pp. 50-58. ISSN 1568-4946
Hashim, Ishak and Chowdhury, Md. Sazzad Hossien and Mawa, S. (2008) On multistage homotopy-perturbation method applied to nonlinear biochemical reaction model. Chaos, Solitons and Fractals , 36. pp. 823-827. ISSN 0960-0779
Hassan, Azizzeanna and Mahmud, Murni (2018) Learning motivation for slow learners with tablet technology. International Journal for Studies on Children, Women, Elderly And Disabled, 5 (10). pp. 201-210. E-ISSN 0128-309X
Hassan, Azmi and Basri, Hassan and Rahmat, Riza Atiq and Kasmiran, Jumari (2001) Traffic Detectors Using Image Processing Method (Pengesan Lalu Lintas Dengan Kaedah Pemprosesan Imej). Jurnal Kejuruteraan (13). pp. 3-20. ISSN 0128-0198
Hassan, Azmi and Pham, Duc Trung (2000) Optimisation of multi-stage production-inspection stations using genetic algorithm. Journal of Industrial Technology, 9 (2). pp. 59-73. ISSN 0128-4940
Henchiri, Mourad M.H. and Wani, Sharyar (2020) Bit stream sampling for a behavioral-based apt caused anomalies detection. International Journal of Engineering and Information Systems, 4 (8). pp. 31-34. E-ISSN 2643-640X
Hijazi, Musab and Zeki, Akram M. and Ismail, Amelia Ritahani (2023) Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification. The International Arab Journal of Information Technology, 20 (3A (Special Issue)). pp. 536-547. ISSN 1683-3198 E-ISSN 2309-4524
Hoda, Rashina and Salleh, Norsaremah and Grundy, John (2018) The rise and evolution of agile software development. IEEE Software, 35 (5). pp. 58-63. ISSN 0740-7459
Hosen, M. A and Chowdhury, Md. Sazzad Hossien (2016) Solution of nonlinear cubic-quintic duffing oscillators using harmonic balance method. Malaysian journal of Mathematical sciences, 10 (Special Issue). pp. 181-192. ISSN 1823-8343
Hoshieah, Noura and Zein, Samer and Salleh, Norsaremah (2019) A static analysis of android source code for lifecycle development usage patterns. Journal of Computer Science, 15 (1). pp. 92-107. ISSN 1549-3636
Hossain, Farhad and Yaacob, Hamwira Sakti (2023) A proposal on a brain-computer interface model for real-time mental fatigue intervention. Journal of Islamic, Social, Economics and Development, 8 (55). pp. 303-315. E-ISSN 0128-1755
Huda, Muhammad Qomarul and Hidayah, Nur Aeni and Khudzaeve, Eva and Zakaria, Noor Azura (2023) Adoption and implementation of self-development information technology applications: an empirical study of state Islamic higher education institutions in Indonesia. Journal of Applied Engineering and Technological Science (JAETS), 4 (2). pp. 940-954. ISSN 2715-6087 E-ISSN 2715-6079
Hussein, Idyawati and Hussain, Azham and Mkpojiogu, Emmanuel O.C. and Mahmud, Murni (2019) A UX community of practice: design goals, practice motivations and values. International Journal of Advanced Science and Technology, 28 (10). pp. 21-29. ISSN 2005-4238 E-ISSN 2207-6360
Imam Yau'u, Badamasi and Nordin, Azlin and Salleh, Norsaremah (2018) Meta-modeling constructs for requirements reuse (RR): software requirements patterns, variability, and traceability. Malaysian Journal of Computing, 3 (2). pp. 119-137. ISSN 2231-7473 E-ISSN 2600-8238
Jauro, Fatsuma and Abdullahi, Usman Ali and Abdulsalami, Aminu Onimisi and Ibrahim, Adamu Abubakar and Abdullahi, Mohammed and Chiroma, Haruna (2024) Modified symbiotic organisms search optimization for automatic construction of convolutional neural network architectures. Intelligent Systems with Applications, 22. pp. 1-20. ISSN 2667-3053
Khamis, Norazlina and Lee , Chin Yang and Nordin, Azlin (2014) Automated call receiving and forwarding mechanism for supporting integrated disaster management system. International Journal of Information and Electronics Engineering, 4 (4). pp. 302-307. ISSN 2010-3719
Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Yaacob, Mashkuri (2020) Scrutinising internet banking security solutions. International Journal of Information and Computer Security, 12 (2-3). pp. 269-302. ISSN 1744-1765 E-ISSN 1744-1773
Khan, Sher Afghan and Aabid, Abdul and Saleel, Ahamad C. (2019) CFD simulation with analytical and theoretical validation of different flow parameters for the wedge at supersonic Mach number. International Journal of Mechanical & Mechatronics Engineering IJMME-IJENS, 19 (1). pp. 170-177. ISSN 2227-2771 E-ISSN 2077-124X
Khattab, Mahmoud and Zeki, Akram M. and Alwan, Ali Amer and Badawy, Ahmed S. (2020) Regularization-based multi-frame super-resolution: a systematic review. Journal of King Saud University - Computer and Information Sciences, 32 (7). pp. 755-762. ISSN 1319-1578 E-ISSN 2213-1248
Khattab, Mahmoud M. and Khedher, Akram M Z M and Alwan, Ali A. and Bouallegue, Belgacem and Matter, Safaa S. and Ahmed, Abdelmoty M. (2021) Regularized multiframe super-resolution image reconstruction using linear and nonlinear filters. Journal of Electrical and Computer Engineering, 2021. pp. 1-16. ISSN 2090-0147 E-ISSN 2090-0155
Khedher, Akram M Z M and Senan Mahmood, Shayma’a (2023) تعلم اللغة العربية بمساعدة الحاسب عن طريق الكلمات المتشابهة = Computer assisted language learning for Arabic using cognates. International Journal on Islamic Applications in Computer Science and Technology, 11 (3). pp. 21-45. ISSN 2289-4012
Komarudin, M. and Sophian, Ali and Septama, Hery Dian and Yulianti, Titin and Ikhsan, Muhamad and Zuhelmi, Tomy Pratama (2023) Ziswaf: zakat application to improve ease of recording zakat data in Indonesia. WSEAS Transactions on Environment and Development, 19. pp. 309-319. ISSN 1790-5079 E-ISSN 2224-3496
Lawal, Ibrahim A. and Ibrahim, Adamu Abubakar and Zammarah, Nuha Abdullah (2022) Improving the quality of service of fixed WiMAX networks by decreasing application response time using a distributed model. International Journal of Interactive Mobile Technologies, 16 (22). pp. 75-93. E-ISSN 1865-7923
Liaw, Mitchelle Ai Wei and Olowolayemo, Akeem Koye (2020) Undergraduate students’ stress, anxiety and depression remote health monitoring system. InternationalJournal on Perceptive and Cognitive Computing (IJPCC), 6 (2). pp. 129-140.
Liaw, Mitchelle Ai Wei and Olowolayemo, Akeem Koye and Gulfam Tanni, Maymuna and Omar Ba Khadher, Mohammed Abdullah (2021) Undergraduate students’ mental health remote monitoring system: end-user usability testing study. International Journal on Perceptive and Cognitive Computing (IJPCC). E-ISSN 2462-229X (In Press)
Looi, Xue Ying and Mohd Aman, Azana Hafizah and Jalil, Mohamad Sirajuddin and Omar, Taha Mohd and Attarbashi, Zainab S. and Abuzaraida, Mustafa Ali (2023) Malaysia cyber fraud prevention application: features and functions. Asia-Pacific Journal of Information Technology and Multimedia, 12 (2). pp. 312-327. E-ISSN 2289-2192
Maidin, Siti Sarah and Yahya, Norzariyah (2024) An insight into hybrid agile software development approach and software security among software engineers: a critical evaluation. Journal of Theoretical and Applied Information Technology, 102 (2). pp. 450-459. ISSN 1992-8645 E-ISSN 1817-3195
Maidin, Siti Sarah and Yahya, Norzariyah (2023) The need for an enhanced IoT-based malware detection model using artificial intelligence (AI) algorithm: a review. Data Science Insights, 1 (1). pp. 52-56. E-ISSN 3031-1268
Masrom, Maslin and Ismail, Zuraini and Hussein, Ramlah and Mohamed, Norshidah (2010) An ethical assessment of computer ethics using scenario approach. International Journal of Electronic Commerce Studies, 1 (1). pp. 25-36. ISSN 2073-9729
Mat Razi, Nurul Izzati and Othman, Marini and Yaacob, Hamwira Sakti (2017) Investment decisions based on EEG emotion recognition. Advanced Science Letters, 23 (11). pp. 11345-11349. ISSN 1936-6612
Md Zaki, Fatimah Audah and Zulkurnain, Nurul Fariza (2019) Improved BVBUC algorithm to discover closed itemsets in long biological datasets. Applied Mechanics and Materials, 892. pp. 157-167. ISSN 1662-7482
Md. Alal, Hosen and Chowdhury, Md. Sazzad Hossien (2015) Analytical approximate solutions for the Helmholtz-Duffing oscillator. ARPN Journal of Engineering and Applied Sciences, 10 (23). pp. 17363-17369. ISSN 1819-6608
Md. Ali, Mohd. Adli and Abidin, Mohd Radhwan and Nik Muhamad Affendi, Nik Arsyad and Abdullah, Hafidzul and Rosman, Daaniyal Reesha and Badrud'din, Nu'man and Kemi, Faiz and Hayati, Farid (2021) Classification of chest radiographs using novel anomalous saliency map and deep convolutional neural network. IIUM Engineering Journal, 22 (2). pp. 234-248. ISSN 1511-758X E-ISSN 2289-7860
Md. Ali, Mohd. Adli and Badrud’din, Nu’man and Abdullah, Hafidzul and Kemi, Faiz (2020) Alternate methods for anomaly detection in high-energy physics via semi-supervised learning. International Journal of Modern Physics A. ISSN 0217-751X E-ISSN 1793-656X
Mior Nazri, Mior Nasir and Hamid, Zarinah (2015) Alignment between data warehouse design and business strategy. International Journal of Information Technology & Computer Science, 19 (1). pp. 21-29. ISSN 2091-1610
Misra, Sudip and Balakrishnan, N. and Pathan, Al-Sakib Khan (2011) Recent advances in simulation and mathematical modeling of wireless networks. Mathematical and Computer Modelling Journal, 53 (11-12). pp. 2057-2058. ISSN 0895-7177
Mohamad Fauzi, Mohamad Aniq Fakhrul and Abdullah, Lili Marziana (2022) Malicious/phishing URL detection system in a network with Raspberry Pi (NETBITS). International Journal on Perceptive and Cognitive Computing (IJPCC), 8 (2). pp. 30-36. E-ISSN 2462-229X
Mohamad Zain, Jasni and Abdul Rani, Mohammed Fauzi and Abd. Aziz, Azian (2009) Clinical assessment of watermarked medical images. Journal of Computer Science, 5 (11). pp. 857-863. ISSN 1549-3636
Mohamed Abdullah, Radhwan and Abualkishik, Abedallah Zaid and Alwan, Ali Amer (2018) Improved handover decision algorithm using multiple criteria. Procedia Computer Science, 141. pp. 32-39. ISSN 1877-0509
Mohamed Abdullah, Radhwan and Aljuboori, Ali A.Alwan and Salih, Kamil G. and Zukarnain, Zuriati (2019) An enhanced group mobility management method in wireless body area networks. Journal of Theoretical and Applied Information Technology, 97 (22). pp. 3293-3303. ISSN 1992-8645 E-ISSN 1817-3195
Mohammed, Al-Naeem and Mohammed, Ashikur Rahman and Abubakar, Adamu and Rahman, M.M. Hafizur (2020) AI-based techniques for DDoS Attack Detection in WSN: a systematic literature review. Journal of Computer Science, 16 (6). pp. 848-855. ISSN 1549-3636 E-ISSN 1552-6607
Mohammed Aldheeb, Mohammed Abdulmalek and Asrar, Waqar and Omar, Ashraf Ali and Altaf, Afaq and Sulaeman, Erwin (2020) Aerodynamics of symmetric permeable airfoils and wings: CFD simulation. Progress in Computational Fluid Dynamics, 20 (6). pp. 349-361. ISSN 1468-4349 E-ISSN 1741-5233
Mohd Esa, Luqman Naim and Morshidi, Malik Arman and Mohd Zailani, Syarah Munirah (2017) Development of real-time pose estimation algorithm for Quranic Arabic word. Indonesian Journal of Electrical Engineering and Computer Science. ISSN 2502-4760 E-ISSN 2502-4760 (In Press)
Mohd Mohadis, Hazwani and Mohamad Ali, Nazlena and Smeaton, Alan F. (2016) Designing a persuasive physical activity application for older workers: Understanding end- user perceptions. Behaviour and Information Technology, 35 (12). pp. 1102-1114. ISSN 0144-929X E-ISSN 1362-3001
Mohd Nasharuddin, Muhammad Zafran Syahmi and Abubakar, Adamu (2024) Analyzing threat level of the backdoor attack method for an organization’s operation. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 51-59. E-ISSN e-ISSN: 2462-229X
Mohd Saad, Nurul Husna and Ibrahim, Hamidah and Sidi, Fatimah and Yaakob, Razali and Alwan Aljuboori, Ali Amer (2016) Reporting skyline on uncertain dimension with query interval. Journal of Telecommunication, Electronic and Computer Engineering, 8 (6). pp. 17-21. ISSN 2180 – 1843 E-ISSN 2289-8131
Mohd Zailani, Syarah Munirah and Morshidi, Malik Arman and Mohd Esa, Luqman Naim (2017) Arabic words recognition technique for pattern matching using SIFT, SURF and ORB. Journal of Telecommunication, Electronic and Computer Engineering. ISSN 2180-1843 E-ISSN 2289-8131 (In Press)
Mohd Zailani, Syarah Munirah and Zakaria, Noor Azura and Said, Abdul Hadi and Ismail, Amelia Ritahani (2022) A fuzzy multi-criteria decision analysis model for decision support in diabetes mellitus: a proposal paper. Journal of Computing Technologies and Creative Content (JTeC), 7 (2). pp. 19-24. E-ISSN 2550-1550
Mon, Chit Su and Tee, Tan Khee and Amir Hussin, Amir Aatieff (2020) A prototype of a mobile car rental system. Journal of Physics: Conference Series, 1529 (32023). pp. 1-8. ISSN 1742-6588 E-ISSN 1742-6596
Naji, Ahmed Wathik and Zaidan, B.B. and Hameed, Shihab A. and O-Khalifa, Othman (2009) Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography. International Journal of Computer Science and Network Security (IJCSNS), 9 (5). pp. 294-300. ISSN 1738-7906
Naknawa, Manus and Ibrahim, Adamu Abubakar (2021) Subscribers' expectations of internet speed for multiplayer online battle arena (MOBA) game. International Journal on Perceptive and Cognitive Computing (IJPCC), 7 (1). pp. 1-7. E-ISSN 2462-229X
Nazurin, Jamaludin and Ahmad Kamran, Alya Aqilah and Azlin, Nordin (2024) Collaborative requirements review tool (collaborev) to support requirements validation. International Journal on Perceptive and Cognitive Computing, 10 (1). pp. 105-112. E-ISSN 2462-229X
Nordin, Azlin and Ahmad Zaidi, Nurul Husna and Mazlan, Noor Asheera (2017) Measuring software requirements specification quality. Journal of Telecommunication Electronic and Computer Engineering, 9 (3-5). pp. 115-121. ISSN 2180-1843 E-ISSN 2289-8131
Nordin, Azlin and Azhar, Afizatul Husna and Mohd Shabul Fadilah, Nur`ain Afiqah and Zakaria, Zalina and Mohamad Zain, Muhammad Syazwan (2022) Halal certificate readiness assessment (HaCeRa) tool: towards automation of the Halal application process. International Journal on Perceptive and Cognitive Computing, 8 (1). pp. 11-18.
Nordin, Azlin and Harasid, Haizir and Anuar, Mohamad Ruzaini (2014) An application of bloom’s taxanomy in generation and assessment of examination question items. International Journal of Innovative Computing, 4 (1). pp. 1-8. ISSN 2180-4370
Nordin, Azlin and Harasid, Haizir and Anuar, Mohamad Ruzaini and Kamis, Norazlina (2014) An application of Bloom's taxanomy in generation and assessment of examination question items. International Journal of Innovative Computing, 4 (1). pp. 1-8. ISSN 2180-4370
Nordin, Azlin and Musleh, Islah Mohammad and Abdul, Ro Zac (2023) Design and development of the e-review: an online requirements review tool based on reading techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 9 (1). pp. 80-87.
Nordin, Azlin and Omar, Amirul Ikhwan and Megat Mohamed Amin, Megat Usaamah and Salleh, Norsaremah (2018) Development of scenario management and requirements tool (SMaRT):Towards supporting scenario-based requirements engineering methodology. International Journal of Engineering and Technology, 7 (2.14 (Special Issue 14)). pp. 62-65. ISSN 2227-524X
Nordin, Azlin and Rusmi, Ahmad Afiq and Suhaizad, Farah Nur Atiqah and Burhanudin, Raida Rasyiqa and Kamis, Norazlina (2018) Development of requirements pattern repository: towards supporting requirements reuse. Advanced Science Letters, 24 (3). pp. 1847-1851. ISSN 1936-6612
Ong, Jiunn Chit and Omar, Ashraf Ali E. and Asrar, Waqar (2013) A BGK-based two-equation turbulence model algorithm for solving compressible navier-stokes equations. CFD Letters, 6 (2). pp. 46-61. ISSN 2180-1363
Oo, Khin Hayman and Nordin, Azlin and Ismail, Amelia Ritahani and Sulaiman, Suriani (2018) An analysis of ambiguity detection techniques for Software Requirements Specification (SRS). International Journal of Engineering & Technology, 7 (2.29 (Special Issue 29)). pp. 501-505. ISSN 2227-524X
Pathan, Al-Sakib Khan (2014) Editorial article: on the boundaries of trust and security in computing and communications systems. International Journal of Trust Management in Computing and Communications (IJTMCC), 2 (1). pp. 1-6. ISSN 2048-8378 (P) 2048-8386 (O)
Pathan, Al-Sakib Khan (2012) Multi-dimensional networking and distributed computing services. International Journal on Internet and Distributed Computing Systems, 2 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)
Pathan, Al-Sakib Khan (2012) Tackling the threats of Internet worms. International Journal on Internet and Distributed Computing Systems, 3 (1). i-ii. ISSN 2219-1887 (O), 2219-1127 (P)
Pathan, Al-Sakib Khan and Alam, Md. Mahbub and Monowar, Md. Mostafa and Rabbi, Md. Forhad (2004) An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting. Proceedings of IEEE E-Tech, Karachi Pakistan 2004. pp. 97-100.
Pathan, Al-Sakib Khan and Dai, Tran Thanh and Hong, Choong Seon (2006) A key management scheme with encoding and improved security for wireless sensor networks. Lecture Notes in Computer Science (LNCS), 4317. pp. 102-115. ISSN 1611-3349 (O), 0302-9743 (P)
Pathan, Al-Sakib Khan and Diallo, Abdoulaye Kindy (2014) Lethality of SQL injection against current and future Internet-technologies. International Journal of Computational Science and Engineering, 9 (4). pp. 386-394. ISSN 1742-7193 (O), 1742-7185 (P)
Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Designing an efficient DMCIS with wireless sensor and ad hoc networks. Ubiquitous Computing and Communication Journal. ISSN 1992-8424
Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annals of Telecommunications, 63 (9-10). pp. 529-541. ISSN 1958-9395 (O), 0003-4347 (print version)
Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Weakly connected dominating set-based secure clustering and operation in distributed sensor networks. International Journal of Communication Networks and Distributed Systems, 3 (2). pp. 175-195. ISSN 1754-3924 (O), 1754-3916 (P)
Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) A key-predistribution-based weakly connected dominating set for secure clustering in DSN. Lecture Notes in Computer Science (LNCS), 4208. pp. 270-279. ISSN 1611-3349 (O), 0302-9743 (P)
Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Jiang, Jinfang and Lei, Shu and Han, Guangjie (2011) An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network. Security and Communication Networks. ISSN 1939-0122
Priyono, Agus and Ridwan, Muhammad and Alias, Ahmad Jais and Rahmat, Riza Atiq and Hassan, Azmi and Mohd Ali, Mohd Alaudin (2005) Application of LVQ neural network in real–time adaptive traffic signal control. Jurnal Teknologi, 42. pp. 57-73. ISSN 2180–3722 (O), 0127–9696 (P)
Priyono, Agus and Ridwan, Purnomo and Alias, Ahmad Jais and Rahmat, Riza Atiq and Hassan, Azmi and Mohd Ali, Mohd Alaudin (2005) Penggunaan penggugusan subtraktif bagi menjana peraturan kabur. Jurnal Kejuruteraan, 17. pp. 47-58. ISSN 0128-0198
Purnomo, Muhammad Ridwan Andi and Saleh, Chairul and Lagaida, Reny Lituhayu and Hassan, Azmi (2014) Knowledge-based genetic algorithm for multidimensional data clustering. Applied Mechanics and Materials, 606. pp. 277-280. ISSN 1660-9336
Rahman, Mohammad Ziaur and Pathan, Al-Sakib Khan (2010) A case study: establishing redundant access networks in the telecommunication sector of a developing country. International Journal of Information Technology, Communications and Convergence, 1 (1). pp. 108-126. ISSN 2042-3225 (O), 2042-3217 (P)
Rahmat, Riza Atiq and Jumari, K. and Hassan, Azmi and Basri, Hassan (2002) Optimising traffic control for a congested intersectton. Traffic Engineering and Control, 43 (9). pp. 357-362. ISSN 0041-0683
Rasul, Khadija and Nuerie, Nujhat and Pathan, Al-Sakib Khan (2010) Securing wireless sensor networks with an efficient B+ tree-based key management scheme. International Journal of Communication Networks and Information Security, 2 (3). pp. 162-168. ISSN 2073-607X (O), 2076-0930 (P)
Razali, Nur Isnida and Chowdhury, Md. Sazzad Hossien and Asrar, Waqar (2016) Solutions of higher order boundary value problems by homotopy perturbation method. Malaysian Journal of Mathematical Sciences, 10 (Special Issue). pp. 373-387. ISSN 1823-8343 E-ISSN 2289-750x
Razali, Nur Isnida and Chowdhury, Md. Sazzad Hossien and Asrar, Waqar (2013) The multistage Adomian Decomposition Method for solving chaotic Lü System. Middle-East Journal of Scientific Research, 13. pp. 43-49. ISSN 1990-9233
Rosli, Aerina Sofea and Roslan, Maryam and Nordin, Azlin (2022) Design and development of a Pothole Tracking System (PotAlert) using Web Progressive Application (WPA). International Journal on Perceptive and Cognitive Computing (IJPCC), 8 (1). pp. 1-10. E-ISSN 2462-229X
S., Suharsiwi and Solehudin, Rd. Heri and Budiarti, Erna and Zakaria, Noor Azura and Rohmah, Siti (2024) Maritirukan Aku Bisa: android application for learning social skills of children with social emotional barriers. Research and Development in Education (RaDEn), 4 (1). pp. 76-84. ISSN 2809-0284 E-ISSN 2809-3216
Saad, Nurul Husna and Ibrahim, Hamidah and Sidi, Fatimah and Yaakob, Razali and Alwan, Ali Amer (2021) Efficient Skyline Computation on Uncertain Dimensions. IEEE Access, 9. pp. 96975-96994. ISSN 2169-3536 E-ISSN 2169-3536
Sadi, Saidul Haq and Hossain Pk, Md Rubel and Zeki, Akram M. (2021) Threat Detector for Social Media Using Text Analysis. International Journal on Perceptive and Cognitive Computing (IJPCC), 7 (1). pp. 113-117. E-ISSN 2462-229X
Santoso, William and Nurjannah, Wilda and Shudhuashar, Mahgrisya and Fadilah, Asyifa Tasya and Junas, M. Destamal and Handayani, Dini (2022) The development of Telegram Bot Api to maximize the dissemination process of Islamic knowledge in 4.0 era. Jurnal Teknik Informatika, 15 (1). pp. 52-62. ISSN 1979-9160 E-ISSN 2549-7901
Saquib, Nazmus and Sakib, Md. Sabbir Rahman and Pathan, Al-Sakib Khan (2011) ViSim: a user-friendly graphical simulation tool for performance analysis of MANET routing protocols. Mathematical and Computer Modelling Journal, 53 (11-12). pp. 2204-2218. ISSN 0895-7177
Seh Wali, Siti Syara Aiman and Nordin, Azlin (2024) Design and development of a requirements conformance tool (RCT). International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 74-79. E-ISSN 2462-229X
Shah , Asadullah and Khatri, Krishan Lal (2011) Digital speech interpolation advantage of statistical time division multiplexer. Pakistan Journal of Engineering ,Technology and Science, 1 (1). pp. 9-13. ISSN 2222-9930
Sham, Rohana and Amir Hussin, Amir 'Aatieff and Abdamia, Noranita and Mohamed, Suhana and Won, Jet Rou (2020) A refuse management system and blockchain: a practical view. International Journal of Advanced Trends in Computer Science and Engineering, 9 (1.3). pp. 101-109. ISSN 2278-3091
Sham, Rohana and Wahab, Siti Norida and Amir Hussin, Amir Aatieff (2018) Smart trolley apps: A solution to reduce picking error. International Journal of Supply Chain Management, 7 (5). pp. 294-302. ISSN 2051-3771 E-ISSN 2050-7399
Shuriye, Abdi Omar (2008) Study of Islamic perspectives of professional code of ethics in the field of computing and informatics. Australian Journal of Islamic Studies, 1 (2). pp. 71-80. ISSN 1834-6170
Sophian, Ali and Awang Za’aba, Dayang Qurratu’aini (2017) Fingertip detection using histogram of gradients and support vector machine. Indonesian Journal of Electrical Engineering and Computer Science, 8 (2). pp. 482-486. ISSN 2502-4752 E-ISSN 2502-4760
Suksuwan, Wasu and Wae-Hayee, Makatar and Mel, Maizirwan (2018) Development of mini pilot fluidized bed gasifier for industrial approach: Preliminary study based on continuous operation. Journal of Advanced Research in Fluid Mechanics and Thermal Sciences, 45 (1). pp. 35-43. ISSN 2289-7879
Swidan, Marwa and Aljuboori, Ali A.Alwan and Turaev, Sherzod and Ibrahim, Hamidah and Zaid Abualkishik, Abedallah and Gulzar, Yonis (2020) Skyline queries computation on crowdsourced- enabled incomplete database. IEEE Access, 8. pp. 106660-106689. E-ISSN 2169-3536
Swidan, Marwa and Alwan, Ali Amer and Gulzar, Yonis and Abualkishik, Abedallah Zaid (2020) An overview of query processing on crowdsourced databases. Scientific Journal of King Faisal University, Online (Online). pp. 1-8. ISSN 1658-0311
Swidan, Marwa and Alwan, Ali Amer and Turaev, Sherzod and Gulzar, Yonis (2018) A model for processing skyline queries in crowd-sourced databases. Indonesian Journal of Electrical Engineering and Computer Science, 10 (2). pp. 798-806. ISSN 2502-4752
Tageldin, Abdelgadir and Pathan, Al-Sakib Khan and Ahmed, Mohiuddin (2011) On the performance of MPI-OpenMP on a 12 nodes multi-core cluster. Lecture Notes in Computer Science (LNCS), 7017 (pt II). pp. 225-234. ISSN 0302-9743
Tengku Sembok, Tengku Mohd and Kadir, Rabiah (2013) A unified logical-linguistic indexing for search engines and question answering. International Journal of Mathematical Models and Methods in Applied Sciences, 7 (1). pp. 22-29. ISSN 1998-0140
Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Pacheco, Julio C. Ramírez (2012) Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models. Mathematical and Computer Modelling Journal. ISSN 0895-7177 (In Press)
Tunku Ahmad, Tunku Badariah and Madarsha, Kamal Basha and Zainuddin, Ahmad Marzuki and Ismail, Nik Ahmad Hisham and Nordin, Mohamad Sahari (2010) Faculty's acceptance of computer based technology: cross-validation of an extended model. Australasian Journal of Education Technology (AJET), 26 (2). pp. 268-279. ISSN 1449-3098
Uddin, Mohammad Moshee and Pathan, Al-Sakib Khan and Ahmed, Mohiuddin and Haseeb, Shariq (2011) Experimental analysis of MIPL based mobile IPv6 using single vs dual interface with practical test-beds. International Journal of Applied Research on Information Technology and Computing, 3 (1). pp. 1-16. ISSN 0975-8070 (Print), 0975-8089 (Online) (In Press)
Ungku, Abdul Hafiz and Hoda, Asif and Asrar, Waqar (2015) A numerical investigation of explicit pressure-correction projection methods for incompressible flows. Engineering Applications of Computational Fluid Mechanics. pp. 1-16. ISSN 1994-2060 (P) 1997-003X (O)
Van Lissa, Caspar J and Stroebe, Wolfgang and vanDellen, Michelle R and Leander, N Pontus and Agostini, Maximilian and Draws, Tim and Grygoryshyn, Andrii and Gutzkow, Ben and Kreienkamp, Jannis and Vetter, Clara S. and Abakoumkin, Georgios and Abdul Khaiyom, Jamilah Hanum and Ahmedi, Vjollca and Akkas, Handan and Almenara, Carlos A and Atta, Mohsin and Bagci, Sabahat Cigdem and Basel, Sima and Kida, Edona Berisha and Bernado, Allan B. I. and Buttrick, Nicholas R and Chobthamkit, Phatthanakit and Choi, Hoon-Seok and Cristea, Mioara and Csaba, Sara and Damnjanović, Kaja and Danyliuk, Ivan and Dash, Arobindu and Di Santo, Daniela and Douglas, Karen M and Enea, Violeta and Faller, Daiane and Fitzsimons, Gavan J and Gheorghiu, Alexandra and Gómez, Ángel and Hamaidia, Ali and Han, Qing and Helmy, Mai and Hudiyana, Joevarian and Jeronimus, Bertus F and Jiang, Ding-Yu and Jovanović, Veljko and Kamenov, Zeljka and Kende, Anna and Keng, Shian-Ling and Tra, Thi Thanh Kieu and Koc, Yasin and Kovyazina, Kamila and Kozytska, Inna and Krause, Joshua and Kruglanski, Arie W and Kurapov, Anton and Kutlaca, Maja and Lantos, Nóra Anna and Lemay Jr., Edward P and Lesmana, Cokorda Bagus J and Louis, Winnifred R and Lueders, Adrian and Iqbal Malik, Najma and Martinez, Anton P and McCabe, Kira O and Mehulić, Jasmina and Milla, Mirra Noor and Mohammed, Idris and Molinario, Erica and Moyano, Manuel and Muhammad, Hayat and Mula, Silvana and Muluk, Hamdi and Myroniuk, Solomiia and Najafi, Reza and Nisa, Claudia F and Nyúl, Boglárka and O'Keefe, Paul A and Osuna, Jose Javier Olivas and Osin, Evgeny N and Park, Joonha and Pica, Gennaro and Pierro, Antonio and Rees, Jonas H and Reitsema, Anne Margit and Resta, Elena and Rullo, Marika and Ryan, Michelle K and Samekin, Adil and Santilla, Pekka and Sasin, Edyta and Schumpe, Birga M and Selim, Heyla A and Stanton, Michael Vicente and Sultana, Samiah and Sutton, Robbie M and Tseliou, Eleftheria and Utsugi, Akira and van Breen, Jolien A and Van Veen, Kees and Vázquez, Alexandra and Wollast, Robin and Yeung, Victoria Wai-lan and Zand, Somayeh and Žeželj, Iris Lav and Zheng, Bang and Zick, Andreas and Zúñiga, Claudia and Belanger, Jocelyn J and UNSPECIFIED (2022) .Using machine learning to identify important predictors of COVID-19 infection prevention behaviors during the early phase of the pandemic. Patterns.
Verner, June M. and Abdullah, Lili Marziana (2012) Exploratory case study research: outsourced project failure. Information and Software Technology, 54 (8). pp. 866-886. ISSN 0950-5849
Wan Ibrahim, Wan Aiman and Ahmad Khalil, Ahmad Nazrin and Abubakar, Adamu (2024) Design and development of cybersecurity suite. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 104-112. E-ISSN 2462-229X
Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2011) PMDA: A malicious peer detection algorithm for P2P systems. INFORMATION JOURNAL. ISSN ISSN 1343-4500 (print), ISSN 1344-8994 (electronic) (In Press)
Ya'au, Badamasi Imam and Nordin, Azlin and Salleh, Norsaremah (2017) Investigation of Requirements Reuse (RR) challenges and existing RR approaches. Advanced Science Letters, 23 (5). pp. 4101-4105. ISSN 1936-6612 E-ISSN 1936-7317
Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab (2017) Affective state classification through CMAC-based model of affects (CCMA) using SVM. Advanced Science Letters, 23 (11). pp. 11369-11373. ISSN 1936-6612 E-ISSN 1936-7317 (In Press)
Yahya, Norzariyah and Maidin, Siti Sarah and Safar, Muhammad Shukri (2021) The development of interview protocol to explore hybrid agile software development phase. The Development of Interview Protocol to Explore Hybrid Agile Software Development Phases, 10 (3). pp. 1639-1645. ISSN 2278-3091
Yahya, Norzariyah and Maidin, Siti Sarah (2023) Hybrid agile development phases: the practice in software projects as performed by software engineering team. Indonesian Journal of Electrical Engineering and Computer Science, 29 (3). pp. 1738-1749. ISSN 2502-4752
Yusof, Imran and Pathan, Al Sakib Khan (2016) Mitigating cross-site scripting attacks with a content security Policy. Computer, 49 (3). pp. 56-63. ISSN 0018-9162
Zakaria, Noor Azura and Abdul Rahman, Nur’Izzah and Abdul Malek, Muhammad Naim (2022) iTherapy: an automated web-based therapy plan for learning disability children. International Journal on Perceptive and Cognitive Computing (IJPCC), 8 (1). pp. 80-85. E-ISSN 2462-229X
Zakaria, Noor Azura and Ibrahim, Suhaimi and Mahrin, Mohd Nazri (2016) An integrated approach to formulate a value-based software process tailoring framework. Jurnal Teknologi, 78 (12-3). pp. 171-180. E-ISSN 2180-3722
Zakaria, Noor Azura and Ismail, Amelia Ritahani and Yakath Ali, Afrujaan and Mohd Khalid, Nur Hidayah and Zainal Abidin, Nadzurah (2021) Software project estimation with machine learning. International Journal of Advanced Computer Science and Applications, 12 (6). pp. 726-734. ISSN 2158-107X E-ISSN 2156-5570
Zakaria, Noor Azura and Tajuddin, Nur Syazwana and Mohd Supian, Nur Faraayuni Sufea (2024) AutistiCare: a one-stop centre for parents with Autism Spectrum Disorder children in Perlis. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 113-117. E-ISSN 2462-229X
Zakaria, Noor Azura and Tajul Anuar, Ahmad Faiz (2024) Transporter mobile application: empowering your journey with reliable transport services. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (1). pp. 119-125. E-ISSN 2462-229X
Zangana, Hewa Majeed and Graha, Yuliana Isma and Taha Alshaikhli, Imad Fakhri (2015) Blogging: a new platform for spreading rumors! CCIT Journal, 9 (1). pp. 71-76. ISSN 1978 -8282
Zeki, Akram M. and Abdul Manaf, Azizah (2009) A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology, 50. pp. 989-996. ISSN 1307-6884
Zeki, Akram M. and Abubakar, Adamu and Chiroma , Haruna (2016) An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus, 5 (1). 868-1-868-25. ISSN 2193-1801
Zulkifli, Mohammad and Omar, Ashraf Ali and Asrar, Waqar (2015) Flowfield dependent variation method for one dimensional stationary and moving boundary problems. International Journal of Computational Science and Engineering, 10 (1/2). pp. 130-144. ISSN 1742-7193 (O), 1742-7185 (P)
Book
Zakaria, Noor Azura and Handayani, Dini Oktarina Dwi and Abdul Rahim, Elin Eliana and Misman, Ahmad Fatzilah, eds. (2024) Advancement in ICT: exploring innovative solutions (AdICT): series 1/2024. KICT Publishing, Kuala Lumpur, Malaysia.
Pathan, Al-Sakib Khan and Pathan, Mukaddim and Lee, Hae Young, eds. (2011) Advancements in distributed computing and Internet technologies: trends and issues. IGI Global, Hershey, PA.. ISBN 9781613501108 (DOI: 10.4018/978-1-61350-110-8)
Shah, Asadullah, ed. (2011) C++ programming: step by step. IIUM Press, Kuala Lumpur. ISBN 9789674180904
Azad, Saiful and Pathan, Al-Sakib Khan, eds. (2014) Practical cryptography: algorithms and implementations using C++. CRC Press, Taylor & Francis Group, USA, USA. ISBN 9781482228892
Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Khan, Shafiullah, eds. (2015) Simulation technologies in networking and communications: selecting the best tool for the test. CRC Press, Taylor & Francis Group, USA, USA. ISBN 9781482225495
Khan, Shafiullah and Pathan, Al-Sakib Khan and Alrajeh, Nabil A., eds. (2012) Wireless sensor networks: current status and future trends. CRC Press, USA, USA. ISBN 9781466506060
Abawajy, Jemal and Pathan, Mukaddim and Rahman, Mustafizur and Pathan, Al-Sakib Khan and Deris, Mustafa Mat (2012) Internet and distributed computing advancements : theoretical frameworks and practical applications. IGI Global, USA, USA. ISBN ISBN13: 9781466601611, ISBN10: 1466601612
Bakar, Noor Hasrina and Hassan, Noor Azimah and Idris, Mohd Norhaedir and Al-Shawabkeh, Mahmoud (2014) Programming in C for foundation. IIUM Press, Kuala Lumpur. ISBN 9789674182946
Mantoro, Teddy (2010) Distributed context processing for intelligent environments. LAP LAMBERT Academic Publishing AG & Co., Sarrbrucken, Germany. ISBN 9783838300757
Mohammed, Mohssen and Pathan, Al-Sakib Khan (2013) Automatic defense against zero-day polymorphic worms in communication networks. CRC Press, USA, USA. ISBN 9781466557277 (In Press)
Book Chapter
A. Ahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Mohammad Ahmed, Hanady (2011) Developed system for Quran protection using MD5 and Base64. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 71-84. ISBN 978-967-418-107-9
A. Ahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Mohammad Ahmed, Hanady and Shah, Asadullah (2011) Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 59-69. ISBN 978-967-418-107-9
Abduallah Alsafi, Hassen Mohammed and Alshaikhli, Imad Fakhri Taha and Shah, Asadullah (2011) Molecular docking. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 37-44. ISBN 978-967-418-107-9
Abdul Rahman, Abdul Wahab and Saad, Siti Norhidayah and N. Zahari, Syuwaida (2011) Basic emotions varification and identifiction using Gaussian Mixture Model (GMM) features extraction. In: An anthology of applied computer technologies. IIUM Press, Kuala Lumpur, pp. 219-232. ISBN 978-967-418-106-2
Alharaki, Omarah Omar and Hweidi, Mohammed and Zeki, Akram M. (2011) An overview of ATM systems security. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 113-128. ISBN 978-967-418-107-9
Aliyu, Mansur and Abdallah, Nahel A. O. and Lasisi, Nojeem A. and Diyar, Dahir and Zeki, Ahmed M. and Zeki, Akram M. (2011) Investigating the student’s awareness on computer security and ethics. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 155-177. ISBN 978-967-418-107-9
Bhatti, Zeeshan and Shah, Asadullah (2011) Abstract class. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 237-244. ISBN 9789674180867
Bhatti, Zeeshan and Shah, Asadullah (2011) Arithmetic and relational operators. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 33-38. ISBN 9789674180867
Bhatti, Zeeshan and Shah, Asadullah (2011) If-else statements. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 55-60. ISBN 9789674180867
Bhatti, Zeeshan and Shah, Asadullah (2011) Introduction to Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 15-20. ISBN 9789674180867
Bhatti, Zeeshan and Shah, Asadullah (2011) Introduction to data types in Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 27-32. ISBN 9789674180867
Bhatti, Zeeshan and Shah, Asadullah (2011) Multiple classes. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 177-184. ISBN 9789674180867
Bhatti, Zeeshan and Shah, Asadullah (2011) Relational and logical operators. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 39-44. ISBN 9789674180867
Dwi, Dini Oktarina and Bhatti, Zeeshan and Shah, Asadullah (2011) Interfaces. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 245-257. ISBN 9789674180867
Hakro, Dil Nawaz and Bhatti, Zeeshan and Shah, Asadullah (2011) Arguments passing. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 155-161. ISBN 9789674180867
Hakro, Dil Nawaz and Bhatti, Zeeshan and Shah, Asadullah (2011) Constructors. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 141-146. ISBN 9789674180867
Hakro, Dil Nawaz and Bhatti, Zeeshan and Shah, Asadullah (2011) Return statement. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 163-167. ISBN 9789674180867
Hakro, Dil Nawaz and Bhatti, Zeeshan and Shah, Asadullah (2011) User defined methods. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 147-154. ISBN 9789674180867
Hakro, Dil Nawaz and Bhatti, Zeeshan and Shah, Asadullah (2011) Working with classes. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 169-175. ISBN 9789674180867
Hassan, Raini and Alshaikhli, Imad Fakhri Taha and Shah, Asadullah (2011) The use of genetic algorithm in improving medical image segmentation techniques. In: Computer applications: Theories and applications. IIUM Press, Kuala Lumpur, pp. 45-55. ISBN 978-967-418-107-9
Jahn Kassim, Puteri Shireen and Ali, Maisarah and Abdul Majid, Noor Hanita and Ibrahim, Mansor (2006) Integrating a computational fluid dynamics simulation and visualization with a 3D virtual walkthrough - a case study of Putrajaya. In: Innovations in 3D Geo Information Systems. Lecture Notes in Geoinformation and Cartography . Springer, Verlag, pp. 599-614. ISBN 978-3-540-36997-4
Jamil, Nursuriati and Tengku Sembok, Tengku Mohd and Abu Bakar, Zainab (2012) Digital archiving of traditional songket motifs using image processing tool. In: Recent Researches in Chemistry, Biology, Environment, & Culture. WSEAS Press, pp. 33-39. ISBN 9781618040602
Kamal Ismail, Normaly and Tengku Sembok, Tengku Mohd (2012) 2D text visualization for the retrieval of Malay documents. In: Applied Mathematics in Electrical and Computer Engineering. WSEAS, pp. 116-121. ISBN 978-1-61804-064-0
Khairun, Nisa Ranti and Zakaria, Noor Azura (2024) EasyKos: room rental management system. In: Advancement in ICT: Exploring Innovative Solutions (AdICT) Series 1/2024. KICT Publishing, Kuala Lumpur, Malaysia, pp. 1-4.
Khowaja, Kamran and Bhatti, Zeeshan and Shah, Asadullah (2011) Exception handling. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 215-222. ISBN 9789674180867
Khowaja, Kamran and Bhatti, Zeeshan and Shah, Asadullah (2011) Throw & throws keyword. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 223-229. ISBN 9789674180867
Mohd Saad, Nurul Husna and Ibrahim, Hamidah and Sidi, Fatimah and Yaakob, Razali and Alwan Aljuboori, Ali Amer (2016) Computing range skyline query on uncertain dimension. In: Database and Expert Systems Applications: 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II. Lecture Notes in Computer Science, 9828 (9828). Springer International Publishing, Switzerland, pp. 377-388. ISBN 978-3-319-44405-5
Mohd Tamrin, Mohd Izzuddin and Sembok, Tengku Mohd (2012) Collaboration of integrative processes intermediaries supporting supply chain management. In: Mathematical Methods for Information Science & Economics. WSEAS Press, pp. 59-64. ISBN 978-1-61804-148-7
Pathan, Al-Sakib Khan and Alam, Md. Mahbub and Monowar, Mostafa and Rabbi, Forhad and Ahmed, Sabbir and Khan, Tareq Hasan (2004) 12-segment display for the Bengali numerical characters. In: National Conference on Computer Processing of Bangla (NCCPB-2004). Independent University Bangladesh (IUB), Dhaka, Bangladesh, pp. 82-88. ISBN 9843211124
Pathan, Al-Sakib Khan and Dai, Tran Thanh and Hong, Choong Seon (2006) An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks. In: Proceedings of The Sixth IEEE International Conference on Computer and Communication Technology (CIT'06). Institute of Electrical and Electronics Engineers ( IEEE ), Washington D.C., USA, pp. 227-232. ISBN 076952687X
Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) Securing sensor reports in wireless sensor networks. In: Lecture Notes in Computer Science (LNCS). Springer-Verlag, Berlin, Germany, pp. 881-890.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) A secure energy-efficient routing protocol for WSN. In: Lecture Notes in Computer Science (LNCS). LNCS, 4742 . Springer-Verlag, Berlin, Germany, pp. 407-418. ISBN 9783540747413
Pathan, Al-Sakib Khan and Hong, Choong Seon and Lee , Hyung-Woo (2006) Smartening the environment using wireless sensor networks in a developing country. In: 2006 8th International Conference Advanced Communication Technology (ICACT 2006). Institute of Electrical and Electronics Engineers ( IEEE ), Piscataway, New Jersey , pp. 705-709. ISBN 8955191294
Pathan, Al-Sakib Khan and Lee, Hyung-Woo and Hong, Choong Seon (2006) Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology. Institute of Electrical and Electronics Engineers ( IEEE ), National Computerization Agency, Electronics and Telecommunications Research Institute, Korea, pp. 1043-1048. ISBN 8955191294
Pathan, Al-Sakib Khan and Ryu, Jae Hyun and Haque, Md. Mokammel and Hong, Choong Seon (2007) Security management in wireless sensor networks with a public key based scheme. In: Proceedings of Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007. Lecture Notes in Computer Science, 4773 . Springer-Verlag, Berlin, Germany, pp. 503-506. ISBN 9783540754756
Phatan, Agha Javed and Bhatti, Zeeshan and Shah, Asadullah (2011) For loops. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 85-92. ISBN 9789674180867
Phatan, Agha Javed and Bhatti, Zeeshan and Shah, Asadullah (2011) Loop pitfalls and exercise. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 93-97. ISBN 9789674180867
Phatan, Agha Javed and Bhatti, Zeeshan and Shah, Asadullah (2011) Loops in Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur , pp. 73-78. ISBN 9789674180867
Phatan, Agha Javed and Bhatti, Zeeshan and Shah, Asadullah (2011) Nested loops. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 99-104. ISBN 9789674180867
Ramli, Fatin Najwa and Mohd Fauzi, Nur Alya Nadirah and Talib, Shuhaili (2024) Cyber security awareness training (SecurityGuts). In: Advancement in ICT: Exploring Innovative Solutions (AdICT). KICT Publishing, Kuala Lumpur, pp. 134-137.
Shah, Asadullah and Ahmed, Ejaz (2011) C++ references. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 223-227. ISBN 9789674180904
Shah, Asadullah and Ahmed, Ejaz (2011) Function pointers. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 213-218. ISBN 9789674180904
Shah, Asadullah and Ahmed, Ejaz (2011) Pointers. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 203-211. ISBN 9789674180904
Shah, Asadullah and Ahmed, Ejaz (2011) Polymorphism and virtual functions. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 219-221. ISBN 9789674180904
Shah, Asadullah and Ahmed, Ejaz (2011) Vector class. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 199-202. ISBN 9789674180904
Shah, Asadullah and Ali, Syed Ifthar (2011) Binary search. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 189-197. ISBN 9789674180904
Shah, Asadullah and Ali, Syed Ifthar (2011) Linear searching. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 179-188. ISBN 9789674180904
Shah, Asadullah and Ali, Syed Ifthar (2011) Selection sorting. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 153-159. ISBN 9789674180904
Shah, Asadullah and Khowaza, Sumbul (2011) Call-by-value and reference. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 91-97. ISBN 9789674180904
Shah, Asadullah and Khowaza, Sumbul (2011) More on functions. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 99-110. ISBN 9789674180904
Shah, Asadullah and Mahfooz, Osama (2011) Const correctness. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 229-234. ISBN 9789674180904
Shah, Asadullah and Mahfooz, Osama (2011) Goto statement. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 241-247. ISBN 9789674180904
Shah, Asadullah and Mahfooz, Osama (2011) Handling errors in C++. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 249-252. ISBN 9789674180904
Shah, Asadullah and Mahfooz, Osama (2011) More on const keywords. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 235-239. ISBN 9789674180904
Shah, Asadullah and Mahfooz, Osama (2011) Static: the multipurpose keyword. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 253-255. ISBN 9789674180904
Shah, Asadullah and Shaikh, Muniba (2011) Arrays. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 119-125. ISBN 9789674180904
Shah, Asadullah and Shaikh, Muniba (2011) Exercise of array. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 127-135. ISBN 9789674180904
Shah, Asadullah and Shaikh, Muniba (2011) Object oriented programming. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 143-152. ISBN 9789674180904
Shah, Asadullah and Shaikh, Muniba (2011) Read data from a file. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 137-141. ISBN 9789674180904
Shah, Asadullah and Shaikh, Muniba (2011) Structures (struct) and files. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 111-118. ISBN 9789674180904
Shah, Asadullah and Shaikh, Syed Ifthar (2011) Bubble sort algorithm. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 161-166. ISBN 9789674180904
Shah, Asadullah and Shaikh, Syed Ifthar (2011) Review of arrays. In: C++ Programming: Step by Step. IIUM Press, Kuala Lumpur, pp. 167-177. ISBN 9789674180904
Shaikh, Asadullah and Bhatti, Zeeshan and Shah, Asadullah (2011) Conditional statements. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 51-54. ISBN 9789674180867
Shaikh, Asadullah and Bhatti, Zeeshan and Shah, Asadullah (2011) Switch statement. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 67-72. ISBN 9789674180867
Shaikh, Muniba and Bhatti, Zeeshan and Shah, Asadullah (2011) Modifiers for class data. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 191-197. ISBN 9789674180867
Soomro, Waseem Javaid and Bhatti, Zeeshan and Shah, Asadullah (2011) Arrays in Java. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 105-110. ISBN 9789674180867
Soomro, Waseem Javaid and Bhatti, Zeeshan and Shah, Asadullah (2011) Methods of string class. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 127-134. ISBN 9789674180867
Soomro, Waseem Javaid and Bhatti, Zeeshan and Shah, Asadullah (2011) Strings. In: JAVA programming lab manual. IIUM Press, Kuala Lumpur, pp. 119-125. ISBN 9789674180867
Proceeding Paper
,, Mujiarto and Djohar, As’ari and Vaidyanathan, Singaravadivelu and Mamat, Mustafa and C-H, Lien and Habib, Md. Mamun and Sulaeman, Erwin and ,, Suswandari and ,, Muhtadi and ,, Sarjito and Komaro, Mumu and Hermawan, Sigit and Tjahjant, Prantasi Harmi and Kautsar, Irwan Alnarus and Saputra, Jumadil and Sambas, Aceng and Hendrawan, Budi (2021) 1stParis Van Java International seminar on Computer, Science, Engineering and Technology (PVJ ISComSET) 2020. In: 1st Paris Van Java International Seminar on Computer, Science, Engineering, and Technology, PVJ ISComSET 2020, 15-16 July 2020, Virtual ( Tasik Malaya).
., Lily Amelia and Wahab, Dzuraidah and Hassan, Azmi (2008) The application of hybrid artificial intelligence techniques in the optimisation of crude palm oil production. In: International Symposium on Information Technology 2008 (ITSim), Vol.1, 26-28 Aug. 2008, Kuala Lumpur.
A. Aziz, Normaziah and Hassan, Nur Asnida and Shamsuddin, Siti Nurul Zulaikha (2017) Inculcating secure coding for beginners. In: International Conference on Informatics and Computing (ICIC 2016), 28th-29th Oct. 2016, Mataram, Indonesia.
Ab Razak, Muhammad Naqib Syahmi and Mohamad, Muhammad Imran and Handayani, Dini Oktarina Dwi and Attarbashi, Zainab and Hakiem Afrizal, Sandra and Suryady, Zeldi (2024) Prayer Hall Vacancy Detection. In: IEEE 9th International Conference on Computing, Engineering and Design (ICCED), Kuala Lumpur, Malaysia.
Abd Samad, Zaharah and Hazmi, Norzelatun Rodhiah (2015) Use of open software for information literacy in academic libraries: issues and challenges. In: International Conference on Libraries (ICOL 2015), 25-26 August 2015, Vistana Hotel, Penang. (Unpublished)
Abdul Aziz, Normaziah and Mantoro, Teddy and Khairudin, M. Aiman and A. Murshid, A. Faiz (2019) Software defined networking (SDN) and its security issues. In: 4th International Conference on Computing, Engineering, and Design, ICCED 2018, 6 - 8 Sept 2018, Asian Institute of Technology (AIT)Bangkok, Thailand.
Abdul Halim, Syafrina and Mohd Daud, Zalina (2016) Spatial interpolation of advanced weather generator parameters in Peninsular Malaysia using locally weighted regression. In: The 6th International Conference on Mathematics and Natural Sciences (ICMNS 2016), 2nd-3rd November 2016, Bandung, Indonesia. (Unpublished)
Abdul Rahman, Abdul Wahab (2018) A real-life application of Neuro - Physiological interface of affect. In: Series lecture on Computational Intelligence and its Applications, Singapore. (Unpublished)
Abdul-Rahman Abed, Bassam and Ismail, Amelia Ritahani and Abdul Aziz, Normaziah (2015) Simple recurrent network in real time astrocyte. In: 2015 International Symposium on Innovations in Intelligent Systems and Applications (INISTA), 2nd-4th Sept. 2015, Madrid, Spain.
Abdullah, Matin Saad and Pathan, Al-Sakib Khan (2013) Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), 25-27 March 2013, Rabat, Morocco.
Abdullah, Matin Saad and Pathan, Al-Sakib Khan and Rahman, Muhammad Abdur (2012) Using the web for critical learning of al-Qur’an’s language: an exploratory case study. In: World Conference on Islamic Thought 2012 (WCIT 2012), 11-12 September 2012, Ipoh, Perak. (In Press)
Abdullah, Mohd Lazim and Tarmudi, Zamali and Md. Tap, Abu Osman (2009) Model pembuat keputusan kabur berdaya teguh: pendekatan penegasan linguistik. In: Simposium Kebangsaan Sains Matematik Ke-17, 15-17 Dicember 2009, Melaka Bandar Bersejarah.
Aboaba, Abdulfattah A. and Chowdhury, M. S. H. and Hameed, Shihab A. and Khalifa, Othman Omran and Hassan Abdalla Hashim, Aisha (2012) Spatial sectoring: A innovative extension of Simpson’s rule for determining area of irregular close shape. In: IIUM Research, Invention and Innovation Exhibition, IRIIE 2012, 21-22 February 2012, Cultural Activity Centre (CAC) and KAED Gallery, IIUM.
Aboaba, Abdulfattah A. and Hameed, Shihab A. and Khalifa, Othman Omran and Hassan Abdalla Hashim, Aisha and Chowdhury, Md. Sazzad Hossien (2012) Formulation of hybrid 3D image segmentation algorithm based partial differential equation. In: International Conference on Mathematical Application in Engineering (ICMAE2012), 03-05 July 2012, Kuala Lumpur.
Abu Bakar, Juliana Aida and Jahn Kassim, Puteri Shireen (2008) Three dimensional user interface for Islamic heritage education and exhibition applications - a proposal. In: 7th Annual Conference Management in Construction Researchers’ Association MICRA 2008, 18 - 19 June 2008, Kuala Lumpur.
Abuzaraida, Mustafa Ali and Zeki, Akram M. and Zeki, Ahmed M. (2013) Feature extraction techniques of online handwriting arabic text recognition. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.
Ahmad Kamaruddin, Saadi and Tolos, Siti Marponga and Hee, Pah Chin and Md Ghani, Nor Azura and Ramli, Norazan Mohamed and Mohamed Nasir, Noorhamizah and Ksm Kader, Babul Salam and Huq, Mohammad Saiful (2017) The quadriceps muscle of knee joint modelling using Hybrid Particle Swarm Optimization-Neural Network (PSO-NN). In: 37th International Conference on Quantum Probability and Related Topics (QP37) 2016, 22nd-26th August 2016, Kuantan, Pahang, Malaysia.
Ahmad Zabidi, Muhammad Najmi and Maarof, Mohd Aizaini and Zainal, Anazida (2012) Malware Analysis with Multiple Features. In: UKSim 14th International Conference on Computer Modelling and Simulation, UKSim2012 (UKSim2012), 28-30th March 2012, University of Cambridge, United Kingdom. (Unpublished)
Al Kafri, Ala S and Sudirman, Sud and Hussain, Abir Jaafar and Al-Jumeily, Dhiya A. and Fergus, Paul and Natalia, Friska and Meidia, Hira and Afriliana, Nunik and Sophian, Ali and Al-Jumaily, Mohammed and Al-Rashdan, Wasfi and Bashtawi, Mohammad (2018) Segmentation of lumbar spine MRI images for stenosis detection using patch-based pixel classification neural network. In: 2018 IEEE Congress on Evolutionary Computation, CEC 2018, 8 July - 13 July 2018, Rio de Janeiro; Brazil.
Ali, Sellami and Ahmed, Abdallah Hassen and Mohammed, Sellami and Chowdhury, Md. Sazzad Hossien and Hassan Abdalla Hashim, Aisha and Mahmoud, Omer (2012) Fiber based practical QKD system. In: International Conference on Mathematical Applications in Engineering (ICMAE2012), 3-5 July 2012, Kuala Lumpur.
Almuqren, Almaha and Alsuwaelim, Hanan and Rahman, M M Hafizur and Abubakar Ibrahim, Adamu (2024) A systematic literature review on digital forensic investigation on android devices. In: 2nd International Conference on Machine Learning and Data Engineering (ICMLDE 2023), 23rd - 24th November 2023, Dehradun, India.
Alshammari, Mohammad Matar and Aljuboori, Ali A.Alwan (2018) Disaster recovery and business continuity for database services in multi-cloud. In: The 1st International Conference on Computer Applications & Information Security (ICCAIS 2018), 4th-6th April 2018, Riyadh, Saudi Arabia.
Alshammari, Mohammad Matar and Aljuboori, Ali A.Alwan and Nordin, Azlin and Abualkishik, Abedallah Zaid (2018) Disaster recovery with minimum replica plan for reliability checking in multi-cloud. In: 9th International Conference on Ambient Systems, Networks and Technologies (ANT-2018) and the 8th International Conference on Sustainable Energy Information Technology (SEIT 2018), 8th-11th May 2018, Porto, Portugal.
Alshammari, Mohammad Matar and Alwan, Ali Amer (2016) IT disaster recovery and business continuity based on VMware SRM solution for Kuwait Oil Company (KOC). In: The 2nd International Conference on Open Source Software Computing (OSSCOM 2016), 1st-3rd Dec. 2016, Beirut, Lebanon.
Alshammari, Mohammad Matar and Alwan, Ali Amer and Nordin, Azlin and Taha Alshaikhli, Imad Fakhri (2018) Disaster recovery in single-cloud and multi-cloud environments: Issues and challenges. In: The 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS), 29th November- 1st December 2017, Bahrain.
Amir Hussin, Amir 'Aatieff and Fatima, Shaheen S. (2017) Heuristic methods for optimal coalition structure generation. In: 14th European Conference on Multi-Agent Systems, EUMAS 2016 and 4th International Conference on Agreement Technologies, AT 2016; Valencia; Spain, 15th - 16th Dec. 2016, Valencia, Spain.
Arkok, Bassam and Zeki, Akram M. (2021) Classification of Quranic topics using SMOTE technique. In: 2021 International Conference of Modern Trends in Information and Communication Technology Industry, MTICTI 2021, 4-6 Dec 2021, Yemen.
Arkok, Bassam and Zeki, Akram M. (2022) GOS: a Genetic OverSampling Algorithm for classification of Quranic verses. In: The 13th International Conference on Information & Communication Systems, 21-23 June 2022, Jordan.
Asmadi, M. Solleh and Md. Kasmani, Ruhaila and Siri, Zailan and Saleh, Habibis and Mt Aznam, Suazlan (2023) Relevance of various cavity aspect ratios to the thermal behavior of natural convection heat transfer for water-based hybrid nanofluid within a U-shaped enclosure. In: 14. International Conference on Computational Heat and Mass Transfer, 4-8 September 2023, Düsseldorf, Germany. (Unpublished)
Awang Abu Bakar, Normi Sham (2011) Defect handling mechanisms in various open source projects. In: Malaysian Open Source Conference (MOSC 2011), 2-3 July 2011, Penang, Malaysia. (Unpublished)
Awang Abu Bakar, Normi Sham (2011) Empirical analysis of object-oriented coupling and cohesion measures in determining the quality of open source systems. In: The 15th IASTED International Conference on Software Engineering and Applications (SEA 2011), 14-16 December 2011, Dallas, USA.
Azman, Amelia Wong and Bigdeli, Abbas and Mohd-Mustafah, Yasir and Biglari-Abhari, Morteza and Lovell, Brian (2010) A Bayesian network-based framework with Constraint Satisfaction Problem (CSP)formulations for FPGA system design. In: 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP 2010), 7-9 July 2010, Rennes, France.
Babanejad, Ghazaleh and Ibrahim, Hamidah and Alwan, Ali Amer and Udzir, Nur Izura and Sidi, Fatimah and Babanejad, Ghoncheh (2015) Identifying skylines in dynamic incomplete database. In: 9th International Conference on Computer Engineering and Applications (CEA '15), 22th - 24th Feb 2015, Dubai, United Arab Emirates.
Babanejad, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Aljuboori, Ali A.Alwan (2017) Deriving skyline points over dynamic and incomplete databases. In: The 6th International Conference on Computing and Informatics, ICOCI 2017, 25th-27th April 2017, Kuala Lumpur.
Babanejad, Ghazaleh and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Alwan, Ali Amer (2018) Efficient skyline processing algorithm over dynamic and incomplete database. In: 20th International Conference on Information Integration and Web-based Applications & Services (iiWAS2018), 19-21-11-2018, Yogyakarta, Indonesia.
Babanejad Dehaki, Ghonched and Ibrahim, Hamidah and Udzir, Nur Izura and Sidi, Fatimah and Alwan, Ali Amer (2018) A framework for processing skyline queries for a group of mobile users. In: The 20th International Conference on Information Integration and Web-based Applications & Services (iiWAS2018), 19-21-11-2018, Yogyakarta, Indonesia.
Bahrom, Suhaila (2024) Smart order tracker: enhancing bakery operations with VBA. In: Malaysia Grand Invention Expo 2024, 1 August - 30 November 2024, Virtual.
Bakar, Noor Hasrina and Mohd Kasirun, Zarinah and Salleh, Norsaremah (2016) Terms extractions: an approach for requirements reuse. In: 2nd International Conference on Information Science and Security (ICISS), 2015, 14th-16th December 2015, Seoul, Korea (South).
Bassam, Arkok and Khedher, Akram M Z M (2021) Classification of Quranic topics using ensemble learning. In: 8th International Conference on Computer and Communication Engineering, ICCCE 2021, 22-23 June 2021, Kuala Lumpur.
Bilal, Sara Mohammed Osman Saleh and Bahri, Nurshafiqah and Khalifa, Othman Omran (2014) A comparative study on eye tracking existing techniques. In: 3rd International Conference on Mathematical Applications in Engineering (ICMAE'14), 23-25 Sept. 2014, Kuala Lumpur. (Unpublished)
Che Noh, Che Hafizah and Mohamed Azmin, Nor Fadhillah and Asnawi, Ani Liza (2015) A review: fourier transform infrared application on bioactive compound. In: International Postgraduate Conference on Engineering Research (IPCER) 2015 , 27th-28th Oct. 2015, Gombak Campus, IIUM. (Unpublished)
Chowdhury, M. S. H. (2009) A new reliable numeric-analytic technique to solve nonlinear system of ordinary differential equations. In: Kulliyyah of Engineering Research and Innovation Exhibition ( KERIE 2009), 21-22 January 2009, Culture Activity Centre (CAC), IIUM . (Unpublished)
Chowdhury, Md. Sazzad Hossien (2015) Homotopy-perturbation method for solving linear and nonlinear differential equation. In: 2nd International Conference on Mathematical Sciences & Computer Engineering, 05-06 February 2015, Langkawi, Malaysia,. (Unpublished)
Chowdhury, Md. Sazzad Hossien (2007) Solution of classical Lane-Emden equation by homotopy-perturbation method. In: 3rd International Conference on Research and Education in Mathematics, 10 - 12th April 2007, The Legend Hotel, Kuala Lumpur.
Chowdhury, Md. Sazzad Hossien (2007) Solution of predator-prey problem by multistage Adomian decomposition method. In: International Conference on Mathematical Biology 2007, 4 - 6th September 2007 , Putrajaya.
Chowdhury, Md. Sazzad Hossien (2010) The multistage homotopy-perturbation method: A powerful scheme for handling the Chaotic Lorenz system. In: IIUM Research, Invention and Innovation Exhibition (IRIIE 2010), 26-27 January 2010, Culture Activity Centre, IIUM, Gombak.
Chowdhury, Md. Sazzad Hossien (2012) A powerful Numeric-analytic Technique for handling prey-predator problems. In: IIUM Research, Invention and Innovation Exhibition IRIIE 2012, 21-22 February 2012, Kuala Lumpur, Malaysia.
Chowdhury, Md. Sazzad Hossien and Hashim, I. and Hosen, Md. Alal (2016) Solving linear and non-linear stiff system of ordinary differential equations by multi stage homotopy perturbation method. In: ISERD International Conference, 24-25 December 2016, Jeddah, Saudi Arabia.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Analytical solution of the fin problem by extended homotopy perturbation method. In: Kolokium Siswazah Ke-7, 26 June 2007, UKM, Bangi.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Application of homotopy-perturbation method to the time-dependent singular initial value problems. In: International Conference on Mathematical Sciences 2007, 28 - 29th November 2007, Equatorial Hotel, Bangi.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Homotopy-perturbation method applied to system of ordinary differential equations (ODEs). In: 3rd International Conference on Research and Education in Mathematics, 10 - 12th April 2007, The Legend Hotel, Kuala Lumpur.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Homotopy-perturbation method for direct solution of nonlinear initial value problem. In: The 3rd IMT-GT 2007 Regional Conference on Mathematics, Statistics and Applications, 5 - 6th December 2007, The Gurney Hotel, Penang.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2007) Homotopy-perturbation solution of the isothermal gas sphetres. In: Simposium Kebangsaan Sains Matematik ke-15 (SKSM15), 5 - 7th June 2007, Hotel Concorde Shah Alam.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2006) Numerical solution of fin problem using decomposition method. In: Simposium Kebangsaan Sains Matematik ke-14 (SKSM14), 6 - 8th June 2006, PNB Darby Park, Kuala Lumpur.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak (2006) On decomposition solutions of fins with temperature dependent surface 232 heat flux: Multi-boiling heat transfer. In: The 2nd IMT-GT 2006 Regional Conference on Mathematics, Statistics and Applications, 13 - 15th June 2006, Penang.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris (2010) Analytical treatment of system of linear and nonlinear PDEs by Homotopy-Perturbation method. In: World Congress on Engineering (WCE) 2010, June 30 - July 2, 2010,, London, U.K..
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris (2009) Comparing numerical methods for the solution of Cauchy reaction-diffusion problems. In: 4th International Conference on Mathematics and Statistics 2009, 13-15 August 2009, Bandar Lampung, Indonesia.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Ismail, Ahmad Faris (2009) Solving linear system of partial differential equations by homotopy-pertubation method. In: 4th International Conference on Research and Education in Mathematics, 21-23 October 2009, Renaissance Hotel, Kuala Lumpur.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Mawa, S. (2007) Homotopy-perturbation method for power-law fin-type problems. In: Asian Symposium on Computer Mathematics, 15 - 17th December 2007, Singapore.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Rahman, M. M. (2012) A reliable modification of the homotopy perturbation method for differential and integral equations. In: 2nd Regional Conference on Applied and Engineering Mathematics (RCAEM-II) 2012, 30-31 May, 2012, Penang, Malaysia.
Chowdhury, Md. Sazzad Hossien and Hashim, Ishak and Rahman, Md. Mahmudur (2011) On the numerical solution of linear stiff IVPs by modified homotopy perturbation method. In: The 7th IMT-GT International Conference on Mathematics, Statistics and its Applications, 21 - 23 July 2011, The Pullman Bangkok King Power Hotel, Thailand.
Chowdhury, Md. Sazzad Hossien and Hassan, Talib Hashim and Ismail, Ahmad Faris (2010) A modified algorithm for the homotopy perturbation method with applications to Lotka-Volterra systems. In: 6th IMT-GT Conference on Mathematics, Statistics and its Applications (ICMSA2010), 3-4 November, 2010, Kuala Lumpur, Malaysia.
Chowdhury, Md. Sazzad Hossien and Rahman, M. M. (2011) An accurate solution to the Lotka-Volterra equations by modified homotopy perturbation method. In: The International Conference on Mathematical and Computational Biology 2011 (ICMCB2011), 12-14 April, 2011, Melaka, malaysia.
Chowdhury, Md. Sazzad Hossien and Rahman, Mahmudur and Muhida, Rifki and Kasai, Hideaki (2010) First principles study on influence of magnetic materials on the dissociative adsorption of oxygen. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.
Chowdhury, Md. Sazzad Hossien and Razali, NurIsnida and Ali, Sellami and Rahman, Mohammad Mustafizur (2013) A new reliable algorithm for analytical treatment of differential and integral equations. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2013), 19-20 February 2010, Kuala Lumpur.
Chowdhury, Md. Sazzad Hossien and Siddiquei, Hasin Reza and Rahman, M. M. and Ismail, A. F. (2010) Homotopy-perturbation method for heat transfer equations. In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur.
Dehaki, Ghazaleh Babanejad and Ibrahim, Hamidah and Sidi, Fatimah and Udzir, Nur Izura and Alwan, Ali Amer (2020) A Rule-based Skyline Computation over a dynamic database. In: The 22nd International Conference on Information Integration and Web-based Applications & Services (iiWAS2020), 30 Nov-2 Dec 2020, Chiang Mai, Thailand.
Dzolkhifli, Zarina and Ibrahim, Hamidah and Sidi, Fatimah and Affendey, Lilly Suriani and Mohd Rum, Siti Nurulain and Alwan, Ali Amer (2019) A skyline query processing approach over interval uncertain data stream with K-means clustering technique. In: The Eleventh International Conference on Advances in Databases, Knowledge, and Data Applications, 2 - 6 June 2019, Athens, Greece.
El Amrani, Mohamed Yassine and Rahman, M. M. and Wahiddin, Mohamed Ridza and Shah, Asadullah (2018) Towards an accurate speaker-independent Holy Quran acoustic model. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017, 29 November- 1 December 2017, AMA International University Salmabad; Bahrain.
Estrada-Vargas, Leopoldo and Toral-Cruz, Homero and Pathan, Al-Sakib Khan (2011) A generator of cauchy-distributed time series with specific Hurst index. In: Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy. (In Press)
Farag, Mohannad and Zainul Azlan, Norsinnira and Alsibai, Mohammed Hayyan (2018) Development of anthropomorphic robotic hand driven by Pneumatic Artificial muscles for robotic applications. In: International Conference on Innovative Technology, Engineering and Sciences 2018, iCITES 2018, 1 - 2 March 2018, Universiti Malaysia Pahang (UMP) Pekan Campus LibraryPekan, Pahang; Malaysia.
Gannarapu, Sainath and Dawoud, Ahmed and Ali, Rasha S. and Alwan, Ali Amer (2021) Bot detection using machine learning algorithms on social media platforms. In: 5th IEEE International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA, 25-27 November 2020, Sydney, Australia.
Ghazali, Masitah and Hussen, Idyawati and Mahmud, Murni and Md. Noor, Nor Laila (2018) Smart city readiness in Malaysia: The role of HCI and UX. In: Asian HCI Symposium'18 on Emerging Research Collection, 21st-26th April 2018, Montreal, QC, Canada.
Ghazali, Masitah and Sivaji, Ashok and Hussein, Idyawati and Lim , Tek Yong and Mahmud, Murni and Md Noor, Nor Laila (2015) HCI practice at MIMOS berhad: A symbiotic collaboration between academia and industry. In: Crossing HCI4D in Asia Pacific: ASEAN CHI Symposium (ACHIS) 2015, 19th April 2015, Seoul, Korea.
Ginanjar, Muhamad Gilang and Lubis, Muharman and Ramadani, Luthfi and Handayani, Dini Oktarina Dwi (2024) Enhancing security and privacy in cloud computing: challenges and solutions in the digital age. In: 2024 3rd International Conference on Creative Communication and Innovative Technology (ICCIT), 7-8 August 2024, Tangerang, Indonesia.
Gulzar, Yonis and Aljuboori, Ali A.Alwan and Abualkishik, Abedallah Zaid and Mehmood, Abid (2020) A model for computing skyline data items in cloud incomplete databases. In: 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020) / 3rd International Conference on Emerging Data and Industry 4.0, (EDI40 2020) /, 6 - 9 Apr 2020, Warsaw, Poland.
Gulzar, Yonis and Aljuboori, Ali A.Alwan and Salleh, Norsaremah and Alshaikhli, Imad Fakhri Taha (2017) Skyline query processing for incomplete data in cloud environment. In: The 6th International Conference on Computing and Informatics, ICOCI 2017, 25th-27th April 2017, Kuala Lumpur.
Gulzar, Yonis and Alwan, Ali Amer and Ibrahim, Hamidah and Xin, Qin (2018) D-SKY: a framework for processing skyline queries in a dynamic and incomplete database. In: 20th International Conference on Information Integration and Web-based Applications & Services (iiWAS2018), 19th-21st November 2018, Yogyakarta, Indonesia. (In Press)
Gündüz, Feyza and Pathan, Al-Sakib Khan (2012) Usability improvements for touch-screen mobile flight booking application: a case study. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), 26-28 November 2012, Kuala Lumpur, Malaysia. (In Press)
Hamdani, Adib and Pankaj, Pankaj (2022) Numerical simulation of axially impacted elastic bar. In: 5th International Conference on Mechanical, Automotive and Aerospace Engineering (ICMAAE 2021), 21-23 June 2021, Kuala Lumpur, Malaysia.
Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Choi, Byung Goo and Hong, Choong Seon (2007) An efficient PKC-based security architecture for wireless sensor networks. In: IEEE Military Communications Conference (IEEE MILCOM 2007), October 23-25, 2006, Orlando, Florida, USA.
Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) S-PkSec: an asymmetric key based security management scheme for sensor network operation. In: KNOM (Korean Network Operations and Management) Conference 2008, April 24-25, 2008, Changwon, Korea.
Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Securing U-Healthcare sensor networks using public key based scheme. In: 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), February 17-20, 2008, Phoenix Park, Korea.
Haque, Md. Mokammel and Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) An efficient public key based security architecture for wireless sensor networks. In: 27th KIPS Spring Conference 2007, 11-12 May 2007, Seongnam, Korea.
Harnum Junaidi, Putri Sakinah Fikriah and Imi, Nur Amira and Zakaria, Noor Azura and Abdul Karim, Ruwinah and Lubis, Muharman and Mat Rejab, Mazidah (2022) Evaluating usability of learning disability assessment system. In: 8th International Conference on Computing, Engineering and Design (ICCED), Sukabumi, Indonesia.
Hasan, Talib Hashim and Chowdhury, Md. Sazzad Hossien (2010) Taylor-newton homotopy method for computing the depth of flow rate for a channel. In: Global Conference on Power Control and Optimization, 2-4 February 2010, Gold Coast, Australia.
Hasan, Talib Hashim and Chowdhury, Md. Sazzad Hossien and Yamamura, Kiyotaka (2010) Taylor -Fixed point homotopy for solving nonlinear algebraic problems. In: International Conference on Mathematical Applications in Engineering (ICMAE’10), 3 - 4 August 2010, Kuala Lumpur, Malaysia.
Hossain, Md Anowar and Elshafiey, Ibrahim and Alkanhal, Majeed A. and Mabrouk, Ahmed Hassan (2011) Adaptive UWB-OFDM synthetic aperture radar. In: The First Saudi International Electronics, Communications and Electronics Conference (SIECPC 2011), 24-26 April 2011 , Riyad, Saudi Arabia.
Hossain, Md Anowar and Elshafiey, Ibrahim and Alkanhal, Majeed A. and Mabrouk, Ahmed Hassan (2011) Anti-jamming capabilities of UWB-OFDM SAR. In: The 8th European radar Conference (EuRAD 2011), 12-14 October 2011, Manchester, United Kingdom .
Hussein, Idyawati and Mahmud, Murni and Md Tap, Abu Osman (2014) HCI knowledge for UX practices in the web development process. In: 3rd International Conference on Design, User Experience, and Usability: User Experience Design for Diverse Interaction Platforms and Environments, DUXU 2014, 22 -27 June 2014, Heraklion, Crete; Greece.
Ibrahim, Maizatul Akma (2021) Quantitative structure-activity relationship (QSAR) study of newly synthesized carbonyl thiourea derivatives on Acanthamoeba sp. In: 7TH INTERNATIONAL CONFERENCE ON ADVANCEMENT IN SCIENCE & TECHNOLOGY (iCAST 2021), Virtual Platform. (Unpublished)
Ibrahim, Mansor and Jahn Kassim, Puteri Shireen and Ali, Maisarah and Abdul Latif, Nurul Syala and Zainal Abidin, Norzalifa (2007) Virtual reality in heritage studies and historical reconstruction through animation – A case study of a 16th century university complex in the Ottoman world. In: 7th International Conference on Construction Applications of Virtual Reality: 0ctober 22-23, 2007, 22-23 Oct 2007, USA.
Imam Ya'U, Badamasi and Nordin, Azlin and Salleh, Norsaremah (2020) Analysis of expert’s opinion on requirements patterns for software product families framework using GQM method. In: 6th International Conference on Computational Science and Technology, ICCST 2019, 29-30 Aug 2019, Kota Kinabalu, Sabah.
Imam Yau'u, Badamasi and Nordin, Azlin and Salleh, Norsaremah (2016) Software requirements patterns and meta model: a strategy for enhancing Requirements Reuse (RR). In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), 22nd-24th November 2016, Jakarta, Indonesia.
Iqbal, Mohammad and Bamatraf, Abdullah Omar Abdullah and Tadjuddin, Muhammad (2018) The study of production performance of water heater manufacturing by using simulation method. In: 2nd International Conference on Nuclear Technologies and Sciences, ICoNETS 2017, 12 -13 October 2017, Makassar; Indonesia.
Islam, Humayun Kadir and Pathan, Al-Sakib Khan (2004) Technological impact on disaster management information system. In: 2nd International Conference on Information and Communication Technology (ICT 2004), Bangkok, Thailand, November 18-19, 2004, Assumption University, Bangkok, Thailand. (Unpublished)
Jamil, Muhammad Abid and Alhindi, Ahmad and Arif, Muhammad and Nour, Mohamed K and Awang Abu Bakar, Normi Sham and Aljabri, Tareq Fahad (2020) Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization. In: 2019 IEEE 6th International Conference on Engineering Technologies and Applied Sciences (ICETAS), 20-21 Dec. 2019, Kuala Lumpur, Malaysia.
Kartia, Felizardo and Salleh, Norsaremah and Rafael, Martins and Mendes, Emilia and MacDonel, Stephen G. and Maldonado, José C. (2011) Using Visual Text Mining to Support the Study Selection in Systematic Literature Reviews. In: 2011 International Symposium on Empirical Software Engineering and Measurement, 22 - 23 September 2011, Banff, Canada.
Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Baba, Asifa Mehraj and Ahmad Lone, Sajad and Zulkurnain, Nurul Fariza (2015) SSM: Secure-Split-Merge data distribution in cloud infrastructure. In: 2015 IEEE Conference on Open Systems (ICOS), 24th–26th Aug. 2015, Melaka.
Khattab, Mahmoud and Zeki, Akram M. and Alwan, Ali Amer and Badawy, Ahmed and Thota, Lalitha (2019) Multi-frame super-resolution: a survey. In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 13-15 December 2018, Madurai, India.
Khowaja, Kamran and Al-Than, Dena and Osman Hassan, Asma and Shah, Asadullah and Salim, Siti Salwah (2020) Mobile augmented reality app for children with autism spectrum disorder (asd) to learn vocabulary (marvoc): From the requirement gathering to its initial evaluation. In: 2nd International Conference on HCI in Games, HCI-Games 2020, 19 - 24 July 2020, Copenhagen, Denmark.
Kindy, Diallo Abdoulaye and Pathan, Al-Sakib Khan (2011) A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques. In: The 15th IEEE Symposium on Consumer Electronics (IEEE ISCE2011), June 14-17, 2011, Singapore.
Kong, Shien Nie and Handayani, Dini Oktarina Dwi and Mun, Hou Kit and Chong, Pei Pei and Mantoro, Teddy (2022) Cervical cancer identification using deep learning approaches. In: 8th International Conference on Computing, Engineering, and Design (ICCED 2022), Sukabumi, Indonesia (Virtual Conference).
Ling, Thong Chee and Alam, Taqbir and Amir Hussin, Amir 'Aatieff (2020) Investigation of the role of individual's gender in the design of graphical user interface for mobile learning device. In: 2nd Joint International Conference on Emerging Computing Technology and Sports, (JICETS 2019), 25th-27th November 2019, Bandung, Indonesia.
Low, Wai Sing and Chow, Li Sze and Solihin, Mahmud Iwan and Handayani, Dini Oktarina Dwi (2024) Diagnosis of COVID-19 on chest X-ray (CXR) images using CNN with transfer learning and integrated stacking ensemble learning. In: 4th Innovative Manufacturing, Mechatronics & Materials Forum 2023 (iM3F 2023), 7th - 8th August 2023, Pekan, Pahang, Malaysia.
MD Ali, Mohd Adli (2023) From tiny-AI to lite-AI in edge computing. In: IEEE Symposium on Wireless Technology & Applications (ISWTA2023), 15-16 August 2023, Kuala Lumpur. (Unpublished)
Mabrouk, Ahmed Abbas and Hassim, Norhidayah (2011) A simplified computational technique for an LSF-based speed decoder. In: 54th IEEE International Midwest Symposium on Circuits and Systems (IEEE MWSCAS 2011), 7-10 August 2011, Seoul, Korea.
Mansor, Nur Farraliza and Shibghatullah, Abdul Samad and Amir Hussin, Amir Aatieff and Chit, Su Mon and Eldabi, Tillal (2020) Multi Agent System (MAS) for bus driver duty reassignment in the event of late for Second Piece of Work (LSPW). In: The 2nd Joint International Conference on Emerging Computing Technology and Sports (JICETS) 2019, 25th-27th November 2019, Bandung, Indonesia.
Mantoro, Teddy and Ayu, Media Anugerah and Azziz, Umran and Muhic, Mithat and AbdulBagi, Moaz and Abubakar, Adamu (2016) VisUN-3D: User navigation with visualized 3D maps for mobile users. In: 2016 International Conference on Informatics and Computing (ICIC), 28 Oct - 29 Oct 2016, Hotel Lombok Raya Jalan Panca Usaha No. 11 Lombok Nusa Tenggara Barat Mataram, Indonesia.
Mantoro, Teddy and Permadi, Didit Dwi and Abubakar, Adamu (2016) Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC), 28-29 Oct. 2016, Hotel Lombok Raya Jalan Panca Usaha No. 11 Lombok Nusa Tenggara Barat Mataram, Indonesia.
Mantoro, Teddy and Shoukat Ali, Haroon (2009) BitTorrent: extra-locality P2P approach for grid content distribution networks. In: The ACM International Symposium Emerging Research Projects, Applications and Services (ERPAS), 14-16 Dec 2009, Kuala Lumpur.
Md. Ali, Mohd. Adli and Ismail, Ahmad Faisal and Nizam, Syafie (2021) INPAINTING OF DENTAL �PANORAMIC TOMOGRAPHY �VIA DEEP LEARNING METHOD. In: 7th International Conference on Advancement in Science & Technology, 24-26 August 2021, Virtual. (Unpublished)
Mior Nazri, Mior Nasir and Noah, Shahrul Azman and Hamid, Zarinah (2010) Using lexical ontology for semi-automatic logical data warehouse design. In: 5th International Conference on Rough Set and Knowledge Technology, RSKT 2010; Beijing; 15 October 2010 through 17 October 2010.
Mohamed, Norshidah and Hussein, Ramlah and Ahlan, Abdul Rahman and Hazza, Zubaidah Muataz (2009) A descriptive analysis of IT adoption in Malaysian small software firms. In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 8-11 August, 2009, Beijing, China.
Mohamed Abdullah, Radhwan and Basher, Radhwan and Alwan Aljuboori, Ali Amer and Abualkishik, Abedallah Zaid (2019) Quantum computers for optimization the performance. In: 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019), 4th-7th November 2019, Coimbra, Portugal.
Mon, Chit Su and Amir Hussin, Amir Aatieff and Sin, Toh Kai (2020) Analyzing the periocular biometric-based access control systems. In: 2nd Joint International Conference on Emerging Computing Technology and Sports (JICETS 2019), 25th-27th November 2019, Bandung, Indonesia.
Monowar, Muhammad Mostafa and Rahman, Md. Obaidur and Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic. In: 2nd International Symposium on Security and Multimodality in Pervasive Environments (SMPE'08) Workshop in conjunction with MobiQuitous 2008, July 21-25, 2008, Trinity College Dublin, Ireland.
Musleh, Iman and Zain, Samer and Nawahdah, Mamoun I. and Salleh, Norsaremah (2018) Automatic generation of android SQLite database components. In: 17th International Conference on New Trends in Intelligent Software Methodology Tools and Techniques, SoMeT 2018, 26 - 28 September 2018, Granada; Spain.
Nordin, Azlin (2012) Analysis of Existing Approaches to Constructing Component-based Systems Directly from Natural Language Requirements. In: The 6th Malaysian Software Engineering Conference (MySec12), 4-5 December 2012, UKM.
Nordin, Azlin and Abdullah, Lili Marziana and Mohamad Fadzil, Farihin Diayana and Roselan, Nor Aqila Syamira (2014) Requirements elicitation and analysis: towards the automation of software project risk management. In: 2014 8th Malaysian Software Engineering Conference (MySEC), 23rd-24th September 2014, Resort World Langkawi, MAlaysia.
Nordin, Azlin and Omar, Amirul Ikhwan and Megat Mohamed Amin, Megat Usaamah (2014) Scenario Management and Requirements Tool (SMaRT). In: International Research, Invention and Innovation Exhibition 2014 (IRIIE2014), 11th -13th June 2014, Cultural Activity Center (CAC), International Islamic University Malaysia. (Unpublished)
Parasapogu, Tejaswi and Seher, Indra and Mohmed Salah, Razwan and Alwan, Ali Amer (2021) DFA taxonomy for the classification of ECG data for effective health monitoring using ML technology. In: The IEEE Conference on Innovative Technologies in Intelligent Systems & Industrial Application 2020 (CITISIA 2020), 25-27 November 2020, Sydney, Australia.
Pathan, Al-Sakib Khan (2011) Energy-efficient secure routing in heavily deployed wireless sensor networks. In: KICT Research Seminar, IIUM, June 22-23, 2011, June 22-23, 2011, KICT Conference Room.
Pathan, Al-Sakib Khan (2010) Introduction to wireless sensor network security. In: BRAC University Seminar series, 17 February, 2010, BRAC University Dhaka Bangladesh. (Unpublished)
Pathan, Al-Sakib Khan and Heo, Gihyuk and Hong, Choong Seon (2007) A secure lightweight approach of node membership verification in Dense HDSN. In: IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, 2007, Orlando, Florida, USA.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards. In: 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), February 17-20, 2008, Phoenix Park, Korea.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Cryptanalysis of improved password authentication scheme with smart cards. In: Korea Computer Congress 2008 (KCC 2008), June 30-July 2, 2008, Phoenix Park, Korea.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) Developing an efficient DMCIS with next-generation wireless networks. In: IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, 2006, Washington, DC, USA.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Feasibility of PKC in resource-constrained wireless sensor networks. In: IEEE International Workshop on Internet and Distributed Computing Systems (IEEE IDCS'08) in conjunction with 11th IEEE ICCIT'08, December 24, 2008, Khulna, Bangladesh.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) Secure clustering in DSN with key predistribution and WCDS. In: IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, 2006, Washington, DC, USA.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) An efficient scheme for secure data transmission in wireless sensor networks. In: 17th Joint Conference on Communication & Information (JCCI 2007), 2-4 May 2007, PyeongChang, Korea.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) An improved timestamp-based password authentication scheme with two-party verification using smart cards. In: The 9th International Conference on Advanced Communication Technology (IEEE ICACT 2007), February 12-14, 2007, Phoenix Park, Korea.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2007) A secure and efficient way of node membership verification in wireless sensor networks. In: 27th KIPS Spring Conference 2007, 11-12 May 2007, Seongnam, Korea.
Pathan, Al-Sakib Khan and Hong, Choong Seon and Lee, Hyung-Woo (2006) Towards developing smart environment using wireless sensor and ad hoc networks. In: International Conference on Computational Science and its Applications 2006, (ICCSA 2006), 8-11 May, 2006, Glasgow, Scotland (UK). (Unpublished)
Pathan, Al-Sakib Khan and Hong, Choong Seon and Suda, Tatsuya (2007) A novel and efficient bilateral remote user authentication scheme using smart cards. In: 2007 IEEE International Conference on Consumer Electronics (IEEE ICCE 2007), January 10-14, 2007, Las Vegas, USA.
Pathan, Al-Sakib Khan and Islam, Humayun Kadir and Sayeed, Sabit Anjum and Ahmed, Farruk and Hong, Choong Seon (2006) A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks. In: First International Conference on Next-Generation Wireless Systems (IEEE ICNEWS 2006), 2-4 January, 2006, Dhaka, Bangladesh.
Purnomo, Muhammad Ridwan Andi and Saleh, Chairul and Lagaida, R.L. and Hassan, Azmi (2013) Knowledge-based genetic algorithm for multidimensional data clustering. In: 1st International Materials, Industrial, and Manufacturing Engineering Conference (MIMEC2013), 4-6 December 2013, Johor Bahru, Johor.
Rasul, Khadija and Nuerie, Nujhat and Pathan, Al-Sakib Khan (2010) An enhanced tree-based key management scheme for secure communication in wireless sensor network. In: 3rd IEEE International Workshop on Internet and Distributed Computing Systems (IDCS'10) in conjunction with the 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), September 01-03, 2010, Melbourne, Australia.
Razali, Nur Iznida and Chowdhury, M. S. H. and Asrar, Waqar (2012) The modified Adomian decomposition method for solving Chaotic Lü system. In: International Conference on Mathematical Application in Engineering (ICMAE 2012), 3-5 July 2012, Kuala Lumpur.
Razali, NurIsnida and Chowdhury, Md. Sazzad Hossien and Asrar, Waqar (2013) Hybrid numeric-analytic method for solving chaotic system. In: IIUM Research, Invention and Innovation Exhibition (IRIIE) 2013, 19-20th February 2013, Cultural Activity Centre (CAC) and KAED Gallery, IIUM.
Riaz, Mehwish and Sulayman, Muhammad and Salleh, Norsaremah and Mendes, Emilia (2010) Experiences conducting systematic reviews from novices' perspective. In: 14th International Conference on Evaluation and Assessment in Software Engineering (EASE), 12-13 April, 2010, Keele University, UK.
Saharudin, Muhammad Aqil Izdihar and Rosli, Muhamad Aizat Nazran and Handayani, Dini Oktarina Dwi and Basri, Atikah Balqis and Mahmod Attar Bashi, Zainab Senan and Suryady, Zeldi (2023) Flood forecasting using weather parameters. In: 2023 IEEE 9th International Conference on Computing, Engineering and Design (ICCED), 7- 8 November 2023, Kuala Lumpur, Malaysia.
Sakib, Md. Sabbir Rahman and Saquib, Nazmus and Pathan, Al-Sakib Khan (2010) A new visual simulation tool for performance evaluation of MANET routing protocols. In: 10th International Conference Algorithms and Architectures for Parallel Processing, ICA3PP 2010; Busan; 21 May 2010 through 23 May 2010.
Salami, Momoh Jimoh Emiyoka and Tijani, Ismaila and Jibia, Abdussamad Umar (2011) Development of real-time software interface for multicomponent transient signal analysis using Labview and Matlab. In: 4th International Conference on Mechatronics (ICOM) , 17-19 May, 2011 , Kuala Lumpur.
Saleh Al-Hussaini, Abulfathi Ibrahim and Abubakar, Adamu (2021) The factors influencing the adoption of bitcoin investment during covid-19. In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT, Online. (Unpublished)
Salleh, Norsaremah and Mendes, Amelia and Grundy, John and Burch, Giles St. J (2009) An empirical study of the effects of personality in pair programming using the five-factor model. In: 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009; Lake Buena Vista, FL; 15 October 2009 through 16 October 2009.
Salleh, Norsaremah and Mendes, Emilia and Grundy, John (2011) The effects of openness to experience on pair programming in a higher education context. In: 2011 24th IEEE-CS Conference on Software Engineering Education and Training, CSEE and T 2011, 22 - 24 May 2011, Waikiki, Honolulu.
Salleh, Norsaremah and Mendes, Emilia and Grundy, John and Burch, Giles St. J (2010) The effects of neuroticism on pair programming: an empirical study in the higher education context. In: 4th International Symposium on Empirical Software Engineering and Measurement (ESEM2010), 15-17 Sept., 2010, Bolzano, Italy.
Salleh, Norsaremah and Mendes, Emilia and Grundy, John and Burch, Giles St. J. (2010) An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model. In: 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010, 1 - 8 May 2010, Cape Town.
Saquib, Nazmus and Sakib, Md. Sabbir Rahman and Pathan, Al-Sakib Khan (2010) Demo abstract: ViSiM, A MANET routing simulation demonstration tool for naive users. In: The 29th IEEE Conference on Computer Communications (IEEE INFOCOM 2010), March 15-19, 2010, San Diego, USA.
Shah, Asadullah and Shaikh, Muniba (2013) 10 c’s of social networking, interconnections and the impact on social networking. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.
Shah, Asadullah and Zeeshan Ahmed, Bhatti (2012) Widget based automated rigging of bipedal character with custom manipulators. In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;, 2 - 4 Dec 2012, Singapore.
Shaklawoon, Omar Saleh and Shafter, Ali Salem and Abuzaraida, Mustafa Ali and Zeki, Akram M. and Attarbashi, Zainab (2024) Monitoring the memorization of the holy Qur'an based on speech recognition and NLP techniques. In: Artificial Intelligence in Sharia and Legal Sciences, Ait Meloul, Morocco.
Sham, Rohana and Amir Hussin, Amir 'Aatieff and Abdamia, Noranita and Mohd Anuar, Marhani (2019) Developing a pollution free environment framework through technology Integration (e-Hailing App). In: 7th AMER International Conference on Quality of Life (AICQOL) 2019, 16th-17th February 2019, Bali, Indonesia.
Shamsudin, Ahmad Faizul and Ibrahim, Jamaludin and Sembok, Tengku Mohd and Noordin, Mohamad Fauzan and Hashim, Jamil and Wan Yusof, Wan Sabri (2013) Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M), 25-27 Mar 2013, Rabat, Moroco.
Sharma, Anil and Al-Dala’in, Thair and Alsadoon, Ghossoon and Alwan, Ali Amer (2021) Use of wearable technologies for analysis of activity recognition for sports. In: The IEEE Conference on Innovative Technologies in Intelligent Systems & Industrial Application 2020 (CITISIA 2020), 25-27 November 2020, Sydney, Australia.
Suhaizad, Farah Nur Atiqah and Burhanudin, Raida Rasyiqa and Nordin, Azlin (2016) Deriving domain specific requirement pattern for Collaborative Meeting and Appointment Scheduler Domain (CMASD). In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), 22nd-24th November 2016, Jakarta, Indonesia.
Suryady, Zeldi and Abdul Rahman, Abdul Wahab and Handayani, Dini Oktarina Dwi (2022) Towards the development of affective recognition using heart sound signal: a proposal. In: 2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED), Sukabumi, Indonesia (Virtual Conference).
Taha, Zahari and Mohd Razman, Mohd Azraai and A. Adnan, Fatihah and Abdul Ghani, Ahmad Shahrizan and P.P. Abdul Majeed, Anwar and Musa, Rabiu Muazu and Sallehudin, Muhammad Firdaus and Mukai, Yukinori (2018) The Identification of hunger behaviour of lates calcarifer through the integration of image processing technique and support vector machine. In: 4th Asia Pacific Conference on Manufacturing Systems and the 3rd International Manufacturing Engineering Conference, APCOMS-iMEC 2017, 7-8 December 2017, Yogyakarta; Indonesia.
Tan, Chin Keng and Yeoh, Kah Ching (2011) A study on the use of measurement software in the preparation of bills of quantities among Malaysian quantity surveying firms. In: 2011 The 9th International Conference on ICT and Knowledge Engineering (ICTKE 2011), 12-13 January 2011, Bangkok, Thailand.
Tan, Hui Theng and Mun, Hou Kit and Handayani, Dini Oktarina Dwi (2023) Machine learning classification model for identifying internet addiction among university students. In: 2nd International Conference on Computer Technologies (ICCTech) 2023, 23rd - 25th February 2023, Kuantan, Malaysia (Hybrid).
Tarmudi, Zamali and Abdullah, Mohd Lazim and Md. Tap, Abu Osman (2009) A new sensitivity analysis approach for fuzzy decision-making model. In: Proceeding of ICORAFSS 2009, 2 - 4 June 2009, The ZON Regency Hotel, Johor bahru.
Wani, Sharyar and Tengku Sembok, Tengku Mohd and Wahiddin, Mohamed Ridza (2018) Constructing a knowledge base for Al-Qur’an utilizing principles of human communication. In: 4th International Conference on Information Retrieval and Knowledge Management (CAMP), 26-28 March 2018, Sabah, Malaysia.
Wei, Xianglin and Ahmed, Tarem and Chen, Ming and Pathan, Al-Sakib Khan (2012) PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA. In: International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA.
Ya'au, Badamasi Imam and Nordin, Azlin and Salleh, Norsaremah and Aliyu, Isma'il (2018) Requirements patterns structure for specifying and reusing software product line requirements. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), 23rd-25th July 2018, Kuala Lumpur.
Yaacob, Hamwira Sakti and Abdul Rahman, Abdul Wahab (2015) Computational model of affective states profiling using commercial 14-channel wireless EEG. In: 28th International Conference on Computer Applications in Industry and Engineering, 12-14 October 2015, San Diego, California, USA.
Yahya, Norzariyah and Maidin, Siti Sarah (2022) The waterfall model with agile scrum as the hybrid agile model for the software engineering team. In: 2022 10th International Conference on Cyber and IT Service Management (CITSM), 20-21 September 2022, Yogyakarta, Indonesia.
Zakaria, Noor Azura and Ibrahim, Suhaimi and Mahrin, Mohd Naz'ri (2016) A proposed value-based software process tailoring framework. In: 2015 9th Malaysian Software Engineering Conference (MySEC), Kuala Lumpur, Malaysia.
Zakaria, Noor Azura and Ibrahim, Suhaimi and Mahrin, Mohd Nazri (2015) Examining value-based factors in software development: A survey study in Malaysian public sector. In: 24th Australasian Software Engineering Conference (ASWEC 2015), 28th October-1st October 2015, Adelaide, SA, Australia.
Zakaria, Noor Azura and Ibrahim, Suhaimi and Mahrin, Mohd Nazri (2017) Using grounded theory approach to identify value-based factors in software development. In: 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 22-24 November 2016, Jakarta, Indonesia.
Zakaria, Noor Azura and Ibrahim, Suhaimi and Mahrin, Mohd Nazri (2016) A proposed value-based software process tailoring framework. In: 9th Malaysian Software Engineering Conference (MySEC) 2015, 16th-17th Dec. 2015, Kuala Lumpur.
Zakaria, Noor Azura and Ibrahim, Suhaimi and Mahrin, Mohd Nazri (2015) The state of the art and issues in software process tailoring. In: 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS), 19th-21s August 2015, Kuantan, Pahang.
Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Jaryani, Farhang and Taherdoost, Hamed and Zeki, Akram M. (2009) A secure audio steganography approach. In: UNSPECIFIED.
Zamani, Mazdak and Abdul Manaf, Azizah and Ahmad, Rabiah and Zeki, Akram M. (2009) An approach to improve the robustness of substitution techniques of audio steganography. In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 8 - 11 August, 2009, Beijing, China.
Zulhuda, Sonny (2015) Developing PDPA-friendly moblie application: key takeaways for mobile apps developers. In: KL Converge! 2015 Talk, 27-29 August 2015, Kuala Lumpur Convention Centre Malaysia. (Unpublished)
Zulkifli, Mohammad and Omar, Ashraf Ali and Asrar, Waqar (2014) Arbitrary Lagrangian-Eulerian Form of Flowfield Dependent Variation (ALE-FDV) Method for 3D Problems. In: 22nd Annual Conference of the CFD Society of Canada, 1-4 Jun 2014, Toronto Canada. (In Press)
Zulkifli, Mohd fadhli and Omar, Ashraf Ali and Asrar, Waqar (2014) Arbitrary lagrangian-eulerian form of flowfield dependent variation method for moving boundary problems. In: Aviation 2014 - 32nd AIAA Applied Aerodynamics Conference 2014, 16 June - 20 June 2014, Atlanta, GA; United States.
d'Auriol, Brian J. and Pathan, Al-Sakib Khan (2007) Embedded processor security. In: 2007 International Conference on Security and Management (SAM'07), June 25-28, 2007, Las Vegas, Nevada, USA.
Monograph
Abdul Aziz, Normaziah and Saidin, Aznan Zuhid and Wahiddin, Mohamed Ridza and Ibrahim, Jamaludin and Ahmad Dahlan, Abdul Rahman and Ahmad H.Osman, Rahmah and M. Ridza, Nadwiyah (2020) Cyber security capability maturity model based on Maqasid A Shari’ah (MS-C2M2). Research Report. UNSPECIFIED. (Unpublished)
Awang Abu Bakar, Normi Sham (2012) The effects of object-oriented coupling and cohesion measures on the quality of open source systems. Research Report. s.n, Kuala Lumpur. (Unpublished)
Jaafar, Samsuddin (2012) The use of non-authoring software for the production of an interactive digital image map. Research Report. s.n, Kuala Lumpur. (Unpublished)
Mohamed Azmin, Nor Fadhillah (2017) Development of Multivariate Model on the Effect of Different Parameters on Synechococcus sp. PCC 7002 Growth. Project Report. UNSPECIFIED. (Unpublished)
Pathan, Al-Sakib Khan (2007) Heterogeneous Distributed Sensor Networks (HDSN). Technical Report. Kyung Hee University, South Korea, South Korea.
Pathan, Al-Sakib Khan (2008) Security attacks and challenges in wireless sensor networks. Technical Report. Kyung Hee University, South Korea, South Korea.
Pathan, Al-Sakib Khan (2008) Security wireless sensor networks: prospects, challenges, and future. Technical Report. Kyung Hee University, South Korea, South Korea.
Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Public key cryptography in resource-constrained WSN. Technical Report. Kyung Hee University, South Korea, South Korea.
Saquib, Nazmus and Sakib, Md. Sabbir Rahman and Pathan, Al-Sakib Khan (2009) ViSim: a user-friendly simulation tool for MANET routing protocols. Technical Report. BRAC University, Dhaka, Bangladesh.
Patent
Pathan, Al-Sakib Khan and Hong, Choong Seon and Haque, Md Mokammel and Heo, Gihyuk (2010) "무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법" (Translated TITLE: Message encryption/ecryption method between sensor nodes in wireless sensor networks). Patent No. 10-0941764, Republic of Korea Intellectual Property Office, 03/02/2010 (Patent : Industry-Academic Cooperation Foundation, Kyung Hee University).