Fakulti

Fakulti

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Imad Fakhri Taha Alyaseen
Professor

  • KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
  • IIUM Gombak Campus
  • imadf@iium.edu.my
  • 5686

Print CV Email Me

Staff Detail


Imad Fakhri Al-Shaikhli, a IEEE senior member, obtained his BSc (Hon) in Mathematics, MSc in Computer Science from Iraq, and Ph.D degree from Pune University, India, 2000. After obtaining his Ph.D, he returned to Iraq and continued teaching and supervising postgraduate students. In 2003, he was appointed as the Head of Department of Computer Information Systems at Alrafidain University College until 2005. Then he joined Gulf University- Bahrain in January 2006 and was appointed as the founding Dean of the College of Computer Engineering and Sciences. During this period, he introduced the CCNA ... show more

  • Computer Science - Doctor of Philosophy, University of Pune
  • Computer Science - Masters Degree, University of Technology, Iraq
  • Mathemathics - Bachelor Degree, Al-Mustansiriya University, Iraq
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography - specialized in cryptography, and cryptanalysis research
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - research on using biometrics as secure and authentic systems
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science -
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Soft Computing - specially in genetic algorithms, neural networks, evolving connectionist systems, and fuzzy logic
  • 2019 - 2019 , DSR
  • 2019 - 2019 , IIUM
  • 2011 - 2019 , Design of Scientific Renaissance
  • 2015 - 2019 , International islamic university Malaysia
  • 2014 - 2019 Senior Member, IEEE
CRYPTOGRAPHY 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 2018/2019 2019/2020
DATA STRUCTURE & ALGORITHM 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016
DATA STRUCTURES AND ALGORITHMS I 2016/2017 2017/2018 2018/2019 2019/2020
FINAL YEAR PROJECT 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015
INDUSTRIAL ATTACHMENT 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018
NEURAL NETWORKS 2010/2011
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2011/2012 2012/2013
In Progress
2016 - Present Development of an Evolving Neuro-Cognitive Computational Model Based on Event-Related Potentials for Healthy Lifestyle Profiling
2016 - Present Analysis of ZUC Cipher in Mobile Communication
2016 - Present Identifying and Profiling children with Learning disabilities using Algorithmic Computational Neuro-Physiological (CNP) Model
2016 - Present Development of an Evolving Neuro-Cognitive Computational Model Based on Event-Related Potentials for Healthy Lifestyle Profiling
2015 - Present An Online Computational Modeling for EcoS Feature Selection in Traffic Volumes Prediction
2008 - Present Intelligent Cyberspace Security
Completed
2016 - 2018 Analysis of ZUC Cipher in Mobile Communication
2015 - 2018 AN EFFICIENT MODEL FOR PROCESSING SKYLINE QUERIES IN INCOMPLETE AND UNCERTAIN DATABASES
2014 - 2016 Computational Modeling for Analyzing the Effect of Quranic Recitations on Human Emotions
2014 - 2016 Anti-Malware for Mobilephones
2014 - 2017 Test Automation Model for Conformance of Mobile Applications Life Cycle
2013 - 2016 Visualization of Emotional Dynamic on Brain Topology using Neural Inspired Computational Model
2013 - 2017 Regulated Splicing Systems and Formal Models for Food Authentication
2013 - 2017 New Algorithm for Realtime OLAP Scheme over Multicore Distributed Processing to Serve Warehouse Data Mining
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2011 - 2013 RU 2011: Block Ciphers: Analysis and Design
2010 - 2012 The use of Digital Watermarking to protect Quran & Sunna
24 Julai 2019 IIUM Takrim Day-highest no. of publications. honorabl Rector - University level.
23 Julai 2018 Top 250 contributors to IIUM's MyRA performance. IIUM RECTOR - University level.
19 Januari 2015 appreciation. Dean, KICT - University level.
21 Disember 2014 best paper award. international conference on computer assisted system in health 2014 - International level.
12 Jun 2014 Silver Medal for a poster at IRIIE 2014. IIUM - International level.
31 Disember 2013 best library partner- 2013. IIUM Library - University level.
27 Jun 2012 best teacher award. KICT - University level.
22 Februari 2012 IRIIE 2012. IIUM - University level.
Article
2019 Emerging solutions in big data and cloud technologies for mobile networks. Mobile Networks and Applications , 24 (3) pp.1015-1017
2019 Identifying skylines in cloud databases with incomplete data. Journal of Information and Communication Technology , 18 (1) pp.19-34
2019 A special issue on disruptive technologies: shaping the future of the industry. Journal of Computational and Theoretical Nanoscience , 16 (3) pp.799-799(1)
2019 Editorial: mobile networks in the era of big data. Mobile Networks and Applications , 24 (4) pp.1135-1138
2019 Neural network and principle component analysis based numerical data analysis for stock market prediction with machine learning techniques. Journal of Computational and Theoretical Nanoscience , 16 (3) pp.806-812
2018 Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal. International Journal of Engineering & Technology , 7 (2 (Special Issue 34)) pp.34-38
2018 Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems pp.1-17
2018 The influence of internet and social media on purchasing decisions in Kuwait. Indonesian Journal of Electrical Engineering and Computer Science , 10 (2) pp.792-797
2018 A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC) , 4 (1) pp.1-6
2018 On randomness of compressed data using non-parametric randomness tests. Bulletin of Electrical Engineering and Informatics , 7 (1) pp.63-69
2018 Implementation of dynamic fuzzy logic control of traffic light with accident detection and action system using iTraffic simulation Simulation. Indonesian Journal of Electrical Engineering and Computer Science , 10 (1) pp.100-109
2018 Multi-level of feature extraction and classification for X-Ray medical image. Indonesian Journal of Electrical Engineering and Computer Science , 10 (1) pp.154-167
2018 Technical approach in text mining for stock market prediction: a systematic review. Indonesian Journal of Electrical Engineering and Computer Science , 10 (2) pp.770-777
2018 Analysis the components of SNOW 3G and ZUC ciphers in mobile systems. International Journal of Engineering & Technology , 7 (4.15) pp.519-523
2018 Improving the cost factor of DLBCA lightweight block cipher algorithm. Indonesian Journal of Electrical Engineering and Computer Science , 10 (2) pp.786-791
2018 Detection and restoration of cracked digitized paintings and manuscripts using image processing. International Journal of Engineering & Technology , 7 (2.34) pp.39-43
2018 A model for skyline query processing in a partially complete database. Advanced Science Letters , 24 (2) pp.1339-1343
2018 A novel secret key generation based on image link. International Journal of Engineering and Technology , 7 (2.5) pp.23-26
2018 A scientific review of soft-computing techniques and methods for stock market prediction. International Journal of Engineering and Technology , 7 (2.5) pp.27-31
2017 A comparative performance analysis of modified Dӧmӧsi’s cryptosystem and data encryption standard. International Journal on Perceptive and Cognitive Computing (IJPCC) , 3 (1) pp.11-14
2017 Analyzing brainwaves while listening to Quranic recitation compared with listening to music based on EEG signals. International Journal on Perceptive and Cognitive Computing (IJPCC) , 3 (1) pp.1-5
2017 A symmetric cryptosystem based on nondeterministic finite automata. Journal of Theoretical and Applied Information Technology ( JATIT ) , 95 (6) pp.1489-1498
2017 Input significance analysis: feature ranking through synaptic weights manipulation for ANNS-based classifiers. Journal of Fundamental and Applied Sciences , 9 (4S) pp.639-662
2017 Processing skyline queries in incomplete database: issues, challenges and future trends. Journal of Computer Science , 13 (11) pp.590-601
2017 Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control , 90 (7) pp.1-29
2017 The influence of internet and social media on purchasing decisions in Egypt and a comparison between Egypt and Kuwait. International Journal of Computer Applications , 178 (5) pp.26-32
2017 A web and software-based approach blending social networks for online Qur'anic Arabic learning. The International Arab Journal of Information Technology , 14 (1) pp.80-90
2017 Detection and restoration of cracked digitized paintings and manuscripts using image processing - a survey. International Journal on Perceptive and Cognitive Computing , 3 (2) pp.1-6
2017 Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier. Journal of Fundamental and Applied Sciences , 9 (4S) pp.681-709
2016 An overview of cryptosystems based on finite automata. Journal of Advanced Review on Scientific Research , 27 (1) pp.1-7
2016 Lightweight block cipher algorithms: review paper. International Journal of Enhanced Research in Science, Technology & Engineering , 5 (5) pp.136-143
2016 Performance and security improvements of Dӧmӧsi’s cryptosystem. International Journal of Applied Mathematics and Statistics , 55 (2) pp.32-45
2016 Data recovery and business continuity in cloud computing: a review of the research literature. International Journal of Advancements in Computing Technology(IJACT) , 8 (5) pp.80-94
2016 Emotion detection using physiological signals EEG & ECG. International Journal of Advancements in Computing Technology (IJACT) , 8 (3) pp.103-112
2016 Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems. International Journal on Perceptive and Cognitive Computing , 2 pp.12-16
2016 Security and performance analysis of SCDSP. International Journal on Perceptive and Cognitive Computing (IJPCC) , 2 (1) pp.27-33
2016 A framework for evaluating skyline queries over incomplete data. Procedia Computer Science , 94 pp.191-198
2016 A new block cipher based on finite automata systems. International Journal on Perceptive and Cognitive Computing (IJPCC) , 2 (1) pp.23-26
2015 SCDSP: a novel stream cipher with dynamic structure and parameters. International Journal of Advancements in Computing Technology (IJACT) , 7 (5) pp.49-56
2015 A new design of cryptographic hash function: gear . International Journal on Perceptive and Cognitive Computing (IJPCC) , 1 (1) pp.29-34
2015 An adequate approach to image retrieval based on local level feature extraction . Mehran University Research Journal of Engineering & Technology , 34 (4) pp.337-348
2015 A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC) , 1 (1) pp.29-34
2015 CERT team involving GEs structured. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences , 3 (3) pp.12-26
2015 CERT Technologies. International Journal of Innovation in Science and Mathematics , 3 (6) pp.275-282
2015 Blogging: a new platform for spreading rumors!. CCIT Journal , 9 (1) pp.71-76
2014 Kuwait government entities e-business continuity and disaster recovery plan. Journal of Advanced Computer Science and Technology Research (JACSTR) , 4 (3) pp.62-75
2014 Key-dependent s-box in lightweight block ciphers. Journal of Theoretical and Applied Information Technology , 62 (2) pp.554-559
2014 Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications , 5 (7) pp.7-10
2013 EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences , 97 pp.30-37
2013 Comparative study between traffic control methods Using simulation software . International Journal of Machine Learning and Computing (IJMLC) , 3 (5) pp.424-429
2013 Emotion recognition model using source-temporal features and fuzzy. Lecture Notes in Computer Science (LNCS) , 8226 (1) pp.577-584
2013 The ethical dilemma of software piracy: an inquiry from an Islamic perspective. Creative Communication and Information Technology , 7 (1) pp.59-76
2013 Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI) , 10 (4) pp.239-246
2013 MOIM: a novel design of cryptographic hash function. International Journal of Computer Engineering & Technology (IJECT) , 4 (4) pp.1-19
2013 Affective computing model using source-temporal domain. Procedia - Social and Behavioral Sciences , 97 pp.54-62
2013 Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology , 2 (2) pp.1-12
2013 Evaluation of usability problems of labor portal in Saudi Arabia. International Journal of Advanced Computer Science and Information Technology , 2 (1) pp.14-25
2013 A new algorithm for human face detection using skin color tone. IOSR-Journal of Computer Engineering , 11 (6) pp.31-38
2013 Achieving security by combining Huffman and SLSB algorithms. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (4) pp.163-172
2012 Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR) , 2 (1) pp.22-34
2012 Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR) , 2 (4) pp.159-165
2012 Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences , 3 (7) pp.1093-1102
2012 Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR) , 2 (3) pp.127-139
2012 Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR) , 2 (3) pp.116-126
2012 Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR) , 2 (2) pp.79-90
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences , 27 pp.233-240
2011 An improved genetic algorithm for solving the multiprocessor scheduling problem. Australian Journal of Basic and Applied Sciences
2011 Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR) , 1 (1) pp.36-51
2011 A practical method for the analysis of genetic algorithms. Journal of Advanced Computer Science and Technology Research(JACSTR) , 1 ( ) pp.1-9
2006 New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18) pp.81-101
2006 Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College , 8 (19) pp.87-98
2006 Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College , 8 (19) pp.217-232
2004 Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq , 7 (15) pp.51-60

Conference or Workshop Item

2018 Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 Scientific research in view of Quran and the creation of Allah s.w.t.. In: International Conference on Computer Assisted Systems in Health (CASH 2018)
2018 Structure of research proposal. In: Postgraduate Development Program (Package 2)
2018 Scientific research in view of Quran and the creation of Allah s w t. In: Seminar of Information Retrieval and knowledge management SIRKM 2018
2018 Disaster recovery in single-cloud and multi-cloud environments: Issues and challenges. In: The 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2017 Analysis of confidentiality algorithms in different mobile generations. In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17)
2017 Skyline query processing for incomplete data in cloud environment. In: The 6th International Conference on Computing and Informatics, ICOCI 2017
2017 A practical and interactive web-based software for online Qur’anic Arabic learning. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 A performance improvement of Dömösi’s cryptosystem. In: Progress in Applied Mathematics in Science and Engineering 2015
2016 Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
2016 Automatic emotion recognition based on EEG and ECG signals while listening to quranic recitation compared with listening to music. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 A practical and interactive web-based software for online Qur'anic Arabic learning. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2016 EEG-based emotion recognition while listening to Quran recitation compared with relaxing music using Valence-arousal model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies
2016 Statistical analysis of the eSTREAM competition winners. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Statistical approach for a complex emotion recognition based on EEG features. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Mobile technology generations and cryptographic algorithms: analysis study. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Computational properties of Watson-Crick context-free grammars. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2015 A performance improvement of Domosi’s cryptosystem . In: 2015 Progress in Applied Mathematics in Science and Engineering (PIAMSE)
2015 Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor. In: 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015
2014 A survey of intrusion detection system using case study Kuwait governments entiteis. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference
2014 Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Brain & heart from computer science perspective. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
2014 OLBCA: a new lightweight block cipher algorithm. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
2014 Security risk analysis used by Kuwait government sectors . In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
2014 Cyber-attacks detection & protection in Kuwait government sectors. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
2014 Design and analysis of a new hash function gear. In: 7th International Conference on Security of Information and Networks (SIN'14)
2014 A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 HISEC: a new lightweight block cipher algorithm. In: The 7th International Conference on Security of Information and Networks (SIN'14)
2014 Dynamic linear feedback shift registers: a review. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Feature ranking through weights manipulations for artificial neural networks-based classifiers. In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014)
2014 A study on the effects of EEG and ECG signals while listening to Qur'an recitation. In: 2014 the 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014
2014 A cognitive-affective measurement model based on the 12-point affective circumplex. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
2014 A study on the effects of EEG and ECG signals while listening to Qur’an recitation. In: 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 CMAC-based computational model of affects (CCMA) for profiling emotion from EEG signals. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2013 A new fragile digital watermarking technique for a PDF digital Holy Quran. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 Protection of the digital Holy Quran hash digest by using cryptography algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Improving the security of LBlock lightweight algorithm using bit permutation. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Improving PRESENT lightweight algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Joux multicollisions attack in sponge construction. In: 6th International Conference on Security of Information and Networks
2013 Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
2013 SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World
2013 Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia. In: 5th International Conference on Information and Communication Technology for the Muslim World
2013 Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
2013 Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2012 Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012
2012 Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim)
2012 Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies
2012 Quality evaluation of “safeer” portal for Saudi students studying abroad . In: International Conference on Advanced Computer Science Applications and Technologies
2012 Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies
2012 An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012
2012 An improved full search block matching algorithm for imaging applications. In: International Conference on Computer and Communication Engineering (ICCCE 2012)
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)
1999 A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99

Book

2017 Protection of the digital holy Quran using IT techniques. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-789-7
2017 Effectiveness and performance of e-government in Saudi Arabia. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-680-7
2017 Enhancement of lightweight block cipher algorithms. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-695-1
2017 Dynamic fuzzy logic traffic light integrated system with accident detection and action. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-673-9
2017 Minimum capabilities and requirements for establishing a national cert for AGC. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-682-1

Book Section

2015 Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security IGI Global . ISBN 978-1-4666-6583-5 , pp.80-94
2011 Storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.127-134
2011 RIPEMD and Chameleon hash function. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.89-96
2011 Basic disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.135-140
2011 Disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.141-146
2011 Cascade style sheets. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.147-155
2011 Rivest-Shamir-Adleman (RSA). In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.99-105
2011 Image editing. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.157-164
2011 Image effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.165-172
2011 Image tool function. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.173-179
2011 Cryptanalysis of RSA. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.107-112
2011 Image clone 1. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.181-191
2011 Image clone 2. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.193-197
2011 Digital signature algorithm. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.113-115
2011 Image and special effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.199-204
2011 Basic text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.205-212
2011 Text animation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.213-219
2011 Background of zero-knowledge proof. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.117-120
2011 Text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.221-226
2011 Image filtering. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.227-232
2011 Interactive proof systems. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.121-126
2011 Image quality improvement. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.233-239
2011 Zero-knowledge-proof. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.127-132
2011 Feige-Fiat-Shamir identification scheme. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.133-138
2011 Introduction. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.3-9
2011 Shamir’s threshold scheme. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.147-150
2011 Blakely’s secret sharing scheme. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.151-154
2011 Monoalphabetic substitution cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.11-16
2011 The use of genetic algorithm in autonomous robot navigation . In: Computer applications: theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.3-13
2011 In-silico drug target design & its approaches . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.15-26
2011 Implementing DNA sequence using genetic algorithm. In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.27-36
2011 Machine based cryptography. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.25-30
2011 Polyalphabetic substitution cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.17-23
2011 Introduction. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.141-146
2011 Block and stream cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.33-38
2011 Molecular docking . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.37-44
2011 The use of genetic algorithm in improving medical image segmentation techniques . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.45-55
2011 Data Encryption Standard (DES). In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.39-46
2011 Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.59-69
2011 Internal structure of computer systems. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.1-8
2011 Developed system for Quran protection using MD5 and Base64 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.71-84
2011 Interfaces and protocols. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.9-16
2011 Protection mechanisms using LSB and MD5 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.85-98
2011 Advanced Encryption Standard (AES). In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.47-52
2011 Firmware program. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.17-22
2011 Developed system for Quran protection using LSB replacement and MD5 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.99-109
2011 Graphical user interfaces. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.23-30
2011 Short cut and hard drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.31-38
2011 Windows explorer. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.39-46
2011 Folder and directory. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.47-53
2011 Trivium and Rabbit stream cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.53-61
2011 Folder operations. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.55-63
2011 Control panel and screen savers. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.65-72
2011 The study of multicast listener discovery. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.27-31
2011 Basic operating system setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.81-86
2011 Introduction. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.65-72
2011 MIPV6 based approaches for mobility management. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.32-35
2011 Hardware configuration. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.73-79
2011 Windows installation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.87-98
2011 Message Digest (MDx) family. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.73-80
2011 Network security setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.99-106
2011 Task scheduling. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.107-112
2011 SHA family hash function. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.81-87
2011 Basic storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.113-118
2011 Logical drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.119-125
2011 Qualitative study of mobility management approaches. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.48-52