Staff Directory
Academic Qualification
- Information and Communication Technology - Doctor of Philosophy, International Islamic University Malaysia
- Computer Science - Masters Degree, Bayero University
- Computer Science - Post Graduate Diploma, Bayero University
- Bsc - Bachelor Degree,
Adamu Abubakar Ibrahim (Assoc. Prof. Dr.)
Associate Professor
IIUM Gombak Campus
KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
adamu@iium.edu.my
6433
Expert Profile
Adamu Abubakar Ibrahim is currently an "Associate Professor" in the department of computer science International Islamic University Malaysia (IIUM). Dr Adamu is working in many areas of Computer Applications with emphasis to Computer Network and Computer Network Security, Artificial Intelligence, Blockchain and 3D Graphics.
Area of Specialisation
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Data Hiding and Steganography
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture and Biometrics)
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Malware, Worms and Viruses
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Intrusion Detection System
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Hacking
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Firewalls
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Digital Signatures
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Multimedia ~ Computer Graphics and Animations
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Machine Learning
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Ethernet Technology
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Open System Interconnecting (OSI) Model
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Communication ~ Routers Technology
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Encryption
Professional Membership
- 2014 - 2020: Member of Profesional Body / Association: (Member), Institute of Electrical and Electronics Engineers (IEEE)
Teaching Responsibilities
COMPUTER MEDIATED COMMUNICATION | 2019/2020 2018/2019 2017/2018 |
COMPUTER NETWORKING | 2024/2025 2023/2024 2022/2023 2021/2022 2020/2021 2019/2020 2018/2019 2017/2018 2016/2017 |
DATA COMMUNICATION IN BUSINESS | 2015/2016 2012/2013 |
DATA MANAGEMENT | 2016/2017 |
DATA STRUCTURE & ALGORITHM | 2014/2015 |
DATA STRUCTURED & ALGORITHM | 2014/2015 |
FINAL YEAR PROJECT | 2018/2019 2017/2018 2016/2017 |
FINAL YEAR PROJECT I | 2017/2018 2015/2016 2014/2015 |
FINAL YEAR PROJECT II | 2019/2020 2017/2018 2015/2016 2014/2015 |
FOUNDATION OF QUANTITATIVE ANALYSIS | 2015/2016 |
INDUSTRIAL ATTACHMENT | 2017/2018 2016/2017 2015/2016 2014/2015 |
INFORMATION RESOURCE AND STRATEGY MANAGEMENT | 2014/2015 2013/2014 |
INFORMATION RETRIEVAL TECHNOLOGIES | 2015/2016 2014/2015 2013/2014 |
MANAGEMENT INFORMATION SYSTEM | 2014/2015 |
OPERATING SYSTEM | 2016/2017 |
OPERATING SYSTEM | 2014/2015 |
WEB PROGRAMMING II | 2012/2013 2011/2012 |
Supervision
The Factors Influencing The Adoption Of Bitcoin In E-Commerce.
Ph.D
Completed
2022
Main Supervisor
|
Word Sense Disambiguation To Enhanced Natural Language Questions For Pilgrims.
Ph.D
Completed
2022
Co-supervisor
|
An Optimized Medical Images Watermarking Technique Utilizing A Constant Ratio Of Frequency Domain.
Ph.D
Completed
2022
Co-supervisor
|
A Model For A Shariah-Compliant Cryptocurrency Adoption.
Ph.D
Completed
2021
Supervisor Supervisory Committee
|
Prediction Of Sepsis Using Artificial Neural Network And Optimal Brain Surgeon
.
Ph.D
Completed
2021
Main Supervisor
|
Towards Automatic Mind Maps Generation Of The Holy Quran: The Case Study Of Surat Al-Baqarah.
Ph.D
Completed
2021
Co-supervisor
|
Performance Optimization Of Wireless Sensor Networks For Multimedia Services Using Priority Schemes.
Ph.D
Completed
2020
Member Supervisory Committee
|
Interoperability-Based Standards For Sensor Enhanced Health Information Systems
.
Ph.D
Completed
2020
Main Supervisor
|
Shifted Completely Connected Network (Sccn): Architecture Of Hierarchical Interconnection Network To Improve The Performance Of Massively Parallel Computer Systems.
Ph.D
Completed
2020
Main Supervisor
|
Modelling Effective Utilization Of Ict Resources And Ict Capabilities In Saudi Arabia'S Institution Of Higher Learning.
Ph.D
Completed
2019
Main Supervisor
|
The Distributed System'S Impact On Bitcoin'S Changing Transaction Network.
Ph.D
In Progress
Main Supervisor
|
Modeling Freescale Non-Communicable Disease Networked Agent-Based Context.
Ph.D
In Progress
Main Supervisor
|
Structuring Large Volume Hetero Geneity In Big Data.
Ph.D
In Progress
Main Supervisor
|
The Key Criteria For Networked System-State Of Implementation Of Egovernment In Afghanistan.
Ph.D
In Progress
Main Supervisor
|
Multimodal Event Detection In Social Media Using Ensemble Learning.
Ph.D
In Progress
Co-supervisor
|
SmeāS Digital Transformation Towards Effective Utilization Of Internet Broadband.
Ph.D
In Progress
Co-supervisor
|
Proposing Nlp Algorithms For Shariah Screening Platform (Sharsp)
.
Master
Completed
2024
Co-supervisor
|
Examining The Impact Of Digitally-Enable Service Delivery Of Agricultural Products And Proposing A Business Model For Fama.
Master
Completed
2023
Main Supervisor
|
Trust Based Security Model For Cloud Systems In An Organization.
Master
Completed
2021
Main Supervisor
|
The Key Cretera For Implementation Of E-Goverment In Afghanistan.
Master
Completed
2021
Main Supervisor
|
Examining The Factors Influencing The Success Of Mobile Money In Afghanistan.
Master
Completed
2021
Main Supervisor
|
The Use Of Robots In Food Industries That Lead To Job Loss..
Master
Completed
2021
Main Supervisor
|
Examining The Behavior And Performance Of Sdn-Enabled Vlan In Switch Network.
Master
Completed
2019
Main Supervisor
|
Electrocardiogram Attribute Extraction Using Big Data Analytics.
Master
Completed
2018
Main Supervisor
|
The Task Oriented Data Packet Transmission For End-To-End Iot Networking.
Master
Completed
2018
Main Supervisor
|
A Centralized, Multi -Nodal Communication Model Associated With Congested Network Environments.
Master
Completed
2017
Main Supervisor
|
Blockchain-Based Model For Deep Packet Inspection System.
Master
In Progress
Main Supervisor
|
Research Projects
Completed
2018 - 2023 | Novel Over-sampling Methods for Classification of Quranic Topics |
2016 - 2019 | A Structured Large Data Volume Heterogeneity with Minimal Incompleteness in a Big Data Analytics |
2015 - 2019 | A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems |
2015 - 2018 | An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment |
2014 - 2019 | User Awareness on the Authenticity of Mobile Quran |
2013 - 2016 | Subjective Assessment Model of the Quranic Audio Watermarking |
On-Going
2022 - Present | Blockchain-based Model for Deep Packet Inspection System |
2017 - Present | A semantic framework remodeling on GPS mobile outdoor navigation for blind pedestrians |
Award & Recognition
31 Oct, 2020 | Best Paper Award - Universiti Putra Malaysia (UPM) | National |
06 May, 2020 | CCNA v7 Bridging Course Cisco - MDEC | National |
07 Feb, 2020 | CCNA Cyber Ops Instructor Training Course - UMP | National |
01 Nov, 2019 | CCENT 1: Routing & Switching: Train the Trainer Program - UNIKL | National |
04 Sep, 2019 | CCENT 1 ITN: Train the Trainer Program - UNIKL | National |
26 Jul, 2019 | Oracle Database Design & Programming with SQL: Premier-Pride Challenge 2019 - MDEC | National |
19 Jul, 2019 | Oracle Java Fundamentals & Java Programming: Premier-Pride Challenge 2019 - MDEC | National |
17 Nov, 2017 | Special Recognition Award - KICT | University |
Publications
Article
Conference or Workshop Item
2024 | A systematic literature review on digital forensic investigation on android devices. In: 2nd International Conference on Machine Learning and Data Engineering (ICMLDE 2023), |
2023 | Exploring blockchain for KYC: deepening client understanding. In: 2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE), |
2023 | Feature selection using generalized linear model for Machine Learning-based sepsis prediction. In: International Conference on Advances in Intelligent Computing and Applications (AICAPS), |
2022 | Islamic Smart City innovation, concept, application and Shari’ah parameters: a theoretical assessment and technological advancement in Artificial Intelligence. In: Ahlia University Conference on Business and Technology, |
2021 | A framework for adopting blockchain technology in medical health records in Nigeria. In: ICT4M, |
2021 | Analysis of watermarking techniques with wavelet and cosine transform for imperceptibility on image. In: 18th International Multi-Conference on Systems, Signals & Devices (SSD) 2021, |
2021 | Bitcoin Adoption in Banking and Finance: The Critical Factors of its Implementation. In: International Conference on Innovative Research in Engineering and Technology (ICIRET-2021), |
2021 | Imperceptibility Analysis for Watermarking Technique Based on Image Block Division Scheme. In: 18th IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2021, |
2021 | The factors influencing the adoption of bitcoin investment during covid-19. In: International Conference on Computing and Technological Solutions with Artificial Intelligence (ICCTSAI 2021) International Islamic University Malaysia THE FACTORS INFLUENCING THE ADOPTION OF BITCOIN INVESTMENT, |
2020 | Analyzing DWT and IWT Techniques for Fitness Evaluation in Watermarking Technique Imperceptibility Performance for Medical Images. In: The 1st International Conference of Science and Technology toward New Normal Era, |
2020 | Real-time video traffic communication over the Internet Protocol (IP) Network. In: 2020 International Conference on Communications, Information System and Computer Engineeringļ¼CISCE 2020), |
2019 | Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015), |
2019 | Hybrid of swarm intelligent algorithms in medical applications. In: The Second International Conference on Advanced Data and Information Engineering (DaEng-2015), |
2019 | Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective. In: Computer Vision Conference (CVC) 2019, |
2018 | An improved chaotic image encryption algorithm. In: 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018, |
2018 | Cloud computing platforms for delivering computer science and mathematics instructional course content to learners. In: 3rd IEEE International Conference on Electro-Technology for National Development, NIGERCON 2017, |
2018 | Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017), |
2018 | MapReduce a comprehensive review. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE 2018), |
2018 | Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018), |
2018 | Window size and round-trip-time in a network transmission session. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M), |
2017 | Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017), |
2017 | The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering, |
2016 | An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015, |
2016 | Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals. In: 12th International Conference on Computing and Information Technology (IC2 IT), |
2016 | Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC), |
2016 | TCP Skudai: A high performance TCP variant for Collaborative Virtual Environment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016), |
2016 | The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015), |
2016 | User awareness in the authenticity of mobile Quran apps. In: Simposium Kebangsaan Sistem Autentikasi Al-Quran dan Al-Hadith (SAHIH 2016), |
2016 | VisUN-3D: User navigation with visualized 3D maps for mobile users. In: 2016 International Conference on Informatics and Computing (ICIC), |
2015 | A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015), |
2015 | A novel algorithm to detect a QPSK signal with the minimum number of samples. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014), |
2015 | A review of the applications of bio-inspired flower pollination algorithm. In: 2015 International Conference on Soft Computing and Software Engineering (SCSE'15), |
2015 | An ensemble CRT, RVFLN, SVM method for estimating Propane Spot Price. In: Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014), |
2015 | An evaluation of mobile Quran apps. In: CHIuXiD 2015 Conference, ACM In Coop International Conference in HCI and UX, Bandung, 8-10 April 2015, |
2015 | Comparing performances of neural network models built through transformed and original data. In: International Conference on Computer, Communications, and Control Technology (I4CT), 2015, |
2015 | Mobile Quran app security vulnerabilities. In: 5th International Conference on Computing and Informatics, ICOCI 2015, |
2014 | An empirical study of customers’ adoption of mobile money transfer services in Somaliland. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014), |
2014 | Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT), |
2014 | Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014), |
2014 | Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2014 | Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014), |
2014 | Investigating the act of deception in online-Islamic content. In: 2014 3rd International Conference on User Science and Engineering (i-USEr), |
2014 | Modified neural network activation function. In: 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology (ICAIET 2014), |
2014 | Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices. In: CF '14 Proceedings of the 11th ACM Conference on Computing Frontiers, |
2014 | Orthogonal wavelet support vector machine for predicting crude oil prices. In: 1st International Conference on Advanced Data and Information Engineering (DaEng 2013), |
2014 | Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), |
2014 | RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), |
2014 | Text normalization algorithm for facebook chats in Hausa language. In: Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference on, |
2014 | Throughput analysis of TCP congestion control algorithms in a cloud based collaborative virtual environment. In: 2014 First International Conference on Systems Informatics, Modelling and Simulation, |
2013 | 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), |
2013 | Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013), |
2013 | Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), |
2013 | Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA), |
2013 | Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), |
Empirical investigation on the barriers of adoption of cryptocurrency-based transaction from an Islamic perspective. In: 8th International Conference on Information and Communication Technology for the Muslim World, |
Book Section
2019 | A framework for non-contact ECG signal detection device on smart chair and its implementation. In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 639-646 |
2019 | A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption. In: Springer Verlag, ISBN: 978-3-319-69889-2, pp. 1-20 |
2019 | Bio-inspired algorithm optimization of neural network for the prediction of Dubai crude oil price. In: Springer Nature Singapore, ISBN: 978-3-030-17794-2, pp. 151-162 |
2019 | Estimation of Middle-East oil consumption using hybrid meta-heuristic algorithms. In: Springer Nature Singapore, ISBN: 978-981-13-1797-2, pp. 139-150 |
2019 | Visualizing pathway on 3D maps for an interactive user navigation in mobile devices. In: IGI Global, ISBN: 978-1522556930, pp. 237-260 |
2018 | A new static cost-effective parameter for interconnection networks of massively parallel computer systems. In: Springer Nature, ISBN: 978-981-13-0513-9 / 978-981-13-0514-6, pp. 147-155 |
2015 | Fundamentals of computer networks: wired/wireless. In: IIUM Press, ISBN: 9789674183134, pp. 1-15 |
2015 | Fundamentals of multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 1-23 |
2015 | Multimedia security and the internet. In: IIUM Press, ISBN: 9789674183134, pp. 48-62 |
2015 | Practices of handling audio. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 126-138 |
2015 | Spread spectrum audio watermarking using vector space projections. In: Springer International Publishing, ISBN: 978-3-319-11218-3, pp. 297-307 |
2015 | Text in multimedia. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 64-72 |
2015 | Video. In: IIUM Press, ISBN: 978-967-418-312-7, pp. 139-148 |
2014 | Kernel functions for the support vector machine: comparing performances on crude oil price data. In: Springer International Publishing, ISBN: 9783319076911, pp. 273-281 |
2014 | Usability evaluation of hospital websites in Nigeria: what affects end users’ preferences?. In: Springer International Publishing, ISBN: 978-3-319-07853-3 (P), 978-3-319-07854-0 (O), pp. 430-434 |
2013 | A framework for selecting the optimal technique suitable for application in a data mining task . In: SpringerLink, ISBN: 978-3-642-40860-1 (P), 978-3-642-40861-8 (O), pp. 163-169 |
2011 | Web application development process. In: IIUM Press, ISBN: 978-967-418-112-3, pp. 189-197 |
Monograph
2017 | Final Report RAGS14-051-0114- User Awareness on the authenticity of mobile Quran. In: , |