Faculties

Faculties

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Mohamed Ridza Wahiddin
Professor

  • KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
  • IIUM Gombak Campus
  • mridza@iium.edu.my
  • 5658

Print CV Email Me

Staff Detail


Mohamed Ridza bin Wahiddin obtained his BSc (Hon), MSc and PhD degrees from UMIST, U.K. in physics. Upon completion of his PhD he returned to Malaysia in August 1989 and took up a lecturer's position at the University of Malaya. For his outstanding pioneering work in quantum optics in Malaysia he is the recipient of the 1994 National Young Scientist Award by the Malaysian Ministry of Science, Technology & Environment. He was the Vice-President of the Malaysian Mathematical Society for the period 1997-1999. On the 10th December 2004 UMIST awarded him the higher doctorate degree of Doctor of ... show more

  • Diploma in Islamic Studies - Diploma, International Islamic University Malaysia
  • Doctor of Philosophy in Theoretical Physics - Doctor of Philosophy, University of Manchester Institute of Science and Technology (UMIST)
  • Masters of Science (Theorical Physics) - Masters Degree, University of Manchester Institute of Science and Technology (UMIST)
  • Bachelor of Science (Physics) - Bachelor Degree, University of Manchester Institute of Science and Technology (UMIST)
  • Natural Science ~ Mathematical Sciences ~ Mathematics and Statistics for ICT and Industries ~ Other Mathematics and Statistics for ICT and Industries n.e.c. - Mathematical Modeling
  • Natural Science ~ Physical Sciences ~ Acoustics and Optical Physics ~ Optics, Non-Linear Optics and Quantum Optics -
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography - Quantum Optics, Quantum Information, Information Security, Mathematical Modeling, Human Behavior
  • 2008 - 2013 , Natural Sciences Publishing Corporation
ADVANCED MATHEMATICAL METHODS 2004/2005
CALCULUS II 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017
DEVELOPING AND PROTECTING MATHEMATICAL IDEAS 2003/2004
FINAL YEAR PROJECT 2014/2015 2015/2016
FINAL YEAR PROJECT I 2017/2018
HALAQAH 1 (BROTHERS) 2002/2003
HALAQAH 1 (SISTER) 2003/2004
HALAQAH 2 (BROTHER) 2002/2003
INTELLECTUAL PROPERTY RIGHTS 2002/2003
MATERIALS PHYSICS 2002/2003
MATHEMATICAL METHODS 2003/2004 2004/2005
MATHEMATICS FOR COMPUTING III 2017/2018 2018/2019
In Progress
2019 - Present IIUM Blue Light Hazard App: Transferring Optical Knowledge on the Circadian and Retinal Hazard of Blue Light to the Malaysian Optometrists
2019 - Present The Development of Cybersecurity Awareness Model using CTC ? Chaos Theory of Careers for Secondary Schools.
2019 - Present Autonomous Quantum Thermal Machine for Quantum Steering
2019 - Present A Tripartite Fake News Detection Framework
2017 - Present Quantum theory of a non-degenerate parametric amplifier beyond Rotating Wave Approximation
2017 - Present A New Cost-Effective Low-Hop Distance Hierarchical Interconnection Network for Massively Parallel Computer System
2016 - Present Cybersecurity Capability Maturity Model based on Maqasid al Shari?ah (MS-C2M2)
2015 - Present Secret Key Infusion for Internet of Things
2013 - Present DYNAMICAL SYSTEMS AND THEIR APPLICATIONS (DSTA)
2008 - Present Intelligent Cyberspace Security
Completed
2015 - 2017 Secret Key Infusion for Internet of Things
2013 - 2013 Analisa dan Kajian Analisa Berhubung Cadangan Pelan Strategik 5 Tahun Kementerian Dalam Negeri (KDN) 2004-2018
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2011 - 2013 RU 2011: Block Ciphers: Analysis and Design
2011 - 2014 Modeling Illegal Immigrants Behaviour in Malaysia Via Scale Free Network
2011 - 2015 Systemic Human Behaviour Security: Deception Detection, Privacy & Secure Communications
2009 - 2011 Free-Space Optic (FSO) Links for Quantum Key Distribution (QKD)
2009 - 2013 Nonlinear Waves in Bose-Einstein Condensates & Optical Waveguide Systems with Higher Order Nonlinearity
2008 - 2011 Realization of Quantum Decoy States for Information Security
2007 - 2017 IIUM - MIMOS Cyberspace Security Lab
2006 - 2012 Free Space Quantum Key Distribution: Implementation and Security Analysis
2006 - 2007 Fuzzy correlation Inequalities for Ferromagnetic System
Unknown - 2018 Privacy and Security in Cloud First Policy Environment (Microsoft Fund)
Unknown - 2016 FREE SPACE QUANTUM KEY DISTRIBUTION
12 July 2018 Best Researcher Award. Kulliyyah of ICT - KCDIO level.
12 July 2018 Highest Number of Publications Award. Kulliyyah of ICT - KCDIO level.
12 July 2018 Top 30 Contributors to IIUM Research Performance. IIUM - University level.
28 April 2018 Fellow. Malaysia Academy of Sciences - National level.
02 November 2017 Top Research Scientist Malaysia (TRSM). Malaysia Academy of Sciences - National level.
28 August 2017 Fellow. Malaysia Mathematical Sciences Society - National level.
31 July 2017 Senior Member. The Optical Society (OSA) - International level.
06 December 2011 2011 ASEAN Chief Security Officer . International Data Group - International level.
28 October 2010 Kesatria Mangku Negara. Federal Government - Seri Paduka Baginda Yang Di-Pertuan Agong - National level.
Article
2015 Topological structure of complex networks and its importance in diffusion. Sindh University Research Journal (Science Series) , 47 (2) pp.191-194
2014 Entropy squeezing for qubit - field system under decoherence effect. Quantum Electronics , 44 (3) pp.274-278
2013 Three level atom in bad cavity. Middle-East Journal of Scientific Research , 13 pp.31-37
2013 Interaction of two pulses in defocusing nonlinear Schrodinger equation. Journal of Physics: Conference Series , 435 (012034) pp.1-4
2013 Computer assisted alerts using mental model approach for customer service improvement. Journal of Software Engineering and Applications , 6 pp.21-25
2012 Phase coherent states for enhancing the performance of continuous variable quantum key distribution. Journal of the Physical Society of Japan , 81 pp.1-9
2012 Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement. Quantum Information Processing , 12 (2) pp.1551-1171
2012 Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement . International Journal of Modern Physics B , 26 (16) pp.1-15
2012 Continuous-variable quantum key distribution protocols with eight-state discrete modulation. International Journal of Quantum Information , 10 (1) pp.1-15
2010 Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols. The European Physical Journal D
2010 Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol. Journal of Computer Science , 6 (10) pp.1094-1100
2010 Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers. Optics Communications , 283 (16) pp.3158-3167
2010 Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection . Journal of Physics B : Atomic, Molecular and Optical Physics , 43 pp.1-6
2010 A protocol for secret key infusion from satellite transmissions . International Journal of Computer and Network Security (IJCNS) , 2 (7) pp.99-101
2010 A linear atomic quantum coupler . Journal of Physics B : Atomic, Molecular and Optical Physics , 43 pp.1-9
2010 Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP). Journal of Computer Science , 6 (10) pp.1123-1129
2009 Quantum state engineering with ququarts: application for deterministic QKD protocol. EPL (Europhysics Letters) , 87 pp.10008-p1
2009 Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation . Laser Physics (International Journal) , 20 (5) pp.1-21
2009 Quantum key distribution using decoy state protocol. American Journal of Engineering and Applied Sciences , 2 (4) pp.694-698
2009 New estimates of single photon parameters for satellite-based QKD. Optics Communications , 282 (15) pp.3185-3189
2009 Decoy state quantum key distribution. IIUM Engineering Journal , 10 (2) pp.81-86
2009 Implementation of decoy state protocol. European Journal of Scientific Research , 33 (1) pp.183-186
2008 Blind encoding into qudits. Physics Letters A , 372 (12) pp.1963-1967
2008 Transient entropy squeezing of a single-Cooper-pair box placed inside a phase-damped cavity. Optics Communications , 281 (24) pp.6019-6023
2008 Single-atom entropy squeezing for two two-level atoms interacting with a single-mode radiation field. Optics Communications , 281 (10) pp.2854-2863
2007 Anticlone Gaussian attack for continuous variable EPR correlations. Journal of Physics B: Atomic, Molecular and Optical Physics , 40 (6) pp.1153-1160
2007 Nonentagled qutrits in two way deterministic QKD. Physics Letters A , 361 (6) pp.445-449
2007 Quantum Mutual Entropy for a Multilevel Atom Interacting with a Cavity Field. International Journal of Theoretical Physics , 46 (4) pp.972-983
2007 Squeezing in multi-mode nonlinear optical state truncation. Physics Letters A , 365 (5-6) pp.380-385
2006 Coherent information losses between two-qubit pair interacting with an environment. Optics Communications , 257 (1) pp.206-215
2006 Entanglement of a three-level trapped atom in the presence of another three-level trapped atom. Optics Communications , 265 (2) pp.551-558
2006 Generation of three-qubit entangled W-state by nonlinear optical state truncation. Journal of Physic B : Atomic, Molecular and Optical Physics , 39 (6) pp.1269-1274
2006 Deterministic six states protocol for quantum communication. Physics Letters A , 358 (2) pp.85-90
2005 Coupled-mode theory for Bose–Einstein condensates with time dependent atomic scattering length. Physics Letters A , 345 (1-3) pp.237-244
2004 Quantum phase properties of two-mode Jaynes–Cummings model for Schrodinger-cat states: interference and entanglement. Optics Communications , 240 (1-3) pp.169-184
2004 Quantum phase properties of two-mode Jaynes–Cummings model for Schrödinger-cat states: interference and entanglement. Optics Communications , 240 (1-3) pp.169-184
2004 The effect of finite bandwidth squeezed light on entanglement creation in the Dicke model. Journal of Optics B: Quantum and Semiclassical Optics , 6 (7) pp.289-295
2004 An Ising model with three competing interactions on a Cayley tree. Journal of Mathematical Physics , 45 (9) pp.3645-3658
2003 Quantum-trajectory simulations of a two-level atom cascaded to a cavity QED laser. Physical Review A - Atomic, Molecular, and Optical Physics , 68 (6) pp.063804/1-063804/6
2003 Entanglement and spin squeezing in the two-atom Dicke model. Journal of Optics B: Quantum and Semiclassical Optics , 5 (2) pp.L1-L4
2003 Exact solution of an Ising model with competing interactions on a Cayley tree. Journal of Physics A: Mathematical and General , 36 (15) pp.4283-4289
2003 Spin squeezing as a measure of entanglement in a two-qubit system. Physical Review A - Atomic, Molecular, and Optical Physics , 68 (6) pp.064301/1-064301/4
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection. journal of physic B: Atomic, molecular and optical physic , 43 (13)

Conference or Workshop Item

2016 Atomic coupler with two-mode squeezed vacuum states. In: 3rd International Conference on Mathematical Applications in Engineering (ICMAE'14)
2014 Calculus and its applications in scale-free networks . In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014)
2014 Node status detection and information diffusion in router network using scale-free network. In: 10th International Network Conference, INC 2014
2013 Generalized quantum rotation gates using STIRAP . In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2012 Interaction of two pulses in defocusing Nonlinear Schrödinger equation. In: International Conference of Application Science & Technology (iCAST2012)
2012 Three level atom in bad cavity. In: ICMCSSE 2012 : International Conference on Mathematical, Computational and Statistical Sciences, and Engineering
2010 A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP). In: International Conference on Computer and Communication Engineering, ICCCE 2010
2005 Entanglement and spin squeezing for non conservative spin systems . In: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005

Book

Book Section

2013 Strategic planning: steering the ship through changing circumstances. In: IIUM: The Premier Global Islamic University IIUM Press . ISBN 9789674182700 , pp.63-77
2012 Reasoning of collaborative human behaviour in security-critical work practices: a framework. In: Trustworthy Ubiquitous Computing Atlantis Press . ISBN 978-94-91216-70-1 (Print) 978-94-91216-71-8 (Online) , pp.99-106
2011 The decoy state method in quantum key distribution. In: Selected topics in advanced electronics IIUM Press . ISBN 9789674181536 , pp.97-119