Faculties

Faculties

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Imad Fakhri Taha Alyaseen
Professor

  • KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY
  • IIUM Gombak Campus
  • imadf@iium.edu.my
  • 5686

Print CV Email Me

Staff Detail


Imad Fakhri Al-Shaikhli, a IEEE senior member, obtained his BSc (Hon) in Mathematics, MSc in Computer Science from Iraq, and Ph.D degree from Pune University, India, 2000. After obtaining his Ph.D, he returned to Iraq and continued teaching and supervising postgraduate students. In 2003, he was appointed as the Head of Department of Computer Information Systems at Alrafidain University College until 2005. Then he joined Gulf University- Bahrain in January 2006 and was appointed as the founding Dean of the College of Computer Engineering and Sciences. During this period, he introduced the CCNA ... show more

  • Computer Science - Doctor of Philosophy, University of Pune
  • Computer Science - Masters Degree, University of Technology, Iraq
  • Mathemathics - Bachelor Degree, Al-Mustansiriya University, Iraq
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Cryptography - specialized in cryptography, and cryptanalysis research
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Security System ~ Other Security System n.e.c. - research on using biometrics as secure and authentic systems
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Cognitive Science -
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Artificial Intelligence ~ Soft Computing - specially in genetic algorithms, neural networks, evolving connectionist systems, and fuzzy logic
  • 2011 - 2020 , Design of Scientific Renaissance
  • 2020 - 2020 ,
  • 2020 - 2020 ,
  • 2020 - 2020 , Ternopil National Economic University- Ukraine
  • 2020 - 2020 ,
CRYPTOGRAPHY 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021
DATA STRUCTURE & ALGORITHM 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016
DATA STRUCTURES AND ALGORITHMS I 2016/2017 2017/2018 2018/2019 2019/2020 2020/2021
FINAL YEAR PROJECT 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015
INDUSTRIAL ATTACHMENT 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018
NEURAL NETWORKS 2010/2011
PRINCIPLES OF ARTIFICIAL INTELLIGENCE 2011/2012 2012/2013
Completed
2016 - 2018 Analysis of ZUC Cipher in Mobile Communication
2015 - 2018 AN EFFICIENT MODEL FOR PROCESSING SKYLINE QUERIES IN INCOMPLETE AND UNCERTAIN DATABASES
2015 - 2019 An Online Computational Modeling for EcoS Feature Selection in Traffic Volumes Prediction
2014 - 2017 Test Automation Model for Conformance of Mobile Applications Life Cycle
2014 - 2016 Computational Modeling for Analyzing the Effect of Quranic Recitations on Human Emotions
2014 - 2016 Anti-Malware for Mobilephones
2013 - 2017 Regulated Splicing Systems and Formal Models for Food Authentication
2013 - 2016 Visualization of Emotional Dynamic on Brain Topology using Neural Inspired Computational Model
2013 - 2017 New Algorithm for Realtime OLAP Scheme over Multicore Distributed Processing to Serve Warehouse Data Mining
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2011 - 2013 RU 2011: Block Ciphers: Analysis and Design
2010 - 2012 The use of Digital Watermarking to protect Quran & Sunna
In Progress
2016 - Present Identifying and Profiling children with Learning disabilities using Algorithmic Computational Neuro-Physiological (CNP) Model
2016 - Present Development of an Evolving Neuro-Cognitive Computational Model Based on Event-Related Potentials for Healthy Lifestyle Profiling
2016 - Present Development of an Evolving Neuro-Cognitive Computational Model Based on Event-Related Potentials for Healthy Lifestyle Profiling
2016 - Present Analysis of ZUC Cipher in Mobile Communication
2015 - Present An Online Computational Modeling for EcoS Feature Selection in Traffic Volumes Prediction
2008 - Present Intelligent Cyberspace Security
18 November 2019 Appreciation Letter. Duzce University Rector-Turkey - International level.
24 July 2019 IIUM Takrim Day-highest no. of publications. honorabl Rector - University level.
23 July 2018 Top 250 contributors to IIUM's MyRA performance. IIUM RECTOR - University level.
19 January 2015 appreciation. Dean, KICT - University level.
21 December 2014 best paper award. international conference on computer assisted system in health 2014 - International level.
12 June 2014 Silver Medal for a poster at IRIIE 2014. IIUM - International level.
31 December 2013 best library partner- 2013. IIUM Library - University level.
27 June 2012 best teacher award. KICT - University level.
22 February 2012 IRIIE 2012. IIUM - University level.
Article
2014 Key-dependent s-box in lightweight block ciphers. Journal of Theoretical and Applied Information Technology , 62 (2) pp.554-559
2014 Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications , 5 (7) pp.7-10
2014 Kuwait government entities e-business continuity and disaster recovery plan. Journal of Advanced Computer Science and Technology Research (JACSTR) , 4 (3) pp.62-75
2013 MOIM: a novel design of cryptographic hash function. International Journal of Computer Engineering & Technology (IJECT) , 4 (4) pp.1-19
2013 Comparative study between traffic control methods Using simulation software . International Journal of Machine Learning and Computing (IJMLC) , 3 (5) pp.424-429
2013 The ethical dilemma of software piracy: an inquiry from an Islamic perspective. Creative Communication and Information Technology , 7 (1) pp.59-76
2013 Emotion recognition model using source-temporal features and fuzzy. Lecture Notes in Computer Science (LNCS) , 8226 (1) pp.577-584
2013 Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI) , 10 (4) pp.239-246
2013 Affective computing model using source-temporal domain. Procedia - Social and Behavioral Sciences , 97 pp.54-62
2013 A new algorithm for human face detection using skin color tone. IOSR-Journal of Computer Engineering , 11 (6) pp.31-38
2013 EEG emotion recognition based on the dimensional models of emotions. Procedia - Social and Behavioral Sciences , 97 pp.30-37
2013 Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology , 2 (2) pp.1-12
2013 Evaluation of usability problems of labor portal in Saudi Arabia. International Journal of Advanced Computer Science and Information Technology , 2 (1) pp.14-25
2013 Achieving security by combining Huffman and SLSB algorithms. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (4) pp.163-172
2012 Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR) , 2 (1) pp.22-34
2012 Lightweight block ciphers: A comparative study. Journal of Advanced Computer Science and Technology Research(JACSTR) , 2 (4) pp.159-165
2012 Rational drug design using genetic algorithm: case of malaria disease. Journal of Emerging Trends in Computing and Information Sciences , 3 (7) pp.1093-1102
2012 Achieving security for images by LSB and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR) , 2 (3) pp.127-139
2012 Designing a smart city in Kuwait: an initial study. Journal of Advanced Computer Science and Technology Research (JACSTR) , 2 (3) pp.116-126
2012 Smart cities: a survey. Journal of Advanced Computer Science and Technology Research (JACSTR) , 2 (2) pp.79-90
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences , 27 pp.233-240
2011 An improved genetic algorithm for solving the multiprocessor scheduling problem. Australian Journal of Basic and Applied Sciences
2011 Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR) , 1 (1) pp.36-51
2011 A practical method for the analysis of genetic algorithms. Journal of Advanced Computer Science and Technology Research(JACSTR) , 1 ( ) pp.1-9
2006 New statistical Binary Random Test. Journal of Al Rafidain university college , 8 (18) pp.81-101
2006 Genetic-local hybrid optimizer for solving advance layout problem. Journal of Al Rafidain University College , 8 (19) pp.87-98
2006 Comparison between Lamarckian Evolution and Baldwin Evolution of neural network. Journal of Al Rafidain University College , 8 (19) pp.217-232
2004 Protecting an Internet Web File using Java. Journal of Al Rafidain University College- Iraq , 7 (15) pp.51-60

Conference or Workshop Item

2014 Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Brain & heart from computer science perspective. In: 3rd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2014
2014 Feature ranking through weights manipulations for artificial neural networks-based classifiers. In: 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014)
2013 Joux multicollisions attack in sponge construction. In: 6th International Conference on Security of Information and Networks
2013 Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2013 Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013
2013 SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World
2013 Setting-up a sulh-based, community mediation-type of online dispute resolution (ODR) in Malaysia. In: 5th International Conference on Information and Communication Technology for the Muslim World
2013 A new fragile digital watermarking technique for a PDF digital Holy Quran. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 Protection of the digital Holy Quran hash digest by using cryptography algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Improving the security of LBlock lightweight algorithm using bit permutation. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Improving PRESENT lightweight algorithms. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies
2012 Traffic management system based on wsn in Kuwait: an initial design. In: International Conference on Informatics and Applications 2012
2012 Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim)
2012 Comparative study on content-based image retrieval CBIR). In: International Conference on Advanced Computer Science Applications and Technologies
2012 Quality evaluation of “safeer” portal for Saudi students studying abroad . In: International Conference on Advanced Computer Science Applications and Technologies
2012 Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies
2012 An anatomy of IGP and BGP routing protocols. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012
2012 An improved full search block matching algorithm for imaging applications. In: International Conference on Computer and Communication Engineering (ICCCE 2012)
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)
1999 A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99

Book

2011 Computer applications: theories and applications. IIUM Press . ISBN 9789674181079
2011 Introduction of computer systems and applications. IIUM Press . ISBN 978-967-418-085-0
2011 Cryptography: past, present and future. IIUM Press . ISBN 9789674181130

Book Section

2011 Storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.127-134
2011 RIPEMD and Chameleon hash function. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.89-96
2011 Basic disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.135-140
2011 Disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.141-146
2011 Cascade style sheets. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.147-155
2011 Rivest-Shamir-Adleman (RSA). In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.99-105
2011 Image editing. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.157-164
2011 Image effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.165-172
2011 Image tool function. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.173-179
2011 Cryptanalysis of RSA. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.107-112
2011 Image clone 1. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.181-191
2011 Image clone 2. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.193-197
2011 Digital signature algorithm. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.113-115
2011 Image and special effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.199-204
2011 Basic text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.205-212
2011 Text animation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.213-219
2011 Background of zero-knowledge proof. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.117-120
2011 Text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.221-226
2011 Image filtering. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.227-232
2011 Interactive proof systems. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.121-126
2011 Image quality improvement. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.233-239
2011 Zero-knowledge-proof. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.127-132
2011 Feige-Fiat-Shamir identification scheme. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.133-138
2011 Introduction. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.3-9
2011 Shamir’s threshold scheme. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.147-150
2011 Blakely’s secret sharing scheme. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.151-154
2011 Monoalphabetic substitution cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.11-16
2011 The use of genetic algorithm in autonomous robot navigation . In: Computer applications: theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.3-13
2011 In-silico drug target design & its approaches . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.15-26
2011 Implementing DNA sequence using genetic algorithm. In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.27-36
2011 Machine based cryptography. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.25-30
2011 Polyalphabetic substitution cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.17-23
2011 Introduction. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.141-146
2011 Folder operations. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.55-63
2011 Block and stream cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.33-38
2011 Molecular docking . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.37-44
2011 The use of genetic algorithm in improving medical image segmentation techniques . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.45-55
2011 Data Encryption Standard (DES). In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.39-46
2011 Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.59-69
2011 Internal structure of computer systems. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.1-8
2011 Developed system for Quran protection using MD5 and Base64 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.71-84
2011 Interfaces and protocols. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.9-16
2011 Protection mechanisms using LSB and MD5 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.85-98
2011 Advanced Encryption Standard (AES). In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.47-52
2011 Firmware program. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.17-22
2011 Developed system for Quran protection using LSB replacement and MD5 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.99-109
2011 Graphical user interfaces. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.23-30
2011 Short cut and hard drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.31-38
2011 Windows explorer. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.39-46
2011 Folder and directory. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.47-53
2011 Trivium and Rabbit stream cipher. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.53-61
2011 Control panel and screen savers. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.65-72
2011 The study of multicast listener discovery. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.27-31
2011 Basic operating system setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.81-86
2011 Introduction. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.65-72
2011 MIPV6 based approaches for mobility management. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.32-35
2011 Hardware configuration. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.73-79
2011 Windows installation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.87-98
2011 Message Digest (MDx) family. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.73-80
2011 Network security setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.99-106
2011 Task scheduling. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.107-112
2011 SHA family hash function. In: Cryptography: past, present and future IIUM Press . ISBN 9789674181130 , pp.81-87
2011 Basic storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.113-118
2011 Logical drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.119-125
2011 Qualitative study of mobility management approaches. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.48-52