Staff Directory


Rashidah Funke Olanrewaju

Academic Qualification

  • Ph.D in Engineering - Doctor of Philosophy, International Islamic University Malaysia
  • Master of Science (Computer & Information Engineering) - Masters Degree, International Islamic University Malaysia
  • Bachelor of Computer Science (Hon.) - Bachelor Degree, Universiti Putra Malaysia (UPM)

Rashidah Funke Olanrewaju (Assoc. Prof. Dr.)

Associate Professor
IIUM Gombak Campus

KULLIYYAH OF ENGINEERING


frashidah@iium.edu.my
4502


Expert Profile


Asst. Prof. Dr. Rashidah Funke Olanrewaju, a Nigerian citizen is from Kaduna, Nigeria. She earned her BSc. Hons. Computer Science at University Putra Malaysia, majoring in Software Engineering in 2002, M.Sc. in Computer and Information Engineering, majoring in Information Engineering from International Islamic University Malaysia (IIUM) in 2006.
She earned a Ph.D (Engineering) in August 2011 with specialization in Information Security in Digital Image Processing where she identified watermark embedding strength and developed an intelligent digital watermarking system based on Safe Region of Fast Fourier Transform using the newly identified embedding strength to hide watermark in the Safe Region of host image. She also earned a Postgraduate Diploma in Islamic Studies (DIS) from IIUM in 2001.
She started her professional career as a tutor/demonstrator in the Faculty of Engineering, IIUM in 2003, She became a part time lecturer with the same faculty in 2009. In 2011, she was appointed as a Post - Doctoral Fellow in the Department of Electrical and Computer Engineering, IIUM after completion of her Ph.D research. She served for a year and in 2012 was appointed as Assistant Professor in the same department. She is currently the Secretary General of Software Engineering Research Group SERG and Deputy Secretary General for Department of Electrical and Computer Engineering, Faculty of Engineering, 2012-2014.


Area of Specialisation


  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Signal Processing ~ Watermarking Techniques
  • Engineering Tech ~ Engineering And Technology ~ Biomedical Engineering ~ Artificial Intelligent Screening
  • Engineering Tech ~ Engineering And Technology ~ Electrical and Electronic Engineering ~ Image Processing - Digital image watermarking


Professional Membership


  • 2016 - 2017: Member of Profesional Body / Association, IEEE, WOMEN IN ENGINEERING, MALAYSIA CHAPTER
  • 2017 - 2018: Member of Profesional Body / Association: (Executive Committee), IEEE Women in Engineering


Teaching Responsibilities


ADVANCED TOPICS IN SOFTWARE ENGINEERING 2016/2017
ALGORITHMS AND PROGRAMMING 2017/2018 2016/2017 2015/2016 2014/2015
COMPUTER AND INFORMATION ENG. LAB I 2018/2019 2017/2018 2016/2017 2015/2016
COMPUTER AND INFORMATION ENGINEERING LAB I 2023/2024 2022/2023 2020/2021 2019/2020 2018/2019 2017/2018
COMPUTER ARCHITECTURE AND DESIGN 2018/2019 2017/2018 2016/2017 2015/2016 2014/2015 2013/2014 2012/2013
COMPUTER ARCHITECTURE AND SYSTEM DESIGN 2023/2024
COMPUTER ARCHITECTURE AND SYSTEMS DESIGN 2023/2024 2022/2023
COMPUTER ORGANIZATION AND ARCHITECTURE 2018/2019 2017/2018 2014/2015 2013/2014 2012/2013
CONCEPTUAL ENGINEERING DESIGN 2023/2024
DATA MINING 2020/2021 2019/2020
DATA STRUCTURE AND ALGORITHM DESIGN 2023/2024 2022/2023 2020/2021 2019/2020 2018/2019 2017/2018
DATA STRUCTURE AND PROGRAMMING 2023/2024
FAMILY MANAGEMENT 2023/2024 2022/2023 2021/2022
FAMILY MANAGEMENT & PARENTING 2020/2021 2019/2020
FINAL YEAR PROJECT 1 2019/2020
FINAL YEAR PROJECT I 2023/2024 2020/2021 2019/2020 2018/2019
FINAL YEAR PROJECT II 2022/2023 2018/2019
NEURAL NETWORKS AND SYSTEMS 2020/2021 2019/2020
OBJECT ORIENTED PROGRAMMING FOR ENGINEERS 2009/2010
PROGRAMMING FOR ENGINEERS 2012/2013
REAL-TIME COMPUTING SYSTEMS 2017/2018
SEMINAR 2023/2024 2022/2023 2016/2017 2015/2016 2014/2015
SOFTWARE ENGINEERING DESIGN 2021/2022
SUSTAINABLE DEVELOPMENT: ISSUES, POLICIES AND PRACTICES 2020/2021


Supervision


Handheld Hybrid Offline Otp Authentication Framework .
Ph.D Completed 2021 Main Supervisor
Robust Ecg Based Human Verification System.
Ph.D In Progress Co-supervisor
Smart Virtual Cognitive Behavioral Therapy With Spoken Dialog Systems Support.
Master Completed 2023 Co-supervisor
Novel Pose Estimation Algorithm For Mobile Augmented Reality Based On Inertial Sensor Fusion .
Master Completed 2022 Co-supervisor
Ecg Based Stress Detection Using Convolutional Neural Network.
Master Completed 2021 Main Supervisor
Development Of An Ensemble Transfer Learning-Based Deep Convolutional Neural Networks Model For Grading Of Diabetic Retinopathy.
Master Completed 2020 Main Supervisor
Smart Parking Guidance System Using 360o Camera And Haar-Cascade Classifier On Iot System.
Master Completed 2019 Main Supervisor
Development Of Intelligent Web Proxy Cache Replacement Algorithms Based On Adaptive Weight Ranking Policy Via Dynamic Aging.
Master Completed 2018 Main Supervisor
Investigation Of Packet Scheduling Algorithms In Practical Downlink Long Term Evolution-Advanced .
Master Completed 2018 Co-supervisor
Enhancement Of Service-Oriented Architecture For Mobile Internet Of Things.
Master Completed 2017 Main Supervisor
Real Time Wireless Heart Rate Monitoring In Small Scale Regions.
Master Completed 2017 Co-supervisor
Photoplethysmogram Based Biometric Identification Incorporating Age, Gender And Time Variability.
Master Completed 2017 Co-supervisor
Development Of Scheduling Algorithm For Cloud Computing.
Master Completed 2017 Co-supervisor
A Proposed Architecture For Big Data Analytics Systems For Telecommunications Industry.
Master Completed 2017 Co-supervisor
Detection Of Medical Identity Theft In Telemedicing Data Through Digital Watermaking.
Master Completed 2015 Main Supervisor
Enhancement Of Bluetooth Security Authentication Using Hash - Based Message Authentication Code (Hmac) Algorithm.
Master Completed 2015 Main Supervisor
Development Of Watermarking Scheme Using Wavelet Transform For Multipurpose Applications.
Master Completed 2015 Co-supervisor
Game Theoretic Approach To Model Misbehaviour In Manets.
Master Completed 2014 Main Supervisor
Security Analysis Of Data Transmission In An Iot Based Platform For Telemedicine.
Master In Progress Main Supervisor


Research Projects


Completed
2020 - 2023 A Unified Holistic Architectural Framework for IoT Applications using SEaaS
2020 - 2023 Comprehensive Tactical Modelling of Node Misbehaviour for Improved Defence of Threat Computing in Mobile IoT Systems using Decision and Game Theory
2019 - 2023 Decision and Game Theory based Comprehensive Tactical Modelling of Node Misbehaviour for Threat Computing in MANET based IoT System
2019 - 2022 New Non-Invasive Technique via Physiological Signals and Intelligence Machine Learning for Rapid Classification of Stress Level
2019 - 2023 The Role of Fintech in attaining Financial Inclusion in selected IDB-Member Countries
2018 - 2022 A Novel Pose Estimation Algorithm for Mobile AR via Inertial Sensing and Conditional Density Propagation
2018 - 2019 Game Theoretic Approach for Exhaustive Tactical Modelling of Node Misbehavior in Adhoc Networking based IoT Paradigm
2017 - 2020 Modeling Novel Maximum power point Tracking Algorithm for Small Scale Wind Turbine System
2017 - 2018 Strategic Profiling & Analytic Modelling of Node Misbehavior in MANET based IoT Paradigm
2016 - 2018 Multihoming-Based Scheme to Support Mobility Management in NEMO
2016 - 2018 Eradicating Multi-Channel Dependency for Authentication and Authorization in Secure E-Banking Applications
2016 - 2019 Novel Tactile Sensory Surface Mat with Electrical Stimulation (SMES)for the Prevention of Pressure Ulcers due to Immobility
2016 - 2018 Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks Via Game Theory
2015 - 2018 An Intelligent method to Optimize Web Cache Replacement algorithm using Neuro-Fuzzy Approach
2013 - 2015 Medical Identity Theft in Telemedicine: Solving the Privacy and Security Issues
2013 - 2016 Discovering Colossal Closed Itemsets from High Dimensional Datasets
On-Going
2021 - Present Investigation of Stress Detection Model based on Speech via Deep Learning Technique


Award & Recognition


13 Jun, 2013 Bronze medal, Kulliyyah of Engineering Research and Innovation exhibition (KERIE) - Kulliyyah of Engineering, IIUM. University
16 Feb, 2012 Silver medal - ? Silver Medal: IIUM Research, Invention and Innovation Exhibition IRIIE University
04 Feb, 2010 Bronze Medal: Malaysia Technology Expo MTE, - malaysian Technology Expo National


Publications


Article

2023 Secure IoT routing through manifold criterion trust evaluation using ant colony optimization. International Journal of Advanced Computer Science and Applications (IJACSA), 14 (11) pp. 131-143
2022 A holistic architecture for a sales enablement sensing-as-a-service model in the IoT environment. Information, 13 (11) pp. 1-22
2022 Decentralized blockchain network for resisting side-channel attacks in mobility-based IoT. Electronics, 11 (23) pp. 1-22
2022 Evolution and analysis of securehash algorithm (sha) family. Malaysian Journal of Computer Science, 35 (3) pp. 179-200
2022 Exploring MANET security aspects: analysis of attacks and node misbehaviour issues. Malaysian Journal of Computer Science, 35 (4) pp. 307-338
2022 SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem. Information, 13 (11) pp. 1-19
2022 The internet of things vision: a comprehensive review of architecture, enabling technologies, adoption challenges, research open issues and contemporary applications. Journal of Advanced Research in Applied Sciences and Engineering Technology, 26 (1) pp. 51-77
2021 A frictionless and secure user authentication in web-based premium applications. IEEE ACCESS, 9 () pp. 129240-129255
2021 Classification of ECG signals for detection of arrhythmia and congestive heart failure based on continuous wavelet transform and deep neural networks. Indonesian Journal of Electrical Engineering and Computer Science, 22 (3) pp. 1520-1528
2021 Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access, 9 () pp. 61778 -61792
2021 Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion. International Journal of Electrical and Computer Engineering (IJECE), () pp.
2021 Reliability analysis for distribution of power network. International Journal of Research and Analytical Reviews (IJRAR), 8 (3) pp. 587-591
2021 Security analysis of data transmission in an IoT based platform for telemedicine. International Journal of Research and Analytical Reviews (IJRAR), 8 (3) pp. 576-579
2020 A comprehensive insight into game theory in relevance to cyber security. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 8 (1) pp. 189-203
2020 A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks. IEEE Access, 8 () pp. 124097-124109
2020 A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT). IEEE Access, 8 () pp. 98481-98490
2020 MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions. International Journal of Recent Technology and Engineering (IJRTE), 8 (6) pp. 3013-3024
2020 Scrutinising internet banking security solutions. International Journal of Information and Computer Security, 12 (2-3) pp. 269-302
2019 A critical insight into pragmatic manifestation of diabetic retinopathy grading and detection. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9 (2) pp. 2040-2049
2019 ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET. International Journal of Soft Computing and Engineering, 8 (7) pp. 506-519
2019 Smart parking guidance system using 360o camera and haar-cascade classifier on IoT system. International Journal of Recent Technology and Engineering, 8 (2, Special issue 11) pp. 864-872
2018 A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. International Journal of Information and Computer Security, () pp. 1-23
2018 A survey on MANETs: architecture, evolution, applications, security issues and solutions. Indonesian Journal of Electrical Engineering and Computer Science, 12 (2) pp. 832-842
2018 Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT), 6 (7) pp. 9-20
2018 Bandwidth allocation policy using the game theory model in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT), 6 (7) pp. 9-20
2018 Classification of normal and crackles respiratory sounds into healthy and lung cancer groups. International Journal of Electrical and Computer Engineering (IJECE), 8 (3) pp. 11530-1538
2018 Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1) pp. 348-353
2018 Design and fabrication of an intelligent walking staff for visually impaired subjects. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1) pp. 266-270
2018 Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches. International Journal of Grid and Utility Computing, 9 (4) pp. 307-321
2018 Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches. International Journal of Grid and Utility Computing, 9 (4) pp. 307-321
2018 Game theory for resource allocation in heterogeneous wireless networks - a review. Indonesian Journal of Electrical Engineering and Computer Science, 12 (2) pp. 843-851
2018 Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology, 7 (4) pp. 4899-4904
2018 Radio Access Technology (RAT) selection mechanism using TOPSIS method in Heterogeneous Wireless Networks (HWN). Indonesian Journal of Electrical Engineering and Computer Science, 12 (2) pp. 852-864
2018 Rehashing system security solutions in e-banking. International Journal of Engineering & Technology, 7 (4) pp. 4905-4910
2018 Secure annihilation of out-of-band authorization for online transactions. Indian Journal of Science and Technology, 11 (5) pp. 1-9
2018 Snort-based smart and swift intrusion detection system. Indian Journal of Science and Technology, 11 (4) pp. 1-9
2017 A compendious study of online payment systems:Past developments, present impact, and future considerations. International Journal of Advanced Computer Science and Applications (IJACSA), 8 (5) pp. 256-271
2017 A computationally efficient P-LRU based optimal cache heap object replacement policy. International Journal of Advanced Computer Science and Applications (IJASA), 8 (1) pp. 128-138
2017 A new automatic method of parkinson disease identification using complex-valued neural network. Journal of Medical and Bioengineering, 6 (1) pp. 25-28
2017 A proposed architecture for generic and scalable CDR analytics platform utilizing big data technology. Advanced Science Letters, 23 (11) pp. 11149-11152
2017 A survey on E-payment systems: elements, adoption, architecture, challenges and security concepts. Indian Journal of Science and Technology, 10 (20) pp. 1-19
2017 Critical security challenges in cloud computing environment: An appraisal. Journal of Theoretical and Applied Information Technology, 95 (10) pp. 2234-2248
2017 Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing. Indian Journal of Science and Technology, 10 (7) pp. 1-7
2017 Design and implementation of a five stage pipelining architecture simulator for RiSC-16 instruction set. Indian Journal of Science and Technology, 10 (3) pp. 1-9
2017 Intelligent cooperative adaptive weight ranking policy via dynamic aging based on NB and J48 classifiers. Indonesian Journal of Electrical Engineering and Informatics, 5 (4) pp. 357-365
2017 Linking software engineering paradigms to Islamic values. Journal of Theoretical and Applied Information Technology, 95 (7) pp. 1405-1417
2017 Modeling malicious multi-attacker node collusion in MANETs via game theory. Middle-East Journal of Scientific Research, 25 (3) pp. 568-579
2017 Real time telemedical health care systems with wearable sensors. Asian Journal of Pharmaceutical Research and Health Care, 9 (3) pp. 138-144
2017 Securing electronic transactions via payment gateways: a systematic review. International Journal Internet Technology and Secured Transactions, 7 (3) pp. 245-269
2016 A framework to reduce redundancy in android test suite using refactoring. Indian Journal of Science and Technology, 9 (46) pp. 107107-1
2016 A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. Journal of Theoretical and Applied Information Technology, 84 (3) pp. 404-413
2016 An enhanced architecture for big data task scheduling in cloud environment. Advanced Science Letters, 22 (10) pp. 2963-2967
2016 Autonomous control of tilt tri-rotor unmanned aerial vehicle. Indian Journal of Science and Technology,, 9 (36) pp. 1-7
2016 Contemplation of tone mapping operators in high dynamic range imaging . International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 5 (2) pp. 98-104
2016 DFAM: A distributed feedback analysis mechanism for knowledge based educational big data. Jurnal Teknologi, 78 (12-3) pp. 31-38
2016 Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging. Indian Journal of Science and Technology, 9 (36) pp. 1-7
2016 MANET – A cogitation of its design and security issues. Middle-East Journal of Scientific Research, 24 (10) pp. 3094-3107
2016 Pragmatic manifestation of high dynamic range imaging – A Review. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 5 (4) pp. 14-21
2016 Two objectives big data task scheduling using swarm intelligence in cloud computing. Indian Journal of Science and Technology, Indian Journal of Science and Technology, Vol 9(28, 9 (28) pp. 1-10
2015 Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering, 2 (3) pp. 10-19
2015 DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. International Journal of Information Technology & Computer Science (IJITCS), 22 (1) pp. 1-9
2015 Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. Journal of Theoretical and Applied Information Technology, 77 (1) pp. 25-43
2014 Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering, 2 (1) pp. 1-7
2014 Dual authentication for bluetooth connection. International Journal of Engineering Research and Application, 4 (7) pp. 181-191
2014 ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal, 76 (5) pp. xx-xx
2014 EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal, 7 (5) pp. 88-103
2014 Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal, 21 (3) pp. 462-470
2014 Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN). Advances in Environmental Biology, 8 (3 (Special)) pp. 582-589
2014 QoS oriented mapReduce optimization for hadoop based bigData application . International Journal of Engineering Research and Application, 4 (4) pp. 12-15
2014 Responsibility and accountability of an engineer in religeous perspective. Science International Lahore, 26 (5) pp. 2429-2432
2013 Computational intelligence: It’s application in digital watermarking. Middle East Journal of Scientific Research (MEJSR), 13 () pp. 25-30
2013 Evaluating the effect of IP and IGP on the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR), 3 (2) pp. 71-82
2013 ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services . electronic Journal of Computer Science and Information Technology, 4 (1) pp. 19-24
2013 Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal , 21 () pp. 78-83
2013 Malicious behaviour of node and its significant security techniques in MANET- a review. Australian Journal of Basic and Applied Sciences, 7 (12) pp. 286-293
2012 An intelligent modeling of coagulant dosing system for water treatment plants based on artificial neural network. Australian Journal of Basic and Applied Sciences, 6 (1) pp. 93-99
2012 Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. World Applied Sciences Journal , (20) pp. 79-83
2011 Determining watermark embedding strength using complex valued neural network. Journal of Applied Sciences, 11 (16) pp. 2907-2915
2011 Forgery detection in medical images using Complex Valued Neural Network (CVNN). Australian Journal of Basic and Applied Sciences, 5 (7) pp. 1251-1264
2011 Water quality issues in food processing and production: good quality water is very essential in the production of safe food. Halal Pages 2011/2012, () pp. 66-73
2010 Damageless digital watermarking using complex-valued artificial neural network . Journal of Information and Communication Technology, 9 () pp. 111-137
Conference or Workshop Item

2022 OVeRS: Online Venue Reservation System for university facilities. In: International Conference on Smart, Secure and Sustainable Nation | S3N’2022,
2022 Stress detection based on TEO and MFCC speech features using Convolutional Neural Networks (CNN). In: 2nd International Conference on Computing 2022 (ICOCO 2022),
2021 A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications. In: 2021 IEEE 7th International Conference on Smart Instrumentation, Measurement and Applications,
2021 Non invasive stress detection method based on discrete wavelet transform and machine learning algorithms. In: 2021 IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE),
2020 Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC),
2020 Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC),
2020 Diabetic retinopathy grading using ResNet convolutional neural network. In: 2020 IEEE Conference on Big Data & Analytics,
2020 Low cost piezoresistive pressure sensor matrix for pressure ulcer prevention and management. In: 2019 7th International Conference on Mechatronics Engineering (ICOM) 2019,
2020 Postgraduate research: sharing international experience. In: NSUK 2020,
2019 A cloud-based bus tracking system based on internet-of-things technology. In: 2019 7th International Conference on Mechatronics Engineering (ICOM),
2019 Electrical stimulation in combating pressure ulcer for immobilize subjects: a conceptual framework. In: International Conference on Biomedical Engineering,
2019 Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms. In: 2nd East Indonesia Conference on Computer and Information Technology, EIConCIT 2018,
2019 Offline OTP based solution for secure internet banking access. In: 2018 IEEE Conference on e-Learning, e-Management and e-Services (IC3e),
2019 Robust , fast and accurate lane departure warning system using deep learning and mobilenets. In: "7th International Conference on Mechatronics Engineering, ICOM 2019",
2018 Class attendance management system using face recognition. In: 7th International Conference on Computer and Communication Engineering, ICCCE 2018,
2018 iWalk:intelligent walking stick for visually impaired subjects. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017,
2018 LiFi based automated shopping assistance application in IoT. In: 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017,
2018 Modeling of ANN to determine optimum adsorption capacity for removal of pollutants in wastewater. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017,
2018 Modelling of intelligent intrusion detection system: making a case for snort. In: IEEE Conference on Wireless Sensors, ICWiSe 2017,
2017 A study on performance evaluation of conventional cache replacement algorithms: A review. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC),
2017 An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing(PDGC),
2017 Enhancement web proxy cache performance using wrapper feature selection methods with NB and J48. In: 6th International Conference on Mechatronics - ICOM'17,
2017 JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016,
2017 MotionSure: a cloud-based algorithm for detection of injected object in data in motion. In: 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA) 2017,
2017 STCM: Secured trust-based communication method in vulnerable mobile adhoc network. In: The 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (RoViSP 2016),
2016 A novel neuroscience-inspired architecture: for computer vision applications. In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC),
2016 Automated bank note identification system for visually impaired subjects in Malaysia. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016),
2016 CDR analysis using big data technology. In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015),
2016 Development of heuristic task scheduling algorithm in cloud computing. In: 3rd International Conference on ICTs for Education and Training (TICET 2016),
2016 I-VRenewal: A cloud based system for VISA renewal: A case study of IIUM. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016),
2016 Mobile Heart Rate Detection System (MoHeRDS) for early warning of potentially-fatal heart diseases. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016),
2016 Re-emphasizing the dimensions and impacts of complementary IT resources through governance. In: 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2016 RFDA: Reliable framework for data administration based on split-merge policy. In: 2016 SAI Computing Conference (SAI),
2016 STCM: secured trust-based communication method in vulnerable mobile adhoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, RoViSP 2016,
2016 Watermarking in protecting and validating the integrity of digital information: a case study of the holy scripture. In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016),
2015 An empirical study of the evolution of PHP MVC framework. In: International Conference on Communication and Computer Engineering (ICOCOE 2014),
2015 An empirical study of the evolution of PHP MVC framework. In: International Conference on Communication and Computer Engineering (ICOCOE 2014),
2015 DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. In: International Conference on Computing Education and Information Technology (ICCEIT 2015) ,
2015 RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e),
2015 RAED: Response analysis of educational data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e) ,
2015 SSM: Secure-Split-Merge data distribution in cloud infrastructure. In: 2015 IEEE Conference on Open Systems (ICOS),
2014 A secure authentication scheme for bluetooth connection. In: International Conference on Computer and Communication Engineering (ICCCE 2014),
2014 Application of neural networks in early detection and diagnosis of parkinson's disease. In: 2014 International Conference on Cyber and IT Service Management (CITSM),
2014 Bandwith conservation framework for mobile cloud computing: challenges and solutions. In: 5th International Conference on Computer & Communication Engineering 2014 (ICCCE 2014),
2014 Big data analysis solutions using mapReduce framework. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014),
2014 Dearth of information technology governance studies in developing nations: making case for Nigeria. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014),
2014 Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm. In: 5th International Conference on Computer and Communication Engineering,
2014 Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.. In: 4th International Cryptology and Information Security Conference,
2014 MARKCLOUD - Software for data confidentiality and security in cloud computing environments. In: 4th International Conference on Industrial Engineering and Operations Management (IEOM) 2014,
2014 Qualitative analysis on watermarking algorithm for large resolution camera phone image. In: 5th International Conference on Computer and Communication Engineering (ICCCE2014),
2014 r-TOLA: an architecture for real time open learning application for universities. In: International Conference on Computer & Communication Engineering 2014,
2014 Robust image watermarking scheme by discrete wavelet transform. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014),
2013 Prediction of optimal adsorption of aqueous phenol removal with oil palm empty fruit bunch activated carbon using Artificial Neural Network (ANN). In: 3rd International Conference on Biotechnology (ICBioE'13),
2012 An Improved Wavelet Digital Watermarking Software Implementation. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia,
2012 Computational intelligence: application in digital watermarking. In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012),
2012 Development of a scalable video compression algorithm. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia,
2012 Digital audio watermarking; techniques and applications . In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia,
2012 Digital watermarking: A counterfeiting and piracy deterrence. In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012,
2012 ICT in telemedicine: conquering privacy and security issues in health care services. In: Symposium on IT Governance, Management and Audit, 2012 (SIGMA 2012),
2012 Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique. In: Proceedings of the International Conference on Mathematical Applications in Engineering (ICMAE 2012),
2012 State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia,
2012 TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID) . In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE2012),
2011 Artificial neural network for modeling coagulant dosing for water treatment plants. In: 2nd International Conference on Biotechnology Engineering (ICBioE 2011),
2010 An attack proof intelligent digital watermarking based on safe region of fast fourier transform. In: The 2nd International Conference on Engineering and ICT,
2010 Watermarking in safe region of frequency domain using complex-valued neural network. In: International Conference on Computer and Communication Engineering (ICCCE 2010),
2009 Image quality assessment of fast fourier transform domain watermarked images. In: International Conference on Rural Information and Communication Technology ,
2009 State-of-the-art application of artificial neural networks in digital watermarking and the way forward . In: International Conference on Computing & Informatics 2009 (ICOCI 09),
Book

2017 Powdered activated carbon for removal of phenol and treatment of palm oil mill final effluent. IIUM Press, International Islamic University Malaysia, ISBN: 978-967-418-489-6
2013 Conquest XHTML: a programers guide to extensible HyperText Markup Language. Google GRIN Verlag, ISBN: 3656517029, 9783656517023
Book Section

2019 An adaptive and viable face identification for Android mobile devices. In: Springer, Cham, ISBN: 978-3-030-15886-6, pp. 301-322
2019 Critical challenges in access management schemes for smartphones: an appraisal. In: Springer, Singapore, ISBN: 978-981-13-8613-8, pp. 87-113
2019 Internet of things: the concept, inherent security challenges and recommended solutions. In: Springer, Singapore, ISBN: 978-981-13-8613-8, pp. 63-86
2019 Internet of things: the concept, inherent security challenges and recommended solutions. In: Springer, Singapore, ISBN: 978-981-13-8613-8, pp. 63-86
2018 Trust and resource oriented communication scheme in mobile ad hoc networks. In: Springer, ISBN: 978-3-319-69265-4, pp. 414-430
2011 Adaptive digital watermarking system for authentication of intellectual properties. In: IIUM Press, ISBN: 978-967-418-160-4, pp. 182-191
2011 An application of biometric technology : Iris recognition. In: IIUM Press, ISBN: 978-967-418-156-7, pp. 206-212
2011 An evaluation of transform domain watermarking and its application to intellectual properties images. In: IIUM Press, ISBN: 978-967-418-160-4, pp. 192-197
Monograph

2019 Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020. In: ,
2018 STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY. In: ,
2018 Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory. In: ,
2015 Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network. In: IIUM,
2015 Medical identity theft in telemedicine: solving the privacy and security issues. In: IIUM Press,