Fakulti

Fakulti

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Akram M Z M Khedher
Associate Professor

Print CV Email Me

Staff Detail


Akram M. Zeki obtained B.Sc. from the University of Jordan, Amman, Jordan in 2000, and Master in Computer Graphics from the Faculty of Computer Science and Information Technology at University Putra Malaysia in 2004. His Ph.D was from the Faculty of Computer Science and Information System, University Technology Malaysia in 2009. He did post doctorate research at Kulliyyah of Information and Communication Technology, International Islamic University Malaysia (IIUM) in 2009. Currently, he is an Associate Professor at the Kulliyyah of Information and Communication Technology, IIUM, and Deputy Dir ... show more

  • Doctor of Philosophy in Computer Science - Doctor of Philosophy, Universiti Teknologi Malaysia (UTM)
  • Master of Science in Computer Imaging - Masters Degree, Universiti Putra Malaysia (UPM)
  • Bachelor of Science in Physic - Bachelor Degree, University of Jordan
  • ICT ~ Information, Computer And Communications Technology (ICT) ~ Data Management ~ Data Security - Information Security
  • 2020 - 2020 Senior Member,
  • 2013 - 2018 , DSR
  • 2016 - 2018 Associate Researcher, Al-Mishkat Institute, Iraq
  • 2014 - 2017 , Phillips publishing company
  • 2014 - 2017 Member in Board of Advisors (BOS) , DSR, Kuala Lumpur, Malaysia
COMPUTER MEDIATED COMMUNICATION 2015/2016 2016/2017 2017/2018 2018/2019 2020/2021
CRITICAL INFRASTRUCTURE MANAGEMENT 2013/2014
DATABASE SYSTEMS I 2011/2012
DIGITAL MEDIA AND COMMUNICATION 2015/2016 2017/2018
FINAL YEAR PROJECT 1 2017/2018
FINAL YEAR PROJECT I 2009/2010 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 2019/2020 2020/2021
FINAL YEAR PROJECT II 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 2019/2020 2020/2021
INDUSTRIAL ATTACHMENT 2010/2011 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017
INFORMATION RESOURCE AND STRATEGY MANAGEMENT 2018/2019 2019/2020
INFORMATION RESOURCES AND STRATEGY MANAGEMENT 2020/2021
INFORMATION RETRIEVAL TECHNOLOGIES 2015/2016 2016/2017 2017/2018 2018/2019 2019/2020
INFORMATION SECURITY 2009/2010 2010/2011 2011/2012 2012/2013
INFORMATION SECURITY STRATEGY & POLICY 2015/2016
INFORMATION TECHNOLOGY 2008/2009 2009/2010
INTERNET APPLICATIONS 2007/2008 2008/2009 2010/2011 2013/2014 2014/2015
INTRODUCTION COMPUTER NETWORKING (NON ICT) 2012/2013 2014/2015
INTRODUCTION TO COMPUTER NETWORKING (NON - ICT) 2013/2014 2014/2015 2016/2017
MANAGEMENT INFORMATION SYSTEM 2016/2017 2017/2018
MANAGEMENT OF INFORMATION SECURITY 2017/2018 2018/2019 2019/2020 2020/2021
MULTIMEDIA TECHNOLOGY 2009/2010 2010/2011 2012/2013 2013/2014 2014/2015
PHYSICAL PROTECTIVE SECURITY 2020/2021
PRACTICAL TRAINING 2009/2010 2010/2011
PROJECT MANAGEMENT IN IT 2013/2014
RISK MANAGEMENT 2016/2017
WEB PROGRAMMING I 2011/2012
In Progress
2018 - Present Novel Over-sampling Methods for Classification of Imbalanced Quranic Topics
2017 - Present SPEECH RECOGNITION FOR ARABIC LANGUAGE
2015 - Present Semantic Body of Knowledge and Testing (SBKT)
2015 - Present ESTABLISHMENT OF THE SEMANTIC BODY OF KNOWLEDGE AND TECHNOLOGY
2008 - Present Intelligent Cyberspace Security
Completed
2016 - 2018 A New Model for Social Media Use for Active Collaborative Learning
2016 - 2018 Analyzing Postgraduate Theses and Dissertaions in Selected Islamic Revealed Knowledge Department: A Critical and Objective Study
2015 - 2019 A Model for Assessing IT Readiness in Organizations for Successful Business Intelligence Systems
2015 - 2018 An Enhanced Centralized Multi-Nodal Model Associated with Congested Network Environment
2015 - 2016 ?Flood Trauma: The Role of Islamic Religious Education in Shaping Personality Well-being?
2014 - 2016 Glossary of Term of Exegesis and Sciences of the Qur'an
2014 - 2016 Glossary of Term of Exegesis and Sciences of the Qur'an
2013 - 2018 Voice Recognition Model for Recitation of the Holy Quran
2013 - 2013 An Interactive Computer Program to Teach Arabic Voices for Non-Native Speakers
2013 - 2015 Multimedia Technology from Islamic Perspective
2013 - 2016 Subjective Assessment Model of the Quranic Audio Watermarking
2012 - 2015 Multicast Network Security using Quantum Key Distribution (QKD)
2012 - 2015 A New Spatial Domain Watermarking Technique Based On Multiple Intermediate Significant Bits
2012 - 2016 Self-Help Maqam-Based Search System
2011 - 2011 An Analytical Evaluation of Multimedia Tools in Islamic Websites
2011 - 2012 Mobile Hajj Dictionary (Arabic, Malay and English Based)
2010 - 2012 The use of Digital Watermarking to protect Quran & Sunna
2010 - 2011 Justification of Voice Recognition Systems, Quranic case of Study
2009 - 2011 Comparative Study of Different Steganographic Techniques
21 Februari 2019 Bronze Medal. MALAYSIA TECHNOLOGY EXPO - National level.
12 Mei 2018 Silver Medal. ITEX2018 - University level.
10 Mei 2018 Silver Medal. ITEX - National level.
18 Februari 2017 Silver Medal. Malaysia Technology Exhibition - University level.
16 Februari 2017 Silver Medal. Malaysia Technology Exhibition - National level.
02 September 2016 Outstanding Contributor. CREAM 2016 - University level.
29 April 2015 Highest Citation in Citation Index Journal Award. Others - University level.
19 November 2014 Best Paper Award. INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIMS WORLD (ICT4M) - National level.
18 Julai 2014 Promising Researcher Award. International Islamic University Malaysia - University level.
25 Jun 2014 Gold Medal. Politeknik Seberang Perai, Penang, Malaysia. Conference, Competition and Exhibition 2014 (CCE2014) - National level.
Article
2020 Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems , 32 (1) pp.261-277
2020 Classification of Holy Quran verses based on imbalanced learning. International Journal on Islamic Applications in Computer Science And Technology , 8 (2) pp.11-24
2020 Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things. Journal of Physics Communications , xx (xx) pp.1-12
2019 Speaker identification based on hybrid feature extraction techniques. International Journal of Advanced Computer Science and Applications , 10 (3) pp.322-327
2019 Massive Open Online Courses (MOOCs): data on higher education. Data in Brief , 22 pp.118-125
2019 Towards adaptive e-learning among university students: by Applying Technology Acceptance Model (TAM). International Journal of Engineering and Advanced Technology , 8 (6S3) pp.270-276
2019 Quranic motivation toward modern approach for e-Da'wah. Quranica: International Journal of Islamic Research , 11 (2) pp.53-83
2018 Critical factors influencing effective of ICT resources and capabilities. Journal of Theoretical and Applied Information Technology , 96 (6) pp.1633 -1646
2018 أسماء التفضيل في القرآن الكريم والحديث النبوي الشريف - دارسة دلالية The names of preference in the Quran and Hadith - Semantic Study. International Journal of Islamic Applications in Computer Science and Technology - Ijaza
2018 Impact of Quran in treatment of the psychological disorder and spiritual illness. Journal of Religion and Health pp.1-14
2018 Quranic sign language for deaf people: Quranic recitation classification and verification. International Journal on Perceptive and Cognitive Computing , 4 (1) pp.8-12
2018 Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems. Journal of Artificial Intelligence and Soft Computing Research , 8 (1) pp.49-61
2018 Regularization-based multi-frame super-resolution: A systematic review. Journal of King Saud University - Computer and Information Sciences
2017 Dynamics of watermark position in audio watermarked files using neural networks. Applied Mathematics & Information Sciences , 11 (3) pp.703-715
2017 Necessary and sufficient conditions for complementary stochastic quadratic operators of finite-dimensional simplex. Journal of Computing and Mathematical Sciences , 1 (1 (Jan-June 2017)) pp.22-27
2017 Social media use, collaborative learning and students’ academic performance: a systematic literature review of theoretical models. Journal of Theoretical and Applied Information Technology , 95 (20) pp.5399-5414
2017 The impact of using social media for teaching and learning in post-secondary institutes. The Anthropologist , 29 (1) pp.8-18
2017 Advances in teaching and learning on facebook in higher institutions. IEEE ACCESS , 5 pp.480-500
2017 A review on soft set-based parameter reduction and decision making. IEEE ACCESS , 5 pp.4671-4689
2017 The dynamics of data packet in transmission session. IEEE ACCESS , 5 pp.4329-4339
2017 A model of using social media for collaborative learning to enhance learners’ performance on learning. Journal of King Saud University - Computer and Information Sciences , 29 (4) pp.526-535
2017 Information technology usage in the Islamic perspective: a systematic literature review. The Anthropologist , 29 (1) pp.27-41
2017 Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management , 34 (1) pp.50-64
2017 PSW statistical LSB image steganalysis. Multimedia Tools and Applications , 77 (1) pp.805-835
2017 Social media and its impact on academic performance among university students. The Anthropologist , 28 (1-2) pp.52-68
2017 Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. International Journal of Control , 90 (7) pp.1-29
2017 An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system. Journal of Internet Banking and Commerce , 22 (Special Issue-S8) pp.1-14
2017 Integrated modalities search framework for digital english language text Holy Qur’an and Tafsir. International Journal on Islamic Applications in Computer Science And Technology , 5 (2) pp.26-36
2016 Arabic text classification: Review study. Journal of Engineering and Applied Science , 11 (3) pp.528-536
2016 The most principle security issues in e-Commerce. International Journal of Scientific and Research Publications , 5 (12) pp.556-560
2016 Utilising key climate element variability for the prediction of future climate change using a support vector machine model. International Journal of Global Warming , 9 (2) pp.129-151
2016 Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security. Journal of Theoretical and Applied Information Technology , 83 (2) pp.173-179
2016 ICT readiness and information security policies in OIC Countries. International Journal of Scientific and Research Publications , 6 (1) pp.58-61
2016 Attitude of students towards information access issues: The case of International Islamic University Malaysia. International Journal of Soft Computing , 11 (4) pp.236-241
2016 Dynamics of doubly stochastic quadratic operators on a finite-dimensional simplex. Open Mathematics , 14 (1) pp.509-519
2016 An intermediate significant bit (ISB) watermarking technique using neural networks. SpringerPlus , 5 (1) pp.868-1-868-25
2016 A finite state model for a self-help system based on minhaj 'al Abidin. Research Journal of Applied Sciences , 11 (6) pp.345-351
2015 Formal analysis of weighted longitudinal routers network via scale-free network: a case study. Journal of Theoretical and Applied Information Technology , 80 (2) pp.257-265
2015 How technology affected our privacy. International Journal of Science and Research (IJSR) , 4 (12) pp.406-410
2015 Security issues with health care information technology. International Journal of Science and Research (IJSR) , 4 (12) pp.1021-1024
2015 Visualisation of a three-dimensional (3D) object’s optimal reality in a 3D map on a mobile device. Applied Mathematics & Information Sciences , 9 (6) pp.3133-3145
2015 QoS amendment toward seamless handover in network mobility NEMO. ARPN Journal of Engineering and Applied Sciences , 10 (21) pp.9698-9709
2015 "مشروع برنامج للتبويب الشامل والمفصل لعلوم القرآن والتفسير "سورة الحجرات نموذجا = Mashru' barnamij lil-tabwib al-shamil al-mufassal li-'ulum al-Qur'an wa-al-tafsir "surah al-Hujrat namudhajan. al-Majallat al-Dauliyah lil-Buhuth al-Islamiyah wa-al-Insaniyah al-Mutaqaddimah , 5 (10) pp.1-18
2015 An unsupevised package for multi-spectral image processing for remote data. Journal of Advanced Computer Science and Technology Research (JACSTR) , 5 (4) pp.113-122
2015 Web assisted language learning system for enhancing Arabic language learning using cognates. Jurnal Teknologi , 77 (19) pp.107-112
2015 Mini-ATX Computer System in Vehicle. Advanced Materials Research , 1115 pp.484-487
2014 Performance analysis of HRO-B+ scheme for the nested mobile networks using OPNet. Journal of Technology , 4 pp.174-191
2014 Developing a solar calculator system. Advanced Materials Research , 980 pp.179-183
2014 Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology , 61 (1) pp.37-43
2014 Empirical investigation of visualization quality for three-dimensional (3d) objects of 3d map on mobile device for navigation aid . Journal of Theoretical and Applied Information Technology , 63 (2) pp.372-380
2014 My E-Mosque system: an Islamic android companion. International Journal on Islamic Applications in Computer Science And Technology , 2 (2) pp.30-37
2014 Subjective assessment of audio watermarked quran. Ulum Islamiyyah - The Malaysian Journal of Islamic Sciences , 13 (Sp. ed) pp.75-90
2014 Online databases on Quranic handwritten words. Journal of Theoretical and Applied Information Technology , 62 (2) pp.485-492
2014 The state of online audio qur'an and its public perception. International Journal on Islamic Applications in Computer Science And Technology , 2 (4) pp.23-34
2013 Visual interactive Islamic learning system for children. International Journal on Islamic Applications in Computer Science And Technology , 1 (3) pp.17-23
2013 High Watermarking Image Quality Based on Dual Intermediate Significant Bit (DISB). International Journal of Digital Content Technology and its Applications , 7 (5) pp.733-742
2013 Assessing issues of change impact analysis process for a software projects. World Applied Sciences Journal , 28 (10) pp.1366-1374
2013 Analytical evaluation of a new route pptimization scheme for nested mobile network. World Applied Sciences Journal (21) pp.16-20
2012 Analysis of Islamic website design. International Journal of Arab Culture, Management and Sustainable Development , 2 (4) pp.309-317
2012 Analytical evaluation of a new route optimization scheme for nested mobile network. World Applied Sciences Journal pp.16-20
2011 High watermarking capacity based on spatial domain technique. Information Technology Journal , 10 (7) pp.1367-1373
2011 Distortion-free embedding in the optic disk of retina fundus images using complex-valued neural network. World Applied Sciences Journal , 13 (6) pp.1295-1301
2011 Forgery detection in medical images using Complex Valued Neural Network (CVNN). Australian Journal of Basic and Applied Sciences , 5 (7) pp.1251-1264
2011 A robust watermark embedding in smooth areas. Research Journal of Information Technology , 3 (2) pp.123-131
2011 ISB watermarking embedding: block based model. Information Technology Journal , 10 (4) pp.841-848
2011 Determining watermark embedding strength using complex valued neural network. Journal of Applied Sciences , 11 (16) pp.2907-2915
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences , 27 pp.233-240
2010 The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms. International Journal of Computer Science and Information Security , 8 (6) pp.47-51
2010 Watermaking technique based on ISB (Intermediate Significant Bit). pp.41
2009 An artificial-intelligence-based approach for audio steganography. MASAUM Journal of Open in Science and Engineering , 1 (1) pp.64-68
2009 A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology , 50 pp.989-996
2009 A genetic-algorithm-based approach for audio steganography. World Academy of Science, Engineering and Technology , 54 pp.360-363

Conference or Workshop Item

2020 Correlation between speaker gender and perceptual quality of mobile speech signal. In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM 2020)
2020 A framework assessing the effect of user emotions on touch gesture behavioural biometric authentication. In: 2019 6th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2019 Multi-frame super-resolution: a survey. In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
2018 تقنبة المعلومات وأخلاق المهنة. In: 3rd International Social Science Conference: Islamic Thought & Understanding (ISSCITU 2018)
2018 Knowing what you know about your faith an interactive application for measuring your faith in Islam. In: International Conference on Information and Communication Technology for the Muslim World, ICT4M 2018
2018 Software defined-network for real-time operations of business intelligence tasks. In: International Conference on Business, Humanities and Education (ICBHE 2018)
2018 Information-based interactive services and support system. In: 2017 IEEE Conference on Systems, Process and Control (ICSPC 2017)
2018 Speaker identification based on curvlet transform technique. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
2017 Isolated Iqlab checking rules based on speech recognition system. In: 2017 8th International Conference on Information Technology (ICIT)
2017 Successful business intelligence system for SME: An analytical study in Malaysia. In: International Research and Innovation Summit (IRIS2017)
2017 The trend of business intelligence adoption and maturity. In: 2nd International Conference on Computer Science and Engineering
2017 Comments and improvements of “HOTA: Handover optimized ticket­based authentication in network­based mobility management”. In: 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)
2017 Attitude towards information property rights among students : The case of International Islamic University Malaysia. In: 2016 4th International Conference on User Science and Engineering (i-USEr)
2017 Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation. In: IEEE 13th International Colloquium on Signal Processing & its Application (CSPA 2017)
2016 Performance comparison of (Diff-FH NEMO) scheme in IPv6-based network mobility. In: 6th International Conference on Computer and Communication Engineering (ICCCE 2016)
2016 Determining the state of truthfulness and falsehood by analyzing the acquired EEG signals. In: 12th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2016
2016 Impersonate affecting users' attitude toward facebook in Egypt. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Attitude towards information privacy issues among students of IIUM. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 The extreme doubly stochastic quadratic operators on two dimensional simplex. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Evaluation of users' awareness and their reaction on information security. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Web users’ knowledge and their behavior towards security threats and vulnerabilities. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Variable size of blocks for embedding watermark images using ISB technique. In: 6th International Conference on Digital Information Processing and Communications, ICDIPC 2016
2016 The convergence consensus of multi-agent systems controlled via doubly stochastic quadratic operators. In: 1st International Symposium on Agents, Multi-Agent Systems and Robotics, ISAMSR 2015
2016 Web user' knowledge and their behavior towards security threats and vulnerabilities. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
2016 Developing mobile E-groceries model. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Least Significant Bit (LSB) and Random Right Circular Shift (RRCF) in digital watermarking. In: 2016 12th International Computer Engineering Conference (ICENCO)
2016 Security failures in EMV smart card payment systems. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 An appraisal of online audio Qur'an as a new media tool for civilization. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015
2015 Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication. In: 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCCNEE 2015)
2015 الدارسات المعجمية ومنهج التعامل مع المصطلح القرآني. In: المؤتمر القرآني الدولي السنوي (Muqaddas V) 2015
2015 الدراسات المعجمية ومنهج التعامل مع المصطلح القرآني = Methods on dealing with the Quranic terms. In: The 5th Annual International Qur'anic Conference 2015 (MUQADDAS V)
2015 Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students. In: 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2014)
2015 Investigating the empirical relation and importance of perceived usefulness, perceived ease of use and intention to use online information resources for evidence based medicine. In: 2014 International Conference on Computer Assisted System in Health (CASH)
2014 The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2014 Perceptions of library and information science community towards open source software adoption in libraries of Oman. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 A new robust image watermarking method using Dual intermediate significant bits. In: 4th International Conference on Control System and Computing and Engineering (ICCSCE 2014)
2014 Mini-ATX computer system in vehicle. In: International Conference on Advances in Manufacturing and Materials Engineering
2014 Comparing performances of Markov Blanket and Tree Augmented Naïve-Bayes on the IRIS dataset. In: International MultiConference of Engineers and Computer Scientists 2014 (IMECS 2014)
2014 Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Project dimension as a readiness factor toward business intelligent systems. In: 3rd International Conference on Computer Engineering & Mathematical Sciences (ICCEMS 2014)
2014 Personal learning environment framework for a self-help Maqam-based search system. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Automatic face reconstruction system. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT)
2014 Robust image watermarking based on Dual Intermediate Significant Bit (DISB). In: 2014 6th International Conference on Computer Science and Information Technology (CSIT)
2014 Exploring the challenges of MP3 audio steganography. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2014 Orthogonal wavelet support vector machine for predicting crude oil prices. In: 1st International Conference on Advanced Data and Information Engineering (DaEng 2013)
2014 The important dimensions for assessing organizations' readiness toward business intelligence systems from the perspective of Malaysian organization. In: 2013 International Conference on Advanced Computer Science Applications and Technologies ACSAT 2013
2014 3D animation as an alternative mean of da'wah for children. In: 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2014
2014 Online recognition system for handwritten Arabic chemical symbols. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
2014 التكنولوجيا وأزمة اللغة العربية بين التهميش والانتشار . In: المؤتمر الدولي الثالث للغة العربية
2014 Online recognition system for handwritten Hindi digits based on matching alignment algorithm. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
2014 Management dimension for assessing organizations' readiness toward business intelligence systems. In: Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference
2014 Arabic-Malay cognates as a computer assisted language learning. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
2014 Career guidance and employment management system. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
2014 Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm. In: The First International Conference on Soft Computing and Data Mining (SCDM-2014)
2014 Robust image watermarking scheme by discrete wavelet transform. In: 5th International Conference on Computer and Communication Engineering (ICCCE 2014)
2013 Online recognition system for handwritten Arabic mathematical symbols. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 The important dimensions for assessing organization's readiness toward business intelligence systems from the perspective of Malaysian organization. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 Trade-off between robustness, and quality based on dual intermediate significant bits. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2013 Problems of writing on digital surfaces in online handwriting recognition systems. In: 5th International Conference on Information and Communication Technology for the Muslim World.
2013 Feature extraction techniques of online handwriting arabic text recognition. In: 5th International Conference on Information and Communication Technology for the Muslim World
2013 Properties of digital image watermarking. In: IEEE 9th International Colloquium on Signal Processing and its Applications
2013 Optimizing three-dimensional (3D) map view on mobile devices as navigation aids using artificial neural network. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 3D mobile map visualization concept for remote rendered dataset. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Investigating digital watermark dynamics on carrier file by feed-forward neural network. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2013 Feature extraction techniques of online handwriting arabic text recognition. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Automatic interactive security monitoring system. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS)
2013 Co - active neuro-fuzzy inference systems model for predicting crude oil price based on OECD inventories. In: 3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13)
2013 Investigating the dynamics of watermark features in audio streams. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA)
2013 Intelligent system for predicting the price of natural gas based on non-oil commodities. In: 2013 IEEE Symposium on Industrial Electronics & Applications (ISIEA2013)
2013 Comparison of empirical indoor propagation models for 4G wireless networks at 2.6 GHz. In: International Conference on Control, Engineering & Information Technology (CEIT2013)
2012 Route optimization scenario of a new scheme based on nested mobile network. In: International Conference on Computer and Communication Engineering (ICCCE 2012)
2012 Recognition techniques for online Arabic handwriting recognition systems. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012)
2012 Novel mechanism to improve Hadith classifier performance. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Digital image watermarking, analysis of current methods. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Web-based conference management system for higher learning institutions. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Image recognition technique of road tax sticker in Malaysia. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Manpower model for human resource planning management. In: International Conference on Advanced Computer Science Applications and Technologies
2012 High image quality watermarking model by using genetic algorithm. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Assessing organizations readiness toward business intelligence systems: a proposed hypothesized model. In: International Conference on Advanced Computer Science Applications and Technologies
2012 Improving knowledge extraction of Hadith classifier using decision tree algorithm. In: International Conference on Information Retrieval & Knowledge Management (CAMP), 2012
2012 Protection of integrity and ownership of pdf documents using invisible signature. In: 14th International Conference on Computer Modelling and Simulation (UKSim)
2012 Digital watermarking: A counterfeiting and piracy deterrence. In: The 3rd International Conference on Cryptology & Computer Security 2012 (Cryptology2012
2012 Analytical evaluation of a new route optimization scheme for nested mobile network . In: 2nd International Conference on Mathematical Applications in Engineering (ICMAE’10)
2012 A framework of a route optimization scheme for nested mobile network. In: 19th International Conference on Neural Information Processing (ICONIP 2012)
2012 A mobile dictionary for pilgrims. In: 2012 International Conference on Information Technology and e-Services
2011 Analysis of ISB watermarking model : block based methods vs Embedding repetition methods. In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011)
2011 Analysis of ISB watermarking model: Block based methods vs embedding repetition methods. In: The 9th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2011)
2011 Human capital business partner information technology and network technology manpower model. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011)
2011 Tropical crops advisory selection system. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011)
2011 A watermarking authentication system for medical images. In: World Congress on Engineering and Technology (CET 2011)
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)
2011 التقنيات الحديث في خدمة ضيوف الرحمن = Al-Taqniyāh al-ḥadīthah fi khidmah ḍuyūf al-raḥman.. In: الندوة الوطنية الثالثة لتقنية المعلومات: المحتوى العربي والإسلامي على الانترنت = Al-Nadwah al-waṭaniyah al-thālithah li taqniyah al-ma'lūmāt: al-muḥtawā al-Arabi wa al-Islāmī 'ala Internet
2011 Analysis of ISB watermarking model: block based methods vs embedding repetition methods . In: MoMM '11 Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
2011 Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network. In: 4th International Conference on Mechatronics (ICOM 2011)
2011 An analytical evaluation of the Islamic websites. In: International Conference on Islamization in Modern Science and Scientification of Islamic Studies: Prospects and Bridges (ICIMSIS 2011)
2011 Comparative study of different steganographic techniques. In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011)
2011 Enhanced mechanism to handle missing data of Hadith classifier. In: International Conference on Sustainable Development 2011
2011 Development of model for assessing organizations’ readiness toward successful Business Intelligence Systems. In: International Conference on Research and Innovation in Information Systems (ICRIIS 2011)
2010 Digital watermarking for mammogram authentication. In: International Conference on Fundamental & Applied Sciences (ICFAS) 2010
2010 Watermarking technique based on ISB (Intermediate Significant Bit). In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010)
2010 Watermarking in safe region of frequency domain using complex-valued neural network. In: International Conference on Computer and Communication Engineering (ICCCE 2010)
2010 Datamining and Islamic knowledge extraction: Alhadith as a knowledge resources . In: International Conference on Information and Communication Technology for Muslim World (ICT4M)
2010 Segmentation Techniques for Online Arabic Handwriting Recognition:A Survey . In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2010
2009 A secure audio steganography approach.
2009 A Novel Approach for Audio Watermarking . In: Firth International Conference on Information Assurance and Security
2009 Robust Audio Steganography via Genetic Algorithm . In: Third International Conference on Information & Communication Texchnologies IEEE-ICIST 2009
2009 An approach to improve the robustness of substitution techniques of audio steganography . In: 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT)
2007 Steganography technique using modulus arithmetic. In: 9th International Symposium on Signal Processing and Its Applications, 2007. ISSPA 2007.

Book

2017 Nonlinear stochastic operators to control the consensus problem in multi-agent systems. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-690-6
2017 Open source software adoption for academic libraries. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-761-3
2015 Internet applications. IIUM Press . ISBN 978-967-418-313-4
2015 Multimedia and its applications. IIUM Press . ISBN 9789674183127
2011 Informatics Engineering and Information Science : International Conference, ICIEIS 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 Proceedings, Part II . Springer . ISBN 978-3-642-25452-9; e-ISBN 978-3-642-25453-6
2011 Advancement in E-Learning.. IIUM Press . ISBN 978-967-418-105-5
2011 Informatics Engineering and Information Science : International Conference, ICIES 2011 Kuala Lumpur, Malaysia, November 14-16, 2011 proceedings, Part I. . Springer . ISBN 978-3-642-25326-3.
2011 Computer applications: theories and applications. IIUM Press . ISBN 9789674181079
2011 Data management: issues, challenges and opportunities. IIUM Press . ISBN 9789674180843

Book Section

2016 Dynamics classifications of extreme doubly stochastic quadratic operators on 2D simplex. In: Advanced Computer and Communication Engineering Technology, LNEE Springer International Publishing . ISBN 978-3-319-24582-9 , pp.323-335
2016 Developing a mobile navigation aid. In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI Global . ISBN 978-1466694385 , pp.124-136
2016 Developing a mobile navigation aid. In: Critical Socio-Technical Issues Surrounding Mobile Computing IGI Global . ISBN 978-1466694385 , pp.124-136
2015 Fundamentals of multimedia. In: Multimedia and Its Applications IIUM Press . ISBN 978-967-418-312-7 , pp.1-23
2015 Malaysian multimedia content industry. In: Multimedia and Its Applications IIUM Press . ISBN 978-967-418-312-7 , pp.24-40
2015 Multimedia and its relevance to education. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.41-52
2015 Elements of multimedia on the Internet. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.53-63
2015 Text in multimedia. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.64-72
2015 Arabic text. In: Multimedia and Its Applications IIUM Press . ISBN 978-967-418-312-7 , pp.73-92
2015 Practices of handling audio. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.126-138
2015 Video. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.139-148
2015 Introduction to computer graphics. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.149-158
2015 Application of multimedia in digital watermarking. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.159-177
2015 Application of multimedia in language self-learner. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.178-184
2015 Application of multimedia in learning history subject. In: Multimedia and its applications IIUM Press . ISBN 978-967-418-312-7 , pp.185-191
2015 Application of multimedia in teaching Hajj. In: Multimedia and Its Applications IIUM Press . ISBN 978-967-418-312-7 , pp.192-198
2015 The high impact of using multimedia in enhancing education in schools. In: Multimedia and Its Applications IIUM Press . ISBN 978-967-418-312-7 , pp.198-206
2015 Fundamentals of computer networks: wired/wireless. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.1-15
2015 Using multimedia in developing Islamic website. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.40-47
2015 Multimedia security and the internet. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.48-62
2015 Application of multimedia user friendly e-lecture notes. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.63-69
2015 Application of multimedia in e-books system. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.70-77
2015 Web-based conference management system for higher learning institutions. In: Internet Applications IIUM Press . ISBN 9789674183134 , pp.106-118
2015 Spread spectrum audio watermarking using vector space projections. In: Advances in Intelligent Informatics Springer International Publishing . ISBN 978-3-319-11218-3 , pp.297-307
2013 Analysis of wardriving activity and WiFi access points. In: Wireless sensor networks for developing countries: First International Conference, WSN4DC 2013 Jamshoro, Pakistan, April 2013 revised selected papers Springer . ISBN 9783642410536, e-ISBN 9783642410543 , pp.51-59
2011 Classifying users emotions towards the quranic recitation using EEG: a preliminary study. In: Understanding brain developmental disorder based on EEG in soft computing approach IIUM Press . ISBN 9789674181116 , pp.404-419
2011 Multimedia elements and internet . In: The Web : Its Utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.198-201
2011 Introduction to E- learning. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.1-4
2011 An overview of ATM systems security . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.113-128
2011 Security risk of ATM systems, case of study . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.129-138
2011 Relevance of multimedia in education. . In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.11-14
2011 Improving the robustness of ISB watermarking techniques by repetition of the embedding. In: Software engineering and computer systems: communications in computer and Information science Springer-Verlag Berlin Heidelberg . ISBN 978-3-642-22170-5 (O), 978-3-642-22169-9 , pp.592-599
2011 Threats and solutions for ATM security systems . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.139-152
2011 Security of multimedia in the web . In: The web : Its utilisation, Evaluation and Security IIUM Press . ISBN 978-967-418-112-3 , pp.257-262
2011 Investigating the student’s awareness on computer security and ethics . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.155-177
2011 Difficulties and challenges of recognizing Arabic text . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.179-191
2011 The study of multicast hierarchical mobile IPV6. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.21-26
2011 Learning PMR history subject using multimedia.. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.51-54
2011 Teaching Islamic concepts electronically : hajj as an example.. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.55-60
2011 Virtual learning environment. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.5-9
2011 The effect of external factors on the students' acceptance of virtual learning.. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.15-20
2011 دراسة احصائية لكلمات القرآن الكريم = Dirāsah ihsāiyah li kalimāt al-Qura'an al-Karīm. In: الألسنية المعاصرة واتجاهاتها (al-Alsuniyah al-mu'asirah wa-ittijahatuha) IIUM Press . ISBN 9789670225302 , pp.286-302
2011 An evaluation of transform domain watermarking and its application to intellectual properties images. In: Multimedia Encryption, Transmission and Authentication IIUM Press . ISBN 978-967-418-160-4 , pp.192-197
2011 Introduction to QoS approaches in mobile ad hoc networks. In: Advances in mobility management for IP networks IIUM Press . ISBN 9789674181406 , pp.171-175
2011 Online management systems for primary school students. . In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.113-116
2011 Tropical crops planting recommendation system. In: Data management: issues, challenges and opportunities IIUM Press . ISBN 9789674180843 , pp.157-160
2011 Employing machine learning algorithms to extract Islamic knowledge. In: Data management: issues, challenges and opportunities IIUM Press . ISBN 9789674180843 , pp.161-168
2011 Justification of voice recognition system : case study of the Quran.. In: Information technology issues and applications in Malaysia : a collection of articles IIUM Press . ISBN 9789674180034 , pp.287-301
2011 Ethical issues in e-learning.. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.145-149
2011 Language self-learner. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.21-25
2011 Logistic database system. In: Data management: issues, challenges and opportunities IIUM Press . ISBN 9789674180843 , pp.177-183
2011 Online teaching notes. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.27-31
2011 Development of user friendly e-lectures notes. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.33-38
2011 E-Books systems. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.39-44
2011 The high impact of using animation in enhancing education in schools. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.45-50
2011 Introduction to mobility management. In: QoS And Mobile Technologies IIUM Press . ISBN 9789674181420 , pp.47-51
2011 Nested mobile networks. In: QoS And Mobile Technologies IIUM Press . ISBN 9789674181420 , pp.53-57
2011 Evaluation of NEMO extensions. In: QoS And Mobile Technologies IIUM Press . ISBN 9789674181420 , pp.59-64
2011 Handoff process in micromobility protocols. In: QoS And Mobile Technologies IIUM Press . ISBN 9789674181420 , pp.65-70
2011 Comparison between network simulators. In: QoS And Mobile Technologies IIUM Press . ISBN 9789674181420 , pp.71-74
2011 Adaptive digital watermarking system for authentication of intellectual properties. In: Multimedia Encryption, Transmission and Authentication IIUM Press . ISBN 978-967-418-160-4 , pp.182-191
2011 Human capital business partner information technology & network technology manpower model. In: Selected readings in computing and telecommunications IIUM Press . ISBN 9789670225814 , pp.38-49