الكليات

الكليات

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Asadullah Shah
Professor

Print CV Email Me

Staff Detail


Professor Asadullah Shah started his career as a Computer Technology lecturer in 1986. Before joining IIUM in January 2011, he worked in Pakistan as a full professor (2001-2010) at Isra, IOBM and SIBA. He earned his Ph.D in Multimedia Communication from the University of Surrey UK in 1998. During his 28 years of teaching, he has taught courses in the fields of Electronics, Computers, Multimedia Communication and Research Methodologies at undergraduate and postgraduate levels. He has held various administrative positions throughout his carreer as Head of Department, Dean, controller of exam ... show more

  • Ph.D in Multimedia Communication - Doctor of Philosophy, University of Surrey
  • M.Sc in Computer Technology - Masters Degree, University of Al-Sind
  • B.Sc in Electronic - Bachelor Degree, University of Al-Sind
  • Engineering Tech ~ Applied Sciences And Technologies ~ Aerospace ~ Advance and Emerging Methods (Including Quantitative Analysis such as Forecasting, Modelling, Inference, Data Mining; Survey Techniques Complex Survey, Rank Set Sampling, Market Survey), and Performance Measurement (Hierarchical Modelling, Data Envelopment Analysis, Stochastic Frontier Analysis and Risk Analysis)) - modelling, survey techniques, quantitative analysis
  • 2015 - 2017 , Australian Academy of Busness Leaders (AABL)
  • 2015 - 2016 AABL advisory Board Member, Australan Academy of Business leader (AABL) Sydney, Australia
  • 2015 - 2016 , University Technology Malaysia
  • 2013 - 2015 , DSF Information
  • 2013 - 2014 , IEEE Computer Society
ADVANCED DATA MANAGEMENT 2017/2018 2018/2019
ADVANCED ENTERPRISE INTEGRATION 2018/2019 2019/2020
ANIMATION TECHNIQUE 2012/2013 2013/2014 2014/2015
CREATIVE DESIGN TECHNIQUES 2012/2013 2013/2014 2014/2015 2015/2016
DATA MANAGEMENT 2016/2017
DIGITAL AUDIO AND VIDEO TECHNOLOGY 2018/2019
ENTERPRISE INTEGRATION 2018/2019
FINAL YEAR PROJECT I 2012/2013 2013/2014 2014/2015 2016/2017
FINAL YEAR PROJECT II 2013/2014 2014/2015 2015/2016 2017/2018 2019/2020
ICT RESEARCH METHODS 2017/2018
INDUSTRIAL ATTACHMENT 2010/2011 2011/2012 2015/2016 2016/2017
ISLAMIC WORLDVIEW, IT AND SOCIETY 2016/2017
IT PROJECT AND CHANGE MANAGEMENT 2017/2018
IT SECURITY II 2011/2012 2012/2013
MOBILE COMMUNICATION 2016/2017 2017/2018
MOBILE COMMUNICATIONS AND NETWORKS 2018/2019 2019/2020
OPERATING SYSTEM 2012/2013
PROJECT & CHANGE MANAGEMENT 2016/2017 2017/2018
RESEARCH METHODOLOGY FOR IT 2011/2012 2012/2013 2013/2014 2014/2015 2015/2016 2017/2018
SIGNALS AND SYSTEMS 2011/2012
WEB PROGRAMMING 2011/2012
WEB PROGRAMMING FUNDAMENTAL 2011/2012 2012/2013
In Progress
2019 - Present Analysis of Video Game Design Styles on Learning Aptitude Using EEG
2015 - Present Re-engineering pre-marriage course learning for JAKIM: an investigation of multimedia lifelong mobile learning experience
Completed
2015 - 2019 Re-engineering pre-marriage course learning for JAKIM: an investigation of multimedia lifelong mobile learning experience
2013 - 2014 Research Methodologies: An Islamic Perspective
2012 - 2016 A novel model of routing protocol for mobile ad hoc networks based on link reliability
2012 - 2016 A Novel Feedback Technique to Detect Unsatisfiable Submodels of UML/OCL Class Diagrams for Verification of UML/OCL Models
2011 - 2012 Mobile Hajj Dictionary (Arabic, Malay and English Based)
2011 - 2011 Research Methodologies : A Practical Approach (KVC Project 2011)
2011 - 2013 RU 2011: On Adverse and Non-Uniform Traffic Patterns on H3DM Network
2011 - 2015 RU 2011: Development of Text Compression Package for Tri-Language Text
02 سبتمبر 2016 Outstanding Contribution. Others - University level.
Article
2019 A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder. Universal Access in the Information Society pp.1-31
2019 Key individual identification using dimensional relevance in the stratum of networks. Journal of Intelligent & Fuzzy systems pp.1-15
2019 A review on energy consumption optimization techniques in IoT based smart building environment. Information , 10 (3) pp.1-34
2019 Deployment of social nets in multi-layer model to identify Key individuals using majority voting. Knowledge and Information Systems An international Journal , 58 (1) pp.113-137
2019 Competitive algorithms for online conversion problems with interrelated prices. International Journal of Advanced Computer Science and Applications (IJACSA) , 10 (6) pp.582-589
2018 Performance optimization of wireless sensor network for multimedia services. International Journal of Engineering and Technology , 7 (4.15) pp.323-326
2018 Energy efficiency in virtualized data center. International Journal of Engineering & Technology , 7 (4.15) pp.315-317
2018 Performance evaluation of distributed mMulti media wireless sensor network. International Journal of Engineering and Technology , Vol 7 (4.15) pp.318-322
2018 Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation. International Journal of Advanced Computer and Applications , 9 (4) pp.221-229
2018 Visualization representation benefits of pre-requirement specification tractability. International Journal of Engineering & Technology , 7 (2.5 (Special Issue 5)) pp.44-52
2018 Identification of valued users to generate more telecom filigence. Sindh University Research Journal (Science Series) , 50 (3D) pp.224-226
2018 An assessment of proximity technology adoption from a user's perspective. Sindh University Research Journal (Science Series) , 50 (3D) pp.220-223
2018 A review of near field communication process: how do it works?. Sindh University Research Journal (Science Series) , 50 (3D) pp.237-240
2018 Visualization representing benefits of pre-requirement specification traceability. International Journal of Engineering and Technology(UAE) , 7 (2) pp.44-52
2018 Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies. International Journal of Engineering & Technology , 7 (2.34 (Special issue 34)) pp.89-92
2018 Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem. International Journal of control and Automation , 11 (3) pp.35-44
2018 Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review. International Journal of Control and Automation , 11 (2) pp.135-150
2018 A review on optimization of vehicle frontal crashworthiness for passenger safety. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34))
2018 Beyond traditional audits: the implications of information technology on auditing. International Journal of Engineering & Technology (UAE) , 7 (2.34) pp.5-11
2018 Integration social media technology and ethical collaborative learning. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.12-15
2018 An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.16-21
2018 Robotic exoskeleton control for lower limb rehabilitation of knee joint. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.56-59
2018 Near field communication enabled mobile payments: preliminary study. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.60-63
2018 Preliminary study for customer’s online shopping satisfaction from security perspective. International Journal of Engineering & Technology (UAE) , 7 (2.34 (Special issue 34)) pp.64-68
2018 Analysis determinants of social media acceptance in higher educational institution of Pakistan. International Journal of Engineering and Technology , 7 (2.5 (Special Issue 5)) pp.32-36
2018 Unstructured source artifacts ontology for requirement validation in GDSD. International Journal of Engineering and Technology , 7 (2.5 (Special Issue 5)) pp.44-52
2017 Predicting the fraud volume in personal computer using different web browsers. Since International , 29 (3 (May-June)) pp.681-685
2017 Halal products recognition using RFID/NFC technology. Science International , 29 (3 (May-June)) pp.687-692
2017 WSN based sensing model for smart crowed movement with identification: an extended study. Journal of Theoretical and Applied Information Technology , 95 (5) pp.975-988
2017 Forensic analysis of offline signature using multi-layer perception and random forest. International Journal of Database Theory and Applications , 10 (1) pp.139-148
2017 Barriers effecting successful implementation of E-learning in Saudi Arabian universities. Internation Journalk of Educational Technology (iJET) , 12 (6) pp.94-107
2017 Online banking information systems acceptance: an empirical examination of system characteristics and web security. Information Systems Management , 34 (1) pp.50-64
2017 Reliability and validity of a questionnaire for empirical analysis of factors influencing IOT-based smart healthcare. Science International , 29 (6 Section B (November-December)) pp.1201-1206
2017 Artifact evaluation in information systems design science research: social constructivism environment. Science International , 29 (5) pp.1059-1064
2017 Assessing digital library acceptance by postgraduate students: a proposed framework. University of Sindh Journal of Information and Communication Technology , 1 (1) pp.47-50
2017 Selecting respondents for survey questionnaire in Islamic way. Journal of Islamic, Social an, Economics and Development , 2 (5) pp.40-46
2017 A mixed method study for investigating critical success factors (CSFs) of E-learning in Saudi Arabian Universities. International Journal of Advanced Computer Science and Applications , 8 (5) pp.171-178
2017 A hybrid method using kinect depth and color data stream for hand blobs segmentation. Science International , 29 (3 (May-June)) pp.515-519
2016 Towards using CMU sphinx tools for the Holy Quran recitation verification. International Journal on Islamic Applications in Computer Science And Technology (IJASAT) , 4 (2) pp.10-15
2016 HTM:a new hierarchical interconnection network for future generation parallel computers. IETE Technical Review , 33 (2) pp.93-104
2016 Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems. Sindh University Research Journal (Science Series) , 48 (4D) pp.17-26
2016 An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem. SINDH university Research Journal ( science series ) , 48 (4D) pp.175-182
2016 A study to investigate state of ethical Development in E-learning. International Journal of Advanced Computer Science and Applications , 7 (4) pp.284-290
2016 Testing desktop application: Police station information management system. International Journal of Software Engineering and Its Applications , 10 (7) pp.101-118
2016 Risk management policies of telecommunication and engineering laboratories . International Journal of Hybrid Information Technology , 9 (4) pp.281-290
2016 Analysis and enhancement of the denoising depth data using kinect through iterative technique. Jurnal Teknologi , 78 (9) pp.185-193
2016 Real-time hand detection by depth images: a survey. Jurnal Teknologi , 78 (2) pp.141-148
2016 Building CMU Sphinx language model for the Holy Quran using simplified Arabic phonemes. Egyptian Informatics Journal , 17 (3) pp.305-314
2016 Utilizing modular neural network for prediction of possible emergencies locations within point of interest of Hajj pilgrimage. Modern Applied Science , 10 (2) pp.34-51
2016 Application service delivery in the modern virtualized data center-improving reliability and scalability. Sindh University Research Journal (Science Series) , 48 (3) pp.579-584
2016 Transitional approaches for PERN migration to SDN. Information Technology Journal , 15 (4) pp.137-143
2016 Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan . Sindh University Research Journal (Science Series) , 48 (2) pp.309-314
2016 An offline signature verification technique using pixels intensity levels. International Journal of Signal Processing, Image Processing and Pattern Recognition , 9 (8) pp.205-222
2016 A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm. International Journal of Signal Processing, Image Processing and Pattern Recognition , 9 (10) pp.11-20
2015 Transaction Management techniques and practices in current cloud computing environment: a survey . International Journal of Database Management Systems (IJDMS) , 7 (1) pp.41-49
2015 Automated animation of quadrupeds using procedural programming technique. Asian Journal of Scientific Research , 8 (2) pp.165-181
2015 Mobile agent based multi-layer security framework for cloud data centers. Indian Journal of Science & Technology , 8 (12) pp.52923-1
2015 Image segmentation methods and edge detection: An application to knee joint articular cartilage edge detection. Journal of Theoretical and Applied Information Technology , 71 (1) pp.87-96
2015 An applications development for record keeping of police stations in Pakistan . Journal of Scientifc Research and Advances , 2 (4) pp.144-150
2015 Collaborative learning, using Facebook's page and Groups. International Journal of Computer System , 2 (2) pp.47-52
2015 Analyzing the weighted dark networks using scale-free network approach. WSEAS Transactions on Computers , 14 pp.748-759
2015 Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review. Renewable and Sustainable Energy Reviews , 51 pp.1553-1563
2015 A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students . Journal of Ecosystem & Ecography , 5 (3) pp.1-5
2015 An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait . Wulfenia Journal , 22 (3) pp.258-269
2015 Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach . American Journal of Computer Science and Engineering , 2 (3) pp.10-19
2015 Pervasive learning using cloud computing . Sindh University Research Journal (Science Series) , 47 (3) pp.567-570
2015 An appraisal of off-line signature verification techniques . International Journal on Modern Education and Computer Science , 4 pp.67-75
2015 Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework. Journal of Islamic Countries Society of Statistical Sciences (IJOSS) , 1 (2) pp.131-139
2015 Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation . International Journal of Computer Graphics & Animation , 5 (1) pp.47-67
2015 Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem . Applied Mathematics & Information Sciences , 9 (5) pp.2703-2714
2015 Computational modeling of mood from sequence of emotions. Advanced Science Letters , 21 (10) pp.2997-3001
2015 Resolving ethical dilemma in technology enhanced education through smart mobile devices . International Arab Journal of e-Technology , 4 (1) pp.25-31
2014 Cloud computing adoption model for universities to increase ICT proficiency. SAGE Open pp.1-10
2014 Critical insight for MAPReduce optimization in Hadoop. International Journal of Computer Science and Control Engineering , 2 (1) pp.1-7
2014 Cloud computing adaptation model for universities to increase ICT proficiency. SAGE Open , 4 (3) pp.1-10
2014 Gender and mobile payment system adoption among students of tertiary institutions in Nigeria. International journal of Computer and Information Technology , 3 (1) pp.13-20
2014 Metrics for computing performance of data center for instigating Energy Efficient Data center. Journal of Scientifc and Industrial Research , 73 pp.11-15
2014 Encryption method for SCADA security enhancement. Journal of Applied Sciences pp.1-9
2014 Implementation of server virualization to build energy efficient data centers. Journal of Power Technologies , 94 (2) pp.1-10
2014 Deployment of new dynamic cryptography buffer for SCADA security enhancement . Journal of Applied Sciences pp.1-11
2014 Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia Journal , 21 (3) pp.462-470
2014 ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network. Pensee Journal , 76 (5) pp.xx-xx
2014 Energy efficiency and environmental consideration for green data centres. International Journal of Green Economics , 8 (2) pp.144-157
2014 Contribution of cloud computing in the reduction of carbon dioxide emission . International Journal for Innovation Education and Research , 2 (8) pp.118-120
2014 Power usage effectiveness metrics to measure efficiency and performance of data centers. Applied Mathematics and Information Sciences , 8 (5) pp.2207-2216
2014 EloPSO: energy aware elephant swarm optimization for mobile adhoc networks . Pensee Journal , 7 (5) pp.88-103
2013 Selecting a mentor: guide for a Protégé. World Applied Sciences Journal , 24 (6) pp.732-738
2013 Prototyping of a situation awareness system in the maritime surveillance. IOP Conference Series: Materials Science and Engineering , 53 (012007) pp.1-6
2013 Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (1) pp.21-30
2013 Forward and Inverse Kinematics Seamless Matching using Jacobian. Sindh University Research Journal (Science Series) , 45 (2) pp.387-392
2013 Evaluating the effect of IP and IGP on the ICMP throughput of a WAN. Journal of Advanced Computer Science and Technology Research (JACSTR) , 3 (2) pp.71-82
2013 Measuring efficiency of tier level data centers to implement green energy efficient data centers. Middle-East Journal of Scientific Research , 15 (2) pp.200-207
2013 Technology based learning analysis of CBCS model at KKU - Case study of College of Computer Science King Khalid University, Saudi Arabia. International Journal of Emerging Technologies in Learning , 8 (3) pp.8-12
2012 Information and communication technology workforce employability in Malaysia. Campus Wide Information Systems , 29 (2) pp.80-89
2012 Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm. International Journal of Innovative Computing, Information and Control , 8 (6) pp.4375-4389
2012 Virtualization implementation approach for data centers to maximize performance. Asian Journal of Scientific Research , 5 (2) pp.45-57
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation . Procedia - Social and Behavioral Sciences , 27 pp.233-240
2011 Green IT based energy efficiency model for data centers to reduce energy consumption & CO2 emissions. International Journal of Current Research and Review , 3 (10) pp.1-10
2011 Revisiting far/near infrared pyramid-based fusion types for night vision using matlab. Pakistan Journal of Engineering Technology & Science (PJETS) , 1 (1) pp.21-36
2011 A novel text steganography technique to Arabic language using reverse fatah . Pakistan Journal of Engineering Technology & Science (PJETS) , 1 (2) pp.106-113
2011 Internet banking in Pakistan: finding complexities. Journal of Internet Banking and Commerce , 16 (1) pp.1-14
2011 Differential image compression for telemedicine: a novel approach. Pakistan Journal of Engineering, Technology and Science , 1 (1) pp.14-20
2011 Command based line following robot using RF technology. Journal of Computer Science and Technology , 1 (1) pp.25-35
2006 Infective endocarditis in the East coast of peninsular Malaysia: a two year retrospective survey from Kuantan. JK-Practitioner , 13 (1) pp.5-8

Conference or Workshop Item

2019 A review of programming code assessment approaches. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2019 The effect of web-based social networking on consultancy. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Factors affecting secure software development practices among developers- an investigation. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Offline printed Sindhi optical text recognition: survey. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Disparity between theory & practice beyond the worst-case competitive analysis. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 A conceptual framework for measuring acceptance of contactless payment methods. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2019 Review on Natural Language Processing (NLP) and its toolkits for opinion mining and sentiment analysis. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2019 Visualization: a tool to study nodes in multi-dimensional networks. In: Computing Conference 2019
2019 A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan. In: 2019 International Conference on Information Science and Communication Technology (ICISCT)
2019 A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life. In: 5 th IEEE International Conference on Engineering, Technologies and Applied Sciences ( ICETAS 2018 )
2019 Acceptance and use of information and communication technology in higher education institutes of Kuwait: a proposed framework. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2018 Near field communication enabled payment system adoption: A proposed framework. In: 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS)
2018 Security and privacy for IoT and fog computing paradigm. In: 15th Learning and Technology Conference (L&T) 2018
2018 Towards an accurate speaker-independent Holy Quran acoustic model. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences, ICETAS 2017
2018 Preliminary study on factors affecting E-commerce success: a modified Delone and McLean model. In: 2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2018 An empirical study of Internet of Things (IoT) - based healthcare acceptance in Pakistan:pilot study. In: 3rd IEEE International Conference on Engineering Technologies and Social Sciences, ICETSS 2017
2018 Prediction-based resource allocation model for real time tasks. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2018 Prioritizing barriers of e-learning for effective teaching-learning using Fuzzy Analytic Hierarchy Process (FAHP). In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2018 The future of data privacy and security concerns in Internet of things. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD)
2018 Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes. In: 2018 IEEE International Conference on Innovative Research and Development (ICIRD)
2018 Social commerce in e-business of Pakistan: opportunities, challenges and solutions. In: International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2018
2018 A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. In: 7th International Conference on Computer and Communication Engineering (ICCCE) 2018
2018 A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh. In: 5th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2018
2018 E-learning in Iraqi universities: a review. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
2018 Towards an integrated framework of e-learning through an international innovative collaboration: Iraqi perspective. In: 3rd International Conference on Computing, Engineering, and Design, ICCED 2017
2018 Health information system (HMS) in Malaysia. In: 1st International conference on Multidisciplinary Academic Research
2018 Using web crawlers for feature extraction of social nets for analysis. In: 14th International Conference on Information Technology - New Generations (ITNG 2017)
2018 Detecting change from social networks using temporal analysis of email data. In: 14th International Conference on Information Technology - New Generations (ITNG 2017)
2017 Testing Sphinx’s language model fault-tolerance for the Holy Quran. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2017 Important attributes of customer satisfaction in telecom industry: a survey based study. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2017 Development of a game for history course of secondary school students. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2017 Assimilating E-Learning Barriers using an Interpretive Structural Modelling (ISM). In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS)
2016 WSN based sensing model for smart crowd movement with identification: a conceptual model. In: Multi Conference on Computer Science And Information Systems 2016
2016 An adoption of Halal food recognition system using Mobile Radio Frequency Identification (RFID) and near field communication (NFC). In: 2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2016)
2016 Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan. In: 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2015)
2016 Factors effecting fixed-line telecom services customer retention: A study of Pakistan . In: 14th International Conference on Statsitical Sciences
2016 Acceptance and use of information and communication technology by academicians: Towards a conceptual framework. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime. In: 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2016)
2016 Modeling user's trust in M-commerce acceptance: a conceptual framework in context of Pakistan. In: 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015
2015 A review of slicing techniques in software engineering. In: International Conference on Engineering and Technology
2015 Simulation of Resources Sharing Architecture (ReSa) between clouds using Java programming. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
2015 Relation mining using cross correlation of multi domain social networks . In: SAI Intelligent Systems Conference (IntelliSys), 2015
2015 SmartCrowd: novel approach to big crowd management using mobile cloud computing. In: International Conference on Cloud Computing 2015 (ICCC'2015)
2015 Predicting the fraud volume in the advent of internet enabled handheld devices . In: 4th International Conference on Advances in Engineering Sciences and applied Mathematics, ICAESAM' 2015
2015 Mobile online services and measuring user satisfaction: study of Kuwait. In: 2014 3rd International Conference on Advanced Computer Science Applications and Technologies
2015 A conceptual framework for the analysis of determinants of m-commerce acceptance. In: 13th International Conference on Statistical Sciences
2015 A model for handling overloading of literature review process for social science . In: The International Conference on Advanced Research in Business and Social Sciences 2015 (ICARBSS 2015)
2015 A conceptual framework for measuring the acceptance of pervasive learning. In: 5th International Conference on Computing and Informatics (ICOCI 2015)
2015 A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan. In: 5th International Conference on Computing and Informatics, ICOCI 2015
2015 Detecting changes in context using time series analysis of social network. In: SAI Intellegence Systems Conference 2015
2015 Towards using CMU Sphinx Tools for the Holy Quran recitation verification. In: 3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015)
2014 Investigating how the sources of online audio Qur’an empower listeners. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014)
2014 Identification of vessel anomaly behavior using support vector machines and Bayesian networks. In: International Conference on Computer and Communication Engineering (ICCCE 2014)
2014 Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science . In: 5th International Conference Information & Communication Technology for the Muslim World (ICT4M 2014)
2014 Calculus and its applications in scale-free networks . In: 5th International Conference on Information and Communication Technology for The Muslims World (ICT4M 2014)
2014 Anomaly detection in vessel tracking using Support Vector Machines (SVMs). In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013)
2014 Node status detection and information diffusion in router network using scale-free network. In: 10th International Network Conference, INC 2014
2014 Sharing of attacks information across clouds for improving security:a conceptual framework. In: International Conference on Computer, Communication, and Control Technology (I4CT 2014)
2014 RFID based smart hospital management system: A conceptual framework. In: 2014 The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)
2014 ReSA: architecture for resources sharing between clouds. In: 2014 Conference on Information Assurance and Cyber Security (CIACS)
2014 Systematic review of computational modeling of mood and emotion. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014)
2013 Inculcating ethical values in the students through e-Learning platform. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Analysis of SNS popularity from different perspectives among users. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Towards quick response and secure online banking transactions: using data compression and cryptography. In: 2nd International Conference on Advances Information Technology (AIT 2013)
2013 Hierarchical 3D-Mesh Network. In: IRIIE2013
2013 10 c’s of social networking, interconnections and the impact on social networking. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Ethical perspective of students in Global Learning Environment. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2013 A 10 C’s of social networking, interconnections and the impact on social networking. In: 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M)
2013 Fault tolerant cloud auditing. In: The 4th International Conference on Information & Communication Technology for the Muslim World (ICT4M)
2013 Prototyping of a situation awareness system in the maritime surveillance. In: 5th International Conference on Mechatronics
2013 A security-based survey and classification of cloud architectures, state of the art and future directions . In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
2013 Template based procedural rigging of quadrupeds with custom manipulators. In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2013 A model for real-time recognition and textual representation of Malaysian sign language through image processing . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2013 Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages . In: 2103 International Conference of Advanced Computer Science Applications and Technologies (ACSAT)
2012 High performance hierarchical torus network. In: IRIIE2012
2012 A deadlock-free dimension order routing for hierarchical 3D-mesh network. In: 2012 International Conference on Computer & Information Science (ICCIS)
2012 Widget based automated rigging of bipedal character with custom manipulators . In: 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012;
2012 NoMadCar: the interactive design using human computer interaction techniques. In: International Multi-TopIc Conference (IMTIC 2012)
2012 Building wireless sensor networks application using Sun SPOTs. In: Second International Multi Topic Conference, IMTIC 2012
2012 On dynamic communication performance of a hierarchical 3D-mesh network. In: The 9th IFIP International Conference on Network and Parallel Computing (NPC 2012)
2012 Design and development of the FMCW Radar Scene Generator. In: 2012 IEEE Symposium on Industrial Electronics and Applications (ISIEA2012)
2011 Maximizing bandwidth efficiency of statistical multiplexer Architexture using frame dropping methods . In: KICT Seminar
2011 Frequencies determination of characters for Bahasa Melayu: results of preliminary investigation. In: 12th Conference of the Pacific Association for Computational Linguistics (PACLING 2011)

Book

2017 Predicting online banking fraud using adaptive neuro-fuzzy inference system (ANFIS). IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-791-0
2017 A model for social media in higher education institutions of Pakistan. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-795-8
2017 An integrated model of acceptance for pervasive learning from students’ perspective. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-792-7
2017 Factors affecting the acceptance of mobile commerce in Pakistan. IIUM Press, International Islamic University Malaysia . ISBN 978-967-418-794-1
2016 Research methodologies an Islamic perspective. IIUM Press . ISBN 9789674183868
2011 Research methodologies: a practical approach. IIUM Press . ISBN 9789674180171

Book Section

2013 Hierarchical Tori Connected Mesh Network. In: Computational Science and Its Applications – ICCSA 2013 : 13th International Conference, Ho Chi Minh City, Vietnam, June 24-27, 2013, Proceedings, Part V Springer-Verlag Berlin Heidelberg . ISBN 978-3-642-39640-3 (O), 978-3-642-39639-7 (P) , pp.197-210
2011 Digital multiplexing techniques. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.5-9
2011 Basic disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.135-140
2011 Low bit rate speech coding. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.10-11
2011 Exception handling. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.215-222
2011 Disk management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.141-146
2011 Low bit rate speech coding standards. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.12-14
2011 Cascade style sheets. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.147-155
2011 Codebook excited linear predictive coding. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.18-21
2011 Throw & throws keyword. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.223-229
2011 Image editing. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.157-164
2011 Pulse residual excited linear prediction. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.22-25
2011 Multi-pulse residual excitation model (MP-PRE). In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.26-30
2011 Image effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.165-172
2011 Low bit rate speech multiplexer tools. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.31-32
2011 Image tool function. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.173-179
2011 Discontinuous transmission and multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.33-35
2011 Local block and static block. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.231-235
2011 Measured temporal parameters. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.36-44
2011 Image clone 1. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.181-191
2011 Quality assessments in multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.45-46
2011 Image clone 2. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.193-197
2011 Simulation of speech activities using Markov Model. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.47-53
2011 Abstract class. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.237-244
2011 Packet loss and frame substitution techniques. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.54-59
2011 Speech quality in lossy multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.60-63
2011 Image and special effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.199-204
2011 Design of a low bit rate STDM multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.64-67
2011 Interfaces. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.245-257
2011 Basic text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.205-212
2011 Multiplexing and operational scenarios. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.68-69
2011 Low bit rate speech coders. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.70-72
2011 Text animation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.213-219
2011 Dynamic talker activity analysis. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.73-79
2011 Text effects. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.221-226
2011 DSI advantage capability of LFR. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.80-83
2011 Image filtering. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.227-232
2011 Image quality improvement. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.233-239
2011 Concept of frames discarding and multiplexing efficiency. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.84-88
2011 Energy ad a criterion for frame discarding and multiplexing efissiency. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.89-91
2011 LPC envelope difference criterion and multiplexing efficiency. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.92-94
2011 Networking issue. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.95-101
2011 Cyclic frame discarding multiplexer design. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.102-105
2011 Speech frame sensitivity based on mean square error criterion. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.106-112
2011 Energy threshold sensitivity for frame loss. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.113-118
2011 Speech quality for energy criterion in multiplexing. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.119-123
2011 Speech quality for LPC envelope criterion. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.124-126
2011 Introduction . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.1-3
2011 Arithmetic expressions and data types in C++ . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.1-3
2011 Sending the output to a print file . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.11-16
2011 Decision making: If-else statements and relational operators . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.17-24
2011 Logical operators and switch statements. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.25-31
2011 Iterative structures . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.39-48
2011 Review, summary & building skill . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.33-37
2011 The for loop . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.49-53
2011 The do-while loop . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.55-57
2011 Introduction to Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.15-20
2011 Review of variables, formatting. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.59-61
2011 Review of iterative structures . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.63-72
2011 Compiling and executing Java code. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.21-26
2011 Post-test and nested loops . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.73-82
2011 Introduction to data types in Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.27-32
2011 Functions . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.83-90
2011 Call-by-value and reference . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.91-97
2011 Arithmetic and relational operators. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.33-38
2011 More on functions. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.99-110
2011 Structures (struct) and files . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.111-118
2011 Relational and logical operators. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.39-44
2011 Arrays . In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.119-125
2011 Exercise of array. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.127-135
2011 Familiarization with multimeter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.1-5
2011 Bitwise operators and type casting . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.45-50
2011 Conditional statements . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.51-54
2011 Using the multimeter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.6-12
2011 Familiarization with oscilloscope. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.13-17
2011 If-else statements . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.55-60
2011 Signals . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.18-22
2011 The If-Else-If statements . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.61-66
2011 Probes. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.23-28
2011 Switch statement . In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.67-72
2011 Control panel of an oscilloscope. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.29-33
2011 Operation of an oscilloscope. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.34-38
2011 Measurement techniques. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.39-46
2011 Resistor color codes . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.47-51
2011 Soldering iron practice . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.52-55
2011 Procedure of soldering iron practice . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.56-59
2011 Ohm's law . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.60-61
2011 Using the multi-meter for Ohm's law . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.62-64
2011 Voltage divider rule (VDR). In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.65-68
2011 Common emitter amplifier with fixed bias . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.69-74
2011 Common emitter amplifier with self bias . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.75-77
2011 Common collector transistor amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.78-81
2011 Darlington common emitter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.82-86
2011 The use of genetic algorithm in autonomous robot navigation . In: Computer applications: theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.3-13
2011 Class-A amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.87-91
2011 Class-B power amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.92-96
2011 In-silico drug target design & its approaches . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.15-26
2011 Voltage follower. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.97-100
2011 Inverting amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.101-104
2011 Implementing DNA sequence using genetic algorithm. In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.27-36
2011 Summing amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.105-107
2011 Subtractor or differential amplifier . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.108-110
2011 Integrator. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.111-114
2011 Differentiator. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.115-120
2011 Read data from a file. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.137-141
2011 Comparator. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.121-122
2011 Object oriented programming. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.143-152
2011 Selection sorting. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.153-159
2011 Active low pass filter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.123-128
2011 Bubble sort algorithm. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.161-166
2011 Molecular docking . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.37-44
2011 Active high pass filter . In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.129-135
2011 Linear searching. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.179-188
2011 Review of arrays. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.167-177
2011 The use of genetic algorithm in improving medical image segmentation techniques . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.45-55
2011 Active band pass filter. In: Understanding basic concept of electrical and electronic systems IIUM Press . ISBN 9789674181161 , pp.136-141
2011 Binary search. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.189-197
2011 Vector class. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.199-202
2011 Loops in Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.73-78
2011 Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.59-69
2011 Pointers. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.203-211
2011 Function pointers. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.213-218
2011 Integration of ICT in education : an Islamic perspective.. In: Advancement in E- learning IIUM Press . ISBN 978-967-418-105-5 , pp.61-71
2011 Internal structure of computer systems. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.1-8
2011 Polymorphism and virtual functions. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.219-221
2011 Do-While loops. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.79-83
2011 C++ references. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.223-227
2011 For loops. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.85-92
2011 Interfaces and protocols. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.9-16
2011 Const correctness. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.229-234
2011 Protection mechanisms using LSB and MD5 . In: Computer applications: Theories and applications IIUM Press . ISBN 978-967-418-107-9 , pp.85-98
2011 More on const keywords. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.235-239
2011 Firmware program. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.17-22
2011 Loop pitfalls and exercise. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.93-97
2011 Goto statement. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.241-247
2011 Nested loops. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.99-104
2011 Graphical user interfaces. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.23-30
2011 Handling errors in C++. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.249-252
2011 Arrays in Java. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.105-110
2011 Static: the multipurpose keyword. In: C++ Programming: Step by Step IIUM Press . ISBN 9789674180904 , pp.253-255
2011 Short cut and hard drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.31-38
2011 Strings. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.119-125
2011 Methods of string class. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.127-134
2011 Windows explorer. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.39-46
2011 Object and classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.135-140
2011 Constructors. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.141-146
2011 Folder and directory. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.47-53
2011 Arguments passing. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.155-161
2011 User defined methods. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.147-154
2011 Return statement. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.163-167
2011 Security risk of ATM systems, case of study . In: Computer Applications: Theories and Applications IIUM Press . ISBN 978-967-418-107-9 , pp.129-138
2011 Folder operations. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.55-63
2011 Working with classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.169-175
2011 Control panel and screen savers. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.65-72
2011 Multiple classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.177-184
2011 Basic operating system setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.81-86
2011 Hardware configuration. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.73-79
2011 Method overloading and overriding. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.185-190
2011 Windows installation. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.87-98
2011 Network security setting. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.99-106
2011 Modifiers for class data. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.191-197
2011 Task scheduling. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.107-112
2011 Inner classes. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.199-205
2011 Basic storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.113-118
2011 Logical drive. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.119-125
2011 Transmission bandwidth efficiency enhancement techniques. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.1-4
2011 Comparison between different class types. In: JAVA programming lab manual IIUM Press . ISBN 9789674180867 , pp.207-213
2011 Storage management. In: Introduction of computer systems and applications IIUM Press . ISBN 9789674180850 , pp.127-134
2011 Linear predictive coding of speech. In: Statistical Time Division Multiplexing Architectures and Design IIUM Press . ISBN 978-967-418-190-1 , pp.15-17