ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade
2023
Source : SUSTAINABILITY DOI : 10.3390/su15032115 |
2. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-022-12010-2 |
3. |
Permissions-Based Detection of Android Malware Using Machine Learning
2022
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : SYMMETRY-BASEL DOI : 10.3390/sym14040718 |
4. |
Authors' Reply
2022
Source : IEEE Sensors Journal DOI : 10.1109/JSEN.2022.3175591 |
5. |
Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern
2022
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Sulaiman Wadi Harun Source : PloS one DOI : 10.1371/journal.pone.0274896 |
6. |
Permissions-Based Detection of Android Malware Using Machine Learning
2022
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Symmetry DOI : 10.3390/sym14040718 |
7. |
Authors' Reply
2022
Source : IEEE SENSORS JOURNAL DOI : 10.1109/JSEN.2022.3175591 |
8. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source : Multimedia Tools and Applications DOI : 10.1007/s11042-022-12010-2 |
9. |
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
2021
Author(s) : Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Roziana Binti Ramli Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3060420 |
10. |
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
2021
Source : ELECTRONICS DOI : 10.3390/electronics10141633 |
11. |
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
2021
Author(s) : Noorzaily Bin Mohamed Noor,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3072030 |
12. |
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
2021
Author(s) : Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Roziana Binti Ramli Source : IEEE Access |
13. |
A tree-based multiclassification of breast tumor histopathology images through deep learning
2021
Source : COMPUTERIZED MEDICAL IMAGING AND GRAPHICS DOI : 10.1016/j.compmedimag.2021.101870 |
14. |
Steel surface defect classification using multi-resolution empirical mode decomposition and LBP
2021
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Sulaiman Wadi Harun Source : MEASUREMENT SCIENCE AND TECHNOLOGY DOI : 10.1088/1361-6501/abab21 |
15. |
Steel surface defect classification using multi-resolution empirical mode decomposition and LBP
2021
Author(s) : Hamzah Bin Arof,Ainuddin Wahid Bin Abdul Wahab Source : Measurement Science and Technology DOI : 10.1088/1361-6501/abab21 |
16. |
A tree-based multiclassification of breast tumor histopathology images through deep learning
2021
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Computerized Medical Imaging and Graphics DOI : 10.1016/j.compmedimag.2021.101870 |
17. |
A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
2021
Source : IEEE SENSORS JOURNAL DOI : 10.1109/JSEN.2021.3097172 |
18. |
An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network
2021
Source : IEEE Access DOI : 10.1109/ACCESS.2021.3060420 |
19. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2021
Source : IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING DOI : 10.1109/TSUSC.2018.2833502 |
20. |
Local descriptor for retinal fundus image registration
2020
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin,Roziana Binti Ramli Source : IET Computer Vision |
21. |
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
2020
Author(s) : Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Mazlina Binti Mazlan,Norhamizan Binti Hamzah Source : Malaysian Journal of Computer Science |
22. |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
2020
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-020-08692-1 |
23. |
Local descriptor for retinal fundus image registration
2020
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin,Roziana Binti Ramli Source : IET COMPUTER VISION |
24. |
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
2020
Source : IEEE ACCESS DOI : 10.1109/ACCESS.2020.2989456 |
25. |
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
2020
Source : ARTIFICIAL INTELLIGENCE REVIEW |
26. |
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
2020
Source : Artificial Intelligence Review DOI : 10.1007/s10462-019-09716-5 |
27. |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
2020
Source : Multimedia Tools and Applications DOI : https://doi.org/10.1007/s11042-020-08692-1 |
28. |
Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities
2020
Source : IEEE Access DOI : 10.1109/ACCESS.2020.2989456, IEEE Access |
29. |
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
2020
Author(s) : Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Norhamizan Binti Hamzah Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
30. |
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunitie
2020
Author(s) : Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Azni Zarina Binti Taha,Siti Nurmaya Binti Musa Source : IEEE Access |
31. |
Accelerating FPGA-SURF Feature Detection Module By Memory Access Reduction
2019
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Malaysian Journal of Computer Science |
32. |
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
Source : APPLIED SCIENCES-BASEL |
33. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Author(s) : Rosli Bin Salleh,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ahsiah Binti Ismail Source : FORENSIC SCIENCE INTERNATIONAL |
34. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Source : Forensic Science International |
35. |
ACCELERATING FPGA-SURF FEATURE DETECTION MODULE BY MEMORY ACCESS REDUCTION
2019
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
36. |
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
Source : Applied Sciences |
37. |
Fractional means based method for multi-oriented keyword spotting in video/scene/license plate images
2019
Author(s) : Ainuddin Wahid Bin Abdul Wahab,Hamid Abdullah Jalab Altulea,Rabha Waell Ibrahim,Shivakumara Palaiahnakote Source : EXPERT SYSTEMS WITH APPLICATIONS |
38. |
Fractional Means based Context Features for Multi-Oriented Keyword Spotting in Video/Scene/License Plate Images
2019
Source : Expert Systems with Applications. DOI : 10.1016/j.eswa.2018.08.0151 |
39. |
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Source : Symmetry |
40. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2018
Source : IEEE Transactions on Sustainable Computing |
41. |
CMF-iteMS: An Automatic Threshold Selection for Detection of Copy-Move Forgery
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Forensic Science International DOI : 10.1016/j.forsciint.2018.12.004 |
42. |
Image steganography in spatial domain: A survey
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Signal Processing: Image Communication DOI : 10.1016/j.image.2018.03.012 |
43. |
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Applied Sciences DOI : 10.3390/app8112199 |
44. |
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Source : SYMMETRY-BASEL |
45. |
Image steganography in spatial domain: A survey
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : SIGNAL PROCESSING-IMAGE COMMUNICATION |
46. |
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IETE TECHNICAL REVIEW |
47. |
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
2018
Author(s) : Abdullah Bin Gani,Ainuddin Wahid Bin Abdul Wahab Source : ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
48. |
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
2018
Source : APPLIED SCIENCES-BASEL |
49. |
Energy Harvesting and Battery Power Based Routing in Wireless Sensor Networks
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Wireless Networks DOI : 10.1007/s11276-015-1150-6 |
50. |
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Signal Processing-Image Communication DOI : 10.1016/j.image.2016.10.005 |
51. |
Blind Source Computer Device Identification from Recorded VoIP Calls for Forensic Investigation
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Forensic Science International DOI : 10.1016/j.forsciint.2017.01.010 |
52. |
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
2017
Source : Journal of Sensors |
53. |
Feature-Based Retinal Image Registration Using D-Saddle Feature
2017
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Nahrizul Adib Bin Kadri,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin,Roziana Binti Ramli Source : Journal of Healthcare Engineering DOI : 10.1155/2017/1489524 |
54. |
SIFT-Symmetry: A Robust Detection Method for Copy-Move Forgery with Reflection Attack
2017
Author(s) : Rosli Bin Salleh,Fazidah Binti Othman,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Journal of Visual Communication and Image Representation DOI : 10.1016/j.jvcir.2017.04.004 |
55. |
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IEEE ACCESS |
56. |
Feature-Based Retinal Image Registration Using D-Saddle Feature
2017
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Nahrizul Adib Bin Kadri,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin Source : JOURNAL OF HEALTHCARE ENGINEERING |
57. |
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Arabian Journal for Science and Engineering DOI : 10.1007/s13369-017-2634-8 |
58. |
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IETE Technical Review DOI : 10.1080/02564602.2016.1244496 |
59. |
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art
2017
Author(s) : Abdullah Bin Gani,Ainuddin Wahid Bin Abdul Wahab Source : IEEE COMMUNICATIONS SURVEYS AND TUTORIALS |
60. |
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Symmetry |
61. |
Low Communication Cost (LCC) Scheme for Localizing Mobile Wireless Sensor Networks
2016
Source : Wireless Networks |
62. |
NATURAL INTERACTION OF GAME-BASED LEARNING FOR ELASTICITY
2016
Source : Malaysian Journal of Computer Science |
63. |
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IEEE Access DOI : 10.1109/ACCESS.2016.2641982 |
64. |
DIGITAL VIDEO INPAINTING DETECTION USING CORRELATION OF HESSIAN MATRIX
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Malaysian Journal of Computer Science |
65. |
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : PLoS ONE DOI : 10.1371/journal.pone.0165966 |
66. |
Low Communication Cost (LCC) Scheme for Localizing Mobile Wireless Sensor Networks
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Wireless Networks |
67. |
Cloud Log Forensics: Foundations, State of the Art, and Future Directions
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : ACM Computing Surveys (CSUR) |
68. |
An evolution of image source camera attribution approaches
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Forensic Science International |
69. |
Network forensics: Review, taxonomy, and open challenges
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Journal of Network and Computer Applications |
70. |
Virtual Community Detection Through the Association between Prime Nodes in Online Social Networks and Its Application to Ranking Algorithms
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IEEE Access DOI : 10.1109/ACCESS.2016.2639563 |
71. |
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
2016
Source : Journal of Sensors |
72. |
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
2016
Source : Wireless Communications and Mobile Computing |
73. |
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Symmetry |
74. |
Digital Video Inpainting Detection Using Correlation Of Hessian Matrix
2016
Source : Malaysian Journal of Computer Science |
75. |
Robust Watermarking Algorithm for Digital Images Using Discrete Wavelet and Probabilistic Neural Network
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Journal of King Saud University Computer and Information Sciences |
76. |
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : International Journal of Security and Its Applications |
77. |
A review on feature selection in mobile malware detection
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Digital Investigation |
78. |
Energy harvesting and battery power based routing in wireless sensor networks
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Wireless Networks |
79. |
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : The Scientific World Journal |
80. |
Blind source mobile device identification based on recorded call
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Engineering Applications of Artificial Intelligence |
81. |
Blind source mobile device identification based on recorded call
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Engineering Applications of Artificial Intelligence |
82. |
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Scientific World Journal |
83. |
Synchronization in coupled Ikeda delay systems
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : The European Physical Journal Special Topics |
84. |
Memory Access Reduction for Field Programmable Gate Array-Speeded Up Robust Features Implementation
2013
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Advanced Science Letters |
85. |
A Novel Approach of an FPGA Design to Improve
Monocular
SLAM Feature State Covariance Matrix Computation
2012
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Emran Bin Mohd Tamil Source : Journal of Innovative Computing, Information and Control (IJICIC) |
86. |
Reducing multiplication operation and independent
processing for monocular simultaneous localization and
mapping (SLAM) feature state covariance matrix
computation
2011
|
87. |
On the Performance of Wavelet Decomposition
Steganalysis
with JSteg Steganography
2009
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Lecture Notes in Computer Science (LNCS) |
88. |
Usability and Performance of Secure Mobile Messaging: M-
PKI
2009
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
89. |
GSM mobile SMS/MMS using public key infrastructure:
m-PKI
2008
Source : WSEAS Transaction on Computer |
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
DUA DEKAD SURAU AL-HIDAYAH, TAMAN BUKIT KAJANG BARU
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
5G Networks: A Holistic View of Enabling Technologies and Research Challenges
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
An Evaluation Of Error Level Analysis In Image Forensics
2015
|
2. |
Blind Source Mobile Devices Identification Using VoIP Communication
2014
|
3. |
Passive Video Forgery Detection Techniques: A Survey
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
4. |
Forensic Challenges in Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Aerospace Industry I4.0 Digital Ecosystem Platform For Potential Aerospace Vendors Identification And Competency Level Assessment
Researcher(s) : Prof. Dr. Mohd Yamani Idna Bin Idris,Mr. Noorzaily Bin Mohamed Noor,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Prof. Dr. Nor Liyana Bt Mohd Shuib
(Others MOHE - Top 100 (IIRG)-IISS) |
|
end |
Machine Learning for Image-based Cancer Detection and Classification
(RU Geran - Fakulti Program) |
|
end |
Digital Image Forensics For Online Social Network
(Bantuan Khas Penyelidikan (BKP Special)) |
|
end |
Blind Identification Of Digital Communication Devices.
(High Impact Research - Ministry of Education (HIR-MOE) Cycle 3) |
|
end |
Features based audio forgery detection
Researcher(s) : -
(Postgraduate Research Grant (PPP) - Course & Disertation) |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Others MOHE) |
|
end |
A Security Framework for Blockchain Applications
Researcher(s) : Dr. Saaidal Razalli Bin Azzuhri,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Muhammad Reza Bin Z'aba,Associate Prof. Ts. Dr. Ismail Bin Ahmedy
(RU Geran - Fakulti Program) |
|
end |
The Investigation into Permutation Property of Block Ciphers
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(RU Geran - Fakulti Program) |
|
end |
Water Monitoring Via Internet Of Things
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Mr. Noorzaily Bin Mohamed Noor,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Associate Prof. Dr. Tey Kok Soon
(UM Community Campus-Manage by UMCARES) |
|
end |
Real-Time Water Channel Remote Monitoring Based on Internet of Things
Researcher(s) : Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Mr. Noorzaily Bin Mohamed Noor,Prof. Ts. Dr. Rafidah Binti Md Noor
(RU Geran - Fakulti Program) |
|
end |
Advertisement Recommender For Indoor Crowd
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Bantuan Khas Penyelidikan (BKP Special)) |
|
end |
Intelligent Estimation And Prediction Of Flood Wastes
Researcher(s) : Mr. Noorzaily Bin Mohamed Noor,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Mohammad Hossein Anisi,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Prof. Dr. Mohd Yamani Idna Bin Idris,Zaini Bin Ahmad,Muhammad Nadzir Marsono,Mr. Emran Bin Mohd Tamil
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - AET (Innovative Technology (ITRC))) |
|
end |
Efficient Detection And Reporting Of Flood Wastes Using Wireless Sensor Network
Researcher(s) : Dr. Mohammad Hossein Anisi,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Dr. Zaidi Bin Razak,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Mr. Noorzaily Bin Mohamed Noor,Mr. Emran Bin Mohd Tamil
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - AET (Innovative Technology (ITRC))) |
|
end |
Measurement Of The Flood Waste Volume Based On The Digital Image
Researcher(s) : Dr. Mohammad Hossein Anisi,Dr. Zaidi Bin Razak,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Prof. Dr. Mohd Yamani Idna Bin Idris,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Mr. Emran Bin Mohd Tamil
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - AET (Innovative Technology (ITRC))) |
|
end |
Image Authentication For Detection And Localization Of Image Forgery
Researcher(s) : Associate Prof. Dr. Mohamad Nizam Bin Ayub,Prof. Ts. Dr. Rafidah Binti Md Noor,Dr. Mohammad Hossein Anisi,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Data Queuing Scheme of Wireless Sensor Network (WSN) Using Prioritization Techniques
Researcher(s) : Associate Prof. Dr. Tey Kok Soon,Prof. Dr. Mohd Yamani Idna Bin Idris,Dr. Zaidi Bin Razak,Mr. Noorzaily Bin Mohamed Noor,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Bantuan Kecil Penyelidikan (BKP)) |
|
end |
An Intelligent Tool For Mobile Malware Detection And Responses
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Associate Prof. Dr. Rosli Bin Salleh,Dr Madihah Mohd Saudi
(MOSTI-Science Fund) |
|
end |
Quran And Hadith Authentication Systems
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Associate Prof. Dr. Amirrudin Bin Kamsin,Associate Prof. Ts. Dr. Aznul Qalid Bin Md Sabri,Associate Prof. Dr. Maizatul Akmar Binti Ismail
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
Detecting Forged Part In An Image
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Geran Penyelidikan Universiti Malaya (UMRG) - AFR (Frontier Science)) |
|
end |
Real Time Scalable Software Video Encoding And Its Applications Through Hi-performance Computing
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Vishnu Monn Baskaran,Prof Dr Raphael Phan Chung Wei
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - AFR (Frontier Science)) |
|
end |
Software Project Management Methodology For Small Medium Enterprises
Researcher(s) : Prof. Dr. Mohd Yamani Idna Bin Idris,Associate Prof. Dr. Rodina Binti Ahmad,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Geran Penyelidikan Universiti Malaya (UMRG) - AFR (Frontier Science)) |
|
end |
Guidelines for Information Accessibility for Multi-sensory Learning in Digital Storytelling
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Ariffin Abdul Mutallib
(Program Rakan Penyelidikan UM) |
|
end |
Realistic Video-based Assistive Living
Researcher(s) : Associate Prof. Dr. Ling Teck Chaw,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Professor Ir. Dr. Chan Chee Seng,Prof Dr Raphael Phan Chung Wei,Chang Yoong Choong,Vishnu Monn Baskaran
(Program Rakan Penyelidikan UM) |
|
end |
Digital Image splicing detecting based on image color spaces
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Rabha Waell Ibrahim,Dr. Khalid Sh Jasim
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |
Accelerating Image Feature Detection Module
Researcher(s) : Mr. Noorzaily Bin Mohamed Noor,Mr. Emran Bin Mohd Tamil,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Zaidi Bin Razak,Prof. Dr. Hamzah Bin Arof
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |
Mobile Botnet
(Geran Penyelidikan Universiti Malaya (UMRG) - ICT) |
|
end |