ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Permissions-Based Detection of Android Malware Using Machine Learning
2022
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Symmetry DOI : 10.3390/sym14040718 |
2. |
Authors' Reply
2022
Source : IEEE Sensors Journal DOI : 10.1109/JSEN.2022.3175591 |
3. |
Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern
2022
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Sulaiman Wadi Harun Source : PloS one DOI : 10.1371/journal.pone.0274896 |
4. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source : Multimedia Tools and Applications DOI : 10.1007/s11042-022-12010-2 |
5. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2021
Source : IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING DOI : 10.1109/TSUSC.2018.2833502 |
6. |
An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network
2021
Source : IEEE Access DOI : 10.1109/ACCESS.2021.3060420 |
7. |
A tree-based multiclassification of breast tumor histopathology images through deep learning
2021
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Computerized Medical Imaging and Graphics DOI : 10.1016/j.compmedimag.2021.101870 |
8. |
Steel surface defect classification using multi-resolution empirical mode decomposition and LBP
2021
Author(s) : Hamzah Bin Arof,Ainuddin Wahid Bin Abdul Wahab Source : Measurement Science and Technology DOI : 10.1088/1361-6501/abab21 |
9. |
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
2021
Source : ELECTRONICS DOI : 10.3390/electronics10141633 |
10. |
A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
2021
Source : IEEE SENSORS JOURNAL DOI : 10.1109/JSEN.2021.3097172 |
11. |
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
2021
Author(s) : Noorzaily Bin Mohamed Noor,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3072030 |
12. |
Steel surface defect classification using multi-resolution empirical mode decomposition and LBP
2021
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Sulaiman Wadi Harun Source : MEASUREMENT SCIENCE AND TECHNOLOGY DOI : 10.1088/1361-6501/abab21 |
13. |
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
2021
Author(s) : Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Roziana Binti Ramli Source : IEEE ACCESS DOI : 10.1109/ACCESS.2021.3060420 |
14. |
A tree-based multiclassification of breast tumor histopathology images through deep learning
2021
Source : COMPUTERIZED MEDICAL IMAGING AND GRAPHICS DOI : 10.1016/j.compmedimag.2021.101870 |
15. |
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
2021
Author(s) : Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Roziana Binti Ramli Source : IEEE Access |
16. |
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunitie
2020
Author(s) : Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Azni Zarina Binti Taha,Siti Nurmaya Binti Musa Source : IEEE Access |
17. |
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
2020
Source : ARTIFICIAL INTELLIGENCE REVIEW |
18. |
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
2020
Source : IEEE ACCESS |
19. |
Local descriptor for retinal fundus image registration
2020
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin,Roziana Binti Ramli Source : IET COMPUTER VISION |
20. |
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
2020
Source : Artificial Intelligence Review DOI : 10.1007/s10462-019-09716-5 |
21. |
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
2020
Author(s) : Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Mazlina Binti Mazlan,Norhamizan Binti Hamzah Source : Malaysian Journal of Computer Science |
22. |
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
2020
Author(s) : Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Norhamizan Binti Hamzah Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
23. |
Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities
2020
Source : IEEE Access DOI : 10.1109/ACCESS.2020.2989456, IEEE Access |
24. |
Local descriptor for retinal fundus image registration
2020
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin,Roziana Binti Ramli Source : IET Computer Vision |
25. |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
2020
Source : MULTIMEDIA TOOLS AND APPLICATIONS DOI : 10.1007/s11042-020-08692-1 |
26. |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
2020
Source : Multimedia Tools and Applications DOI : https://doi.org/10.1007/s11042-020-08692-1 |
27. |
Fractional Means based Context Features for Multi-Oriented Keyword Spotting in Video/Scene/License Plate Images
2019
Source : Expert Systems with Applications. DOI : 10.1016/j.eswa.2018.08.0151 |
28. |
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
Source : Applied Sciences |
29. |
Fractional means based method for multi-oriented keyword spotting in video/scene/license plate images
2019
Author(s) : Ainuddin Wahid Bin Abdul Wahab,Hamid Abdullah Jalab Altulea,Rabha Waell Ibrahim,Shivakumara Palaiahnakote Source : EXPERT SYSTEMS WITH APPLICATIONS |
30. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Author(s) : Rosli Bin Salleh,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Ahsiah Binti Ismail Source : FORENSIC SCIENCE INTERNATIONAL |
31. |
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
Source : APPLIED SCIENCES-BASEL |
32. |
ACCELERATING FPGA-SURF FEATURE DETECTION MODULE BY MEMORY ACCESS REDUCTION
2019
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE |
33. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Source : Forensic Science International |
34. |
Accelerating FPGA-SURF Feature Detection Module By Memory Access Reduction
2019
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Malaysian Journal of Computer Science |
35. |
Image steganography in spatial domain: A survey
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Signal Processing: Image Communication DOI : 10.1016/j.image.2018.03.012 |
36. |
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Applied Sciences DOI : 10.3390/app8112199 |
37. |
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IETE TECHNICAL REVIEW |
38. |
Image steganography in spatial domain: A survey
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : SIGNAL PROCESSING-IMAGE COMMUNICATION |
39. |
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
2018
Author(s) : Abdullah Bin Gani,Ainuddin Wahid Bin Abdul Wahab Source : ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
40. |
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Source : Symmetry |
41. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2018
Source : IEEE Transactions on Sustainable Computing |
42. |
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Source : SYMMETRY-BASEL |
43. |
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
2018
Source : APPLIED SCIENCES-BASEL |
44. |
CMF-iteMS: An Automatic Threshold Selection for Detection of Copy-Move Forgery
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Forensic Science International DOI : 10.1016/j.forsciint.2018.12.004 |
45. |
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
2017
Source : Journal of Sensors |
46. |
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Arabian Journal for Science and Engineering DOI : 10.1007/s13369-017-2634-8 |
47. |
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IETE Technical Review DOI : 10.1080/02564602.2016.1244496 |
48. |
Blind Source Computer Device Identification from Recorded VoIP Calls for Forensic Investigation
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Forensic Science International DOI : 10.1016/j.forsciint.2017.01.010 |
49. |
Energy Harvesting and Battery Power Based Routing in Wireless Sensor Networks
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Wireless Networks DOI : 10.1007/s11276-015-1150-6 |
50. |
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IEEE ACCESS |
51. |
Feature-Based Retinal Image Registration Using D-Saddle Feature
2017
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Nahrizul Adib Bin Kadri,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin Source : JOURNAL OF HEALTHCARE ENGINEERING |
52. |
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art
2017
Author(s) : Abdullah Bin Gani,Ainuddin Wahid Bin Abdul Wahab Source : IEEE COMMUNICATIONS SURVEYS AND TUTORIALS |
53. |
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Signal Processing-Image Communication DOI : 10.1016/j.image.2016.10.005 |
54. |
Feature-Based Retinal Image Registration Using D-Saddle Feature
2017
Author(s) : Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Nahrizul Adib Bin Kadri,Ainuddin Wahid Bin Abdul Wahab,Ismail Bin Ahmedy,Khairunnisa Binti Hasikin,Roziana Binti Ramli Source : Journal of Healthcare Engineering DOI : 10.1155/2017/1489524 |
55. |
SIFT-Symmetry: A Robust Detection Method for Copy-Move Forgery with Reflection Attack
2017
Author(s) : Rosli Bin Salleh,Fazidah Binti Othman,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Journal of Visual Communication and Image Representation DOI : 10.1016/j.jvcir.2017.04.004 |
56. |
An evolution of image source camera attribution approaches
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Forensic Science International |
57. |
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Symmetry |
58. |
Network forensics: Review, taxonomy, and open challenges
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Journal of Network and Computer Applications |
59. |
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IEEE Access DOI : 10.1109/ACCESS.2016.2641982 |
60. |
DIGITAL VIDEO INPAINTING DETECTION USING CORRELATION OF HESSIAN MATRIX
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Malaysian Journal of Computer Science |
61. |
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
2016
Source : Wireless Communications and Mobile Computing |
62. |
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
2016
Source : Journal of Sensors |
63. |
Cloud Log Forensics: Foundations, State of the Art, and Future Directions
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : ACM Computing Surveys (CSUR) |
64. |
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : PLoS ONE DOI : 10.1371/journal.pone.0165966 |
65. |
Digital Video Inpainting Detection Using Correlation Of Hessian Matrix
2016
Source : Malaysian Journal of Computer Science |
66. |
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Symmetry |
67. |
NATURAL INTERACTION OF GAME-BASED LEARNING FOR ELASTICITY
2016
Source : Malaysian Journal of Computer Science |
68. |
Low Communication Cost (LCC) Scheme for Localizing Mobile Wireless Sensor Networks
2016
Source : Wireless Networks |
69. |
Low Communication Cost (LCC) Scheme for Localizing Mobile Wireless Sensor Networks
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Wireless Networks |
70. |
Virtual Community Detection Through the Association between Prime Nodes in Online Social Networks and Its Application to Ranking Algorithms
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : IEEE Access DOI : 10.1109/ACCESS.2016.2639563 |
71. |
A review on feature selection in mobile malware detection
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Digital Investigation |
72. |
Robust Watermarking Algorithm for Digital Images Using Discrete Wavelet and Probabilistic Neural Network
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Journal of King Saud University Computer and Information Sciences |
73. |
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : International Journal of Security and Its Applications |
74. |
Energy harvesting and battery power based routing in wireless sensor networks
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Wireless Networks |
75. |
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : The Scientific World Journal |
76. |
Blind source mobile device identification based on recorded call
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Engineering Applications of Artificial Intelligence |
77. |
Blind source mobile device identification based on recorded call
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Engineering Applications of Artificial Intelligence |
78. |
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Scientific World Journal |
79. |
Synchronization in coupled Ikeda delay systems
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : The European Physical Journal Special Topics |
80. |
Memory Access Reduction for Field Programmable Gate Array-Speeded Up Robust Features Implementation
2013
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab Source : Advanced Science Letters |
81. |
A Novel Approach of an FPGA Design to Improve
Monocular
SLAM Feature State Covariance Matrix Computation
2012
Author(s) : Noorzaily Bin Mohamed Noor,Hamzah Bin Arof,Zaidi Bin Razak,Mohd Yamani Idna Bin Idris,Ainuddin Wahid Bin Abdul Wahab,Emran Bin Mohd Tamil Source : Journal of Innovative Computing, Information and Control (IJICIC) |
82. |
Reducing multiplication operation and independent
processing for monocular simultaneous localization and
mapping (SLAM) feature state covariance matrix
computation
2011
|
83. |
On the Performance of Wavelet Decomposition
Steganalysis
with JSteg Steganography
2009
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source : Lecture Notes in Computer Science (LNCS) |
84. |
Usability and Performance of Secure Mobile Messaging: M-
PKI
2009
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
85. |
GSM mobile SMS/MMS using public key infrastructure:
m-PKI
2008
Source : WSEAS Transaction on Computer |
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
DUA DEKAD SURAU AL-HIDAYAH, TAMAN BUKIT KAJANG BARU
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
5G Networks: A Holistic View of Enabling Technologies and Research Challenges
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
An Evaluation Of Error Level Analysis In Image Forensics
2015
|
2. |
Blind Source Mobile Devices Identification Using VoIP Communication
2014
|
3. |
Passive Video Forgery Detection Techniques: A Survey
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
4. |
Forensic Challenges in Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
MASS MEDIA(NEWSPAPER,RADIO,TV,POPULAR MAGAZINE)
NO | DETAILS OF MASS MEDIA(NEWSPAPER,RADIO,TV,POPULAR MAGAZINE) |
---|---|
1. |
Awas Ah Long Siber
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
2. |
Keselamatan Siber Dikalangan Kanak-Kanak
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
3. |
Banyak Faktor Pengaruhi Penghasilan Bunyi
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
4. |
Pengimbas Suhu 'Kebas' Maklumat
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
5. |
Berhati-hati dengan jerat penggodam
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
6. |
Laman web bawa identiti dan status sesebuah syarikat
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
7. |
Media sosial aset masa depan politik
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
8. |
Forensik imej banteras jenayah siber.
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
9. |
Live streaming jalan pintas dekati peminat.
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
10. |
AInquire inovasi forensik imej digital.
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
11. |
IoT bantu capaian komunikasi lebih efektif.
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
OTHERS
NO | DETAILS OF OTHERS |
---|---|
1. |
An FPGA Implementation of Stream Cipher Encryption Based on Statistical Approach, Computer Science and Mathematical Symposium, KUSTEM, Kuala Terengganu.
2008
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
2. |
The Development of Electronic Library Systems for Malaysians Secondary Schools Using Dewey Decimal Classification Method, Konvensyen Teknologi Pendidikan Ke-19, Langkawi, Kedah.
2008
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
3. |
Multimedia Encryption Learning Tool (MELT), Computer Science and Mathematical Symposium, KUSTEM, Kuala Terengganu.
2008
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Aerospace Industry I4.0 Digital Ecosystem Platform For Potential Aerospace Vendors Identification And Competency Level Assessment
Researcher(s) : Associate Prof. Dr. Mohd Yamani Idna Bin Idris,Mr. Noorzaily Bin Mohamed Noor,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Associate Prof. Dr. Nor Liyana Bt Mohd Shuib
(Others MOHE - Top 100 (IIRG)-IISS) |
|
end |
Machine Learning for Image-based Cancer Detection and Classification
Researcher(s) : Associate Prof. Dr. Nor Liyana Bt Mohd Shuib,Associate Prof. Dr. Mohd Yamani Idna Bin Idris
(RU Geran - Fakulti Program) |
|
end |
Digital Image Forensics For Online Social Network
(Bantuan Khas Penyelidikan (BKP Special)) |
|
end |
Features based audio forgery detection
Researcher(s) : -
(Postgraduate Research Grant (PPP) - Course & Disertation) |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
Penyelidikan Dalam Konteks Governans, Integriti Dan Antirasuah Dalam Sektor Kewangan Dan Perbankan Di Malaysia: Risiko Dan Intervensi
Researcher(s) : Associate Prof. Dr. Azah Anir Binti Norman,Associate Prof. Dr. Koh Hsieng Yang Eric,Dr. Saaidal Razalli Bin Azzuhri,Dr. Mohd Zaidi Bin Md Zabri,Prof. Dr. Aida Binti Idris,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Government Agency) |
|
on going |
Digitising The Cultural And Natural Heritage
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Prof. Dr. Yahaya Bin Ahmad,Dr. Ong Siew Kian,Assoc. Prof. Gs. Dr. Rosilawati Binti Zainol
(Others MOHE - Top 100 (IIRG)-SAH) |
|
on going |
Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Others MOHE) |
|
end |
A Security Framework for Blockchain Applications
Researcher(s) : Dr. Saaidal Razalli Bin Azzuhri,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Muhammad Reza Bin Z'aba,Associate Prof. Ts. Dr. Ismail Bin Ahmedy
(RU Geran - Fakulti Program) |
|
end |
The Investigation into Permutation Property of Block Ciphers
Researcher(s) : Prof. Ts. Dr. Miss Laiha Binti Mat Kiah,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(RU Geran - Fakulti Program) |
|
end |
Advertisement Recommender For Indoor Crowd
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Bantuan Khas Penyelidikan (BKP Special)) |
|
end |
Measurement Of The Flood Waste Volume Based On The Digital Image
Researcher(s) : Dr. Mohammad Hossein Anisi,Dr. Zaidi Bin Razak,Associate Prof. Ts. Dr. Ismail Bin Ahmedy,Associate Prof. Dr. Mohd Yamani Idna Bin Idris,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Mr. Emran Bin Mohd Tamil
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - AET (Innovative Technology (ITRC))) |
|
end |
Image Authentication For Detection And Localization Of Image Forgery
Researcher(s) : Associate Prof. Dr. Mohamad Nizam Bin Ayub,Prof. Ts. Dr. Rafidah Binti Md Noor,Dr. Mohammad Hossein Anisi,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Fundamental Research Grant Scheme (FRGS)) |
|
end |
Data Queuing Scheme of Wireless Sensor Network (WSN) Using Prioritization Techniques
Researcher(s) : Associate Prof. Dr. Tey Kok Soon,Associate Prof. Dr. Mohd Yamani Idna Bin Idris,Dr. Zaidi Bin Razak,Mr. Noorzaily Bin Mohamed Noor,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Bantuan Kecil Penyelidikan (BKP)) |
|
end |
Quran And Hadith Authentication Systems
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Associate Prof. Dr. Amirrudin Bin Kamsin,Associate Prof. Ts. Dr. Aznul Qalid Bin Md Sabri,Associate Prof. Dr. Maizatul Akmar Binti Ismail
(Geran Penyelidikan Universiti Malaya (UMRG Programme) - HNE (Humanities & Ethics)) |
|
end |
Detecting Forged Part In An Image
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab
(Geran Penyelidikan Universiti Malaya (UMRG) - AFR (Frontier Science)) |
|
end |
Guidelines for Information Accessibility for Multi-sensory Learning in Digital Storytelling
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Ariffin Abdul Mutallib
(Program Rakan Penyelidikan UM) |
|
end |
Digital Image splicing detecting based on image color spaces
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Rabha Waell Ibrahim,Dr. Khalid Sh Jasim
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |
Accelerating Image Feature Detection Module
Researcher(s) : Mr. Noorzaily Bin Mohamed Noor,Mr. Emran Bin Mohd Tamil,Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab,Dr. Zaidi Bin Razak,Prof. Dr. Hamzah Bin Arof
(Geran Penyelidikan Universiti Malaya (UMRG) - AET (Innovative Technology (ITRC))) |
|
end |
Mobile Botnet
(Geran Penyelidikan Universiti Malaya (UMRG) - ICT) |
|
end |