Dr. Imad Fakhri Taha Alshaikhli
My Social Links

Dr. Imad Fakhri Taha Alshaikhli

Dean, Professor
International Islamic University Malaysia, Malaysia


Highest Degree
Ph.D. in Computer Science from University of Pune, India

Share this Profile

Area of Interest:

Computer Sciences
100%
Information Technology
62%
Artificial Intelligence
90%
Soft Computing
75%
Communication
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
0
Abstracts
0

Selected Publications

  1. Sulaiman, A.G. and I.F.T. Al Shaikhli, 2014. Comparative study on 4G/LTE cryptographic algorithms based on different factors. Int. J. Comput. Sci. Telecommun., 5: 7-10.
    Direct Link  |  
  2. Alenezi, K., I.F.T. Alshaikhli and M.A. Alahmad, 2014. Kuwait government entities e-business continuity and disaster recovery plan. J. Adv. Comput. Sci. Technol. Res., 4: 62-75.
    Direct Link  |  
  3. Aldabbagh, S.S.M., I.F.T. Alshaikhli and M.R. Zaba, 2014. Key-dependent S-box in lightweight block ciphers. J. Theoret. Applied Inform. Technol., 62: 554-559.
    Direct Link  |  
  4. Zangana, H.M., I.F.T. Al-Shaikhli and Y.I. Graha, 2013. The ethical dilemma of software piracy: An inquiry from an Islamic perspective. Creative Commun. Inform. Technol., 7: 59-76.
    Direct Link  |  
  5. Zangana, H.M. and I.F.T. Al-Shaikhli, 2013. A new algorithm for human face detection using skin color tone. IOSR J. Comput. Eng., 11: 31-38.
  6. Shams, W.K., A. Wahab and I. Fakhri, 2013. Affective computing model using source-temporal domain. Procedia-Social Behav. Sci., 97: 54-62.
    CrossRef  |  Direct Link  |  
  7. Othman, M., A. Wahab, I. Karim, M.A. Dzulkifli and I.F.T. Alshaikli, 2013. EEG emotion recognition based on the dimensional models of emotions. Procedia-Social Behav. Sci., 97: 30-37.
    CrossRef  |  Direct Link  |  
  8. AlAhmad, M.A. and I.F. Alshaikhli, 2013. MOIM: A novel design of cryptographic hash function. Int. J. Comput. Eng. Technol., 4: 1-19.
    Direct Link  |  
  9. AlAhmad, M. and I.F.T. Alshaikhli, 2013. Broad view of cryptographic hash functions. Int. J. Comput. Sci. Issues, 10: 239-246.
    Direct Link  |  
  10. Al-Zuabi, H.F. and I.F.T. Al-Shaikhli, 2013. Evaluation of usability problems of labor portal in Saudi Arabia. Int. J. Adv. Comput. Sci. Inform. Technol., 2: 14-25.
    Direct Link  |  
  11. Al-Shaikhli, I.F.T., M.A. Alahmad and K. Munthir, 2013. Hash function of finalist SHA-3: Analysis study. Int. J. Adv. Comput. Sci. Inform. Technol., 2: 1-12.
    Direct Link  |  
  12. Al-Shaikhli, I.F., M.M.Y. Alnasheet, M. Alahmad and S.M. Alashram, 2013. Achieving security by combining Huffman and SLSB algorithms. J. Adv. Comput. Sci. Technol. Res., 3: 163-172.
    Direct Link  |  
  13. Al-Kandari, A., I. Al-Shaikhli and A. Najaa, 2013. Comparative study between traffic control methods using simulation software. Int. J. Mach. Learn. Comput., 3: 424-429.
    CrossRef  |  Direct Link  |  
  14. Alkandari, A., M. Alnasheet and I.F.T. Alshaikhli, 2012. Smart cities: Survey. J. Adv. Comput. Sci. Technol. Res., 2: 79-90.
    Direct Link  |  
  15. Alkandari, A. and I. Alshaikhli, 2012. Designing a smart city in Kuwait: An initial study. J. Adv. Comput. Sci. Technol. Res., 2: 116-126.
    Direct Link  |  
  16. AlDabbagh, S.S.M. and I. Al Shaikhli, 2012. Lightweight block ciphers: A comparative study. J. Adv. Comput. Sci. Technol. Res., 2: 159-165.
    Direct Link  |  
  17. AlAhmad, M.A., I.F. Al Shaikhli and H.M. Ahmad, 2012. Protection of the texts using Base64 and MD5. J. Adv. Comput. Sci. Technol. Res., 2: 22-34.
    Direct Link  |  
  18. AlAhmad, M., I. Alshaikhli and S.O. Alhussainan, 2012. Achieving security for images by LSB and MD5. J. Adv. Comput. Sci. Technol. Res., 2: 127-139.
    Direct Link  |  
  19. Al-Safi, H.M. and I.F.T. Alshaikhli, 2012. Rational drug design using genetic algorithm: Case of malaria disease. J. Emerg. Trends Comput. Inform. Sci., 3: 1093-1102.
    Direct Link  |  
  20. Shah, A., A.Z. Saidin, I.F. Taha and A.M. Zeki, 2011. Frequencies determination of characters for Bahasa Melayu: Results of preliminary investigations. Procedia-Social Behav. Sci., 27: 233-240.
    CrossRef  |  Direct Link  |  
  21. Alshaikhli, I.F. and M.A. Ahmad, 2011. Security threats of finger print biometric in network system environment. J. Adv. Comput. Sci. Technol. Res., 1: 36-51.
    Direct Link  |  
  22. Al Shaikhli, I.F., 2011. A practical method for the analysis of genetic algorithms. J. Adv. Comput. Sci. Technol. Res., 1: 1-9.
    Direct Link  |  
  23. Al Shaikhli, I.F. and I. Khalil, 2011. An improved genetic algorithm for solving the multiprocessor scheduling problem. Aust. J. Basic Applied Sci., 5: 947-951.
    Direct Link  |  
  24. Taha, I. and Q. Inazy, 2006. Comparison between Lamarckian evolution and Baldwin evolution of neural network. J. Al Rafidain Univ. Coll., 8: 217-232.
  25. Taha, I. and L. Hasan, 2006. New statistical binary random test. J. Al Rafidain Univ. Coll., 8: 81-101.
  26. Taha, I. and H.S.I. Habra, 2006. Genetic-local hybrid optimizer for solving advance layout problem. J. Al Rafidain Univ. Coll., 8: 87-98.
  27. Taha, I. and A. Naef, 2004. Protecting an internet web file using java. J. Al Rafidain Univ. Coll., 7: 51-60.