Dr. Imad Fakhri Taha Alshaikhli

Dean, Professor
International Islamic University Malaysia, Malaysia


Highest Degree
Ph.D. in Computer Science from University of Pune, India

Share this Profile

Area of Interest:

Computer Sciences
Information Technology
Artificial Intelligence
Soft Computing
Communication

Selected Publications

  1. Sulaiman, A.G. and I.F.T. Al Shaikhli, 2014. Comparative study on 4G/LTE cryptographic algorithms based on different factors. Int. J. Comput. Sci. Telecommun., 5: 7-10.
    Direct Link  |  

  2. Alenezi, K., I.F.T. Alshaikhli and M.A. Alahmad, 2014. Kuwait government entities e-business continuity and disaster recovery plan. J. Adv. Comput. Sci. Technol. Res., 4: 62-75.
    Direct Link  |  

  3. Aldabbagh, S.S.M., I.F.T. Alshaikhli and M.R. Zaba, 2014. Key-dependent S-box in lightweight block ciphers. J. Theoret. Applied Inform. Technol., 62: 554-559.
    Direct Link  |  

  4. Zangana, H.M., I.F.T. Al-Shaikhli and Y.I. Graha, 2013. The ethical dilemma of software piracy: An inquiry from an Islamic perspective. Creative Commun. Inform. Technol., 7: 59-76.
    Direct Link  |  

  5. Zangana, H.M. and I.F.T. Al-Shaikhli, 2013. A new algorithm for human face detection using skin color tone. IOSR J. Comput. Eng., 11: 31-38.

  6. Shams, W.K., A. Wahab and I. Fakhri, 2013. Affective computing model using source-temporal domain. Procedia-Social Behav. Sci., 97: 54-62.
    CrossRef  |  Direct Link  |  

  7. Othman, M., A. Wahab, I. Karim, M.A. Dzulkifli and I.F.T. Alshaikli, 2013. EEG emotion recognition based on the dimensional models of emotions. Procedia-Social Behav. Sci., 97: 30-37.
    CrossRef  |  Direct Link  |  

  8. AlAhmad, M.A. and I.F. Alshaikhli, 2013. MOIM: A novel design of cryptographic hash function. Int. J. Comput. Eng. Technol., 4: 1-19.
    Direct Link  |  

  9. AlAhmad, M. and I.F.T. Alshaikhli, 2013. Broad view of cryptographic hash functions. Int. J. Comput. Sci. Issues, 10: 239-246.
    Direct Link  |  

  10. Al-Zuabi, H.F. and I.F.T. Al-Shaikhli, 2013. Evaluation of usability problems of labor portal in Saudi Arabia. Int. J. Adv. Comput. Sci. Inform. Technol., 2: 14-25.
    Direct Link  |  

  11. Al-Shaikhli, I.F.T., M.A. Alahmad and K. Munthir, 2013. Hash function of finalist SHA-3: Analysis study. Int. J. Adv. Comput. Sci. Inform. Technol., 2: 1-12.
    Direct Link  |  

  12. Al-Shaikhli, I.F., M.M.Y. Alnasheet, M. Alahmad and S.M. Alashram, 2013. Achieving security by combining Huffman and SLSB algorithms. J. Adv. Comput. Sci. Technol. Res., 3: 163-172.
    Direct Link  |  

  13. Al-Kandari, A., I. Al-Shaikhli and A. Najaa, 2013. Comparative study between traffic control methods using simulation software. Int. J. Mach. Learn. Comput., 3: 424-429.
    CrossRef  |  Direct Link  |  

  14. Alkandari, A., M. Alnasheet and I.F.T. Alshaikhli, 2012. Smart cities: Survey. J. Adv. Comput. Sci. Technol. Res., 2: 79-90.
    Direct Link  |  

  15. Alkandari, A. and I. Alshaikhli, 2012. Designing a smart city in Kuwait: An initial study. J. Adv. Comput. Sci. Technol. Res., 2: 116-126.
    Direct Link  |  

  16. AlDabbagh, S.S.M. and I. Al Shaikhli, 2012. Lightweight block ciphers: A comparative study. J. Adv. Comput. Sci. Technol. Res., 2: 159-165.
    Direct Link  |  

  17. AlAhmad, M.A., I.F. Al Shaikhli and H.M. Ahmad, 2012. Protection of the texts using Base64 and MD5. J. Adv. Comput. Sci. Technol. Res., 2: 22-34.
    Direct Link  |  

  18. AlAhmad, M., I. Alshaikhli and S.O. Alhussainan, 2012. Achieving security for images by LSB and MD5. J. Adv. Comput. Sci. Technol. Res., 2: 127-139.
    Direct Link  |  

  19. Al-Safi, H.M. and I.F.T. Alshaikhli, 2012. Rational drug design using genetic algorithm: Case of malaria disease. J. Emerg. Trends Comput. Inform. Sci., 3: 1093-1102.
    Direct Link  |  

  20. Shah, A., A.Z. Saidin, I.F. Taha and A.M. Zeki, 2011. Frequencies determination of characters for Bahasa Melayu: Results of preliminary investigations. Procedia-Social Behav. Sci., 27: 233-240.
    CrossRef  |  Direct Link  |  

  21. Alshaikhli, I.F. and M.A. Ahmad, 2011. Security threats of finger print biometric in network system environment. J. Adv. Comput. Sci. Technol. Res., 1: 36-51.
    Direct Link  |  

  22. Al Shaikhli, I.F., 2011. A practical method for the analysis of genetic algorithms. J. Adv. Comput. Sci. Technol. Res., 1: 1-9.
    Direct Link  |  

  23. Al Shaikhli, I.F. and I. Khalil, 2011. An improved genetic algorithm for solving the multiprocessor scheduling problem. Aust. J. Basic Applied Sci., 5: 947-951.
    Direct Link  |  

  24. Taha, I. and Q. Inazy, 2006. Comparison between Lamarckian evolution and Baldwin evolution of neural network. J. Al Rafidain Univ. Coll., 8: 217-232.

  25. Taha, I. and L. Hasan, 2006. New statistical binary random test. J. Al Rafidain Univ. Coll., 8: 81-101.

  26. Taha, I. and H.S.I. Habra, 2006. Genetic-local hybrid optimizer for solving advance layout problem. J. Al Rafidain Univ. Coll., 8: 87-98.

  27. Taha, I. and A. Naef, 2004. Protecting an internet web file using java. J. Al Rafidain Univ. Coll., 7: 51-60.