Neural and Mathematical Predicting Models for Particulate Matter Impact on Human Health in Oman

H. Yousif Jabar , alattar Nebras , Jaffer Moosa , A. Aljunid S.
WSEAS Transactions on Environment and Development 15 578 -585

7
2019
People’s perception on the concept of wadiah in Islamic Banking: a research study on students of UiTM Puncak Alam

Sayyid Umar Syed Ahmad Aljunid
Universiti Teknologi MARA, Selangor, Puncak Alam Campus

2018
An Architecture for Providing Context-aware Security as a Service in Mobile Cloud Computing Environments

Muaamar Amer Alkubati Syed Ahmad Aljunid , Normaly Kamal Ismail
International Conference on Computational Science and Engineering (ICCSE), 2016

2016
Understanding vulnerabilities by refining taxonomy

Nurul Haszeli Ahmad , Syed Ahmad Aljunid , Jamalul-lail Ab Manan
information assurance and security 25 -29

1
2011
Predictive Analytics: The Application of J48 Algorithm on Grocery Data to Predict Obesity

NurrAina Daud , Nor Laila Mohd Noor , Syed Ahmad Aljunid , Nurulhuda Noordin
2018 IEEE Conference on Big Data and Analytics (ICBDA)

2
2018
Domain specific concept ontologies and text summarization as hierarchical fuzzy logic ranking indicator on malay text corpus

Shaiful Bakhtiar Bin Rodzman , Normaly Kamal Ismail , Nurazzah Abd Rahman , Syed Ahmad Aljunid
Indonesian Journal of Electrical Engineering and Computer Science 15 ( 3) 1527 -1534

2019
I-OnAR: a rule-based machine learning approach for intelligent assessment in an online learning environment

Shaiful Bakhtiar Bin Rodzman , Nordin Abu Bakar , Yun-Huoy Choo , Syed Ahmad Aljunid
Indonesian Journal of Electrical Engineering and Computer Science 17 ( 2) 1021 -1028

2020
A novel hybrid fuzzy-SVM image steganographic model

Hanizan Shaker Hussain , Syed Ahmad Aljunid , Saadiah Yahya , Fakariah Hani Mohd Ali
international symposium on information technology 1 1 -6

10
2010
Application of Back Propagation Neural Network and ANFIS in forecasting university program

Nor Eleena Yusoff , Daud Mohamad , Zaidah Ibrahim , Syed Ahmad Aljunid
international conference on science and social research 1099 -1103

2
2010
Taxonomy of C Overflow Vulnerabilities Attack

Nurul Haszeli Ahmad , Syed Ahmad Aljunid , Jamalul-lail Ab Manan
international conference on software engineering and computer systems 376 -390

1
2011
An architecture for providing context-aware security as a service in mobile cloud computing environments

Muaamar Amer Alkubati , Syed Ahmad Aljunid , Normaly Kamal Ismail
Advanced Science Letters 23 ( 11) 11074 -11077

2017
Secret Sharing Deniable Encryption Technique

Mohsen Mohamad Hata , Fakariah Hani Mohd Ali , Syed Ahmad Aljunid
international conference on information science and applications 347 -357

2017
Performing Tasks Can Improve Program Comprehension Mental Model of Novice Developers: An Empirical Approach

Amal A. Shargabi , Syed Ahmad Aljunid , Muthukkaruppan Annamalai , Abdullah Mohd Zin
international conference on program comprehension 263 -273

2020
A study on the program comprehension and debugging processes of novice programmers

Syed Ahmad Aljunid , Abdullah Mohd Zin , Zarina Shukur
Journal of Software Engineering 6 ( 1) 1 -9

2
2012
Mobile cloud computing applications penetration testing model design

Salah Al Ahmad , Syed Ahmad Aljunid , Normaly Kamal Ismail
International Journal of Information and Computer Security 13 ( 2) 210 -226

2020
SVM-SS Watermarking Model for Medical Images

Saliza Ramly , Syed Ahmad Aljunid , Hanizan Shaker Hussain
digital enterprise and information systems 372 -386

5
2011
Expert judgment Z-Numbers as a ranking indicator for hierarchical fuzzy logic system

Shaiful Bakhtiar bin Rodzman , Normaly Kamal Ismail , Nurazzah Abd Rahman , Syed Ahmad Aljunid
IAES International Journal of Artificial Intelligence 8 ( 3) 244 -251

2019
Mobile Cloud Computing Testing Review

Ahmad Salah Al-Ahmad , Syed Ahmad Aljunid , Anis Shobirin Abdullah Sani
international conference on advanced computer science applications and technologies 176 -180

11
2013
Notice of Removal Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique

Suzwani Binti Ismail , Fakariah Hani Mohd Ali , Syed Ahmad Aljunid
2016 6th International Conference on IT Convergence and Security (ICITCS) 1 -4

2016