


default search action
Akram M. Zeki
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ammar Mohammed Ali Alqadasi
, Akram M. Zeki, Mohd Shahrizal Sunar
, Md Sah Bin Hj Salam
, Rawad Abdulghafor, Nashwan Abdo Khaled:
Improving Automatic Forced Alignment for Phoneme Segmentation in Quranic Recitation. IEEE Access 12: 229-244 (2024) - 2023
- [j14]Mahmoud Khattab, Akram M. Zeki, Ali Amer Alwan, Belgacem Bouallegue, Safaa S. Matter, Abdelmoty M. Ahmed
:
A Hybrid Regularization-Based Multi-Frame Super-Resolution Using Bayesian Framework. Comput. Syst. Sci. Eng. 44(1): 35-54 (2023) - [j13]Musab Mustafa Hijazi, Akram M. Zeki, Amelia Ismail:
Utilizing artificial bee colony algorithm as feature selection method in arabic text classification. Int. Arab J. Inf. Technol. 20(3A): 536-547 (2023) - [c20]Muhammad Akmal Bin Anuar, Akram M. Zeki, Adamu I. Abubakar:
Exploring Blockchain for KYC: Deepening Client Understanding. ICCSCE 2023: 27-32 - 2022
- [c19]Musab Mustafa Hijazi, Akram M. Zeki, Amelia Ismail:
A Review Study on Arabic Text Classification. ACIT 2022: 1-13 - 2021
- [j12]Mahmoud Khattab
, Akram M. Zeki, Ali Amer Alwan
, Belgacem Bouallegue
, Safaa S. Matter
, Abdelmoty M. Ahmed
:
Regularized Multiframe Super-Resolution Image Reconstruction Using Linear and Nonlinear Filters. J. Electr. Comput. Eng. 2021: 8309910:1-8309910:16 (2021) - [c18]Musab Mustafa Hijazi, Akram M. Zeki, Amelia Ismail:
Arabic Text Classification: A Review Study on Feature Selection Methods. ACIT 2021: 1-6 - 2020
- [j11]Mahmoud Khattab
, Akram M. Zeki
, Ali Amer Alwan
, Ahmed S. Badawy
:
Regularization-based multi-frame super-resolution: A systematic review. J. King Saud Univ. Comput. Inf. Sci. 32(7): 755-762 (2020) - [j10]Rawad Abdulghafor
, Shahrum Shah Abdullah
, Sherzod Turaev
, Akram M. Zeki
, Imad Al-Shaikhli
:
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems. Neural Comput. Appl. 32(1): 261-277 (2020) - [c17]AbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki
, Qusay Al-Maatouk
, Abdulaziz Aborujilah, Maen T. Al-Rashdan:
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal. IMCOM 2020: 1-6
2010 – 2019
- 2019
- [j9]Haruna Chiroma
, Usman Ali Abdullahi, Shafii Muhammad Abdulhamid
, Ala Abdulsalam Alarood
, Lubna Abdel Kareim Gabralla, Nadim Rana
, Liyana Shuib
, Ibrahim Abaker Targio Hashem
, Dada Emmanuel Gbenga
, Adamu I. Abubakar
, Akram M. Zeki
, Tutut Herawan
:
Progress on Artificial Neural Networks for Big Data Analytics: A Survey. IEEE Access 7: 70535-70551 (2019) - 2018
- [j8]Rawad Abdulghafor
, Sherzod Turaev
, Akram M. Zeki
, Imad Al-Shaikhli
:
Reach a nonlinear consensus for MAS via doubly stochastic quadratic operators. Int. J. Control 91(6): 1431-1459 (2018) - [j7]Rawad Abdulghafor
, Sherzod Turaev
, Akram M. Zeki
, Adamu Abubaker:
Nonlinear Convergence Algorithm: Structural Properties with Doubly Stochastic Quadratic Operators for Multi-Agent Systems. J. Artif. Intell. Soft Comput. Res. 8(1): 49-61 (2018) - [j6]Saman Shojae Chaeikar
, Mazdak Zamani
, Azizah Bt Abdul Manaf, Akram M. Zeki
:
PSW statistical LSB image steganalysis. Multim. Tools Appl. 77(1): 805-835 (2018) - 2017
- [j5]Haruna Chiroma
, Nor Liyana Mohd Shuib
, Adamu I. Abubakar, Akram M. Zeki
, Abdulsalam Ya'u Gital
, Tutut Herawan
, Jemal H. Abawajy:
Advances in Teaching and Learning on Facebook in Higher Institutions. IEEE Access 5: 480-500 (2017) - [j4]Adamu I. Abubakar
, Elbara Eldaw Elnour Mohamed, Akram M. Zeki
:
The Dynamics of Data Packet in Transmission Session. IEEE Access 5: 4329-4339 (2017) - [j3]Sani Danjuma
, Tutut Herawan
, Maizatul Akmar Ismail
, Haruna Chiroma, Adamu I. Abubakar, Akram M. Zeki
:
A Review on Soft Set-Based Parameter Reduction and Decision Making. IEEE Access 5: 4671-4689 (2017) - [j2]Fida Hussain Chandio, Zahir Irani, Akram M. Zeki, Asadullah Shah, Sayed Chhattan Shah:
Online Banking Information Systems Acceptance: An Empirical Examination of System Characteristics and Web Security. Inf. Syst. Manag. 34(1): 50-64 (2017) - [j1]Waleed Mugahed Al-Rahmi
, Akram M. Zeki
:
A model of using social media for collaborative learning to enhance learners' performance on learning. J. King Saud Univ. Comput. Inf. Sci. 29(4): 526-535 (2017) - [c16]Mojtaba Alizadeh
, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani
, Akram M. Zeki
, Shehzad Ashraf Chaudhry
, Muhammad Khurram Khan
:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - 2015
- [c15]Rawad Abdulghafor
, Sherzod Turaev
, Akram M. Zeki
, Farruh Shahidi:
The convergence consensus of multi-agent systems controlled via doubly stochastic quadratic operators. ISAMSR 2015: 59-64 - 2014
- [c14]Ghassan N. Mohammed, Azman Yasin, Akram M. Zeki
:
A new robust image watermarking method using Dual Intermediate Significant Bits. ICCSCE 2014: 680-685 - [c13]Adamu I. Abubakar, Akram M. Zeki
, Haruna Chiroma
, Sanah Abdullahi Muaz, Eka Novita Sari, Tutut Herawan
:
Spread Spectrum Audio Watermarking Using Vector Space Projections. ISI (1) 2014: 297-307 - [c12]Adamu I. Abubakar, Akram M. Zeki
, Haruna Chiroma
, Tutut Herawan
:
Investigating Rendering Speed and Download Rate of Three-Dimension (3D) Mobile Map Intended for Navigation Aid Using Genetic Algorithm. SCDM 2014: 261-271 - 2013
- [c11]Haruna Chiroma, Sameem Abdul Kareem
, Adamu I. Abubakar, Akram M. Zeki
, Mohammed Joda Usman:
Orthogonal Wavelet Support Vector Machine for Predicting Crude Oil Prices. DaEng 2013: 193-201 - [c10]Ghassan N. Mohammed, Azman Yasin, Akram M. Zeki
:
Improvement of the Quality for Digital Image Watermarking Based on Dual ISB. ICITCS 2013: 1-4 - 2012
- [c9]Shayma'a Senan Mahmod, Aisha-Hassan A. Hashim
, Akram M. Zeki
, Rashid A. Saeed
, Shihab A. Hameed, Jamal I. Daoud
:
A Framework of a Route Optimization Scheme for Nested Mobile Network. ICONIP (5) 2012: 689-696 - [c8]Kawther Aldhaln, Akram M. Zeki
, Ahmed Zeki, Hamad Alreshidi
:
Improving knowledge extraction of Hadith classifier using decision tree algorithm. CAMP 2012: 148-152 - [c7]Imad Fakhri Al Shaikhli, Akram M. Zeki
, Rusydi H. Makarim, Al-Sakib Khan Pathan
:
Protection of Integrity and Ownership of PDF Documents Using Invisible Signature. UKSim 2012: 533-537 - 2011
- [c6]Akram M. Zeki
, Azizah A. Manaf, Shayma'a Senan Mahmod:
Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding. ICSECS (1) 2011: 592-599 - [c5]Akram M. Zeki
, Azizah A. Manaf, Shayma'a Senan Mahmod:
Analysis of ISB watermarking model: block based methods vs embedding repetition methods. MoMM 2011: 198-201
2000 – 2009
- 2009
- [c4]Mazdak Zamani
, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki
, Pritheega Magalingam
:
A Novel Approach for Audio Watermarking. IAS 2009: 83-86 - [c3]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Shahidan M. Abdullah:
Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography. GEM 2009: 170-175 - [c2]Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki
:
A secure audio steganography approach. ICITST 2009: 1-6 - 2007
- [c1]Sayuthi Jaafar, Azizah A. Manaf, Akram M. Zeki
:
Steganography technique using modulus arithmetic. ISSPA 2007: 1-4
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint