Now showing items 301-320 of 2402

    • Role of contextual properties in enterprise service migration to cloud computing 

      Khan, Khaled M.; Malluhi, Qutaibah ( John Wiley and Sons Ltd , 2013 , Article Review)
      This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
    • Live migration of virtual machine memory content in networked systems 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong ( Elsevier , 2022 , Article Review)
      Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ...
    • A Process Model for Customisation of Software in Multi-tenant SaaS Model 

      Khan, Khaled M.; Nhlabatsi, Armstrong; Khan, Niamul ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics 

      Alkaeed, Mahdi Kh.; Alamro, Zaid; Al-Ali, Muhammed Samir; Al-Mohammed, Hasan Abbas; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ...
    • Managing Security Control Assumptions Using Causal Traceability 

      Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
    • Traceability for adaptive information security in the cloud 

      Nhlabatsi, Armstrong; Thun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; ... more authors ( IEEE Computer Society , 2014 , Conference)
      One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...
    • Distributed Framework via Block-chain Smart Contracts for Smart Grid Systems against Cyber-Attacks 

      Alkaeed, Mahdi; Soliman, Md Mohiuddin; Khan, Khaled M.; Elfouly, Tarek M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      In this century, the demand for energy is increasing daily, and the need for energy resources has become urgent and inevitable. New ways of generating energy, such as renewable resources that depend on many sources, including ...
    • Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator 

      Elnour, Mariam; Meskin, Nader; Khan, Khlaed M.; Jain, Raj; Zaidi, Syed; ... more authors ( Elsevier , 2020 , Conference)
      Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ...
    • A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems 

      Elnour, Mariam; Noorizadeh, Mohammad; Shakerpour, Mohammad; Meskin, Nader; Khan, Khaled; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
      In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to ...
    • A machine learning-based optimization approach for pre-copy live virtual machine migration 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong; Barhamgi, Mahmoud ( Springer , 2023 , Article)
      Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ...
    • Altmetrics for country-level research assessment 

      Alhoori, Hamed; Furuta, Richard; Tabet, Myrna; Samaka, Mohammed; Fox, Edward A. ( Springer Verlag , 2014 , Article)
      Changes are occurring in scholarly communication and the geography of science.Policymakersand research funding agencies are looking for ways to measure the comprehensive impact of research and benefit from the research ...
    • Workplace learning using mobile technology: A case study in the oil and gas industry 

      Ally, Mohamed; Samaka, Mohammed; Impagliazzo, John; Mohamed, Abdulahi; Robinson, Martha ( Springer Verlag , 2014 , Article)
      This article presents an innovative project using mobile technology to train workers in the oil and gas industry to develop their communication skills while functioning on the job. The training was delivered on mobile ...
    • Digital library initiative: A project for educators in qatar 

      Tabet, Myrna; Kanan, Tarek; Alhoori, Hamed; Lukesh, Susan S.; Thompson, Carole; ... more authors ( Association for Computing Machinery , 2013 , Article)
      This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ...
    • Open education resources and mobile technology to narrow the learning divide 

      Ally, Mohamed; Samaka, Mohammed ( Athabasca University , 2013 , Article)
      As the world becomes more digitized, there will be an increasing need to make available learning resources in electronic format for access by information and communication technologies. The question education will face is ...
    • Use of mobile learning apps in workplace learning 

      Ally, Mohamed; Samaka, Mohammed; Ismail, Loay; Impagliazzo, John ( IEEE Computer Society , 2013 , Article)
      Organizations are starting to use mobile learning to train workers and to provide professional development of workers so that they can function on the job. The training can be delivered using mobile apps which provides the ...
    • Guidelines for design and implementation of mobile learning 

      Ally, Mohamed; Samaka, Mohammed ( IGI Global , 2016 , Book chapter)
      As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ...
    • E-learning and mobile learning development in the state of Qatar 

      Robinson, Martha; Ally, Mohamed; Samaka, Mohammed ( Taylor and Francis , 2015 , Book chapter)
      The State of Qatar's National Vision 2030 (QNV 2030) defines long-term outcomes for this oil-rich and gas-rich state. It aims at transforming Qatar into an advanced nation, capable of sustaining its own development and ...
    • A problem-oriented approach to represent and manage knowledge in PBL 

      Miao, Yongwu; Samaka, Mohammed; Wang, Disi ( Asia-Pacific Society for Computers in Education , 2015 , Conference)
      In traditional subject-based learning knowledge is well-structured and prepared in advance by the teachers before transferring in the form of a lecture presentation. However, the knowledge learned in problem-based learning ...
    • Wireless application deploying cell broadcast, and bulk SMS/MMS 

      Samaka, Mohammed; Fakhroo, Abdulaziz; Al-Omari, Noha; Moeinzadeh, Zohreh; Al-Kubaisi, Saada; ... more authors ( International Business Information Management Association, IBIMA , 2009 , Conference)
      Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...