Now showing items 301-320 of 2402

    • Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics 

      Alkaeed, Mahdi Kh.; Alamro, Zaid; Al-Ali, Muhammed Samir; Al-Mohammed, Hasan Abbas; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Managing Security Control Assumptions Using Causal Traceability 

      Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
    • Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator 

      Elnour, Mariam; Meskin, Nader; Khan, Khlaed M.; Jain, Raj; Zaidi, Syed; ... more authors ( Elsevier , 2020 , Conference Paper)
      Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Traceability for adaptive information security in the cloud 

      Nhlabatsi, Armstrong; Thun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; ... more authors ( IEEE Computer Society , 2014 , Conference Paper)
      One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...
    • A Process Model for Customisation of Software in Multi-tenant SaaS Model 

      Khan, Khaled M.; Nhlabatsi, Armstrong; Khan, Niamul ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
    • Role of contextual properties in enterprise service migration to cloud computing 

      Khan, Khaled M.; Malluhi, Qutaibah ( John Wiley and Sons Ltd , 2013 , Article Review)
      This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
    • Live migration of virtual machine memory content in networked systems 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong ( Elsevier , 2022 , Article Review)
      Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ...
    • A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems 

      Elnour, Mariam; Noorizadeh, Mohammad; Shakerpour, Mohammad; Meskin, Nader; Khan, Khaled; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
      In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to ...
    • A machine learning-based optimization approach for pre-copy live virtual machine migration 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong; Barhamgi, Mahmoud ( Springer , 2023 , Article)
      Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ...
    • Altmetrics for country-level research assessment 

      Alhoori, Hamed; Furuta, Richard; Tabet, Myrna; Samaka, Mohammed; Fox, Edward A. ( Springer Verlag , 2014 , Article)
      Changes are occurring in scholarly communication and the geography of science.Policymakersand research funding agencies are looking for ways to measure the comprehensive impact of research and benefit from the research ...
    • Workplace learning using mobile technology: A case study in the oil and gas industry 

      Ally, Mohamed; Samaka, Mohammed; Impagliazzo, John; Mohamed, Abdulahi; Robinson, Martha ( Springer Verlag , 2014 , Article)
      This article presents an innovative project using mobile technology to train workers in the oil and gas industry to develop their communication skills while functioning on the job. The training was delivered on mobile ...
    • Digital library initiative: A project for educators in qatar 

      Tabet, Myrna; Kanan, Tarek; Alhoori, Hamed; Lukesh, Susan S.; Thompson, Carole; ... more authors ( Association for Computing Machinery , 2013 , Article)
      This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ...
    • Wireless application deploying cell broadcast, and bulk SMS/MMS 

      Samaka, Mohammed; Fakhroo, Abdulaziz; Al-Omari, Noha; Moeinzadeh, Zohreh; Al-Kubaisi, Saada; ... more authors ( International Business Information Management Association, IBIMA , 2009 , Conference Paper)
      Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
    • Open education resources and mobile technology to narrow the learning divide 

      Ally, Mohamed; Samaka, Mohammed ( Athabasca University , 2013 , Article)
      As the world becomes more digitized, there will be an increasing need to make available learning resources in electronic format for access by information and communication technologies. The question education will face is ...
    • MB-C: Check-in mobile application using barcodes 

      Samaka, Mohammed; Hassan, Mohammed ( International Business Information Management Association, IBIMA , 2008 , Conference Paper)
      This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...
    • A problem-oriented approach to represent and manage knowledge in PBL 

      Miao, Yongwu; Samaka, Mohammed; Wang, Disi ( Asia-Pacific Society for Computers in Education , 2015 , Conference Paper)
      In traditional subject-based learning knowledge is well-structured and prepared in advance by the teachers before transferring in the form of a lecture presentation. However, the knowledge learned in problem-based learning ...
    • Using a PBL authoring tool to train teachers in designing an online PBL unit 

      Miao, Yongwu; Samaka, Mohammed; Wang, Disi; Ali, Zeyad; Romanowski, Michael H. ( Asia-Pacific Society for Computers in Education , 2014 , Conference Paper)
      Problem-based learning (PBL) is proposed as one of the most well-known alternatives to subject-based learning in educating graduates to become independent workers, critical thinkers, problem solvers, lifelong learners, and ...
    • A flexible system and data model for the representation and management of PBL scripts 

      Wang, Disi; Miao, Yongwu; Hoppe, Ulrich; Samaka, Mohammed ( Asia-Pacific Society for Computers in Education , 2014 , Conference Paper)
      As problem-based learning (PBL) is becoming more and more popular, there is also a growing interest in developing and using technologies in the implementation of PBL. However, teachers may have difficulties to design a ...