-
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing
Authors:
Mohammad Riyaz Belgaum,
Safeeullah Soomro,
Zainab Alansari,
Shahrulniza Musa,
Muhammad Alam,
Mazliham Mohd Su'ud
Abstract:
In Cloud computing environment the resources are managed dynamically based on the need and demand for resources for a particular task. With a lot of challenges to be addressed our concern is Load balancing where load balancing is done for optimal usage of resources and reduces the cost associated with it as we use pay-as-you-go policy. The task scheduling is done by the cloud service provider usin…
▽ More
In Cloud computing environment the resources are managed dynamically based on the need and demand for resources for a particular task. With a lot of challenges to be addressed our concern is Load balancing where load balancing is done for optimal usage of resources and reduces the cost associated with it as we use pay-as-you-go policy. The task scheduling is done by the cloud service provider using preemption and non-preemption based on the requirements in a virtualized scenario which has been focused here. In this paper, various task scheduling algorithms are studied to present the dynamic allocation of resources under each category and the ways each of this scheduling algorithm adapts to handle the load and have high-performance computing
△ Less
Submitted 16 April, 2019;
originally announced May 2019.
-
Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing
Authors:
Mohammad Riyaz Belgaum,
Safeeullah Soomro,
Zainab Alansari,
Muhammad Alam
Abstract:
Cloud computing has been gaining popularity in the recent years. Several studies are being proceeded to build cloud applications with exquisite quality based on users demands. In achieving the same, one of the applied criteria is checkpoint based load balancing in real time scheduling through which suitable cloud service is chosen from a group of cloud services candidates. Valuable information can…
▽ More
Cloud computing has been gaining popularity in the recent years. Several studies are being proceeded to build cloud applications with exquisite quality based on users demands. In achieving the same, one of the applied criteria is checkpoint based load balancing in real time scheduling through which suitable cloud service is chosen from a group of cloud services candidates. Valuable information can be collected to rank the services within this checkpoint based load balancing. In order to attain ranking, different services are needed to be invoked in the cloud, which is time consuming and wastage of services invocation. To avoid the same, this chapter proposes an algorithm for predicting the ranks of different cloud services by using the values from previously offered services.
△ Less
Submitted 16 April, 2019;
originally announced May 2019.
-
A Framework for Debugging Java Programs in a Bytecode
Authors:
Safeeullah Soomro,
Mohammad Riyaz Belgaum,
Zainab Alansari,
Mahdi H Miraz
Abstract:
In the domain of Software Engineering, program analysis and understanding has been considered to be a very challenging task since decade, as it demands dedicated time and efforts. The analysis of source code may occasionally be comparatively easier due to its static nature, however, the back end code (Bytecode), especially in terms of Java programming, is complicated to be analysed. In this paper,…
▽ More
In the domain of Software Engineering, program analysis and understanding has been considered to be a very challenging task since decade, as it demands dedicated time and efforts. The analysis of source code may occasionally be comparatively easier due to its static nature, however, the back end code (Bytecode), especially in terms of Java programming, is complicated to be analysed. In this paper, we present a methodological approach towards understanding the Bytecode of Java programs. We put forward a framework for the debugging process of Java Bytecode. Furthermore, we discuss the debugging process of Bytecode understanding from simple to multiple statements with regards to data flow analysis. Finally, we present a comparative analysis of Bytecode along with the simulation of the proposed framework for the debugging process
△ Less
Submitted 29 April, 2019;
originally announced April 2019.
-
The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open research Issues
Authors:
Zainab Alansari,
Safeeullah Soomro,
Mohammad Riyaz Belgaum,
Shahaboddin Shamshirband
Abstract:
Health is one of the sustainable development areas in all of the countries. Internet of Things has a variety of use in this sector which was not studied yet. The aim of this research is to prioritize IoT usage in the healthcare sector to achieve sustainable development. The study is an applied descriptive research according to data collection. As per the research methodology which is FAHP, it is a…
▽ More
Health is one of the sustainable development areas in all of the countries. Internet of Things has a variety of use in this sector which was not studied yet. The aim of this research is to prioritize IoT usage in the healthcare sector to achieve sustainable development. The study is an applied descriptive research according to data collection. As per the research methodology which is FAHP, it is a single cross sectional survey research. After data collection, the agreed paired comparison matrices, allocated to weighted criteria and the priority of IoT usage were determined. Based on the research findings, the two criteria of Economic Prosperity and Quality of Life achieved the highest priority for IoT sustainable development in the healthcare sector. Moreover, the top priorities for IoT in the area of health, according to the usage, were identified as Ultraviolet Radiation, Dental Health and Fall Detection.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics
Authors:
Zainab Alansari,
Nor Badrul Anuar,
Amirrudin Kamsin,
Safeeullah Soomro,
Mohammad Riyaz Belgaum
Abstract:
In contemporary age, Computational Intelligence (CI) performs an essential role in the interpretation of big biological data considering that it could provide all of the molecular biology and DNA sequencing computations. For this purpose, many researchers have attempted to implement different tools in this field and have competed aggressively. Hence, determining the best of them among the enormous…
▽ More
In contemporary age, Computational Intelligence (CI) performs an essential role in the interpretation of big biological data considering that it could provide all of the molecular biology and DNA sequencing computations. For this purpose, many researchers have attempted to implement different tools in this field and have competed aggressively. Hence, determining the best of them among the enormous number of available tools is not an easy task, selecting the one which accomplishes big data in the concise time and with no error can significantly improve the scientist's contribution in the bioinformatics field. This study uses different analysis and methods such as Fuzzy, Dempster-Shafer, Murphy and Entropy Shannon to provide the most significant and reliable evaluation of IoT-based computational intelligence tools for DNA sequence analysis. The outcomes of this study can be advantageous to the bioinformatics community, researchers and experts in big biological data.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks
Authors:
Mohammad Riyaz Belgaum,
Shahrulniza Musa,
Mazliham Mohd Su'ud,
Muhammad Alam,
Safeeullah Soomro,
Zainab Alansari
Abstract:
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the rou…
▽ More
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput
△ Less
Submitted 3 April, 2019;
originally announced April 2019.
-
Internet of Things: Infrastructure, Architecture, Security and Privacy
Authors:
Zainab Alansari,
Nor Badrul Anuar,
Amirrudin Kamsin,
Mohammad Riyaz Belgaum,
Jawdat Alshaer,
Safeeullah Soomro,
Mahdi H. Miraz
Abstract:
Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure, Security, Architecture and Privacy, play an important role in sha** the future of the digitalised world. Internet of Things devices are connected through sensors which have significant impacts on the data and its security. In this research, we used IoT five layered ar…
▽ More
Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure, Security, Architecture and Privacy, play an important role in sha** the future of the digitalised world. Internet of Things devices are connected through sensors which have significant impacts on the data and its security. In this research, we used IoT five layered architecture of the Internet of Things to address the security and private issues of IoT enabled services and applications. Furthermore, a detailed survey on Internet of Things infrastructure, architecture, security, and privacy of the heterogeneous objects were presented. The paper identifies the major challenge in the field of IoT; one of them is to secure the data while accessing the objects through sensing machines. This research advocates the importance of securing the IoT ecosystem at each layer resulting in an enhanced overall security of the connected devices as well as the data generated. Thus, this paper put forwards a security model to be utilised by the researchers, manufacturers and developers of IoT devices, applications and services.
△ Less
Submitted 11 July, 2018;
originally announced July 2018.
-
Challenges of Internet of Things and Big Data Integration
Authors:
Zainab Alansari,
Nor Badrul Anuar,
Amirrudin Kamsin,
Safeeullah Soomro,
Mohammad Riyaz Belgaum,
Mahdi H. Miraz,
Jawdat Alshaer
Abstract:
The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. considering the existing techniques and technologie…
▽ More
The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. considering the existing techniques and technologies, it is probably safe to say that the best solution is to use big data tools to provide an analytical solution to the Internet of Things. Based on the current technology deployment and adoption trends, it is envisioned that the Internet of Things is the technology of the future, while to-day's real-world devices can provide real and valuable analytics, and people in the real world use many IoT devices. Despite all the advertisements that companies offer in connection with the Internet of Things, you as a liable consumer, have the right to be suspicious about IoT advertise-ments. The primary question is: What is the promise of the Internet of things con-cerning reality and what are the prospects for the future.
△ Less
Submitted 23 June, 2018;
originally announced June 2018.
-
Fault Localization Models in Debugging
Authors:
Safeeullah Soomro,
Mohammad Riyaz Belgaum,
Zainab Alansari,
Mahdi H. Miraz
Abstract:
Debugging is considered as a rigorous but important feature of software engineering process. Since more than a decade, the software engineering research community is exploring different techniques for removal of faults from programs but it is quite difficult to overcome all the faults of software programs. Thus, it is still remains as a real challenge for software debugging and maintenance communi…
▽ More
Debugging is considered as a rigorous but important feature of software engineering process. Since more than a decade, the software engineering research community is exploring different techniques for removal of faults from programs but it is quite difficult to overcome all the faults of software programs. Thus, it is still remains as a real challenge for software debugging and maintenance community. In this paper, we briefly introduced software anomalies and faults classification and then explained different fault localization models using theory of diagnosis. Furthermore, we compared and contrasted between value based and dependencies based models in accordance with different real misbehaviours and presented some insight information for the debugging process. Moreover, we discussed the results of both models and manifested the shortcomings as well as advantages of these models in terms of debugging and maintenance.
△ Less
Submitted 13 February, 2018;
originally announced March 2018.
-
Challenges: Bridge between Cloud and IoT
Authors:
Mohammad Riyaz Belgaum,
Safeeullah Soomro,
Zainab Alansari,
Muhammad Alam,
Shahrulniza Musa,
Mazliham Mohd Suud
Abstract:
In the real time processing, a new emerging technology where the need of connecting smart devices with cloud through Internet has raised. IoT devices processed information is to be stored and accessed anywhere needed with a support of powerful computing performance, efficient storage infrastructure for heterogeneous systems and software which configures and controls these different devices. A lot…
▽ More
In the real time processing, a new emerging technology where the need of connecting smart devices with cloud through Internet has raised. IoT devices processed information is to be stored and accessed anywhere needed with a support of powerful computing performance, efficient storage infrastructure for heterogeneous systems and software which configures and controls these different devices. A lot of challenges to be addressed are listed with this new emerging technology as it needs to be compatible with the upcoming 5G wireless devices too. In this paper, the benefits and challenges of this innovative paradigm along with the areas open to do research are shown.
△ Less
Submitted 5 February, 2018;
originally announced March 2018.
-
Ideal Node Enquiry Search Algorithm (INESH) in MANETS
Authors:
Mohammad Riyaz Belgaum,
Safeeullah Soomro,
Zainab Alansari,
Muhammad Alam
Abstract:
The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and are inclined to interface disappointment which makes dependably to discover new routes to the destination. During the forwarding of packets to the destination, various intermediate…
▽ More
The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and are inclined to interface disappointment which makes dependably to discover new routes to the destination. During the forwarding of packets to the destination, various intermediate nodes take part in routing, where such node should be an ideal node. An algorithm is proposed here to know the ideal node after studying the features of the reactive routing protocols. The malicious node can be eliminated from the networking function and the overhead on the protocol can be reduced. The node chooses the neighbor which can be found in less number of bounces and with less time delay and kee** up the QoS.
△ Less
Submitted 9 October, 2017;
originally announced October 2017.
-
Control and Data Flow Execution of Java Programs
Authors:
Safeeullah Soomro,
Zainab Alansari,
Mohammad Riyaz Belgaum
Abstract:
Since decade understanding of programs has become a compulsory task for the students as well as for others who are involved in the process of develo** software and providing solutions to open problems. In that aspect showing the problem in a pictorial presentation in a best manner is a key advantage to better understand it. We provide model and structure for Java programs to understand the contr…
▽ More
Since decade understanding of programs has become a compulsory task for the students as well as for others who are involved in the process of develo** software and providing solutions to open problems. In that aspect showing the problem in a pictorial presentation in a best manner is a key advantage to better understand it. We provide model and structure for Java programs to understand the control and data flow analysis of execution. Especially it helps to understand the static analysis of Java programs, which is an uttermost important phase for software maintenance. We provided information and model for visualization of Java programs that may help better understanding of programs for a learning and analysis purpose. The idea provided for building visualization tool is extracting data and control analysis from execution of Java programs. We presented case studies to prove that our idea is most important for better understanding of Java programs which may help towards static analysis, software debugging and software maintenance.
△ Less
Submitted 27 July, 2017;
originally announced August 2017.
-
Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS
Authors:
Mohammad Riyaz Belgaum,
Safeeullah Soomro,
Zainab Alansari,
Muhammad Alam
Abstract:
Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research is mainly focused on the study of…
▽ More
Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research is mainly focused on the study of the threats, attacks and reasons for malicious behavior of nodes in the network for reactive routing protocols in MANETS. DSR and AODV are the two reactive routing protocols that were considered for the study to propose a second chance strategy to be given to the nodes considering the reason for malicious behavior to improve the packet delivery ratio and reduce the routing overhead in the network. A simulative study has been conducted using Ad hoc Simulator (ASIM) considering the DSR and AODV routing protocols in the presence of malicious nodes and in the absence of malicious nodes which showed that the packet delivery ratio is low and routing overhead is high in the absence of malicious nodes. The second chance strategy proposed considers the reasons for malicious behavior and helps the node to get reintegrated in the network to improve the packet delivery ratio and reduce the routing overhead.
△ Less
Submitted 27 July, 2017;
originally announced August 2017.
-
Development of UMLS Based Health Care Web Services for Android Platform
Authors:
Nareena Soomro,
Safeeulah Soomro,
Zainab Alansari,
Suhni Abbasi,
Mohammad Riyaz Belgaum,
Abdul Baqi Khakwani
Abstract:
In this fast develo** world of information, the amount of medical knowledge is rising at an exponential level. The UMLS (Unified Medical Language Systems), is rich knowledge base consisting files and software that provides many health and biomedical vocabularies and standards. A Web service is a web solution to facilitate machine-to-machine interaction over a network. Few UMLS web services are c…
▽ More
In this fast develo** world of information, the amount of medical knowledge is rising at an exponential level. The UMLS (Unified Medical Language Systems), is rich knowledge base consisting files and software that provides many health and biomedical vocabularies and standards. A Web service is a web solution to facilitate machine-to-machine interaction over a network. Few UMLS web services are currently available for portable devices, but most of them lack in efficiency and performance. It is proposed to develop Android-based web services for healthcare systems underlying rich knowledge source of UMLS. The experimental evaluation was made to analyse the efficiency and performance effect with and without using the designed prototype. The understand-ability and interaction with the prototype were greater than those who used the alternate sources to obtain the answers to their questions. The overall performance indicates that the system is convenient and easy to use. The result of the evaluation clearly proved that designed system retrieves all the pertinent information better than syntactic searches.
△ Less
Submitted 22 December, 2016;
originally announced December 2016.
-
Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA)
Authors:
Abdul Ahad Abro,
Safeeullah Soomro,
Zainab Alansari,
Mohammad Riyaz Belgaum,
Abdul Baqi Khan Khakwani
Abstract:
The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as external or internal attacks. This paper presents the initial finding of attacks, types of attacks and their ratio within specific time. It demonstrates the a…
▽ More
The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as external or internal attacks. This paper presents the initial finding of attacks, types of attacks and their ratio within specific time. It demonstrates the advance technique and methodology to reduce the attacks and vulnerabilities and minimize the ratio of attacks to the networks and application and keep the network secure and runs application smoothly regarding that. It also identifies the location of attacks, the reason behind the attack and the technique used in attacking. The whole field of system security is limitless and in an evolutionary stage. To comprehend the exploration being performed today, foundation learning of the web and assaults, the security is vital and in this way they are investigated. It provides the statistical analytics about various attacks and nature of attacks for acquiring the results through simulation to prove the hypothesis.
△ Less
Submitted 22 December, 2016;
originally announced December 2016.