Skip to main content

Showing 1–15 of 15 results for author: Alansari, Z

Searching in archive cs. Search in all archives.
.
  1. Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing

    Authors: Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Shahrulniza Musa, Muhammad Alam, Mazliham Mohd Su'ud

    Abstract: In Cloud computing environment the resources are managed dynamically based on the need and demand for resources for a particular task. With a lot of challenges to be addressed our concern is Load balancing where load balancing is done for optimal usage of resources and reduces the cost associated with it as we use pay-as-you-go policy. The task scheduling is done by the cloud service provider usin… ▽ More

    Submitted 16 April, 2019; originally announced May 2019.

  2. Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing

    Authors: Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam

    Abstract: Cloud computing has been gaining popularity in the recent years. Several studies are being proceeded to build cloud applications with exquisite quality based on users demands. In achieving the same, one of the applied criteria is checkpoint based load balancing in real time scheduling through which suitable cloud service is chosen from a group of cloud services candidates. Valuable information can… ▽ More

    Submitted 16 April, 2019; originally announced May 2019.

  3. A Framework for Debugging Java Programs in a Bytecode

    Authors: Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H Miraz

    Abstract: In the domain of Software Engineering, program analysis and understanding has been considered to be a very challenging task since decade, as it demands dedicated time and efforts. The analysis of source code may occasionally be comparatively easier due to its static nature, however, the back end code (Bytecode), especially in terms of Java programming, is complicated to be analysed. In this paper,… ▽ More

    Submitted 29 April, 2019; originally announced April 2019.

    Comments: 6 pages, 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE)

    Report number: 18494083

  4. The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open research Issues

    Authors: Zainab Alansari, Safeeullah Soomro, Mohammad Riyaz Belgaum, Shahaboddin Shamshirband

    Abstract: Health is one of the sustainable development areas in all of the countries. Internet of Things has a variety of use in this sector which was not studied yet. The aim of this research is to prioritize IoT usage in the healthcare sector to achieve sustainable development. The study is an applied descriptive research according to data collection. As per the research methodology which is FAHP, it is a… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

  5. Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics

    Authors: Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum

    Abstract: In contemporary age, Computational Intelligence (CI) performs an essential role in the interpretation of big biological data considering that it could provide all of the molecular biology and DNA sequencing computations. For this purpose, many researchers have attempted to implement different tools in this field and have competed aggressively. Hence, determining the best of them among the enormous… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

  6. arXiv:1904.01826  [pdf

    cs.NI

    Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks

    Authors: Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham Mohd Su'ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari

    Abstract: Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the rou… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1708.01639, arXiv:1710.10145

  7. arXiv:1807.04087  [pdf

    cs.CY cs.NI

    Internet of Things: Infrastructure, Architecture, Security and Privacy

    Authors: Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum, Jawdat Alshaer, Safeeullah Soomro, Mahdi H. Miraz

    Abstract: Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure, Security, Architecture and Privacy, play an important role in sha** the future of the digitalised world. Internet of Things devices are connected through sensors which have significant impacts on the data and its security. In this research, we used IoT five layered ar… ▽ More

    Submitted 11 July, 2018; originally announced July 2018.

    Journal ref: proceedings of the IEEE International Conference on Computing, Electronics & Communications Engineering 2018 (IEEE iCCECE '18), 16-17 August 2018, UK, Online ISBN: 978-1-5386-4904-6, E-ISBN:978-1-5386-4903-9, Published by IEEE

  8. arXiv:1806.08953  [pdf

    cs.CY

    Challenges of Internet of Things and Big Data Integration

    Authors: Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Safeeullah Soomro, Mohammad Riyaz Belgaum, Mahdi H. Miraz, Jawdat Alshaer

    Abstract: The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. considering the existing techniques and technologie… ▽ More

    Submitted 23 June, 2018; originally announced June 2018.

    Comments: Proceedings of the International Conference on International Conference on Emerging Technologies in Computing 2018 (iCETiC '18), 23rd -24th August, 2018, at London Metropolitan University, London, UK, Published by Springer-Verlag

  9. Fault Localization Models in Debugging

    Authors: Safeeullah Soomro, Mohammad Riyaz Belgaum, Zainab Alansari, Mahdi H. Miraz

    Abstract: Debugging is considered as a rigorous but important feature of software engineering process. Since more than a decade, the software engineering research community is exploring different techniques for removal of faults from programs but it is quite difficult to overcome all the faults of software programs. Thus, it is still remains as a real challenge for software debugging and maintenance communi… ▽ More

    Submitted 13 February, 2018; originally announced March 2018.

    Comments: 58-62

    Journal ref: 2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS'2017)

  10. arXiv:1803.02890  [pdf

    cs.SE cs.CY

    Challenges: Bridge between Cloud and IoT

    Authors: Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam, Shahrulniza Musa, Mazliham Mohd Suud

    Abstract: In the real time processing, a new emerging technology where the need of connecting smart devices with cloud through Internet has raised. IoT devices processed information is to be stored and accessed anywhere needed with a support of powerful computing performance, efficient storage infrastructure for heterogeneous systems and software which configures and controls these different devices. A lot… ▽ More

    Submitted 5 February, 2018; originally announced March 2018.

    Comments: ICETAS IEEE Proceedings 2017

  11. arXiv:1710.10145  [pdf

    cs.NI

    Ideal Node Enquiry Search Algorithm (INESH) in MANETS

    Authors: Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam

    Abstract: The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and are inclined to interface disappointment which makes dependably to discover new routes to the destination. During the forwarding of packets to the destination, various intermediate… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: 26-33. arXiv admin note: text overlap with arXiv:1708.01639

    Journal ref: Annals of Emerging Technologies in Computing (AETiC), Vol 1, issue 1, 2017

  12. Control and Data Flow Execution of Java Programs

    Authors: Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum

    Abstract: Since decade understanding of programs has become a compulsory task for the students as well as for others who are involved in the process of develo** software and providing solutions to open problems. In that aspect showing the problem in a pictorial presentation in a best manner is a key advantage to better understand it. We provide model and structure for Java programs to understand the contr… ▽ More

    Submitted 27 July, 2017; originally announced August 2017.

  13. arXiv:1708.01639  [pdf

    cs.NI

    Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS

    Authors: Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam

    Abstract: Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research is mainly focused on the study of… ▽ More

    Submitted 27 July, 2017; originally announced August 2017.

  14. arXiv:1612.07688  [pdf

    cs.CY cs.IR cs.SE

    Development of UMLS Based Health Care Web Services for Android Platform

    Authors: Nareena Soomro, Safeeulah Soomro, Zainab Alansari, Suhni Abbasi, Mohammad Riyaz Belgaum, Abdul Baqi Khakwani

    Abstract: In this fast develo** world of information, the amount of medical knowledge is rising at an exponential level. The UMLS (Unified Medical Language Systems), is rich knowledge base consisting files and software that provides many health and biomedical vocabularies and standards. A Web service is a web solution to facilitate machine-to-machine interaction over a network. Few UMLS web services are c… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

    Journal ref: Sindh Univ. Res. Jour. (Sci. Ser.) Vol. 48 (4D) 05-08 (2016)

  15. arXiv:1612.07685  [pdf

    cs.CR cs.NI

    Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA)

    Authors: Abdul Ahad Abro, Safeeullah Soomro, Zainab Alansari, Mohammad Riyaz Belgaum, Abdul Baqi Khan Khakwani

    Abstract: The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as external or internal attacks. This paper presents the initial finding of attacks, types of attacks and their ratio within specific time. It demonstrates the a… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

    Journal ref: Sindh Univ. Res. Jour. (Sci. Ser.) Vol. 48 (4D) 01-04 (2016)