3144 Slices
Medium 9781601322418

Model Based Design method for Dynamic Configurable Ecosystem of Embedded System

Hamid R. Arabnia, Leonidas Deligiannidis, CSREA Press PDF


����%& �$�

��� ���� �� ��� �� ���� ������ �4(���� �

� ���

(������ ���-�����








�� ���


�� ���( �� ����� �

��� (� �� �-� � ���� �

� ������ �




(��6�� ��� ��� � ����������

�� ���� (�

-����� ��� ���� �






������� (�

#���� ����������� ��� ����6��




!��� ������

��� ��� ������� �� �

� ����-� �� ��� ���� ����6��



�������� ��� (�

-����� #���� �� ���( �� ����������

�� ������

�� �






� ������ ���� ��� ��� �

��� ���� ���� ��

�� ����� ������

��� ��� ���� � �� ����� �����






���� ���� �'�/� "�� ��

����� -����� ��

� �� ���� ��

������ ��� ��





��-����� ���������������'����





��� ��

�� �������

�� ���� �'�/� !�����

���� ������ ������


�� ����

������� ������ �

��� ��-�

(���� ���� ������ ���� �((�

-��� ����


(�������������� ����-�


See All Chapters
Medium 9781601322494

Opportunities and Challenges of Big Data Analytics

Hamid R. Arabnia, Victor A. Clincy, Leonidas Deligiannidis, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Internet Computing and Big Data | ICOMP'13 |


Opportunities and Challenges of Big Data Analytics

Faruk Bagci

Department of Computer


Kuwait University

Kuwait City, Kuwait dr.faruk.bagci@gmail.com


In the era of information explosion, enormous amounts of data have become available on hand to decision makers.

Big data refers to datasets that grow so huge that they become difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets. Such value can only be provided by using big data analytics, which is the application of advanced analytics techniques on big data. This paper aims to analyze the different methods and tools which can be applied to big data, as well as the opportunities provided and the challenges which much be faced.

1. Introduction

Imagine a world without data storage; a place where every detail about a person or organization, every transaction performed, or every aspect which can be documented is lost directly after use. Organizations would thus lose the ability to extract valuable information and knowledge, perform detailed analyses, as well as provide new opportunities and advantages. Data is an essential part of our lives, and the ability to store and access such data has become a crucial task which we cannot live without.

See All Chapters
Medium 9781601323279

An Approach and Its Implementation for Cloud Computing Security

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'14 |


An Approach and Its Implementation for Cloud Computing


Yun Bai1 , Khaled M. Khan2 and Chunsheng Yang3

1 School of Computing, Engineering and Mathematics

University of Western Sydney,Australia

Email: ybai@scem.uws.edu.au

2 Department of Computer Science and Engineering, Qatar University, Qatar

Email: k.khan@qu.edu.qa

3 National Research Council Canada, Ottawa, ON, Canada

Email: Chunsheng.Yang@nrc-cnrc.gc.ca

Abstract— With the increasing popularity of the datacenter provided by Could computing, the datacenter security is becoming an important issue. Also there are other issues to be concerned about such as its speed and standard, but data security is the biggest one. When an organization uses a remote datacenter provided by Cloud, it needs to maintain the confidentiality of the outsourced data and ensure only authorized user or client is allowed to access its data resource. In this paper, we investigate the security issue related to datacenter of cloud computing and propose a security approach for it. We use a formal logical method to specify the data and employ intelligent agents to enforce appropriate security rules on it. We outline the authentication mechanism and present a detailed authorization or access control approach, The implementation of the proposed approach will be discussed and investigated. The authentication and the authorization mechanisms work together to prevent any unauthorized attempt to data stored in the datacenter.

See All Chapters
Medium 9781601323149

A secure E-Court System for India

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 |


A secure E-Court System for India

Himanshu Agarwal

Harshal Singh


Dept. of Information Technology

Dept. of Information Technology


India-211012 agarwal1488@gmail.com


India-211012 harshal90singh.hs@gmail.com

Abstract: The main motivation behind writing this paper is the pendency prevailing in Indian jurisdiction system which is about 35 million as per the survey. The technology of E-court for

India is proposed for the first time in this paper.

This proposed model has a greater security due to unique identity with their finger prints.

Considering the proposed model for e-court, the criminals will be provided hearing opportunity from the jail itself through Audio/Video facilities.

This proposed model is also eliminating the possibility of their running away while under transit from jail to court. The proposed model will be extremely helpful in early disposal of the court case.

Keywords: Biometric device, E-court, Online judicial system, Finger print Recognition,

See All Chapters
Medium 9781601322432

Assessment Agent based ABET Criterions

Hamid R. Arabnia, Azita Bahrami, Victor A. Clincy, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF


Int'l Conf. Frontiers in Education: CS and CE | FECS'13 |

Assessment Agent based ABET Criterions

Abbas M. Al-Bakry

Software Dept.,University of Babylon, Babylon, Hilla, Iraq

Abstract-Assessment is the important process for testing the ability of the institution program to meet the required criterions to get the accreditation. In this work we deals with

ABET quality assurance agency dedicated with applied science, computing, engineering and technology education and we concerned with computer science program. A software agent, which provide difference facilities developed to achieve the assessment function. The developed agent(Assessment Agent) perceive the current institution program status from the system environment, then perform sequence control instructions included two cycles of verifications to generate the Self-Assessment Report(SAR) and advices for getting accreditation.

Keywords: ABET criterion, assessment agent, quality assurance.



Improving professional standards for a number of years has been developed by Quality Management Systems in

See All Chapters

See All Slices