King Abdulaziz University

Displaying 1-24 of 24 results

  • White Papers // Aug 2014

    Risk Assessment Algorithm in Wireless Sensor Networks Using Beta Distribution

    In this paper, the authors introduce the Beta distribution as a novel technique to weight direct and indirect trust and assessing the risk in wireless sensor networks. This paper also reviews the trust factors, which play a major role in building trust in wireless sensor networks and explains the dynamic...

    Provided By King Abdulaziz University

  • White Papers // Mar 2014

    The Spectrum Assigment (SA) Problem in Optical Networks: A Multiprocesor Scheduling Perspective

    The Routing and Spectrum Assignment (RSA) problem has emerged as the key design and control problem in elastic optical networks. In this paper, the authors provide new insight into the Spectrum Assignment (SA) problem in mesh networks by showing that it transforms to the problem of scheduling multiprocessor tasks on...

    Provided By King Abdulaziz University

  • White Papers // Nov 2013

    Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks

    The paper proposes a provably secure authenticated multiple key establishment protocol for wireless sensor network. Security of the protocol is based on the computational infeasibility of solving elliptic curve discrete logarithm problem and computational Diffie-Hellman problem on bilinear pairing. User authentication is a one of the most challenging security requirement...

    Provided By King Abdulaziz University

  • White Papers // Sep 2013

    Comparison Between RISS and DCHARM for Mining Gene Expression Data

    Since the rapid advance of microarray technology, gene expression data are gaining recent interest to reveal biological information about genes functions and their relation to health. Data mining techniques are effective and efficient in extracting useful patterns. Most of the current data mining algorithms suffer from high processing time while...

    Provided By King Abdulaziz University

  • White Papers // Mar 2013

    Q-LEACH: A New Routing Protocol for WSNs

    Wireless Sensor Networks (WSNs) with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network life-time as much as one could, for efficient and optimal utilization of resources. Different...

    Provided By King Abdulaziz University

  • White Papers // Mar 2013

    Energy Consumption Rate Based Stable Election Protocol (ECRSEP) for WSNs

    In recent few years Wireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of...

    Provided By King Abdulaziz University

  • White Papers // Jan 2013

    Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles

    In this paper the authors propose a provably secure aggregate signcryption scheme in random oracles. Security of the scheme is based on computational infeasibility of solving decisional bilinear diffie-hellman problem and discrete logarithm problems. Confidentiality and authenticity are two fundamental security requirement of public key cryptography. These are achieved by...

    Provided By King Abdulaziz University

  • White Papers // Jan 2013

    A New Practical Identity-Based Encryption System

    The authors present a new practical Identity-Based Encryption (IBE) system that can be another candidate for standard IBE techniques. Their construction is based on a new framework for realizing an IBE trapdoor from pairing-based groups, which is motivated from the 'Two equation' revocation technique suggested by the researchers. The new...

    Provided By King Abdulaziz University

  • White Papers // Jan 2013

    Various Approaches for Enhancing The Performance of Wireless Sensor Networks

    In the current time and next decades, Wireless Sensor Networks (WSNs) represents a new category of ad hoc networks consisting of small nodes with three functions: sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been designed for WSNs where energy awareness is an...

    Provided By King Abdulaziz University

  • White Papers // Dec 2012

    Defensive Leakage Camouflage

    This paper considers the transfer of digital data over leaky and noisy communication channels. The authors develop defensive strategies exploiting the fact that noise prevents the attacker from accurately measuring leakage. The defense strategy described in this paper pairs each useful data element k with a camouflage value v and...

    Provided By King Abdulaziz University

  • White Papers // Oct 2012

    Network Protection Design Models, a Heuristic, and a Study for Concurrent Single-Link Per Layer Failures in Three-Layer Networks

    Multilayer network design has received significant attention in current literature. However, the explicit modeling of IP/MPLS over OTN over DWDM in which the OTN layer's technological constraints are specifically considered has not been investigated before. In this paper, the authors present an optimization design model for protecting an IP/MPLS over...

    Provided By King Abdulaziz University

  • White Papers // Aug 2012

    An Efficient Signcryption Scheme from q-Diffie-Hellman Problems

    Confidentiality and authenticity are two fundamental security requirement of Public key Cryptography. These are achieved by encryption scheme and digital signatures respectively. Here the authors present a provably secure signcryption scheme in random oracle model by modifying Libert et al's scheme. Their scheme is more efficient and secure than Libert...

    Provided By King Abdulaziz University

  • White Papers // May 2012

    Dynamic Handoff Decision in Heterogeneous Wireless Systems: Q-Learning Approach

    The satisfaction of a mobile user in a heterogeneous wireless environment relies heavily on the appropriate choice of network. With the presence of various wireless technologies and advances in smart mobile devices, the mobile terminal in next generation wireless communications will likely make intelligent handoff decisions to optimize the user...

    Provided By King Abdulaziz University

  • White Papers // May 2012

    Multi Objectives Heuristic Algorithm for Grid Computing

    Grid computing provides the means of using and sharing heterogeneous resources that are geographically distributed to solve complex scientific or technical problems. Task scheduling is critical to achieving high performance on grid computing environment. The objective of the scheduling process is to map each task with specific requirements to a...

    Provided By King Abdulaziz University

  • White Papers // Apr 2012

    Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network

    This paper describes an efficient and secure online and off-line signature scheme for Wireless Sensor Network (WSN). Security of the proposed scheme is based on difficulty of breaking Bilinear Diffie-Hellman Problem (BDHP). WSN systems are usually deployed in hostile environments where they encountered a wide variety of malicious attacks. Information...

    Provided By King Abdulaziz University

  • White Papers // Jan 2012

    UMTS-Wimax Vertical Handover in Next Generation Wireless Networks

    The vision of Next Generation Wireless Network (NGWN) is to integrate different wireless access technologies, each with its own characteristics, into a common IP-based core network to provide mobile user with service continuity and seamless roaming. One of the major issues for the converged heterogeneous networks is providing a seamless...

    Provided By King Abdulaziz University

  • White Papers // Jan 2012

    Novel Component Based Development Model for SIP-Based Mobile Application

    Increasingly, academics are dealing with issues associated with assessment in large classes, arising from factors like high enrolment of students. Assessment of students requires a lot of effort, consumes enormous time and resources, this results in high time pressure on academics to search for alternative assessment methods that can guarantee...

    Provided By King Abdulaziz University

  • White Papers // Sep 2011

    Enhancing Information Systems Security in Educational Organizations in KSA Through Proposing Security Model

    It is well known that technology utilization is not restricted for one sector than the other anymore, Educational organizations share many parts of their information systems with commercial organizations. In this paper, the authors will try to identify the main characteristics of information systems in educational organizations, then they will...

    Provided By King Abdulaziz University

  • White Papers // Aug 2011

    An Agent Tool for Integrating Component-Based Applications

    The concept of building the best component-based application becomes very attractive. But, the reusable components must comply with specific underlying middleware architecture in order to interact with each other efficiently. This dependency on the underlying architecture creates compatibility problems. Anyway, software agents provide a powerful new method for implementing the...

    Provided By King Abdulaziz University

  • White Papers // Jul 2011

    A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies

    Software has been playing a key role in the development of modern society. Software industry has an option to choose suitable methodology/process model for its current needs to provide solutions to give problems. Though some companies have their own customized methodology for developing their software but majority agrees that software...

    Provided By King Abdulaziz University

  • White Papers // Jun 2011

    Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation Networks

    Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where varieties of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network's side to (a more intelligent) user's side. On top of...

    Provided By King Abdulaziz University

  • White Papers // May 2011

    Dominant Student Modeling for Web Personalization

    The large amount of information on the Web can play a significant role in building an efficient repository. To overcome this challenge, the authors create a considerable model called Dominant-Model based on Naive-Bayes classifier. An incoming document will be reformulated to take the same shape of their model and then...

    Provided By King Abdulaziz University

  • White Papers // Apr 2011

    Dynamic Load-Balancing Based on a Coordinator and Backup Automatic Election in Distributed Systems

    In a distributed system environment it is likely that some nodes are heavily loaded while others are lightly loaded or even idle. It is desirable that the work-load is fully distributed among all nodes so as to utilize the processing time and optimize the whole performance. A load-balancing mechanism decides...

    Provided By King Abdulaziz University

  • White Papers // Apr 2010

    Artificial Immune Clonal Selection Classification Algorithms for Classifying Malware and Benign Processes Using API Call Sequences

    Machine learning is an important field of artificial intelligence in which models are generated by extracting rules and functions from large datasets. Machine learning includes a diversity of methods and algorithms such as decision trees, lazy learning, k-nearest neighbors, Bayesian methods, Gaussian processes, artificial neural networks, support vector machines, kernel...

    Provided By King Abdulaziz University

  • White Papers // Apr 2011

    Dynamic Load-Balancing Based on a Coordinator and Backup Automatic Election in Distributed Systems

    In a distributed system environment it is likely that some nodes are heavily loaded while others are lightly loaded or even idle. It is desirable that the work-load is fully distributed among all nodes so as to utilize the processing time and optimize the whole performance. A load-balancing mechanism decides...

    Provided By King Abdulaziz University

  • White Papers // Jul 2011

    A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies

    Software has been playing a key role in the development of modern society. Software industry has an option to choose suitable methodology/process model for its current needs to provide solutions to give problems. Though some companies have their own customized methodology for developing their software but majority agrees that software...

    Provided By King Abdulaziz University

  • White Papers // Jan 2012

    Novel Component Based Development Model for SIP-Based Mobile Application

    Increasingly, academics are dealing with issues associated with assessment in large classes, arising from factors like high enrolment of students. Assessment of students requires a lot of effort, consumes enormous time and resources, this results in high time pressure on academics to search for alternative assessment methods that can guarantee...

    Provided By King Abdulaziz University

  • White Papers // May 2012

    Dynamic Handoff Decision in Heterogeneous Wireless Systems: Q-Learning Approach

    The satisfaction of a mobile user in a heterogeneous wireless environment relies heavily on the appropriate choice of network. With the presence of various wireless technologies and advances in smart mobile devices, the mobile terminal in next generation wireless communications will likely make intelligent handoff decisions to optimize the user...

    Provided By King Abdulaziz University

  • White Papers // Sep 2011

    Enhancing Information Systems Security in Educational Organizations in KSA Through Proposing Security Model

    It is well known that technology utilization is not restricted for one sector than the other anymore, Educational organizations share many parts of their information systems with commercial organizations. In this paper, the authors will try to identify the main characteristics of information systems in educational organizations, then they will...

    Provided By King Abdulaziz University

  • White Papers // Dec 2012

    Defensive Leakage Camouflage

    This paper considers the transfer of digital data over leaky and noisy communication channels. The authors develop defensive strategies exploiting the fact that noise prevents the attacker from accurately measuring leakage. The defense strategy described in this paper pairs each useful data element k with a camouflage value v and...

    Provided By King Abdulaziz University

  • White Papers // Aug 2012

    An Efficient Signcryption Scheme from q-Diffie-Hellman Problems

    Confidentiality and authenticity are two fundamental security requirement of Public key Cryptography. These are achieved by encryption scheme and digital signatures respectively. Here the authors present a provably secure signcryption scheme in random oracle model by modifying Libert et al's scheme. Their scheme is more efficient and secure than Libert...

    Provided By King Abdulaziz University

  • White Papers // Mar 2013

    Q-LEACH: A New Routing Protocol for WSNs

    Wireless Sensor Networks (WSNs) with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network life-time as much as one could, for efficient and optimal utilization of resources. Different...

    Provided By King Abdulaziz University

  • White Papers // Mar 2013

    Energy Consumption Rate Based Stable Election Protocol (ECRSEP) for WSNs

    In recent few years Wireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of...

    Provided By King Abdulaziz University

  • White Papers // May 2012

    Multi Objectives Heuristic Algorithm for Grid Computing

    Grid computing provides the means of using and sharing heterogeneous resources that are geographically distributed to solve complex scientific or technical problems. Task scheduling is critical to achieving high performance on grid computing environment. The objective of the scheduling process is to map each task with specific requirements to a...

    Provided By King Abdulaziz University

  • White Papers // Jan 2013

    Various Approaches for Enhancing The Performance of Wireless Sensor Networks

    In the current time and next decades, Wireless Sensor Networks (WSNs) represents a new category of ad hoc networks consisting of small nodes with three functions: sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been designed for WSNs where energy awareness is an...

    Provided By King Abdulaziz University

  • White Papers // May 2011

    Dominant Student Modeling for Web Personalization

    The large amount of information on the Web can play a significant role in building an efficient repository. To overcome this challenge, the authors create a considerable model called Dominant-Model based on Naive-Bayes classifier. An incoming document will be reformulated to take the same shape of their model and then...

    Provided By King Abdulaziz University

  • White Papers // Oct 2012

    Network Protection Design Models, a Heuristic, and a Study for Concurrent Single-Link Per Layer Failures in Three-Layer Networks

    Multilayer network design has received significant attention in current literature. However, the explicit modeling of IP/MPLS over OTN over DWDM in which the OTN layer's technological constraints are specifically considered has not been investigated before. In this paper, the authors present an optimization design model for protecting an IP/MPLS over...

    Provided By King Abdulaziz University

  • White Papers // Apr 2010

    Artificial Immune Clonal Selection Classification Algorithms for Classifying Malware and Benign Processes Using API Call Sequences

    Machine learning is an important field of artificial intelligence in which models are generated by extracting rules and functions from large datasets. Machine learning includes a diversity of methods and algorithms such as decision trees, lazy learning, k-nearest neighbors, Bayesian methods, Gaussian processes, artificial neural networks, support vector machines, kernel...

    Provided By King Abdulaziz University

  • White Papers // Jun 2011

    Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation Networks

    Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where varieties of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network's side to (a more intelligent) user's side. On top of...

    Provided By King Abdulaziz University

  • White Papers // Apr 2012

    Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network

    This paper describes an efficient and secure online and off-line signature scheme for Wireless Sensor Network (WSN). Security of the proposed scheme is based on difficulty of breaking Bilinear Diffie-Hellman Problem (BDHP). WSN systems are usually deployed in hostile environments where they encountered a wide variety of malicious attacks. Information...

    Provided By King Abdulaziz University

  • White Papers // Aug 2011

    An Agent Tool for Integrating Component-Based Applications

    The concept of building the best component-based application becomes very attractive. But, the reusable components must comply with specific underlying middleware architecture in order to interact with each other efficiently. This dependency on the underlying architecture creates compatibility problems. Anyway, software agents provide a powerful new method for implementing the...

    Provided By King Abdulaziz University

  • White Papers // Jan 2012

    UMTS-Wimax Vertical Handover in Next Generation Wireless Networks

    The vision of Next Generation Wireless Network (NGWN) is to integrate different wireless access technologies, each with its own characteristics, into a common IP-based core network to provide mobile user with service continuity and seamless roaming. One of the major issues for the converged heterogeneous networks is providing a seamless...

    Provided By King Abdulaziz University

  • White Papers // Jan 2013

    Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles

    In this paper the authors propose a provably secure aggregate signcryption scheme in random oracles. Security of the scheme is based on computational infeasibility of solving decisional bilinear diffie-hellman problem and discrete logarithm problems. Confidentiality and authenticity are two fundamental security requirement of public key cryptography. These are achieved by...

    Provided By King Abdulaziz University

  • White Papers // Jan 2013

    A New Practical Identity-Based Encryption System

    The authors present a new practical Identity-Based Encryption (IBE) system that can be another candidate for standard IBE techniques. Their construction is based on a new framework for realizing an IBE trapdoor from pairing-based groups, which is motivated from the 'Two equation' revocation technique suggested by the researchers. The new...

    Provided By King Abdulaziz University

  • White Papers // Nov 2013

    Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks

    The paper proposes a provably secure authenticated multiple key establishment protocol for wireless sensor network. Security of the protocol is based on the computational infeasibility of solving elliptic curve discrete logarithm problem and computational Diffie-Hellman problem on bilinear pairing. User authentication is a one of the most challenging security requirement...

    Provided By King Abdulaziz University

  • White Papers // Sep 2013

    Comparison Between RISS and DCHARM for Mining Gene Expression Data

    Since the rapid advance of microarray technology, gene expression data are gaining recent interest to reveal biological information about genes functions and their relation to health. Data mining techniques are effective and efficient in extracting useful patterns. Most of the current data mining algorithms suffer from high processing time while...

    Provided By King Abdulaziz University

  • White Papers // Mar 2014

    The Spectrum Assigment (SA) Problem in Optical Networks: A Multiprocesor Scheduling Perspective

    The Routing and Spectrum Assignment (RSA) problem has emerged as the key design and control problem in elastic optical networks. In this paper, the authors provide new insight into the Spectrum Assignment (SA) problem in mesh networks by showing that it transforms to the problem of scheduling multiprocessor tasks on...

    Provided By King Abdulaziz University

  • White Papers // Aug 2014

    Risk Assessment Algorithm in Wireless Sensor Networks Using Beta Distribution

    In this paper, the authors introduce the Beta distribution as a novel technique to weight direct and indirect trust and assessing the risk in wireless sensor networks. This paper also reviews the trust factors, which play a major role in building trust in wireless sensor networks and explains the dynamic...

    Provided By King Abdulaziz University