King Saud University

Displaying 1-40 of 57 results

  • White Papers // Jan 2014

    Secure Routing and Data Transmission in Mobile Ad Hoc Networks

    In this paper, the authors present an IDentity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a...

    Provided By King Saud University

  • White Papers // Oct 2013

    Can a Single Security Framework Address Information Security Risks Adequately?

    There is no doubt that modern society depends heavily on information technology in nearly every facet of human activity. Organizations of all kinds are increasingly exposed to various kinds of risks, including information technology risks. There are many security standards and frameworks available to help organizations manage these risks. The...

    Provided By King Saud University

  • White Papers // Jun 2013

    A Framework for ERP Systems in SME Based on Cloud Computing Technology

    Present Enterprise Resource Planning (ERP) offers expensive models which are hard to implement in Small and Medium Enterprises (SME) due to budget limitations. Moreover, current ERP systems are associated with several issues such as mutual synchronization of multi-typed resources, limited customization, bulky upgrading cost, solution integration, industry functionality, backup hedge...

    Provided By King Saud University

  • White Papers // Jun 2013

    Towards Pervasive Computing Environments with Cloud Services

    Pervasive computing aims at creating environments saturated with embedded and portable computing devices surrounding the users and providing them with many interesting services. It has been gradually applied into the people everyday life and its applications are becoming more and more extensive day by day. However, exploiting its full potential...

    Provided By King Saud University

  • White Papers // May 2013

    A Novel Scheme to Secure Cloud Computing Enviroment

    The cloud computing is getting more and more important due to the large size of files that need to be shared and cannot be sent through the email. The need for cloud computing create a new challenges for security. In Cloud computing, there are three main parties: the server, the...

    Provided By King Saud University

  • White Papers // Apr 2013

    An Efficient Biometric Authentication Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. User authentication is necessary for legitimate access control in WSNs. Sensors have limited processing power, bandwidth, memory, and limited communication...

    Provided By King Saud University

  • White Papers // Apr 2013

    Intrusion Detection Systems in Wireless Sensor Networks: A Review

    Wireless Sensor Networks (WSNs) are composed of sensor nodes and sinks. Sensor nodes have the capability of self-healing and self-organizing. Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. Their distributed nature, multi-hop data forwarding, and open wireless medium are the...

    Provided By King Saud University

  • White Papers // Apr 2013

    A Comparative Analysis and Evaluation of Open Source ERP Systems

    An ERP system is a system that needs to create integrated solutions in order to manage the bulk of operations inside a company or organization. Also ERP system is a critical and important investment that can affect the overall performance of a company. Open source ERP systems are often targeted...

    Provided By King Saud University

  • White Papers // Mar 2013

    Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks

    From energy conservation perspective in Wireless Sensor Networks (WSNs), clustering of sensor nodes is a challenging task. Clustering technique in routing protocols play a key role to prolong the stability period and lifetime of the network. In this paper, the authors propose and evaluate a new routing protocol for WSNs....

    Provided By King Saud University

  • White Papers // Mar 2013

    M-ATTEMPT: A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks

    In this paper, the authors propose a new routing protocol for heterogeneous Wireless Body Area Sensor Networks (WBASNs); Mobility-supporting Adaptive Threshold-based Thermal-aware Energy-efficient Multi-hop ProTocol (M-ATTEMPT). A prototype is defined for employing heterogeneous sensors on human body. Direct communication is used for real-time traffic (critical data) or on-demand data while...

    Provided By King Saud University

  • White Papers // Mar 2013

    Comparative Study of RMST and STCP Protocol for QoS Provisioning in WSN

    Advancements in technologies, semiconductor industry and communications resulted in construction of wireless sensors. Wireless sensors are self-managing and sensing devices having the capability to communicate with each other and sink node wirelessly. The sink node can then take decision according to the application they are being used for; upon the...

    Provided By King Saud University

  • White Papers // Feb 2013

    A New Virtualization-Based Security Architecture in a Cloud Computing Environment

    Cloud computing finally emerged on the stage of the information technology. Virtualization is the core of cloud computing. Virtualization minimizes capital, operational and maintenance costs. Also, it provides flexibility in the used platform. However, the expansion of cloud computing is impeded by the lack of the security issue. Physical resources...

    Provided By King Saud University

  • White Papers // Feb 2013

    Risk Assessment for Scheduling Acceleration

    Time-cost-trade-off is a known method to accelerate a construction project by using the CPM method. However, this method cannot be used solely in the contractor or owner's decision to accelerate the project schedule because the vagueness of defining delays and acceleration responsibilities. In addition, time-cost-trade-off overlooks the increase in project...

    Provided By King Saud University

  • White Papers // Feb 2013

    Development of Cloud Computing and Security Issues

    In past three decades, the computing world is based on the Internet, featured by the rapid development and application of computer technology. The cloud computing model is one of the very important shapes of a new era. This technology based on the distributed computing, parallel computing, grid computing, Virtualization technologies,...

    Provided By King Saud University

  • White Papers // Jan 2013

    A Swot Analysis on Cisco High Availability Virtualization Clusters Disaster Recovery Plan

    Continuity of services availability is critical in some business types such as banks, hospitals, and military institutions. However, this may be interrupted by either a natural disaster such as an earthquake, volcano, or a tornado. In addition, human negative interference such as hackers or terrorism may expose valuable resources to...

    Provided By King Saud University

  • White Papers // Jan 2013

    Dynamic Password Based Remote User Authentication without Time Stamping

    The rapid growth of electronic commerce and Internet-based applications demands strong privacy protection and robust system security, which are essential requirements for an authentication scheme or access control mechanism. The issue of remote user authentication has received much attention recently. Password authentication is one of the most convenient authentication mechanisms....

    Provided By King Saud University

  • White Papers // Jan 2013

    Cyber Security Using Arabic CAPTCHA Scheme

    Bots are programs that crawl through the web site and make auto registrations. CAPTCHAs, using Latin script, are widely used to prevent automated bots from abusing online services on the World Wide Web. However, many of the existing English based CAPTCHAs have some inherent problems and cannot assure the security...

    Provided By King Saud University

  • White Papers // Nov 2012

    A Survey on Sensor-Cloud: Architecture, Applications, and Approaches

    Now-a-days, Wireless Sensor Network (WSN) applications have been used in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. However, due to the limitations of WSNs in terms of memory, energy, computation, communication, and scalability, efficient management of the large number of WSNs data in...

    Provided By King Saud University

  • White Papers // Nov 2012

    A Supervised Learning Approach for Automatic Keyphrase Extraction

    Keyphrases, synonymously spoken as keywords, represent semantic meta-data and play an important role to capture the main theme represented by a large text data collection. Although authors provide a list of about five to ten keywords in scientific publications that are used to map them to respective domains, due to...

    Provided By King Saud University

  • White Papers // Jul 2012

    Privacy and Security Concerns in SNS: A Saudi Arabian Users Point of View

    Social networking sites and applications are the major phenomenon all over the world and are constantly on a rise. As the users share their information and data on these sites, these sites can act as major source for misuse of information. So these SNS take steps stop this misuse of...

    Provided By King Saud University

  • White Papers // Jul 2012

    Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation

    The Biometric Gaussian Stream (BGS) cryptosystem was extended by extensive research experimentation. Using this system, complexity is added to an image by passing it through a Gaussian noise function. This function is applied with specific parameters for the mean and variance, which also works as a parallel key. To implement...

    Provided By King Saud University

  • White Papers // May 2012

    Representing Access Control Policies in Use Cases

    Security requirements of a software product need to receive attention throughout its development lifecycle. This paper proposes the required notation and format to represent security requirements, especially access control policies in use case diagram and use case description. Such enhancements offer simple representation for positive and negative authorization, grouping sensitive...

    Provided By King Saud University

  • White Papers // Apr 2012

    Efficient Distributed Face Recognition in Wireless Sensor Network

    Face recognition enhances the security through wireless sensor network and it is a challenging task due to constraints involved in wireless sensor network. Image processing and image communication in wireless sensor network reduce the life time of network due to the heavy processing and communication. Face recognition system enhances the...

    Provided By King Saud University

  • White Papers // Apr 2012

    A Review of Malicious Code Detection Techniques for Mobile Devices

    With the advent and rising popularity of wireless systems, there is a proliferation of small-enabled devices such as PDAs, mobile phones, etc. While these devices are becoming more and more preferable by all age groups, they also pose the threat of being vulnerable to malicious code (e.g.: viruses, trojans, worms,...

    Provided By King Saud University

  • White Papers // Mar 2012

    Automated Usability Testing : A Literature Review and an Evaluation

    Usability can be considered as an important requirement to provide high quality products. However, the usability testing has not been taken as basic task in the development life cycle which increases the number of products that have poor usability. The deficiency of excellent automated tools contributes mainly to this situation....

    Provided By King Saud University

  • White Papers // Mar 2012

    Towards Augmented Connectivity in Federated Wireless Sensor Networks

    Advances in sensing and wireless communication technologies have enabled a wide spectrum of Outdoor Wireless Sensor Network (OWSN) applications. Some applications require the existence of a communication backbone federating different OWSN sectors, in order to collaborate in achieving more sophisticated missions. Federating (connecting) these sectors is an intricate task due...

    Provided By King Saud University

  • White Papers // Jan 2012

    A New Trend for E-Learning in KSA Using Educational Clouds

    Cloud computing provides a shared pool of computing resources that can be rapidly and elastically provisioned and released based on users' demand to serve a wide and constantly expanding range of information processing needs. Due to its tremendous advantages this technology is maturing rapidly and is being adopted in many...

    Provided By King Saud University

  • White Papers // Nov 2011

    Integrating Electronic Health Records Using Universal Patient Identifiers KSA

    One of the required standards of Healthcare Information Technology (HIT) and specially Electronic Health Records (HER) is to develop a Unique Patient Identifier (UPI) to enable physicians, hospitals, and other authorized users to share clinical and administrative records more efficiently. Till now there is no standard format of UPI which...

    Provided By King Saud University

  • White Papers // Nov 2011

    Intelligent Advising System

    The primary and necessary task for any undergraduate student has to go through after his orientation is advising. Advising plays a key role in a student's success towards his degree program. Many reports were published recently on the survey of the declining college graduate students. There might be several reasons...

    Provided By King Saud University

  • White Papers // Oct 2011

    A Model Approach for the Analysis of Dominant Factors in ERP Software Implementation

    The recent advancement and development in Enterprise Resource Planning (ERP) Software Systems has been a major incident in the software industry in the last decades and their application is rising hastily in all industries. The recent research shows that the total revenue in the ERP software market is approaching to...

    Provided By King Saud University

  • White Papers // Sep 2011

    New Robust Protocols for Remote User Authentication and Password Change

    In 2008, Holbl et al. proposed improvements of Peyravian and Jeffries's DH (Diffie-Hellman)-based authentication protocol and password change protocol that can withstand the Shim's and Munilla et al.'s proposed off-line password guessing at-tacks. However, the authors found out that their protocols are still susceptible to off-line password guessing attacks and...

    Provided By King Saud University

  • White Papers // Jul 2011

    An Enhanced AODV Routing Protocol for Energy-Efficiency in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) are formed by a large number of sensor nodes working together to provide a specific duty. However, the low energy capacity assigned to each node prompts users to look at an important design challenge which is lifetime maximization. Therefore, designing effective techniques that conserve scarce...

    Provided By King Saud University

  • White Papers // Jun 2011

    Perspective of Feature Selection Techniques in Bioinformatics

    The availability of massive amounts of experimental data based on genome-wide association and mass spectroscopy studies have given motivation in recent years to a large effort in developing mathematical, statistical and computational techniques to infer biological models from data. In many bioinformatics problems the number of features is significantly larger...

    Provided By King Saud University

  • White Papers // Jun 2011

    Causes of Mistrust and the Most Effective Authentication Tools for Improving Saudi Arabian Consumers' Willingness to Participate in E-commerce

    E-commerce is facing different challenges globally, and in particular, in developing countries. In some countries e-commerce adoption is slow because of some barriers; such as lack of trust. Customer trust is a significant issue in e-commerce since online services and products are typically not immediately verifiable. Both vendors and consumers...

    Provided By King Saud University

  • White Papers // May 2011

    Call Quality Measurement and Application in Telecommunication Network

    The measurement of call quality from end users perspective is emerging area of research on speech quality in telecommunication networks. The research is focused on deriving the call quality parameters from end-users perspective and visualizes, escalate the critical call quality. Also, proses the method of redemption of call charges based...

    Provided By King Saud University

  • White Papers // May 2011

    Source ID Based Security (SIBS) Algorithm for Wireless Sensor Networks

    Today information security is foremost demand of every application. Data confidentiality is really a challenging task for Wireless Sensor Networks (WSNs). A light weight and full proof security algorithm is introduced in this research paper. The authors have named it "Source ID Based Security (SIBS)" algorithm. SIBS algorithm involves the...

    Provided By King Saud University

  • White Papers // May 2011

    Centralized Buffering and Lookahead Wavelength Conversion in Multistage Interconnection Networks

    In this paper, methods to alleviate the problem of internal blocking in interconnection networks based on WDM are studied. In an ordinary 8x8 Omega network, only 10% of all permutations are permissible in one pass, and it gets worse with larger switches. However, using WDM technology, the performance of these...

    Provided By King Saud University

  • White Papers // Apr 2011

    Extended Average Magnitude Difference Function Based Pitch Detection

    This paper presents a new extended average magnitude difference function for noise robust pitch detection. Average magnitude difference function based algorithms are suitable for real time operations, but suffer from incorrect pitch detection in noisy conditions. The proposed new extended average magnitude difference function involves in sufficient number of averaging...

    Provided By King Saud University

  • White Papers // Jan 2011

    Semantic Data Integration Approaches for e-Governanace

    Increased generation of data in the e-governance R&D process is required to generate the expected services in terms of enhanced e-services productivity and pipelines. The inability of existing integration strategies to organise and apply the available knowledge to the range of real scientific, business and governance issues is impacting on...

    Provided By King Saud University

  • White Papers // Jan 2011

    Security Risks and Modern Cyber Security Technologies for Corporate Networks

    This paper aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate...

    Provided By King Saud University

  • White Papers // Mar 2012

    Towards Augmented Connectivity in Federated Wireless Sensor Networks

    Advances in sensing and wireless communication technologies have enabled a wide spectrum of Outdoor Wireless Sensor Network (OWSN) applications. Some applications require the existence of a communication backbone federating different OWSN sectors, in order to collaborate in achieving more sophisticated missions. Federating (connecting) these sectors is an intricate task due...

    Provided By King Saud University

  • White Papers // Jan 2011

    Security Risks and Modern Cyber Security Technologies for Corporate Networks

    This paper aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate...

    Provided By King Saud University

  • White Papers // May 2013

    A Novel Scheme to Secure Cloud Computing Enviroment

    The cloud computing is getting more and more important due to the large size of files that need to be shared and cannot be sent through the email. The need for cloud computing create a new challenges for security. In Cloud computing, there are three main parties: the server, the...

    Provided By King Saud University

  • White Papers // Oct 2013

    Can a Single Security Framework Address Information Security Risks Adequately?

    There is no doubt that modern society depends heavily on information technology in nearly every facet of human activity. Organizations of all kinds are increasingly exposed to various kinds of risks, including information technology risks. There are many security standards and frameworks available to help organizations manage these risks. The...

    Provided By King Saud University

  • White Papers // Jan 2014

    Secure Routing and Data Transmission in Mobile Ad Hoc Networks

    In this paper, the authors present an IDentity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a...

    Provided By King Saud University

  • White Papers // Aug 2008

    A Risk Management Tool for Extreme Programming

    Risk management is the application of appropriate tools and procedures to contain risk within acceptable limits. In this paper, the authors apply risk management to software development that uses extreme programming approach. A risk tool is designed and developed using MS Excel. The tool is simple to use and would...

    Provided By King Saud University

  • White Papers // Oct 2009

    A Planning Methodology and Cost Models for Designing a Wide Area Network

    The planning and cost-modeling of large-scale computer Wide Area Networks (WANs) are important issues for carrier service providers, Internet Service Providers (ISP), and for large enterprises that use WANs. This paper develop several quantitative and business-oriented cost models that define the mathematical relationships needed to derive the cost estimate of...

    Provided By King Saud University

  • White Papers // Sep 2008

    Evaluating Tractor Ownership With the OwnTractor Spreadsheet

    This paper accompanies the OwnTractor computer spreadsheet, which was developed as a "Quick and dirty" aid to help individuals think through the tractor ownership decision. Thus, most of the underlying assumptions and formulas are simply asserted rather than developed here. For a more comprehensive treatment of machinery costs, and for...

    Provided By King Saud University

  • White Papers // Nov 2008

    Creating SMS-Based Applications: Using HyperTerminal to Send and Receive SMS Messages

    Short Message Service (SMS) is provided by all cell phone operators and is extensively used by cell phone users. There is a wide range of applications demand in which a user interacts with a PC application via SMS message. This series of papers provides step by step tutorial for creating...

    Provided By King Saud University

  • White Papers // Oct 2010

    A Modular Software System for Planning and Cost Modeling of a Wide Area Network

    This research presents a modular software system that computes the mathematical relationships needed to evaluate planning and business-oriented models for estimation of the cost of a set of current Wide Area Networks (WAN) transmission technologies. Based on the software modular design, a program for constructing a minimum-cost WAN design is...

    Provided By King Saud University

  • White Papers // Jan 2011

    Semantic Data Integration Approaches for e-Governanace

    Increased generation of data in the e-governance R&D process is required to generate the expected services in terms of enhanced e-services productivity and pipelines. The inability of existing integration strategies to organise and apply the available knowledge to the range of real scientific, business and governance issues is impacting on...

    Provided By King Saud University

  • White Papers // Apr 2010

    Risk Identification and Preemptive Scheduling in Software Development Life Cycle

    Software development has emerged as a disciplined discipline and the use of process models to develop the software has increased over time. Although the software industry is blessed with quite a few tool driven approaches, and the usage of technology is increasing yet the amount of risks faced by the...

    Provided By King Saud University

  • White Papers // Jun 2010

    Advance Security Warning System: Wireless Technologies

    This is a proven fact in the modern medical sciences that all human bodies develop from a combination of stem cells, which matures to form a fetus and so on into a neonate. This procedure is natural, (Until and unless, under certain circumstances where it may not be able occur...

    Provided By King Saud University

  • White Papers // Apr 2011

    Extended Average Magnitude Difference Function Based Pitch Detection

    This paper presents a new extended average magnitude difference function for noise robust pitch detection. Average magnitude difference function based algorithms are suitable for real time operations, but suffer from incorrect pitch detection in noisy conditions. The proposed new extended average magnitude difference function involves in sufficient number of averaging...

    Provided By King Saud University

  • White Papers // Jul 2009

    An Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation

    Time warp is a well-known optimistic mechanism for parallel execution of simulation programs. Implementing time warp using a connection-oriented communication approach is proposed in the literature as a way to improve time warp performance because it allows for the use of more efficient event queue implementations. However, no empirical performance...

    Provided By King Saud University

  • White Papers // Jan 2011

    Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies

    Nowadays, there is a huge variety of cyber threats that can be quite dangerous not only for big companies but also for an ordinary user, who can be a potential victim for cybercriminals when using unsafe system for entering confidential data, such as login, password, credit card numbers, etc. Among...

    Provided By King Saud University

  • White Papers // Dec 2009

    The Wiimote With SAPI: Creating an Accessible Low-Cost, Human Computer Interface for the Physically Disabled

    In this paper the authors report on an inexpensive device that helps a person with physical disability to interact with the Web. The human computer interface is made through a head tracking pointer. The head tracking pointer consists of the Wii controller (Wiimote), a low cost and readily available game...

    Provided By King Saud University

  • White Papers // Jun 2010

    Traffic Modeling and Provisioning of a P2P-Based VOD Architecture

    Building a scalable Video On Demand (VOD) architecture is essential for the optimization of the VOD service cost and to support a very large VOD content library. The Peer-To-Peer (P2P) VOD architecture works towards achieving this goal, by distributing the video files to the user's set-top boxes at the network...

    Provided By King Saud University

  • White Papers // May 2011

    Call Quality Measurement and Application in Telecommunication Network

    The measurement of call quality from end users perspective is emerging area of research on speech quality in telecommunication networks. The research is focused on deriving the call quality parameters from end-users perspective and visualizes, escalate the critical call quality. Also, proses the method of redemption of call charges based...

    Provided By King Saud University

  • White Papers // Jul 2011

    An Enhanced AODV Routing Protocol for Energy-Efficiency in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) are formed by a large number of sensor nodes working together to provide a specific duty. However, the low energy capacity assigned to each node prompts users to look at an important design challenge which is lifetime maximization. Therefore, designing effective techniques that conserve scarce...

    Provided By King Saud University

  • White Papers // Jan 2012

    A New Trend for E-Learning in KSA Using Educational Clouds

    Cloud computing provides a shared pool of computing resources that can be rapidly and elastically provisioned and released based on users' demand to serve a wide and constantly expanding range of information processing needs. Due to its tremendous advantages this technology is maturing rapidly and is being adopted in many...

    Provided By King Saud University

  • White Papers // Mar 2012

    Automated Usability Testing : A Literature Review and an Evaluation

    Usability can be considered as an important requirement to provide high quality products. However, the usability testing has not been taken as basic task in the development life cycle which increases the number of products that have poor usability. The deficiency of excellent automated tools contributes mainly to this situation....

    Provided By King Saud University

  • White Papers // Jan 2013

    Dynamic Password Based Remote User Authentication without Time Stamping

    The rapid growth of electronic commerce and Internet-based applications demands strong privacy protection and robust system security, which are essential requirements for an authentication scheme or access control mechanism. The issue of remote user authentication has received much attention recently. Password authentication is one of the most convenient authentication mechanisms....

    Provided By King Saud University

  • White Papers // Nov 2012

    A Supervised Learning Approach for Automatic Keyphrase Extraction

    Keyphrases, synonymously spoken as keywords, represent semantic meta-data and play an important role to capture the main theme represented by a large text data collection. Although authors provide a list of about five to ten keywords in scientific publications that are used to map them to respective domains, due to...

    Provided By King Saud University

  • White Papers // Apr 2012

    Efficient Distributed Face Recognition in Wireless Sensor Network

    Face recognition enhances the security through wireless sensor network and it is a challenging task due to constraints involved in wireless sensor network. Image processing and image communication in wireless sensor network reduce the life time of network due to the heavy processing and communication. Face recognition system enhances the...

    Provided By King Saud University

  • White Papers // Sep 2011

    New Robust Protocols for Remote User Authentication and Password Change

    In 2008, Holbl et al. proposed improvements of Peyravian and Jeffries's DH (Diffie-Hellman)-based authentication protocol and password change protocol that can withstand the Shim's and Munilla et al.'s proposed off-line password guessing at-tacks. However, the authors found out that their protocols are still susceptible to off-line password guessing attacks and...

    Provided By King Saud University

  • White Papers // Feb 2013

    Risk Assessment for Scheduling Acceleration

    Time-cost-trade-off is a known method to accelerate a construction project by using the CPM method. However, this method cannot be used solely in the contractor or owner's decision to accelerate the project schedule because the vagueness of defining delays and acceleration responsibilities. In addition, time-cost-trade-off overlooks the increase in project...

    Provided By King Saud University

  • White Papers // Jul 2012

    Privacy and Security Concerns in SNS: A Saudi Arabian Users Point of View

    Social networking sites and applications are the major phenomenon all over the world and are constantly on a rise. As the users share their information and data on these sites, these sites can act as major source for misuse of information. So these SNS take steps stop this misuse of...

    Provided By King Saud University

  • White Papers // Mar 2013

    Comparative Study of RMST and STCP Protocol for QoS Provisioning in WSN

    Advancements in technologies, semiconductor industry and communications resulted in construction of wireless sensors. Wireless sensors are self-managing and sensing devices having the capability to communicate with each other and sink node wirelessly. The sink node can then take decision according to the application they are being used for; upon the...

    Provided By King Saud University

  • White Papers // Mar 2013

    Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks

    From energy conservation perspective in Wireless Sensor Networks (WSNs), clustering of sensor nodes is a challenging task. Clustering technique in routing protocols play a key role to prolong the stability period and lifetime of the network. In this paper, the authors propose and evaluate a new routing protocol for WSNs....

    Provided By King Saud University

  • White Papers // Mar 2013

    M-ATTEMPT: A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks

    In this paper, the authors propose a new routing protocol for heterogeneous Wireless Body Area Sensor Networks (WBASNs); Mobility-supporting Adaptive Threshold-based Thermal-aware Energy-efficient Multi-hop ProTocol (M-ATTEMPT). A prototype is defined for employing heterogeneous sensors on human body. Direct communication is used for real-time traffic (critical data) or on-demand data while...

    Provided By King Saud University

  • White Papers // May 2011

    Source ID Based Security (SIBS) Algorithm for Wireless Sensor Networks

    Today information security is foremost demand of every application. Data confidentiality is really a challenging task for Wireless Sensor Networks (WSNs). A light weight and full proof security algorithm is introduced in this research paper. The authors have named it "Source ID Based Security (SIBS)" algorithm. SIBS algorithm involves the...

    Provided By King Saud University

  • White Papers // May 2011

    Centralized Buffering and Lookahead Wavelength Conversion in Multistage Interconnection Networks

    In this paper, methods to alleviate the problem of internal blocking in interconnection networks based on WDM are studied. In an ordinary 8x8 Omega network, only 10% of all permutations are permissible in one pass, and it gets worse with larger switches. However, using WDM technology, the performance of these...

    Provided By King Saud University

  • White Papers // Jun 2011

    Causes of Mistrust and the Most Effective Authentication Tools for Improving Saudi Arabian Consumers' Willingness to Participate in E-commerce

    E-commerce is facing different challenges globally, and in particular, in developing countries. In some countries e-commerce adoption is slow because of some barriers; such as lack of trust. Customer trust is a significant issue in e-commerce since online services and products are typically not immediately verifiable. Both vendors and consumers...

    Provided By King Saud University

  • White Papers // Jun 2011

    Perspective of Feature Selection Techniques in Bioinformatics

    The availability of massive amounts of experimental data based on genome-wide association and mass spectroscopy studies have given motivation in recent years to a large effort in developing mathematical, statistical and computational techniques to infer biological models from data. In many bioinformatics problems the number of features is significantly larger...

    Provided By King Saud University

  • White Papers // Nov 2011

    Integrating Electronic Health Records Using Universal Patient Identifiers KSA

    One of the required standards of Healthcare Information Technology (HIT) and specially Electronic Health Records (HER) is to develop a Unique Patient Identifier (UPI) to enable physicians, hospitals, and other authorized users to share clinical and administrative records more efficiently. Till now there is no standard format of UPI which...

    Provided By King Saud University

  • White Papers // Nov 2011

    Intelligent Advising System

    The primary and necessary task for any undergraduate student has to go through after his orientation is advising. Advising plays a key role in a student's success towards his degree program. Many reports were published recently on the survey of the declining college graduate students. There might be several reasons...

    Provided By King Saud University

  • White Papers // Feb 2013

    A New Virtualization-Based Security Architecture in a Cloud Computing Environment

    Cloud computing finally emerged on the stage of the information technology. Virtualization is the core of cloud computing. Virtualization minimizes capital, operational and maintenance costs. Also, it provides flexibility in the used platform. However, the expansion of cloud computing is impeded by the lack of the security issue. Physical resources...

    Provided By King Saud University

  • White Papers // Jun 2013

    A Framework for ERP Systems in SME Based on Cloud Computing Technology

    Present Enterprise Resource Planning (ERP) offers expensive models which are hard to implement in Small and Medium Enterprises (SME) due to budget limitations. Moreover, current ERP systems are associated with several issues such as mutual synchronization of multi-typed resources, limited customization, bulky upgrading cost, solution integration, industry functionality, backup hedge...

    Provided By King Saud University

  • White Papers // Jan 2013

    A Swot Analysis on Cisco High Availability Virtualization Clusters Disaster Recovery Plan

    Continuity of services availability is critical in some business types such as banks, hospitals, and military institutions. However, this may be interrupted by either a natural disaster such as an earthquake, volcano, or a tornado. In addition, human negative interference such as hackers or terrorism may expose valuable resources to...

    Provided By King Saud University