University of Al-Jabal Al-Gharbi

Displaying 1-14 of 14 results

  • White Papers // Sep 2013

    Lack of Mainframe Programmers a Critical Issue for IT Organizations A Review of the Literature

    Many technology experts predicted mainframe systems would be obsolete in less than 10 years. Many years later the mainframe is still very much alive and is the backbone of many corporations' data processing strategy. While the mainframe continues to offer reliability and stability, the most knowledgeable and experienced mainframe programmers...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Jul 2013

    A Fault-Tolerant Method for Enhancing Reliability of Services Composition Application in WSNs Based on BPEL

    In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web services, and the Business Process Execution Language (BPEL) to build a wireless sensor networks service application. However, there a great challenge on fault tolerant in...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Feb 2013

    Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems

    In recent years, cloud computing has become popular as a cost-effective and efficient computing paradigm. Unfortunately, today's cloud computing architectures are not designed for security and forensics. To date, very little research has been done to develop the theory and practice of cloud forensics. Many factors complicate forensic investigations in...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Feb 2013

    SecLaaS: Secure Logging-as-a-Service for Cloud Forensics

    Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. Analyzing various logs (e.g., process logs, network logs) plays a vital role in computer forensics. Unfortunately, collecting logs from a cloud is very hard given the...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Jan 2013

    Parameter Estimation in Wireless Sensor Networks with Normally Distributed Sensor Gains

    Wireless Sensor Networks (WSN) has attracted significant attention recently. The distributed estimation problem is an important research topic in WSNs. In the distributed estimation problem, the fusion center estimates an unknown parameter based on information gathered from sensors. Usually, it is assumed that sensors have identical gains. However, this may...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Nov 2012

    Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks

    Human mobility, hence the movement pattern of mobile devices, often confines to relatively local geographic areas. Such a movement pattern reduces the opportunities for a message to be disseminated to a more global geographical region using the encounter-based "Store-carry-forward" routing approach. On the other hand, different local areas often overlap...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Nov 2012

    I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics

    Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. A key task of digital forensics is to prove the presence of a particular file in a given storage system. Unfortunately, it is very hard to...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // May 2011

    Private Distributed Cloud Deployment in a Limited Networking Environment

    The focus of the authors' research began with the deployment of a cloud computing system to offer resources similar to commercial vendors. Realizing the implications of deploying such a system in an environment with limited networking resources (IP addresses); they decided to find a solution that would work giving their...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // May 2011

    A Review on Cloud Computing: Design Challenges in Architecture and Security

    Cloud computing is quickly becoming one of the most popular and trendy phrases being tossed around in today's technology world. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. In this paper, the authors will comprehensively survey the concepts and architecture of cloud computing, as...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Oct 2010

    The Use of Research Methodologies in the Knowledge Management Literature

    The texts of 630 knowledge management paper were analyzed to address the question of what research methodologies are used in the knowledge management literature. It was found that 27.8 percent of knowledge management-related papers in knowledge management journals used no identifiable research method. Of the remaining 455 refereed paper, 60...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Oct 2010

    Local Cloud Deployment in a Limited IP Setting

    The cloud computing architecture is becoming a dominant contender in the distributed systems paradigm. Its differences from the client/server architecture are based in its heavy use of resource elasticity. The cloud architecture uses virtualization technology in distributed data centers to allocate resources to users as they need them. Cloud computing...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Aug 2010

    Registration and Aggregate Cache Routing for Ad hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a temporary, infrastructure less wireless network composed of mobile nodes. Due to the limitations in the wireless environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. Since traditional routing protocols...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Oct 2009

    Modeling Worm Propagation Through Hidden Wireless Connections

    The security issue regarding to worm propagation that exploits geographic proximity of wireless enabled devices has raised attentions in recent years. Early work has modeled worm propagation through directly infecting neighboring nodes, e.g., wireless routers and Bluetooth networks. However, there remains new potential wireless connection topology that can assist the...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Dec 2008

    Deriving a Taxonomy of IT Transition Costs

    Those charged with implementing information technology often face the daunting task of assessing the total organizational costs of such initiatives. The authors' study posits evaluating such expenditures as IT transition costs - organizational resource expenditures stemming from a positive IT investment decision. A content analytic review of academic, IT- related...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Nov 2012

    I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics

    Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. A key task of digital forensics is to prove the presence of a particular file in a given storage system. Unfortunately, it is very hard to...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Oct 2009

    Modeling Worm Propagation Through Hidden Wireless Connections

    The security issue regarding to worm propagation that exploits geographic proximity of wireless enabled devices has raised attentions in recent years. Early work has modeled worm propagation through directly infecting neighboring nodes, e.g., wireless routers and Bluetooth networks. However, there remains new potential wireless connection topology that can assist the...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // May 2011

    Private Distributed Cloud Deployment in a Limited Networking Environment

    The focus of the authors' research began with the deployment of a cloud computing system to offer resources similar to commercial vendors. Realizing the implications of deploying such a system in an environment with limited networking resources (IP addresses); they decided to find a solution that would work giving their...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Feb 2013

    Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems

    In recent years, cloud computing has become popular as a cost-effective and efficient computing paradigm. Unfortunately, today's cloud computing architectures are not designed for security and forensics. To date, very little research has been done to develop the theory and practice of cloud forensics. Many factors complicate forensic investigations in...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Feb 2013

    SecLaaS: Secure Logging-as-a-Service for Cloud Forensics

    Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. Analyzing various logs (e.g., process logs, network logs) plays a vital role in computer forensics. Unfortunately, collecting logs from a cloud is very hard given the...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Aug 2010

    Registration and Aggregate Cache Routing for Ad hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a temporary, infrastructure less wireless network composed of mobile nodes. Due to the limitations in the wireless environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. Since traditional routing protocols...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Jul 2013

    A Fault-Tolerant Method for Enhancing Reliability of Services Composition Application in WSNs Based on BPEL

    In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web services, and the Business Process Execution Language (BPEL) to build a wireless sensor networks service application. However, there a great challenge on fault tolerant in...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // May 2011

    A Review on Cloud Computing: Design Challenges in Architecture and Security

    Cloud computing is quickly becoming one of the most popular and trendy phrases being tossed around in today's technology world. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. In this paper, the authors will comprehensively survey the concepts and architecture of cloud computing, as...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Dec 2008

    Deriving a Taxonomy of IT Transition Costs

    Those charged with implementing information technology often face the daunting task of assessing the total organizational costs of such initiatives. The authors' study posits evaluating such expenditures as IT transition costs - organizational resource expenditures stemming from a positive IT investment decision. A content analytic review of academic, IT- related...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Nov 2012

    Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks

    Human mobility, hence the movement pattern of mobile devices, often confines to relatively local geographic areas. Such a movement pattern reduces the opportunities for a message to be disseminated to a more global geographical region using the encounter-based "Store-carry-forward" routing approach. On the other hand, different local areas often overlap...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Jan 2013

    Parameter Estimation in Wireless Sensor Networks with Normally Distributed Sensor Gains

    Wireless Sensor Networks (WSN) has attracted significant attention recently. The distributed estimation problem is an important research topic in WSNs. In the distributed estimation problem, the fusion center estimates an unknown parameter based on information gathered from sensors. Usually, it is assumed that sensors have identical gains. However, this may...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Oct 2010

    Local Cloud Deployment in a Limited IP Setting

    The cloud computing architecture is becoming a dominant contender in the distributed systems paradigm. Its differences from the client/server architecture are based in its heavy use of resource elasticity. The cloud architecture uses virtualization technology in distributed data centers to allocate resources to users as they need them. Cloud computing...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Sep 2013

    Lack of Mainframe Programmers a Critical Issue for IT Organizations A Review of the Literature

    Many technology experts predicted mainframe systems would be obsolete in less than 10 years. Many years later the mainframe is still very much alive and is the backbone of many corporations' data processing strategy. While the mainframe continues to offer reliability and stability, the most knowledgeable and experienced mainframe programmers...

    Provided By University of Al-Jabal Al-Gharbi

  • White Papers // Oct 2010

    The Use of Research Methodologies in the Knowledge Management Literature

    The texts of 630 knowledge management paper were analyzed to address the question of what research methodologies are used in the knowledge management literature. It was found that 27.8 percent of knowledge management-related papers in knowledge management journals used no identifiable research method. Of the remaining 455 refereed paper, 60...

    Provided By University of Al-Jabal Al-Gharbi