38 results on '"Abdullah S. Alghamdi"'
Search Results
2. Secure privacy vault design for distributed multimedia surveillance system
- Author
-
Sk. Md. Mizanur Rahman, Atif Alamri, Abdullah S. Alghamdi, Mohammad Mehedi Hassan, Mukaddim Pathan, and M. Anwar Hossain
- Subjects
Security analysis ,Multimedia ,Computer Networks and Communications ,Privacy software ,Computer science ,020207 software engineering ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Computer security ,Identification (information) ,Attack model ,Hardware and Architecture ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Software - Abstract
Distributed multimedia surveillance systems utilize heterogeneous sensors such as cameras, motion sensors, sound sensors, and RFID in order to provide safety and security to people. However, due to the potential of exposing privacy by these systems, many people are reluctant to be electronically monitored and suffer from privacy loss. In order to overcome this dilemma, the current surveillance systems should adopt improved privacy preservation (i.e. hiding people's face) mechanism while they are used for typical surveillance tasks. This paper takes a holistic approach to identify the different privacy leakage channels in the distributed video surveillance context and proposes the design of a secure privacy vault to conceal privacy-sensitive data obtained from distributed visual sensors. It also shows how the proposed solution helps to mitigate the potential privacy leakage problems at different levels of the leakage channels. In order to demonstrate the viability of the proposed approach, we further provide the privacy leakage attack model as well as the security analysis of the proposed solution. Identification of privacy leakage channels by means of privacy leakage trees.A secure privacy vault design for distributed surveillance system.Robust against different security and privacy attacks.Different attack models (White-box, Gray-box, or Black-box) have been considered.
- Published
- 2016
- Full Text
- View/download PDF
3. QoS-adaptive service configuration framework for cloud-assisted video surveillance systems
- Author
-
Ahmad Almogren, Atif Alamri, Abdullah S. Alghamdi, M. Shamim Hossain, Mohammed Zakariah, Lee Seyam, Khalid Alnafjan, and Mohammad Mehedi Hassan
- Subjects
Adaptive quality of service multi-hop routing ,Computer Networks and Communications ,Computer science ,business.industry ,Quality of service ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Transcoding ,Video processing ,computer.software_genre ,Frame rate ,Hardware and Architecture ,Video tracking ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Bandwidth (computing) ,020201 artificial intelligence & image processing ,business ,computer ,Software ,Computer network - Abstract
Quality of service (QoS)-adaptive service configuration is crucial for seamless access to video services in cloud-assisted video surveillance systems. To maintain seamless access to video on a user's preferred device, suitable video transcoding services are needed. It is a challenging task to choose and configure these services for various devices to ensure QoS-adaptive user experiences. To configure these services for the desired user devices, a suitable configuration algorithm is needed. Therefore, this paper describes a QoS-adaptive service configuration approach to choose the optimal configuration for the preferred user devices in varied contexts so that the user can access the services ubiquitously. We implemented a cloud-assisted video surveillance prototype to show how the proposed method can handle ubiquitous access to target video for possible QoS-adaptive and video processing requirements in terms of bandwidth, delay, and frame rates. The results show that the proposed configuration method outperforms the other comparable approaches.
- Published
- 2015
- Full Text
- View/download PDF
4. Enhanced engineering education using smart class environment
- Author
-
M. Shamim Hossain, Majdi Rawashdeh, Abdullah S. Alghamdi, Mohammad Shorfuzzaman, Abdulhameed Alelaiwi, and Ghulam Muhammad
- Subjects
Class (computer programming) ,Focus (computing) ,Multimedia ,business.industry ,Computer science ,computer.software_genre ,Tablet pc ,Human-Computer Interaction ,Annotation ,Arts and Humanities (miscellaneous) ,Engineering education ,Smart learning ,The Internet ,business ,computer ,General Psychology - Abstract
Annotation facility on slides from both students and educators are explored.Live broadcast of a lecture to multi-class is realized by real time mixture.Students are highly in favor of annotation facility.High internet speed is required for live broadcast using real time mixture. The availability of 3G and 4G technologies coupled with tablet PCs and smart phones makes the communication and learning system easier. In engineering education, these sophisticated technologies can bring immense advantages to the methods of delivering and acquiring knowledge. In this paper, we focus on facilities of a smart class environment for engineering education that can improve the co-learning procedure. We particularly emphasize the use of 3G and 4G technology in a smart class.
- Published
- 2015
- Full Text
- View/download PDF
5. Cryptanalysis and improvement of ‘a secure authentication scheme for telecare medical information system’ with nonce verification
- Author
-
Abdul Hanan Abdullah, Abdullah S. Alghamdi, Zeeshan Siddiqui, and Muhammad Khurram Khan
- Subjects
Challenge-Handshake Authentication Protocol ,Authentication ,020205 medical informatics ,Computer Networks and Communications ,Computer science ,Data_MISCELLANEOUS ,020207 software engineering ,02 engineering and technology ,Multi-factor authentication ,Computer security ,computer.software_genre ,Authentication protocol ,Lightweight Extensible Authentication Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Challenge–response authentication ,computer ,Software ,Data Authentication Algorithm ,Cryptographic nonce - Abstract
In 2009, Xu et al. presented an improved smartcard based authentication scheme while using a security model previously applied by Bellare et al. to prove the security of their authentication methods. Later on, in 2012, Wu et al. pointed out number of authentication attacks in Xu et al. scheme. To address these issues, Wu et al. presented a Smartcard based Two-Factor Authentication (2FA) scheme for Telecare Medical Information System (TMIS) facility. In this study, we prove that authentication scheme of Wu et al. is still vulnerable to impersonation attack, offline password guessing attack, forgery attack and many other attacks. Moreover, number of performance and verification issues are also outlined in the authentication scheme of Wu et al. To overcome these issues, an improved and enhanced 3FA Smartphone based authentication method is proposed on a Cloud Computing environment. The proposed scheme is further corroborated using Burrows-Abadi-Needham logic (BAN logic) nonce verification. The detailed BAN logic verification and further security analysis shows that the proposed authentication protocol is highly reliable and secure in terms of message verifications, message freshness and trustworthiness of its origin. Moreover, the comparative security, performance and feature analysis shows that the proposed work yields an even more improved and enhanced authentication framework as compared to Wu et al. authentication scheme.
- Published
- 2015
- Full Text
- View/download PDF
6. Htab2RDF: Mapping HTML Tables to RDF Triples
- Author
-
Abdullah S. Alghamdi, Khalid Alnafjan, Djelloul Bouchiha, and Mimoun Malki
- Subjects
0209 industrial biotechnology ,Information retrieval ,68N99 ,Computer Networks and Communications ,Computer science ,Relational database ,WordNet ,02 engineering and technology ,Linked data ,computer.file_format ,Ontology (information science) ,Lexical database ,Identification (information) ,020901 industrial engineering & automation ,Data access ,Computational Theory and Mathematics ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,HTML tables, RDF, relational databases, Linked Data, domain ontology, WordNet ,RDF ,computer ,Software ,Knowledge and Information Engineering ,Semantic Web ,Linked Data engineering - Abstract
The Web has become a tremendously huge data source hidden under linked documents. A significant number of Web documents include HTML tables generated dynamically from relational databases. Often, there is no direct public access to the databases themselves. On the other hand, RDF (Resource Description Framework) gives an efficient mechanism to represent directly data on the Web based on a Web-scalable architecture for identification and interpretation of terms. This leads to the concept of Linked Data on the Web. To allow direct access to data on the Web as Linked Data, we propose in this paper an approach to transform HTML tables into RDF triples. It consists of three main phases: refining, pre-treatment and mapping. The whole process is assisted by a domain ontology and the WordNet lexical database. A tool called Htab2RDF has been implemented. Experiments have been carried out to evaluate and show efficiency of the proposed approach.
- Published
- 2018
7. Collective control over sensitive video data using secret sharing
- Author
-
M. Anwar Hossain, Pradeep K. Atrey, Saeed Alharthi, Abdulmotaleb Saadik, and Abdullah S. Alghamdi
- Subjects
Homomorphic secret sharing ,Proactive secret sharing ,Computer Networks and Communications ,Computer science ,business.industry ,Key distribution ,Data security ,Shared secret ,Computer security ,computer.software_genre ,Encryption ,Secret sharing ,Hardware and Architecture ,Secrecy ,Media Technology ,Secure multi-party computation ,business ,computer ,Software - Abstract
Today digital video is used extensively in many applications. Sometimes a video could be treated as a top secret for an organization, for example military secrets, surveillance footage and corporate product designs, and may need to be shared among a group of people in a secure manner. Traditional data security methods such as encryption techniques are prone to single-point attack, i.e. the secret can be revealed by obtaining the decryption key from any single person. Alternatively, the secret sharing scheme provides collective control over the secrecy of information and is considered information theoretically secure. In this paper, we propose to adopt a secret sharing based approach to provide collective control over a given sensitive video. We present three methods that utilize the spatial and temporal redundancy in videos in different ways. We analyze the security of these methods and compare them for efficiency in terms of computation time and space using extensive experimentation.
- Published
- 2013
- Full Text
- View/download PDF
8. Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components
- Author
-
Muhammad Hussain, Abdullah S. Alghamdi, Abdulhameed Alelaiwi, and Iftikhar Ahmad
- Subjects
business.industry ,Computer science ,Pattern recognition ,Intrusion detection system ,computer.software_genre ,Support vector machine ,Knowledge extraction ,Artificial Intelligence ,Principal component analysis ,False positive paradox ,Artificial intelligence ,Data mining ,business ,computer ,Classifier (UML) ,Software ,Eigenvalues and eigenvectors - Abstract
Intrusion detection is very serious issue in these days because the prevention of intrusions depends on detection. Therefore, accurate detection of intrusion is very essential to secure information in computer and network systems of any organization such as private, public, and government. Several intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. This issue of the existing techniques is the focus of research in this paper. The poor performance of such techniques is due to raw dataset which confuse the classifier and results inaccurate detection due to redundant features. The recent approaches used principal component analysis (PCA) for feature subset selection which is based on highest eigenvalues, but the features corresponding to the highest eigenvalues may not have the optimal sensitivity for the classifier due to ignoring many sensitive features. Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a genetic algorithm to search the genetic principal components that offers a subset of features with optimal sensitivity and the highest discriminatory power. The support vector machine (SVM) is used for classification purpose. This research work used the knowledge discovery and data mining cup dataset for experimentation. The performance of this approach was analyzed and compared with existing approaches. The results show that proposed method enhances SVM performance in intrusion detection that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.
- Published
- 2013
- Full Text
- View/download PDF
9. Utility based decision support engine for camera view selection in multimedia surveillance systems
- Author
-
Shervin Shirmohammadi, Dewan Tanvir Ahmed, Pradeep K. Atrey, Abdullah S. Alghamdi, M. Anwar Hossain, and Abdulmotaleb El Saddik
- Subjects
Schedule ,Decision support system ,Computer Networks and Communications ,Event (computing) ,Computer science ,Computer security ,computer.software_genre ,Task (project management) ,Operator (computer programming) ,Hardware and Architecture ,Action plan ,Media Technology ,Selection (linguistics) ,Smart camera ,computer ,Software - Abstract
Design and implementation of an effective surveillance system is a challenging task. In practice, a large number of CCTV cameras are installed to prevent illegal and unacceptable activities where a human operator observes different camera views and identifies various alarming cases. But reliance on the human operator for real-time response can be expensive as he may be unable to pay full attention to all camera views at the same time. Moreover, the complexity of a situation may not be easily perceivable by the operator for which he might require additional support in response to an adverse situation. In this paper, we present a Decision Support Engine (DSE) to select and schedule most appropriate camera views that can help the operator to take an informed decision. For this purpose, we devise a utility based approach where the utility value changes based on automatically detected events in different surveillance zones, event co-relation, and operator's feedback. In addition to the selected camera views, we propose to synthetically embed extra information around the camera views such as event summary and suggested action plan to globally perceive the current situation. The experimental results show the usefulness of the proposed decision support system.
- Published
- 2012
- Full Text
- View/download PDF
10. Adaptive interaction support in ambient-aware environments based on quality of context information
- Author
-
M. Anwar Hossain, Ali Asghar Nazari Shirehjini, Abdullah S. Alghamdi, and Abdulmotaleb El Saddik
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,media_common.quotation_subject ,User satisfaction ,Information quality ,Context (language use) ,Computer security ,computer.software_genre ,Action (philosophy) ,Null (SQL) ,Hardware and Architecture ,Home automation ,Human–computer interaction ,Media Technology ,Quality (business) ,business ,computer ,Software ,Cognitive load ,media_common - Abstract
Ambient-aware environments are technologically augmented with myriad sensors, devices and other emerging services in order to support users. However, users find it complex in interacting with such environments due to the presence of numerous devices and services. In this situation, providing context-aware implicit or automatic interaction support may help reducing the cognitive load of the users and facilitate easy access of the available devices and services. However, due to the imprecision in context information, implicit interactions performed by the environment often leads to mis-automation. The result of such impaired implicitness causes distrust and dissatisfaction to the user. In order to address this issue, we propose a system that considers quality of information to dynamically adjust the level of implicit interaction and allows a system to operate in different modes such as full-automation, action suggestion, simple notification, or null action. We conduct experiment in a smart home scenario in order to elicit users' acceptance and trust regarding the proposed system. Our experiment shows that dynamic and alternative mode of interaction not only increases the satisfaction of users but also helps to avoid distrust in automated actions carried out by the environment under varying contexts.
- Published
- 2012
- Full Text
- View/download PDF
11. Intrusion Detection Using PCA Based Modular Neural Network
- Author
-
Abdullah S. Alghamdi, Khaled Al-Nafjan, M. Haque, Musaed Alhussein, and Iftikhar Ahmad
- Subjects
Information Systems and Management ,Artificial neural network ,Computer science ,business.industry ,Computer Science::Neural and Evolutionary Computation ,Pattern recognition ,Intrusion detection system ,Modular neural network ,computer.software_genre ,Backpropagation ,Computer Science Applications ,Data set ,Knowledge extraction ,Artificial Intelligence ,Principal component analysis ,Artificial intelligence ,Data mining ,business ,Cluster analysis ,computer - Abstract
Most of current intrusion detection systems are based on machine learning methods but very few till now use clustering algorithms as a preprocessing layer to reduce the high dimensionality of data, which is difficult to analyze. In this paper we introduce Modular Neural Network for intrusion detection, which apply Principal Component Analysis (PCA) as preprocessing layer for reducing huge information quantity presented in knowledge discovery and data mining (KDD99) data set. PCA significantly reduce the high dimensionality of data set without loss of information. Then this preprocess data in the form of principal component is presented to Batch Backpropagation Neural Network for efficient intrusion detection. We rely on some experiments to calculate Root Mean Square Error (RMSE) using Modular Neural Network on KDD 99 data set. Our experimental results show improvement in the learning time due to the reduction of high dimensions of data. Also we have obtained low RMSE during training, which is below the acceptance range of 0.1. Proposed Modular Neural Network has capability to efficiently and accurately classify data into attack and normal.
- Published
- 2012
- Full Text
- View/download PDF
12. Optimized intrusion detection mechanism using soft computing techniques
- Author
-
Abdullah S. Alghamdi, Iftikhar Ahmad, Azween Abdullah, and Muhammad Hussain
- Subjects
Soft computing ,Anomaly-based intrusion detection system ,business.industry ,Network security ,Computer science ,Feature vector ,Pattern recognition ,Intrusion detection system ,computer.software_genre ,Support vector machine ,Benchmark (computing) ,Artificial intelligence ,False alarm ,Data mining ,Electrical and Electronic Engineering ,business ,computer - Abstract
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.
- Published
- 2011
- Full Text
- View/download PDF
13. Evaluating Defense Architecture Frameworks for C4I System Using Analytic Hierarchy Process
- Author
-
Abdullah S. Alghamdi
- Subjects
Enterprise architecture framework ,Situation awareness ,Computer Networks and Communications ,Computer science ,NATO Architecture Framework ,Analytic hierarchy process ,Computer security ,computer.software_genre ,MODAF ,Architecture framework ,Engineering management ,Artificial Intelligence ,Operational View ,Department of Defense Architecture Framework ,View model ,computer ,Software ,TAFIM - Abstract
Problem statement: The Command, Control, Communications, Computers and Intelligence (C4I) Systems provided situational awareness about operational environment and supported in decision making and directed to operative environment. These systems had been used by various agencies like defense, police, investigation, road, rail, airports, oil and gas related department. However, the increase use of C4I system had made it more important and attractive. Consequently interest in design and development of C4I system had increased among the researchers. Many defense industry frameworks were available but the problem was a suitable selection of a framework in design and development of C4I system. Approach: This study described the concepts, tool and methodology being used for evaluation analysis of different frameworks by Analytic Hierarchy Process (AHP). Results: We had compared different defense industry frameworks like Department of Defense Architecture Framework (DODAF), Ministry of Defense Architecture Framework (MODAF) and NATO Architecture Framework (NAF) and found that AHP is fairly good tool in terms of analysis. Conclusion: Different defense industry frameworks such as DODAF, MODAF and NAF had been evaluated and compared using AHP.
- Published
- 2009
- Full Text
- View/download PDF
14. An Empirical Process for Evaluating and Selecting AWEM Environments: 'Evaluation Stage'
- Author
-
Abdullah S. Alghamdi
- Subjects
Scheme (programming language) ,medicine.medical_specialty ,Process management ,General Computer Science ,business.industry ,Process (engineering) ,Management science ,Computer science ,Empirical process (process control model) ,Web engineering ,Identification (information) ,Evaluation and selection of Web Engineering Methodology environment ,medicine ,Web application ,Automated Web Engineering Methodology environments ,business ,Web modeling ,computer ,Selection (genetic algorithm) ,computer.programming_language - Abstract
This paper elaborates on the evaluation stage of an empirical process whose purpose is to evaluate and select a best-of-breed AWEM, Automated Web Engineering Methodology environment. The process is basically comprised of four major stages, namely: characteristics identification, screening of available AWEM environments, evaluation, and selection.During the evaluation stage, an “evaluation scheme”, which serves specific web application domains reflecting the organization's perspective towards the AWEM environment, is created. The idea is to make the evaluation process more user-centric. The actual evaluation is then conducted based on the results gained through the development of real pilot projects.The paper contributes to the current research in web engineering area by proposing an evaluation mechanism through the introduction of a so-called “evaluation scheme”, a sub-set of predefined essential criteria. Another major contribution is the introduction of an evaluation algorithm for weighing and rating various characteristics and alternatives that will eventually assist in making a final decision. Both, the process and the algorithm, were fully automated and evaluated on real world cases using the AWEM-ESS, which is an evaluation and selection system built specifically for this purpose.
- Published
- 2007
- Full Text
- View/download PDF
15. Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
- Author
-
Atif Alamri, S. M. Kamruzzaman, Abdulhameed Alelaiwi, Ahmad Almogren, Sk. Md. Mizanur Rahman, and Abdullah S. Alghamdi
- Subjects
Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,Wireless ad hoc network ,Computer science ,Wireless network ,business.industry ,Ad hoc wireless distribution service ,Computer security ,computer.software_genre ,Cognitive radio ,Optimized Link State Routing Protocol ,Secure communication ,business ,computer ,Computer network - Abstract
Cognitive radio (CR) networks are becoming an increasingly important part of the wireless networking landscape due to the ever-increasing scarcity of spectrum resources throughout the world. Nowadays CR media is becoming popular wireless communication media for disaster recovery communication network. Although the operational aspects of CR are being explored vigorously, its security aspects have gained less attention to the research community. The existing research on CR network mainly focuses on the spectrum sensing and allocation, energy efficiency, high throughput, end-to-end delay and other aspect of the network technology. But, very few focuses on the security aspect and almost none focus on the secure anonymous communication in CR networks (CRNs). In this research article we would focus on secure anonymous communication in CR ad hoc networks (CRANs). We would propose a secure anonymous routing for CRANs based on pairing based cryptography which would provide source node, destination node and the location anonymity. Furthermore, the proposed research would protect different attacks those are feasible on CRANs.
- Published
- 2014
- Full Text
- View/download PDF
16. Identification of frequently used features of smartphone web browsers
- Author
-
Iftikhar Ahmad, Fazal-e-Amin, and Abdullah S. Alghamdi
- Subjects
Multimedia ,Computer science ,business.industry ,Navigation bar ,Mobile Web ,Usability ,computer.software_genre ,Browser security ,World Wide Web ,Web Accessibility Initiative ,Web page ,Web navigation ,business ,computer ,Web usability - Abstract
Browsing web through smartphone browsers is gaining popularity due to the convenience and availability of infrastructure at almost all places. On the other hand the capabilities of smartphone browsers are also improved to a great extent and many browsers are available to users. One can perform almost all of his information seeking and web related tasks through smartphone browser. Many web sites are customized for the smartphone browsers. This research work is deemed to identify the frequently used smartphone browser features. Mixed methods of research are employed in this study. Qualitative method i.e. interview is used to collect the data from the smartphone users to lay down the basis for quantitative phase i.e. survey. Features are categorized into different categories and two groups i.e. basic, and advanced features. Results show that features related to tabs, view and download are the frequently used by users. The results are equally help for practitioners and researchers to work on the improvement of browser's usability.
- Published
- 2014
- Full Text
- View/download PDF
17. Designing Framework for the Interoperability of C4I Systems
- Author
-
Tazar Hussain, Abdullah S. Alghamdi, Aman ul Haq, Khalid Alnafjan, and Raja Majid Mehmood
- Subjects
System of systems ,Situation awareness ,business.industry ,Computer science ,Distributed computing ,Interoperability ,Semantic interoperability ,computer.software_genre ,Data exchange ,Middleware ,Middleware (distributed applications) ,Information system ,Department of Defense Architecture Framework ,Systems design ,Cross-domain interoperability ,Software engineering ,business ,computer - Abstract
C4I (command, control, communication, computer and intelligence) are complex information systems designed to achieve mission objectives through better situational awareness and information superiority. C4I systems are system of systems (SOS), SOS comprised of independent constituent systems that interoperate with other systems to achieve specific mission objectives. In this paper we propose a framework for the interoperability of C4I Systems that covers key issues and challenges related to interoperability of heterogeneous C4I systems such as complexity, criticality and Information Exchanges Requirements (IER). The frameworks make use of department of defense architecture framework (DOAF) to describe data exchange requirements, source adapters, message translation, routing and destination adapters.
- Published
- 2014
- Full Text
- View/download PDF
18. Cloud Based C4I Systems: Security Requirements and Concerns
- Author
-
Fazal-e-Amin, Iftikhar Ahmad, and Abdullah S. Alghamdi
- Subjects
Control system security ,System of systems ,Government ,Cloud computing security ,Emergency management ,business.industry ,Computer science ,Cloud computing ,Computer security model ,Computer security ,computer.software_genre ,Utility computing ,Security service ,Software deployment ,Cloud testing ,business ,computer - Abstract
C4I (Command, Control, Communication, Computer and Intelligence) systems are critical systems of systems. These systems are used in military, emergency response, and in disaster management etc. Due to the sensitive nature of domains and applications of these systems, quality could never be compromised. C4I systems are resource demanding system, their expansion or up gradation for the sake of improvement require additional computational resources. Cloud computing provides a solution for the convenient access and scaling of resources. Recently, it is envisioned by the researchers to deploy C4I systems using cloud computing resources. However, there are many issues in such deployment and security being at the top, is focus of many researchers. In this research, security requirements and concerns of cloud based C4I systems are highlighted. Different aspects of cloud computing and C4I systems are discussed from the security point of view. This research will be helpful for both academia and industry to further strengthen the basis of cloud based C4I systems.
- Published
- 2014
- Full Text
- View/download PDF
19. Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System
- Author
-
Zeeshan Siddiqui, Abdullah S. Alghamdi, Muhammad Khurram Khan, and Abdul Hanan Abdullah
- Subjects
Health Information Exchange ,Computer science ,Smart device ,Medicine (miscellaneous) ,Health Informatics ,Cloud computing ,Computer security ,computer.software_genre ,law.invention ,Health Information Management ,law ,Humans ,Computer Security ,Internet ,Authentication ,business.industry ,Multi-factor authentication ,Telemedicine ,Chip Authentication Program ,Authentication protocol ,Smart environment ,Smart card ,business ,computer ,Algorithms ,Confidentiality ,Information Systems - Abstract
The Telecare Medical Information System (TMIS) provides a set of different medical services to the patient and medical practitioner. The patients and medical practitioners can easily connect to the services remotely from their own premises. There are several studies carried out to enhance and authenticate smartcard-based remote user authentication protocols for TMIS system. In this article, we propose a set of enhanced and authentic Three Factor (3FA) remote user authentication protocols utilizing a smartphone capability over a dynamic Cloud Computing (CC) environment. A user can access the TMIS services presented in the form of CC services using his smart device e.g. smartphone. Our framework transforms a smartphone to act as a unique and only identity required to access the TMIS system remotely. Methods, Protocols and Authentication techniques are proposed followed by security analysis and a performance analysis with the two recent authentication protocols proposed for the healthcare TMIS system.
- Published
- 2013
- Full Text
- View/download PDF
20. AVTMT - The Effect of Multimodal Patterns on Human Memory
- Author
-
Saleh Alshomrani, Abdullah S. Alghamdi, Tahir Mustafa Madni, Muzafar Khan, Amina Siddiqua, Rizwana Irfan, Muhammad Tahir, and Maryam Ahmed
- Subjects
Multimedia ,Computer Networks and Communications ,Computer science ,Human memory ,Short-term memory ,computer.software_genre ,Computer Science Applications ,Computer game ,Image (mathematics) ,Artificial Intelligence ,visual_art ,visual_art.visual_art_medium ,Tile ,computer ,Software ,Information Systems - Abstract
This paper presents a computer game which consists of multiple tiles at three different levels. When users click on each tile, it flips or un-flips. Each tile, upon flipping, reveals a different patterns e.g. audio, image or text. The system matches those patterns. If two flipped tiles have same pattern, they disappear otherwise they un-flip. This research work 1) examines the effects of audio, visual and text patterns on sighted, deaf, and blind users 2) analyzes the working of human's memory depending upon the appearance of audio, visual and text patterns and 3) calculates the performance of each user based on the number of previous interactions made with the game. The total number of clicks and the time taken to finish the game was recorded. The results of the four experiments indicate that different types of users behave differently when presented with specific type of information (audio, visual and text).
- Published
- 2013
- Full Text
- View/download PDF
21. Resource Allocation for Service Composition in Cloud-based Video Surveillance Platform
- Author
-
Mohammad Mehedi Hassan, M. Al Qurishi, M. Shamim Hossain, and Abdullah S. Alghamdi
- Subjects
Service (business) ,business.industry ,Computer science ,Quality of service ,Cloud computing ,computer.software_genre ,Virtual machine ,Server ,Resource allocation ,Resource management ,business ,Heuristics ,computer ,Computer network - Abstract
Resource allocation play an important role in service composition for cloud-based video surveillance platform. In this platform, the utilization of computational resources is managed through accessing various services from Virtual Machine (VM) resources. A single service accessed from VMs running inside such a cloud platform may not cater the application demands of all surveillance users. Services require to be modeled as a value added composite service. In order to provide such a composite service to the customer, VM resources need to be utilized optimally so that QoS requirements is fulfilled. In order to optimize the VM resource allocation, we have used linear programming approach as well as heuristics. The simulation results show that our approach outperforms the existing VM allocation schemes in a cloud-based video surveillance environment, in terms of cost and response time.
- Published
- 2012
- Full Text
- View/download PDF
22. A collaboration architecture for distributed smart surveillance systems based on DoDAF 2.0
- Author
-
Abobakr Y. Shahrah, Abdullah S. Alghamdi, and M. Anwar Hossain
- Subjects
Collaborative software ,Situation awareness ,business.industry ,Computer science ,Enterprise architecture ,Computer security ,computer.software_genre ,Data science ,Smart surveillance ,Applications architecture ,Architecture ,business ,Software architecture ,computer ,Block (data storage) - Abstract
Smart surveillance systems have dramatically evolved over the recent years due to the availability of affordable sensing technologies, media processing discoveries and advanced networking capabilities. In third generation of surveillance systems, the distribution of surveillance capabilities over different sites has extremely boosted the complexity of such systems. As a result, managing alerts and responses that serve as a building block for collaboration among different parties has become very challenging in distributed surveillance system setting. The aim of this research is to propose an effective mechanism for establishing a strong collaboration among distributed smart surveillance systems regardless of the heterogeneity of their platforms. The proposed mechanism is demonstrated in the form of a generic Enterprise Architecture that utilizes DoDAF 2.0 to represent the development of Architectural Descriptions for supporting an accurate and complete integration and interaction among distributed smart surveillance systems. The development of Architectural Descriptions proposed in this research will facilitate an appropriate management of alerts and responses for improved situation awareness.
- Published
- 2012
- Full Text
- View/download PDF
23. Proposed methodology to enhance C4I systems security on architectural level
- Author
-
Abdul Haseeb, Tazar Hussain, Gul Faraz Khan, Khalid Alnafjan, and Abdullah S. Alghamdi
- Subjects
Enterprise architecture framework ,Exploit ,Process (engineering) ,Computer science ,Interoperability ,General Engineering ,General Physics and Astronomy ,General Medicine ,Information security ,Computer security ,computer.software_genre ,General Biochemistry, Genetics and Molecular Biology ,Information warfare ,Department of Defense Architecture Framework ,General Agricultural and Biological Sciences ,Design methods ,computer - Abstract
Command control, communication, computer and intelligence (C4I) systems are the back bone complex information and communication systems for modern information warfare (IW). Managing security in C4I systems is a challenge due to complexity and criticality of these systems. This paper elaborates design methodology to incorporate security in the C4I systems in systematic and consistent way instead of patching and random approach. The approach in this work exploits the opportunity provided by architecture frameworks (AF) to capture threats and devise security measures. Assurance cases have been used to model security of the C4I system in order to enhance the process of security design and overcome challenges. Key words: C4I systems, information security, Department of Defense Architecture Framework, assurance cases, interoperability.
- Published
- 2011
- Full Text
- View/download PDF
24. A novel vehicular SMS system (VSS) approach for Intelligent Transport System (ITS)
- Author
-
Iftikhar Ahmad, Irshad Ahmed Sumra, J. Ab Manan, Halabi Hasbullah, Mohsan Iftikhar, and Abdullah S. Alghamdi
- Subjects
Vehicular ad hoc network ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile computing ,Computer security ,computer.software_genre ,Effective solution ,Traffic system ,Cellular network ,Intelligent transport ,Mobile telephony ,business ,Road traffic ,computer - Abstract
Road accidents and traffic jams are common problems being the target of a lot of research works to be resolved in current traffic system. Vehicular Ad hoc Network (VANET) is commonly part of Intelligent Transport System (ITS) which is directly involved in handling these problems and aims to make journey on road comfortable. In this paper, vehicular SMS system (VSS) is proposed based on cellular network to provide VANET services to users through SMS system. It has the potential of being more cost effective solution as compared to VANET but needs further research to resolve its trust and privacy issues.
- Published
- 2011
- Full Text
- View/download PDF
25. Towards software engineering process for C4I systems
- Author
-
Tazar Hussain, Abdullah S. Alghamdi, and Khalid Al-Mutib
- Subjects
System of systems ,business.industry ,Process (engineering) ,Computer science ,Computer security ,computer.software_genre ,Information warfare ,Software development process ,Software ,Systems development life cycle ,Systems engineering ,Systems design ,Software system ,business ,computer - Abstract
Command Control, Communication Computer and Intelligence (C4I) systems enables modern military forces to achieve information superiority in the battlefield. C4I are complex System of systems (SOS) where individual systems interact locally to achieve global SOS behaviors. To build software for C4I systems conventional software engineering SwE process and practices have shortcomings and are not capable to support certain aspect of these systems. If C4I systems fail to operate as required due to the fact that SwE process was unable to fulfill its requirements, the consequences may not be tolerated because of the criticality of the mission of these systems in information warfare (IW). This paper highlights the distinguished characteristics and operational requirements of C4I systems which poses challenges to SwE process and practices. This paper also discuss the possible future research areas in order to enhance SwE process so that better software could drive these complex systems as required.
- Published
- 2011
- Full Text
- View/download PDF
26. Applying neural network to U2R attacks
- Author
-
Abdullah S. Alghamdi, Azween Abdullah, and Iftikhar Ahmad
- Subjects
Artificial neural network ,Network security ,business.industry ,Anomaly-based intrusion detection system ,Computer science ,Time delay neural network ,Robust random early detection ,Intrusion detection system ,Machine learning ,computer.software_genre ,Backpropagation ,Feedforward neural network ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Intrusion detection using artificial neural networks is an ongoing area and thus interest in this field has increased among the researchers. Therefore, in this paper we present a system for tackling User to Root (U2R) attacks using generalized feedforward neural network. A backpropagation algorithm is used for training and testing purpose. The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. The system is implemented in two phases such as training phase and testing phase. The developed system is applied to different U2R attacks to test its performance. Furthermore, the results indicate that this approach is more precise and accurate in case of false positive, false negative and detection rate.
- Published
- 2010
- Full Text
- View/download PDF
27. Selecting the best alternative SOA service bus for C4I systems using multi-criteria decision making technique
- Author
-
Abdullah S. Alghamdi, Iftikhar Ahmad, and Muhammad Nasir
- Subjects
Engineering ,Service (systems architecture) ,Operations research ,business.industry ,computer.internet_protocol ,Distributed computing ,Control (management) ,Enterprise integration ,Service-oriented architecture ,Multiple-criteria decision analysis ,Work (electrical) ,Fuse (electrical) ,business ,Software architecture ,computer - Abstract
A Service Bus is a distributed infrastructure used for enterprise integration. It resolves the problem of connecting heterogeneous C4I systems among various defense forces. The current work focuses on describing a detailed comparative analysis of three SOA service buses; Mule, Fuse and GlassFish for C4I systems using Multi-criteria Decision Making Technique (MCDM). In this paper, the phenomenon of selecting the best alternative is based on two criteria; main criteria and sub-criteria. The presented results may be used for integrating different C4I systems and can further assist enterprises in selecting a service bus in an optimized way.
- Published
- 2010
- Full Text
- View/download PDF
28. Evaluating neural network intrusion detection approaches using Analytic Hierarchy Process
- Author
-
Abdullah S. Alghamdi, Azween Abdullah, and Iftikhar Ahmad
- Subjects
Artificial neural network ,business.industry ,Computer science ,Anomaly-based intrusion detection system ,Analytic hierarchy process ,Neural network nn ,Intrusion detection system ,computer.software_genre ,Machine learning ,Outcome (game theory) ,Field (computer science) ,Intrusion ,Artificial intelligence ,Data mining ,business ,computer - Abstract
At present age, security in computer and network systems is a pressing concern because a solo attack may cause an immense destruction in computer and network systems. Various intrusion detection approaches be present to resolve this serious issue but the dilemma is which one is more appropriate in the field of intrusion. Therefore, in this paper, we evaluated and compared different neural network (NN) approaches to intrusion detection. This work describes the concepts, tool and methodology being used for assay of different NN intrusion detection approaches using Analytic Hierarchy Process (AHP). Further, conclusion on results is made and direction for future works is presented. The outcome of this work may help and guide the security implementers in two possible ways, either by using the results directly obtained in this paper or by extracting the results using similar mechanism but on different intrusion detection systems or approaches.
- Published
- 2010
- Full Text
- View/download PDF
29. An interoperability study of ESB for C4I systems
- Author
-
Iftikhar Ahmad, Abdullah S. Alghamdi, Muhammad Nasir, and Khalid A. Nafjan
- Subjects
System of systems ,Collaborative software ,business.industry ,Computer science ,computer.internet_protocol ,Interoperability ,Service-oriented architecture ,computer.software_genre ,Engineering management ,Enterprise system ,Enterprise service bus ,The Internet ,business ,Software architecture ,computer ,Computer network - Abstract
Ever since the inception of the idea of collaborating the enterprise systems, the need of an Enterprise Service Bus (ESB) has been a relentless need of the market, the bigger the systems get after collaboration the failures of the ESB's was inevitable. Things moved to more gravity when the bulkiest of the systems like Defense architectures came into picture, with the advent of this not of the efficiency but also the factors like stability, reliability, resource utilization were also of pivotal importance. This paper reviews a critical and comparative analysis of the current ESB's keeping in view the C4I System as a base, so as to ascertain which ESB fulfills the requirements of the system of systems. In comparison we try to analyze Mule ESB, GlassFish ESB and Fuse ESB with respect to interoperability. This study demonstrates that Mule is more feasible to C4I systems because it is simple, easy to integrate, no adopter requirement and flexible.
- Published
- 2010
- Full Text
- View/download PDF
30. Comparative Analysis of Defense Industry Frameworks for C4I System
- Author
-
Abdullah S. Alghamdi and Iftikhar Ahmad
- Subjects
Enterprise architecture framework ,business.industry ,Computer science ,Management science ,Process (engineering) ,UPDM ,Computer security ,computer.software_genre ,MODAF ,Field (computer science) ,Software ,Unified Modeling Language ,Information system ,business ,computer ,computer.programming_language - Abstract
The increase usage of C4I systems in defense and civil era had made it more imperative and attractive. Therefore, we can witness that the researchers, analysts, designers and developers had taken much interest in C4I systems. This paper describes a comparative analysis of defense industry frameworks such as DODAF, MODAF, NAF and UPDM. These frameworks had used in design and development process of defense information systems for instance, C4I systems. In this work, we used multi criteria software for comparative analysis of different defense industry frameworks. Further, results obtained by experiments are discussed. This effort done in this paper may be utilized by the researchers in two different possible ways, either by using the results directly obtained in this paper or by extracting the results by similar approach but on different architecture frameworks (AFs) in the field of C4I Systems.
- Published
- 2010
- Full Text
- View/download PDF
31. A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
- Author
-
Abdullah S. Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad, and Khalid Alnafjan
- Subjects
Cloud computing security ,business.industry ,Data security ,Computer security model ,Computer security ,computer.software_genre ,Communications security ,Security service ,Network Access Control ,Security convergence ,Network security policy ,Business ,computer ,Computer network - Abstract
The purpose of this paper is to suggest security assured data communications architecture in net-centric defense systems based on DoDAF 2.0. This architecture provides a finite security precision of network communication within the defense network like C4I System. In this proposed network communication architecture where security is being prioritized, we propose three security mechanism levels, the authentication level, the Business Rules Repository level & Security Rules Repository level and available techniques facilitating the functionality of the levels. Security can be coerced at every stage of the data transit. By utilization of various data security measures available, each level will substantiate the security of the data in the communication chain from end to end.
- Published
- 2010
- Full Text
- View/download PDF
32. Enhancing C4I Security Using Threat Modeling
- Author
-
Gul Faraz Khan, Abdullah S. Alghamdi, and Tazar Hussain
- Subjects
Security service ,Computer science ,Net-centric ,Threat model ,Information system ,Systems design ,Adversary ,Asset (computer security) ,Computer security ,computer.software_genre ,computer ,Threat - Abstract
C4I (command, control, communications, computer and intelligence) system is a complex system of systems that enables the military commander to achieve decision superiority by affecting adversary’s information and information based processes while protecting one‘s own information systems. Owing to the sensitivity of military information the security threats to C4I systems are real and growing therefore security is a major challenge in order to maintain integrity, confidentiality, availability and accountability. Different Models and architectures frameworks e.g. DODAF, CDSA have been proposed which decompose the detail structure of C4I systems however these models and frameworks do not provide mechanism to capture associated security risks and issues. Threat modeling is the process to understand different ways system can be attacked which helps towards secure system design and implement countermeasures. This paper suggests that using threat modeling could help to eradicate or reduce the effect of advancing threats to C4I systems. In this paper we also identify how security can be modeled in top down manner e.g. from architecture level to lower level of modeling so that countermeasures can be incorporated on system level rather than on bit by bit basis.
- Published
- 2010
- Full Text
- View/download PDF
33. Comparative Analysis of Intrusion Detection Approaches
- Author
-
Iftikhar Ahmad, Abdullah S. Alghamdi, and Azween Abdullah
- Subjects
Computer science ,business.industry ,Anomaly-based intrusion detection system ,Intrusion detection system ,Information security ,computer.software_genre ,Machine learning ,Field (computer science) ,Expert system ,Harm ,Pattern recognition (psychology) ,Data mining ,Artificial intelligence ,business ,Resource management (computing) ,computer - Abstract
Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented.
- Published
- 2010
- Full Text
- View/download PDF
34. Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
- Author
-
Abdullah S. Alghamdi, Iftikhar Ahmad, and Azween B. Abdulah
- Subjects
Engineering ,Artificial neural network ,business.industry ,Distributed computing ,Neural network architecture ,Adaptive security ,Intrusion detection system ,Data mining ,Intrusion prevention system ,business ,computer.software_genre ,computer ,Network activity - Abstract
The duty of securing networks is very difficult due to their size, complexity, diversity and dynamic situation. Currently applying neural networks in intrusion detection is a robust approach to ensure security in the network system. Further, neural networks are alternatives to other approaches in the area of intrusion detection. The main objective of this research is to present an adaptive, flexible and optimize neural network architecture for intrusion detection system that provides the potential to identify network activity in a robust way. The results of this work give directions to enhance security applications such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), check points and firewalls and further guide to the security implementers.
- Published
- 2010
- Full Text
- View/download PDF
35. Application of artificial neural network in detection of probing attacks
- Author
-
Iftikhar Ahmad, Abdullah S. Alghamdi, and Azween Abdullah
- Subjects
Artificial neural network ,Computer science ,Anomaly-based intrusion detection system ,business.industry ,Robust random early detection ,Intrusion detection system ,Perceptron ,Machine learning ,computer.software_genre ,Rprop ,Statistical classification ,Cyber-attack ,Artificial intelligence ,business ,computer - Abstract
The prevention of any type of cyber attack is indispensable because a single attack may break the security of computer and network systems. The hindrance of such attacks is entirely dependent on their detection. The detection is a major part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), check points and firewalls. Consequently, in this paper, we are contemplating the feasibility of an approach to probing attacks that are the basis of others attacks in computer network systems. Our approach adopts a supervised neural network phenomenon that is majorly used for detecting security attacks. The proposed system takes into account Multiple Layered Perceptron (MLP) architecture and resilient backpropagation for its training and testing. The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. The developed system is applied to different probing attacks. Furthermore, its performance is compared to other neural networks' approaches and the results indicate that our approach is more precise and accurate in case of false positive, false negative and detection rate.
- Published
- 2009
- Full Text
- View/download PDF
36. Application of artificial neural network in detection of DOS attacks
- Author
-
Iftikhar Ahmad, Abdullah S. Alghamdi, and Azween Abdullah
- Subjects
Internet Control Message Protocol ,Artificial neural network ,Computer science ,Anomaly-based intrusion detection system ,Denial-of-service attack ,Intrusion detection system ,Data mining ,Intrusion prevention system ,Perceptron ,computer.software_genre ,Rprop ,computer - Abstract
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, very inevitable. Precise detection is very important to prevent such losses. Such detection is a pivotal part of any security tools like intrusion detection system, intrusion prevention system, and firewalls etc. Therefore, an approach is provided in this paper to analyze denial of service attack by using a supervised neural network. The methodology used sampled data from Kddcup99 dataset, an attack database that is a standard for judgment of attack detection tools. The system uses multiple layered perceptron architecture and resilient backpropagation for its training and testing. The developed system is then applied to denial of service attacks. Moreover, its performance is also compared to other neural network approaches which results more accuracy and precision in detection rate.
- Published
- 2009
- Full Text
- View/download PDF
37. A Novel Interaction Technique for Transferring Files between Smartphones and Public Displays
- Author
-
Abdullah S. Alghamdi, Achraf Gazdar, and Lyan Al-Wakeel
- Subjects
020203 distributed computing ,Focus (computing) ,Distributed Architecture ,Multimedia ,Computer science ,media_common.quotation_subject ,Public displays ,020207 software engineering ,02 engineering and technology ,Interaction technique ,Pervasive Computing ,computer.software_genre ,Upload ,Smartphones ,File sharing ,Web Technology ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,Interaction Techniques ,Function (engineering) ,computer ,General Environmental Science ,media_common - Abstract
In recent years, public displays (PDs) have become an increasingly significant mechanism of mass communication. So far, many of PDs do not provide a means of interaction acting only act as output devices that present information. On the other hand, smartphones have become increasingly popular due to their number of users, inherent properties and power. It has been argued that digital information is required for most meetings, whether formal or informal. With technological improvement and the growing of the ubiquity of both PDs and smartphones, streaming data between devices should be done smoothly in formal or informal meetings. While many possibilities exist for communication between such devices, file sharing in these scenarios is still restricted. These solutions also focus only on new mechanisms for interaction with PDs and ignore PDs’ primary function of displaying information. To solve this problem, we present a novel technique that allows users to transfer different types of files while preserving the security of these files. The technique will be particularly used to transfer files from smartphones to PDs in various kinds of meetings. The system combines both traditional uses of PDs (such as displaying announcements) and interactive ways of giving real-time presentations by uploading files, marking important parts of pages and writing notes. The findings imply that a majority of users are ready to use the system. Furthermore, the systems's performance evaluation results are very encouraging and reveal that the deployed tool is an effective method that can be a reasonable alternative to using projectors.
- Full Text
- View/download PDF
38. A Review of Evaluation Methods and Techniques for Simulation Packages
- Author
-
Abdullah S. Alghamdi, Iftikhar Ahmad, and Yasmeen Alomair
- Subjects
Multicriteria Decision Making Technique ,business.industry ,Computer science ,Process (engineering) ,Management science ,Evaluation Method ,computer.software_genre ,Simulation software ,and Evaluation Framework ,Simulation Packages ,Assessment methods ,Evaluation methods ,Systems engineering ,General Earth and Planetary Sciences ,business ,computer ,Risk management ,General Environmental Science - Abstract
Given the varied benefits of using the simulation packages such as; cost efficiency, time, risk mitigation, greater insights and user friendliness of systems. It has been extensively used in many application domains such as defense, airports, manufacturing, engineering, and healthcare. Currently, due to the increasing numbers of simulation software packages available in the market, it is often challenging to choose a suitable package that meets users’ demands. Researchers have leveraged many assessment methods and techniques to facilitate the evaluation and selection process of the simulation packages. This paper provides a survey corroborated from researcher's contributions to simplify the selection process of simulation packages. Also, discerns the evaluation methods and techniques for simulation packages found in the literature.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.