Abid Khan. December, 2012-to Date Politecnico De Torino, Italy
|
|
- Beatrix Dorsey
- 5 years ago
- Views:
Transcription
1 Abid Khan Personal Data Place of Birth: Address: Skype ID: Research Interests Peshawar, Pakistan Dept. of Computer Science,COMSATS Inst. of IT, Islamabad, Pakistan abidkhan.hit Cryptography application in security & privacy issues of distributed computing (including cloud computing, smart grids,p2p, D2D, IoT), secure provenance, genomic privacy Education Politecnico De Torino, Italy PostDoc Fellow December December 2011 Harbin Institute of Technology, Harbin, P.R.China Ph.D. Candidate, Computer Science, October 2004 to April 2008 Dissertation Topic: Secure Mobile Agent Computation Advisor: Prof. Xiamu Niu Quaid e Azam University, Islamabad, Pakistan M.Sc., Computer Science, 2002 Punjab University,Lahore, Pakistan B.SC, Mathematics and Physics,1999 Academic Experience CIIT, Islamabad, Pakistan Assistant Professor December, 2011-to Date CIIT, Islamabad, Pakistan As Incharge Graduate Programs responsible for managing all graduate programs related activities such as: students admission interviews, counseling graduate students, coordinating with faculty & students in MS/PhD Thesis related activities etc. December, 2012-to Date Politecnico De Torino, Italy PostDoc Fellow December December 2011 CIIT, Islamabad, Pakistan Assistant Professor April December, 2009 Taught graduate level courses of Cryptography,Design and Analysis of Algorithms. Responsible for lectures, exams,homework assignments, and grades. Lecturer July October 2004 Talks Given Secure Provenance in perspective: Issues and Challenges Invited talk given at Bahria University, 24th Dec Provenance in O 2 Invited Speaker at 5th ALICE/CERN ITS upgrade, MFT and O2 Asian Workshop,Wuhan,China, June 7-9, 2015.
2 Cloud Computing Security Issues and Challenges Invited Speaker at Bahria University, Islamabad, Pakistan,26th Dec, Security modeling of authentication mechanism of cloud computing using Petri Nets Invited Speaker at Pak-China Workshop on Network Security, organized by Pakistan Academy of Sciences, July Secure Mobile Agent Computation, given to e-security Lab at Politecnico De Torino,Italy, Feb Teaching Some of the courses which i taught recently are: 1. Cryptography Essentials (Spring 2017) 2. Public Key Cryptography (Spring 2017, 2016,2015,Fall 2014, Spring 2014,Fall 2013,Spring 2012) 3. Advance Algorithms Analysis (Fall 2015, Spring 2015,Fall 2014, Spring 2014,Fall 2013,Spring 2012) 4. Distributed System(Fall 2015, Spring 2015,Fall 2014, Spring 2014,Fall 2013,Fall 2011) 5. Cryptography and Network Security(Spring 2013) 6. Advance Topics in Mathematical Modelling (Spring 2012) 7. Cloud Computing Security and Privacy (Fall 2012) 8. Data Structures and Algorithms (Spring 2004) 9. Advanced Software Engineering(Fall 2002,Spring 2003) 10. Object Oriented Programming(Spring 2004,Fall 2003) 11. Introduction to Programming using Java(Spring 2003,Fall 2003) Students Supervision Graduated 1. Muzna Tahir(MS CS) Set Aggregation based Secure Data Aggregation in Smart Grids (Thesis Defended June, 2016) 2. Umber Sheikh(MS CS) Root Cause Analysis using Graph based inference (Thesis Defended June, 2016) 3. Usman Shafique(MS Information Security) Towards detection of Rank Attack in Routing Protocol for Low Power Lossy Network (IOT Security) (Thesis Defended June, 2016) 4. Faiqa Maqsood(MS CS) False Data Injection in Smart Grids (Thesis Defended June, 2016) 5. Bilal Ahmed(MS CS) Ontology based inferencing in large scale Provenance (Thesis Defended June, 2016) 6. Abdul Waheed(MS CS) Rule based inferencing in large scale Provenance (Thesis Defended June, 2016) 7. Khizar (MS CS), Research topic: A Zero Watermarking for data integrity protection in wireless sensor networks,thesis Defended (January, 2016) 8. Muhammad Ahmed (MS Information Security), Research topic: Towards a multi-agent Based Approach for Geo-location Assurance in Cloud Computing,Thesis Defended (January, 2016)
3 9. Muhammad Tayyab (MS Information Security), Research topic: A Fingerprinting Based approach for Illegal copy detection for Geo-location of Cloud Data.,Thesis Defended (January, 2016) 10. Kinza Sarwar (MS Information Security) Secure Logging as a service using a Zero Watermarking approach, Thesis Defended (January, 2016) 11. Samia Rehman (MS Information Security), Research topic: MATE in the Cloud-Secure Data Deletion on full compromised of cloud using proof of availability(poa),thesis Defended (June, 2015) 12. Anam Ahsan (MS Information Security), Research topic: An Ontology based approach for genomic privacy, Thesis Defended (June, 2015) 13. Haseeb Ahmed (MS Information Security), Research topic: Attribute based access control for outsourced provenance graph Thesis Defended (June, 2015) 14. Fuzel Jamil(MS CS), Research topic: Secure Provenance Storage Using Authenticated Data Structure, Thesis Defended (June, 2015) 15. Rehana Haider(MS CS), Research topic: A Secure Provenance Provenance Scheme using Provable Data Possession(PDP), Thesis Defended (June, 2015) 16. Ishtiaq Ahmed (MS CS), Research topic: A Model for generating unified format logs and provenance using RDF,Thesis Defended (June, 2015) 17. Usama Saleem (MS CS), Research topic: Towards Fault tolerant URL Filtering,Thesis Defended (June, 2015)(co-supervised with Dr.Mansoor) 18. Saba Noor (MS CS), Research topic: A ontology based approach to detect genomic privacy attacks,thesis Defended (June, 2015)(co-supervised with Dr.Mansoor) 19. Farah Naz(MS CS),Watermarking as a Service(WaaS) with Anonymity,Thesis Defended (Feb, 2015) 20. Sidra tul Muntaha(MS CS),Preserving Privacy of Outsourced Genomic Data,Thesis Defended (Feb, 2015) 21. Nasir Khan(MS CS),URL Filtering as a Big Data Problem,Thesis Defended (Feb, 2015) 22. Faheem Zafar(MS CS), Thesis Title: A Scalable Data Integrity Mechanism Based on PDP and JARs,Thesis Defended (June,2014) 23. Ayaaz Ahmed(MS CS), Thesis Title: Secure Logging as a service using Reversible Watermarking, Thesis Defended (January,2014) 24. Kashif Riaz(MS CS)(Co-Supervised with Dr.Mansoor Ahmed), Thesis Title : Ontology based framework for URL Filtering and Blocking, Thesis Defended (January,2014) 25. Amil Rohani Dar(MS Computer Science)(Co-Supervised with Dr.Mansoor Ahmed), Thesis Title: Medel Dewey Decimal Classification Scheme Using OWL Ontology for CIIT Library, Thesis Defended (January,2014) 26. Mubashira Nasir,(MS Information Security) (Co-Supervised with Dr. Adeel Anjum), Thesis Title: Privacy Preservation of Skewed Data, Thesis Defended (June 2016) 27. Muhammad Nazim,(MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title: Ontologybased approach for detecting Semantic Web attacks, Thesis Defended (June 2016) 28. Saleha Shafqat, (MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title: An Ontology-Based approach for detecting Drug Abuse Epidemiology, Thesis Defended (December 2015) 29. Amber Abid,(MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title:Ontologybased approach for detecting System Errors using Logs, Thesis Defended (December 2015)
4 30. Mubashar Hassan, (MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title:Ontologybased approach for multilingual URL filtering/blocking,thesis Defended (December 2015) 31. Muhammad Haseeb and Wajahat Munir(BS Computer Science), mobile agent based query execution for data management in cloud computing 32. Mubashira Nasir and Madiha Masood(BS CS), Suspicious activity detection (Spring 2013) 33. Arsalan Ahmed and Omer Akbar (BS Computer Science), security as a service for smart phones (Spring 2014) 34. Hassan Nadeem, Shahid A. Khan(BS Software Eng), Volunteer Computing on Android Devices,Spring M. Wajih ul Murtaza, Bilal Najeeb(BS CS), Provenance as a Service(PraaS), Spring 2016 In-Progress 1. Faheem Zafar (PhD), Research Topic: Security and Privacy of Cloud Data Storage (Since Fall 2014). 2. Idrees Ahmed (PhD) Research Topic: Provenance Chain Security 3. Hayat Khan(PhD), Research Topic: Cloud Forensics 4. Furqan Shahid(PhD),Research Topic: Garbled Computing 5. Ali Ahmed(PhD),Research topic: Security Ontologies (Co-supervised with Dr.Mansoor Ahmed Since Fall 2014) Journal Publications 1. Adeel Anjum, Abid Khan, Mansoor Ahmed, Masoom Alam et al. τ-safety: A Privacy Model for Sequential Publication with Arbitrary Updates, Computer & Security:Elsevier Volume 66, May 2017, Pages Anam nazir, Sai rehmanmalik, Nadeem Cheema, Muhammad Khurram Khan, Ziang Yang, Tanveer Khan, and Abid Khan A High-Level Domain-specific Language for SIEM: Design, Development and Formal Verification, Cluster Computing:Springer, 2017 (Accepted IF=1.514) 3. Faheem Zafar, Abid Khan, Mansoor Ahmed et al. A Survey of Data integrity schemes: Taxonomy, design challenges and future trends, Computer & Security:Elsevier Volume 65, March 2017, Pages 29 49, (IF 1.640) 4. Abid Khan, Sidra Tul Muntaha, Mansoor Ahmed, Adeel Anjum, Saif Ur Rehman, and Nadeem Javaid, Preserving Privacy and leakage protection of Outsourced Genomic Data Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 5. Saleha Shafqat, Mansoor Ahmed, Abid Khan et al., An Ontology-Based Approach for Detecting Drug Abuse Epidemiology, Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 6. Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail, Mansoor Ahmed and Sarfaraz Nawaz, Buyer Seller Watermarking Protocols Issues and Challenges - A Survey, Journal of Network and Computer Applications: Elsevier Volume(75):pp: , Nov 2016 (IF=2.331) 7. Nadeem Javaid, Sheraz Hussain, Ashfaq Ahmad, Muhammad Imran, Abid Khan, Mohsen Guizan, Region based cooperative routingin underwater wireless sensor networks, Journal of Network and Computer Applications, (IF=2.331)
5 8. Mariam Akbar, Nadeem Javaid, Wadood Abdul, Sanaa Ghouzali, Abid Khan, Iftikhar Azim Niaz, Manzoor Ilahi, Balanced transmissions based trajectories of mobile sink in homogeneous wireless sensor networks, accepted in Journal of Sensors,IF= Saba Noor, Mansoor Ahmed, Abid Khan et al., An Ontology-Based Approach for Detecting Attacks on Genomic Data, Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 10. Adeel Anjum, Saba Suhail, Faheem Zafar, Abid Khan, Privacy Preservation in Skewed Data using Frequency Distribution and Weightage (FDW), Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 11. M. Alam, A.Ihsan, Abid Khan,Muazzam Ali et al., Optimizing SIEM Throughput on the Cloud Using Parallelization, PLOS ONE Nov, (IF=3.54) 12. Faheem Zafar,Abid Khan, Mansoor Ahmed, Majid Iqbal Khan, Farhana Jabeen, Zara Hamid, Naveed Ahmed and Faisal Bashir, A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs, KSII Transactions on Internet and Information Systems, vol. 10, no. 6, pp , DOI: /tiis (IF 0.537) 13. Faisal Bashir, Meer Khan,Ali Lodhi, Abid Khan, Sink-to-sink coordination framework using RPL: Routing protocol for low power and lossy networks, Journal of Sensors Vol.2016(2016) (IF 1.182). 14. Ashfaq Ahmad, Nadeem Javaid, Nabil Alrajeh, Zahoor Ali Khan, Umar Qasim, and Abid Khan, A Modified Feature Selection and Artificial Neural Network-Based Day-Ahead Load Forecasting Model for a Smart Grid, Applied Sciences(Special Issue Applied Artificial Neural Network ), 2015, 5(4), ; doi: /app , (IF 1.484) 15. Mukhtar Azeem, Majid Iqbal, Najamus Saqib,Manzoor Illahi, Abid Khan, and Mansoor Ahmed et al Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE , Mathematical Problems in Engineering Volume 2014 (2014), (IF 1.082) 16. Sidra Faheel, Munam Ali Shah, Abid Khan,Mansoor Ahmed, Smart Cities: A Survey on Security Concerns, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, Saba Arshad, Munam Ali Shah, Abid Khan,Mansoor Ahmed, Android Malware Detection and Protection: A Survey (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, D. Mahmood, N. Javaid, Z. A. Khan, U. Qasim, A. Khan, S. Qurashi, A. Memon, Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols,Journal of Basic and Applied Scientific Research, 2013(ISI-Index) 19. Mahmood, D.; Javaid, N.; Qasim, U.; Khan, Z. A.; Khan, A.; Qurashi, S.; Memon, A, Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols,Journal of Basic and Applied Scientific Research, 2013(ISI-Index) 20. A. Khan, X. Niu and Z. Yong, A Hybrid Approach for Mobile Agent Security using Reversible Watermarking and Dynamic Data Structure IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.1, January 2007 Pages: ISSN: X. Niu, A. Khan et al. Benchmarking Survey of Mobile Agent Systems, Source: Tien Tzu Hsueh Pao/Acta Electronica Sinica, v 33, n SUPPL, December, 2005, Pages: ISSN: Publisher: Chinese Institute of Electronics, Beijing, ,China (EI: Accession Number: ) 22. A. Khan, X. Niu and Z. Yong, Mobile Agent Computation Results Protection with Head Sealing, IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.2, No.1, January 2008 Pages: ISSN:
6 23. A.Khan, X. Niu and Z. Yong, A Robust Framework for protecting Computation Results of Mobile Agents, Information Technology Journal 7(1): (EI Index) Conference Publications 1. Saba Suhail, Zuhaib ud din, Faheem Zafar, Abid Khan, Choong Seon Hong, Introducing Secure Provenance in IoT: Requirements and Challenges International Workshop on Secure Internet of Things(SIoT 2016), held in Conjunction with European Symposium on Research in Computer Security(ESORICS 2016), Crete - Greece. 2. Khizar, Muhammad Saleem Khan, Abid Khan, and Zuhaib Uddin Ahmad, A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks, IEEE international conference on network based information system (NBiS 2016) Ostrava, Czech Republic. 3. Muhammad Saleem Khan, Idrees Ahmed, Abid Khan, Majid. I. Khan Adaptive Reputation Weight Assignments Scheme for MANETs, (IEEE TrustComm-2016),Beijing,China. 4. Idrees Ahmed, Abid Khan, Muhammad Saleem Khan, Mansoor Ahmed, Aggregated Signatures for Chaining: A Secure Provenance Scheme, in 1st IEEE International Workshop on Security and Privacy in Advanced Persistent Threat (SPAPT 2016) held in conjunction with IEEE TrustComm-2016, Beijing,China. 5. A. Waheed and M. Ali Shah and Abid Khan, Secure login protocols: An analysis on modern attacks and solutions,in Proceedings of IEEE 22nd International Conference on Automation and Computing (ICAC), pp ,Colchester, UK, Sept Bilal S.Raja,Ahmed Ali,Mansoor Ahmed, Abid Khan et al., Semantics enabled role based sentiment analysis for drug abuse on social media: A framework, IEEE Symposium on Computer Applications Industrial Electronics (ISCAIE), , 2016, Penang, Malaysia. 7. M. Ahmed, A. Khan et al, Ontology-based solution for managing license agreement using Semantic Desktop,The Fifth International Conference on Collaborative Computing ARES 2010, proceedings. 8. Abid Khan, Q. Arshad, X. Niu, W. Anwar, Z. Yong, On the Security Properties of Mobile Agent Graph Head Sealing(MAGHS), IEEE International Conference on Information Security and Assurance(ISA 2009,Springer- Verlag LNCS : Pages ) 9. Abid Khan, N.Khan, W. Anwar, M. Ahmed, Mobile Agent Watermarking: Security Properties and attacks revisited, ACM FIT 2009 Proceedings. 10. A.N.Khan, X.Sha, W.Anwar, Abid Khan, Performance Analysis of Prioritized and Non Prioritized Handoff Call Queuing Schemes in Mobile Cellular Networks, ACM FIT 2009 Proceedings. 11. Abid Khan, U. Sharif, M. Ahmed, A.N.Khan, CLUSMA:A Mobile Agent based clustering middleware for Wireless Sensor Networks ACM FIT 2009 Proceedings 12. A.N.Khan, A.Khan, et al, Performance Analysis of Prioritized and Un-Prioritized Handoff Queuing Schemes in Cellular Mobile Networks ACM FIT 2009 Proceedings 13. Abid Khan, X. Niu and Z. Yong, On the Security Properties and attacks against Mobile Agent Watermark Encapsulation(MAWE) IEEE International Conference on System, Man and Cybernetics,(IEEE SMC 2008)(EI Index) 14. Abid Khan, X. Niu, Z. Yong Protecting Mobile Agent Computation results with reversible watermarking and digital signature. IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IEEE IIHMSP 2007),IEEE Computer Society, Pages (EI Index) 15. Z. Yong, X. Niu, A. Khan et al. A Novel Method of Watermarking Relational Databases Using Character String. IASTED International Conference on Artificial Intelligence and Applications, IASTED AIA 2006, Innsbruck Austria: (EI Index)
7 Articles Submitted 1. Masoom Alam, Tanveer Khan, Naina, Abid Khan, Privacy Aware Cross Tenant Access Control using Garbled Computing in the Cloud, IEEE Trans. on Information Forensics and Security 2. Mouzna Tahir, Abid Khan, Masoom Alam et al., Towards a Set Aggregation-Based Data Integrity Scheme for Smart Grids, annals of Telecommunications, Springer. 3. Usman Shafique, Abdur Rehman, Abid Khan, Faisal Bashir, Wadood Abdul and Sanaa Ghouzali, Towards detection of rank attack in routing protocol for low-power lossy network, IEEE Access 4. Idrees Ahmed, Abid Khan, Saif ur Rehman, Nadeem Javaid, Mohsen Guizani, Order Preserving Secure Provenance Scheme For Distributed Networks, IEEE Trans. on Information Forensics and Security 5. Shamaila Bisma Khan,Saif-ur-Rehman Malik, Masoom Alam, Abid Khan, Adnan Akhunzada, Muhammad Khurram Khan, Formal Modeling and Verification of Security Information and Event Management System Submitted to Springer Multimedia Tools and Application: Special Issue on Big Data Security 6. Masoom alam, Abid Khan et al., Interoperable ERP Systems: A Technical Implementation in OpenERP, PLOSONE 7. Abid Khan, Kinza Sarwar, Mansoor Ahmed, Saif ur Rehman, Abdul Hameed, Nadeem Javaid, Adeel Anjum, Secure Logging Schemes: Taxonomy, Design Challenges and Future Trends, IEEE Trans. on Information Forensics and Security M Junaid Shabbir, Najam-us-Saqib, Adeel Anjum, Saif U. R. Malik, Naveed Ahmed, Abid Khan, and Mansoor Ahmed, A Dual Signature-based Secure Internet E-Voting System, IEEE Security and Privacy, Abid Khan, Muhammad Tayyab, Muhammad Ahmed, Abdul Hameed and Mansoor Ahmed, A Survey of Geolocation Assurance schemes: taxonomy, design challenges, and future trends P2P Networks and applications: SI(Springer) Umber Sheikh, Bilal Ahmed, Waheed Ahmed, Abid Khan, Mansoor Ahmed, Abdul Hameed, A Comparative Analysis and Taxonomy of Provenance Inference Applications, Tools, and Techniques, Elsevier: Journal of Systems & Softwares 11. Idrees Ahmed, Abid Khan, Mansoor Ahmed et al. Towards an Order Preserving Secure Provenance Scheme For Distributed Networks Computer & Security Article 2016 Submitted 12. Khizar, Abid Khan,Abdul Hameed,Masoor Ahmed, Zuhaibud din, Nadeem Javaid, Aun Haider, A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks JNCA: Elsevier K.Riaz, Abid Khan, Mansoor Ahmed Developing Web Filtering Ontology using protege OWL Tool Journal of Web Semantics Article K.Riaz, Abid Khan, Mansoor Ahmed Ontology based Framework for URL Filtering and Blocking Journal of Data Semantics,Springer K.Riaz, Abid Khan, Mansoor Ahmed A Survey of URL Filtering and Blocking JNCA: Elsevier Muhammad Hussain, Mansoor Ahmed and Abid Khan, Multi-Lingual URL Filtering: an Ontology-based approach Journal of Web Semantics, Saleha Asad, Mansoor Ahmed, Abid Khan and Amber Abid An Ontology-Based Approach for Detecting Drug Abuse Epidemiology, Journal of Biomedical Informatics, 2016
8 18. Farhana Khan,Abid Kan et al. Trust and reputation in e-health systems Health Info. Journal, K.Riaz, A.Khan, M.Ahmed,R.Usman Developing Web Filtering Ontology using protege OWL Tool, Journal of Web Semantics,Elsevier (Submitted) 20. K.Riaz, Abid Khan, M.Ahmed,R.Usman Ontology based Framework for URL Filtering and Blocking, Journal of Data Semantics,Springer (Submitted) 21. K.Riaz, Abid Khan, M.Ahmed,R.Usman A Survey of URL Filtering and Blocking, Journal of Network and Computer Applications,Elsevier (Submitted) Computer Skills Programming Experience in Java Applications: Generic Mapping Tools (GMT) - Unix mapping software, L A T E X, common Windows database, spreadsheet, and presentation software Operating Systems: Unix/Linux, Windows. MIRACL Library for Elliptic Curve Cryptography Bouncy Castle Provider for Cryptographic functions Languages English: Fluent Italian: Basic(willing to learn & improve) Chinese: Good listening and speaking skills(willing to learn & improve) References 1. Dr. Mansoor Ahmed, Assistant Professor Department of Computer Science, CIIT, Islamabad, Pakistan mansoor@comsats.edu.pk 2. Dr. Adeel Anjum, Assistant Professor Department of Computer Science, CIIT, Islamabad, Pakistan, adeel.anjum@comsats.edu.pk 3. Dr.Masoom Alam, Associate Professor Department of Computer Science, CIIT, Islamabad, Pakistan, masoom.alam@comsats.edu.pk 4. Dr.Nadeem Javaid, Associate Professor Department of Computer Science, CIIT, Islamabad, Pakistan, nadeemjavaid@comsats.edu.pk 5. Dr. Waqas Anwar, Associate Professor, Department of Computer Science, CIIT, Lahore, Pakistan, waqas@ciit.net.pk 6. Prof.Dr. ZheMing Lu, Professor, Zhejiang University, Hangzhou, P.R.China zhemingl@yahoo.com
Progress ICT TRG 2016~17. Team Lead: Dr Sajjad A. Madani Presented by Prof Dr Izhar Hussain
Progress ICT TRG 2016~17 Team Lead: Dr Sajjad A. Madani Presented by Prof Dr Izhar Hussain 1 Flow of Presentation 1. Research Theme 2. Projects and Progress 3. Way Forward 2 Original Research Themes e-solutions
More informationDr. SHERAZ ANJUM (MSc PhD MIET CEng)
Dr. SHERAZ ANJUM (MSc PhD MIET CEng) drsheraz@comsats.edu.pk House CB-758/A, Abdullah Street, Near Quba Market, Lane # 5, Peshawar Road, Rawalpindi Qualification PhD Engineering Microelectronics and Solid-State
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationDr. Muhammad Mubashir Khan
Dr. Muhammad Mubashir Khan Associate Professor (Approved PhD Supervisor of Higher Education Commission Pakistan) Department of Computer Science & IT, NED University of Engineering & Technology, University
More informationName: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems
Name: Prof. Dr. Iftikhar Hussain Designation: Vice Chancellor Department: Industrial Engineering Specialization: Flexible Manufacturing Systems Email: iftikhar@uetpeshawar.edu.pk Area of Interest: Design,
More informationIdris Mala. Qualification. Area of Specialization. Contact Information: Ext.: 3035
Idris Mala Contact Information: Email: imala@uit.edu Ext.: 3035 Qualification ME (Telecom) UIT HU 2006 MS (Info. Tech.) Hamdard University 2002 BE (Electrical) NEDUET 1984 Area of Specialization Database
More informationIJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby
Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address
More informationMohsen Rezvani. Curriculum Vitae
Mohsen Rezvani * Last modified: October 22, 2018. PERSONAL INFORMATION: Office Email Department of Computer Engineering, Shahrood University of Technology, Shahrood, Iran mrezvani@shahroodut.ac.ir, mohsen.rezvani@gmail.com
More informationFramework For Cloud Computing Networks Pdf
A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network
More informationCURRICULUM VITAE. June, 2013
CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il
More informationSermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer.
Objective: With sound technical knowledge as background and with innovative ideas, I am awaiting to work on challenging jobs that expose my skills and potential ability. Also looking for the opportunity
More informationBrian F. Cooper. Distributed systems, digital libraries, and database systems
Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree
Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3
More informationCPD ACTIVITIES CALENDAR FOR THE YEAR 2018
CPD ACTIVITIES CALENDAR FOR THE YEAR 208 PEB Name: PEB Reg. No. Name of PEB Coordinator: ACADEMY PEB-S-UET-0059 Prof. Rizwan U. Farooqui S. No. CPD Title. Hands on Training: Ansys Fluent 2. Performance
More informationRequest-Response Interaction Model in Constrained Networks
Request-Response Interaction Model in Constrained Networks Izaz Ahmad Khan 1 *, Muhammad Safdar 2, Farman Ullah 3, Syed Roohullah Jan 4, Fazlullah Khan 5, Sabir Shah 6 1,2,3,6 Department of Computer Science,
More informationEDUCATION RESEARCH EXPERIENCE
PERSONAL Name: Mais Nijim Gender: Female Address: 901 walkway, apartment A1 Socorro, NM 87801 Email: mais@cs.nmt.edu Phone: (505)517-0150 (505)650-0400 RESEARCH INTEREST Computer Architecture Storage Systems
More information17. Hussain, M. Z. & Jamaludin (2006), Postivity-preserving piecewise rational cubic interpolation, Matematika, Vol. 22(2), Hussain, M.
RESEARCH PROFILE:. Sarfraz, M. Butt, S. & Hussain, M. Z. (994), Interpolation for the positive data using rational cubics, Proc. ISOSS-IV August 27-3, Lahore, Pakistan, Vol. 8, 25-26. 2. Hussain, M. Z.
More informationDEPARTMENT OF COMPUTER SCIENCE
Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,
More informationNational University of Computer and Emerging Sciences, CFD Campus
National University of Computer and Emerging Sciences, CFD Campus From: INTER OFFICE MEMO 11-14/CFD-DR/006 November 12, 2014 Dr. Rana Muhammad Gufran Khan Incharge, Department of Electrical Engineering,
More informationCurriculum Vitae. Degree Grade/Division Major Subjects Institute
PERSONAL INFORMATION: Curriculum Vitae Name: Farhan Ullah Father s Name: Farid Ullah Nationality: Pakistani Marital Status: Married Date of birth: 01-04-1985 NIC: 17201-9456109-7 Email: farhankhan.cs@gmail.com
More informationSaint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.
Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationEnas El-Sayed Mohammed El-Sharawy
Enas El-Sayed Mohammed El-Sharawy Assistant Professor Computer Department Education Faculty Jubail Personal Data Nationality Egyptian Date of Birth 3 November 1984 Department Computer Science Official
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationJ. Haadi Jafarian CV June J. Haadi Jafarian
J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina
More informationPhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.
AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.
More informationPersonal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.
Personal Profile (1) Name of the teacher (in full): Ms. Sarika Vijay Purao (2) Department: (3) Designation: Assistant Professor (4) Qualifications of the teacher:- Degree/ Post Graduate Degree Examinatio
More informationACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology
ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session
More informationJ I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213
J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412
More informationFirst merit list for BS Microbiology
First merit list for BS Microbiology List of Candidates on Open Merit 1 11915 Maryam Wazir Attaullah Wazir mari.khan044@gmail.com OpenMeritSeats F R Bannu KPK SSC 853 1050 888 1100 Obtained NTS NAT 75
More informationBiodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),
Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date
More informationDetection of Missing Values from Big Data of Self Adaptive Energy Systems
Detection of Missing Values from Big Data of Self Adaptive Energy Systems MVD tool detect missing values in timeseries energy data Muhammad Nabeel Computer Science Department, SST University of Management
More informationCurriculum Vitae of Paolo Romano
Curriculum Vitae of Paolo Romano Personal Information Place and Date of Birth: Rome (Italy), 4 March 1979 Citizenship: Italian Office Address: Dipartimento di Informatica e Sistemistica Antonio Ruberti
More informationCURRICULUM VITAE. I. General Information Dr. Samiullah Khan
1 CURRICULUM VITAE I. General Information Name: Dr. Samiullah Khan Date & Place of Birth February 22, 1982, Lakki Marwat (KPK) Postal Address: Institute of Business Management Sciences University of Agriculture,
More informationMASTER OF ENGINEERING PROGRAM IN INFORMATION
MASTER OF ENGINEERING PROGRAM IN INFORMATION AND COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS (INTERNATIONAL PROGRAM) Curriculum Title Master of Engineering in Information and Communication Technology
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationSherenaz Waleed Al-Haj Baddar
Sherenaz Waleed Al-Haj Baddar s.alhajbaddar@gmail.coms.baddar@ju.edu.jo Personal Information Nationality: Jordanian Current Employer: King Abdullah II School for Information Technology, The University
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationKianoush GholamiBoroujeni Ph.D. in Computer Science
Kianoush GholamiBoroujeni Ph.D. in Computer Science Address: 1440 SW 104th Path, Apt 301 Miami, FL 33174. +1 (305)200-9577 kianooush@gmail.com Personal Webpage ABOUT ME HIGHLIGHTS...........................................................................................................
More information30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613)
30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613) 907-6109 http://www.sce.carleton.ca/~ufarooq ufarooq@sce.carleton.ca Umar FAROOQ Research Interests Distributed Systems, Large-Scale Multi-Organizational
More informationPayal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e
Payal Gulati House No. 1H-36, NIT, gulatipayal@yahoo.co.in Total Experience: 9.5 years E xp e r i e nc e Currently working as Assistant Professor (IT) in YMCA University of Science & Technology, since
More informationExperience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25
Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop
More informationFirst merit list for MPhil Islamiyat
Print General Meritlist First merit list for MPhil Islamiyat NOTE: The following candidates have been o ered admissions provisionally. The candidates are requested to print online fee challan using this
More informationA Survey on Resource Allocation policies in Mobile ad-hoc Computational Network
A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,
More informationCOCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D
More informationCollaborative Next Generation Networking
CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationA Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks
Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission
More informationPRGMEA (North Zone) Lahore Voters List
PAKISTAN READYMADE GARMENTS MANUFACTURERS & EXPORTERS ASSOCIATION (NORTH ZONE) LAHORE 1 2 3 4 5 6 7 8 M/s Ali Murtaza Associates (Pvt.) Ltd. 22-KM Off Ferozepur Road, Rohi Nala, Mauza Dolu Khurd. Tehsil
More informationMAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad FACULTY PROFILE 1. JNTUH REGISTRATION ID:
MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad 500 075 FACULTY PROFILE 1. JNTUH REGISTRATION ID: 60150405-003701 2. DATE OF BIRTH: 10-01-1982 3. DESIGNATION: Asst.Professor 4. YEARS OF EXPERIENCE:
More informationMS in Computer Sciences & MS in Software Engineering
SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences & MS in Software Engineering (2016-2017) DEPARTMENT OF COMPUTER SCIENCE Schema of Studies
More informationAnalysis of Query Processing and Optimization
Analysis of Query Processing and Optimization Nimra Memon, Muhammad Saleem Vighio, Shah Zaman Nizamani, Niaz Ahmed Memon, Adeel Riaz Memon, Umair Ramzan Shaikh Abstract Modern database management systems
More informationMaster Course in Computer Science Orientation day
Master Course in Computer Science Orientation day Info on the Department of Computer Science Ranked first (in its area) in 5-year Research Assessment by Ministry of University and Research 2013 e 2017
More informationM.S. in Information Systems
M.S. in Information Systems 1 M.S. in Information Systems (30 Credits) M.S. in Information Systems IS Core Courses IS 601 Web Systems Development 3 IS 663 System Analysis and Design 3 IS 631 Enterprise
More informationResults Winter Exam P r e s s Re le a s e
P r e s s Re le a s e Pakistan Institute of Public Finance Accountants (PIPFA) has declared its Results of Corporate, AGP, Punjab Government, PMAD & Public Sectors for Winter Exam-2015, held during 02
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationDr. Ehsan Ullah Munir
Dr. Ehsan Ullah Munir Senior Member IEEE Associate Professor / Head Department of Computer Science COMSATS Institute of Information technology Wah Cantt, Pakistan Cell: 0333-5428189, Email: ehsanmunir@comsats.edu.pk
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationProject Progress Report
ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationName: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing)
Name: S.Brindha Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Assistant Professor Grade I Area of specialization: B.E(ECE), M.E( &Networking) Ph.D(Pursuing) Radio over Fiber Networks Experience
More informationCURRICULUM VITÆ. Naama Kraus B.Sc. in Computer Science and Mathematics, Bar-Ilan University, Cum Laude GPA: 90.
CURRICULUM VITÆ Naama Kraus naamakraus@gmail.com Personal Information Home Address: 6 Trumpeldor Ave., Haifa, 32582, Israel Phone (Home): +972 4 8328216 Phone (Mobile): +972 55 6644563 Date of Birth: 29-APR-1974
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationResume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram
Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationMohamed Mahmoud Mahmoud Azab. Education: Ongoing research:
Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,
More informationEvolution of XML Applications
Evolution of XML Applications University of Technology Sydney, Australia Irena Mlynkova 9.11. 2011 XML and Web Engineering Research Group Department of Software Engineering Faculty of Mathematics and Physics
More informationInterconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks
Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks Inam Ullah Khan 1, Nazia Azim 2,Syed Bilal Hussain Shah, Yin Fuliang 4, Muhammad Sameen 5 1 Isra University, Islamabadad
More informationDr. Zheng Chang. Personal. Education and Qualifications. Professional Experience
Dr. Zheng Chang Assistant Professor (Tutkijatohtori, Docent) Faculty of Information Technology University of Jyväkylä P.O.Box 35(Agora), 40014 Jyväkylä, Finland Phone: +358 408054143 Email: zheng.chang@jyu.fi
More informationDoctoral School: József Hatvany Doctoral School for Computer Science and Engineering
University of Miskolc Faculty of Mechanical Engineering and Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering Name of the Study Program: Computer Science and Engineering
More informationVoid main Technologies
SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure
More informationJun Li, Ph.D. School of Computing and Information Sciences Phone:
Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/
More informationUNIVERSITY OF ENGINEERING & TECHNOLOGY LAHORE
UNIVERSITY OF ENGINEERING & TECHNOLOGY LAHORE 1 Power System Simulation Laboratory Venue: Ground Floor Department of Electrical Engineering (New Block) (Opposite Electronics Lab) Description This course
More informationMS in Electrical Engineering & MS in Computer Engineering
MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College
More informationComparative Analysis of GUI Testing vs. HCI: Applying on Information Systems
Proceedings of the 1st International Multi-Disciplinary Conference (IMDC), The University of Lahore, Gujrat Campus, PK, 23- Comparative Analysis of GUI Testing vs. HCI: Applying on Information Systems
More informationMSc entry onwards UCL UCL. Engineering Sciences
PROGRAMME SPECIFICATION Programme Specification MSc in Information Security Programme title: Final award (BSc, MA etc): (where stopping off points exist they should be detailed here and defined later in
More informationSTUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS
STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationInternational Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:
Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The
More informationPerformance Evaluation Analysis of Group Mobility in Mobile Ad hoc Networks
Performance Evaluation Analysis of Group Mobility in Mobile Ad hoc Networks Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Azeem Irshad, Muhammad Usman University Institute of Information
More informationWireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.
Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education
More informationSecurity in sensors, an important requirement for embedded systems
Security in sensors, an important requirement for embedded systems Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer AISEC Institute for Applied
More informationQUALIFICATION HIGHLIGHTS
MUHAMMAD ZUBAIR School of Information and Communication Engineering Dalian University of Technology, Dalian, China E-mail: m.zubairpaf@gmail.com, Mobile: 008615998557184 PhD Scholar Telecommunication expert
More informationDr. Muhammad Qaiser Saleem
Dr. Muhammad Qaiser Saleem Postal address: H. No. G 103, Street 3 Phase 4, Officers Colony, Wah Cantt, Rawalpindi, Punjab,. Personal Particulars IT Experience: Date of Birth: Marital Status: Nationality:
More informationDr. Spencer Sevilla Postdoctoral Researcher, University of Washington
Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University
More informationDR. UMMA HANY. Current Status: Education: Career Summary:
DR. UMMA HANY Address: House No. 20, Road No. 18, Sector-11, Uttara, Dhaka-1230 Mobile : +8801712002418 e-mail : ummahany@baiust.edu.bd; ummahany@gmail.com. Current Status: Associate Professor and Head
More informationAn Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage
, pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2
More informationThe 2018 (14th) International Conference on Data Science (ICDATA)
CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International
More informationDepartment of Computer Science
Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer
More informationMuhannad Al-Jabi Personal Profile
Muhannad Al-Jabi Personal Profile Curriculum vitae Personal details Surname Forename Email address Contact phone number Al-Jabi Muhannad Computer Engineering Department Nablus Palestine mjabi@najah.edu
More informationThesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel
Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/
More informationCURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela
CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)
More informationDr. Ahmed K. Sadek 2. Experience
Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School
More informationGateway Based WSN algorithm for environmental monitoring for Energy Conservation
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 Gateway Based WSN algorithm for environmental monitoring for Energy Conservation Arunesh Kumar Singh 1, Arjun Kumar
More information