Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Hussein Al-Bahadili
Total Records ( 4 ) for Hussein Al-Bahadili
  Shakir M. Hussain and Hussein Al-Bahadili
  The password-based authentication is widely used in client-server systems. This research presents a non-exchanged password scheme for password-based authentication. This scheme constructs a Digital Signature (DS) that is derived from the user password. The digital signature is then exchanged instead of the password itself for the purpose of authentication. Therefore, we refer to it as a Password-Based Digital Signature (PBDS) scheme. It consists of three phases, in the first phase a password-based Permutation (P) is computed using the Key-Based Random Permutation (KBRP) method. The second phase utilizes P to derive a Key (K) using the Password-Based Key Derivation (PBKD) algorithm. The third phase uses P and K to generate the exchanged DS. The scheme has a number of features that shows its advantages over other password authentication approaches.
  Shakir M. Hussain and Hussein Al-Bahadili
  This study presents a new efficient password-based strong key derivation algorithm using the key based random permutation the KBRP method. The algorithm consists of five steps, the first three steps are similar to those formed the KBRP method. The last two steps are added to derive a key and to ensure that the derived key has all the characteristics of a strong key. In order to demonstrate the efficiency of the algorithm, a number of keys are derived using various passwords of different content and length. The features of the derived keys show a good agreement with all characteristics of strong keys. In addition, they are compared with features of keys generated using the WLAN strong key generator v2.2 by Warewolf Labs.
  Khalid Kaabneh , Azmi Halasa and Hussein Al-Bahadili
  Problem statement: One of the major issues in current reactive routing protocols for Mobile Ad Hoc Networks (MANETs) is the high bandwidth and power consumptions during the routing process. In this study, we proposed and evaluated the performance of an efficient Location-Based Power Conservation (LBPC) scheme for MANETs. Approach: In this scheme, the transmitting node utilized the location-information of the first-hop neighbors to adjust its radio transmission range according to one of the following criteria: Farthest first-hop neighbor, average distance of the first-hop neighbors and a random distance between the nearest and the farthest first-hop neighbors. Results: A number of simulation were carried-out to evaluate the power conservation ratio that can be achieved for two route discovery algorithms, namely, pure flooding and Location-Aided Routing Scheme 1 (LAR-1) algorithms. Conclusion: The simulation results demonstrated that the scheme can provide power conservation ratios between 10-50% without adding any extra overheads or complexity to the routing algorithm.
  Ghassan F. Issa , Shakir M. Hussain and Hussein Al-Bahadili
  Problem statement: The introduction of Information Technology (IT) to government institutions in developing countries bears a great deal of risk of failure. The lack of qualified personnel, lack of financial support and the lack of planning and proper justification are just few of the causes of projects failure. Study presented in this study focused on the justification issue of IT projects through the application of Cost Benefit Analysis (CBA) as part of a comprehensive Economic Efficiency Analysis (EEA) of IT Projects, thus providing management with a decision making tool which highlights existing and future problems and reduces the risk of failure. Approach: Cost-Benefit Analysis (CBA) based on Economic Efficiency Analysis (EEA) was performed on selected IT projects from ministries and key institutions in the government of Jordan using a well established approach employed by the Federal Government of Germany (KBSt approach). The approach was then modified and refined to suit the needs of developing countries so that it captured all the relevant elements of cost and benefits both quantitatively and qualitatively and includes a set of guidelines for data collection strategy. Results: When IT projects were evaluated using CBA, most cases yielded negative Net Present Value (NPV), even though, some cases showed some reduction in operation cost starting from the third year of project life. However, when the CBA was applied as a part of a comprehensive EEA by introducing qualitative aspects and urgency criteria, proper justification for new projects became feasible. Conclusion: The modified EEA represented a systematic approach which was well suited for the government of Jordan as a developing country. This approach was capable of dealing with the justification issue, evaluation of existing systems and the urgency of replacing legacy systems. This study explored many of the challenges and inherited problems existing in the public sectors of developing countries which can not simply be resolved by the introduction of IT projects, but rather require more comprehensive solutions.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility