Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by M.A. Maluk Mohamed
Total Records ( 5 ) for M.A. Maluk Mohamed
  Shinu Mathew John and M.A. Maluk Mohamed
  Grid computing is a virtual peer to peer framework to connect the resources and services distributed across the world. Resource management and scheduling of jobs are the two major bottlenecks in grid computing. These problems occur due to heterogeneity and distributed nature of the resources. Runtime failure of jobs is another crucial problem due to resource failure in the dynamic nature of grid environments. Reliable scheduling and careful usage of resources are used to overcome the problems mentioned above. In this study, Workflow Scheduling Algorithm for Grid Services with Hierarchical Grouping Based QoS, selection of the resources for scheduling, based on their computing and bandwidth capability. The proposed algorithm has two phases; in the first phase the resources are hierarchically grouped based on their bandwidth, resource capacity, MIPS, SLA violation, resource failure and location of resources. In the second phase, tasks are scheduled based on the QoS constraints of the task. Fine grained or coarse grained data granularity is considered in job creation and transmission to resources based on QoS constraints. The proposed algorithm simulated using GridSim toolkit and provides guaranteed services to grid user with improved network performance, resource utilization, job failure rate, execution time and QoS.
  A.N. Gnana Jeevan and M.A. Maluk Mohamed
  In the newly emerging mobile cloud computing paradigm, the contribution of cloud computing and mobile computing technologies lead to optimize the computation offloading of a data stream between mobile devices and cloud to achieve maximum throughput in processing the streaming data through dynamic surrogate object model. We introduce the concept of dynamic offloading of data between mobile devices and clouds which distribute a key by Dynamic Offload Algorithm (DOA) to addressing in surrogate object. This DOA is used to find the optimal off-load data between executing data streaming of an application at the mobile device and the cloud server by taking an account of the speed of mobile device, network performance and the characteristics of a data stream and the efficiency of mobile devices by using surrogate object effectively. According to our experimental analysis, by executing the dynamic offloading algorithm using surrogate object model, the data will be executed on the cloud are decided statically or dynamically based on the complex data stream in mobile device. Thus in this study, we propose a Surrogate Object model for Dynamic Offloading (SODO) mechanism which provides mobile device network to self heal by storing data needed for transactions across multiple surrogate objects over the cloud by analyzing customer requirements and context. The proposed SODO mechanism ensures maximum throughput of data streaming and less power consumption in mobile cloud.
  A. Jahir Husain and M.A. Maluk Mohamed
  The salient characteristics of Mobile Ad hoc Networks (MANET) make it more vulnerable to various attacks. In this study we propose a novel dynamic IP configuration scheme that generates IP address for MANET nodes by using a simplified cryptographic hash function. The MAC addresses and the IP addresses are mapped with the Manufacturer Serial Number (MSN) of the nodes participating in the MANET. The proposed technique named as Auto Configuration Protocol with Intrusion Prevention (ACPIP) specially designed for MANET is capable of securing and organizing MANET as it develops from one node to many. A new Malicious Node Alert (MNA) technique is included to secure the MANET from Distributed Denial of Service (DDoS) attacks. We evaluate the performance of this solution through simulation experiments. The results demonstrate that it is possible to prevent the DDoS attacks by properly configuring IP address, in an efficient way.
  H. Parveen Begam and M.A. Maluk Mohamed
  Mobile grid is a class of distributed systems that autonomously engages sharing of resources and exchange of services to provide higher performance and utilization of the mobile device resources in a seamless, transparent, secure and efficient way. It allows sharing and co-ordinate use of diverse resources in dynamic, heterogeneous and distributed environment. Mobile grid focuses towards many issues like data management, resource management information management, power management and security management. Due to the combinationb of grid and mobile devices, it leads to many security issues like authentication, authorization, non-repudiation integrity, confidentiality and secure routing. Our main focus is to provide authentication and secure communication. In existing system, certificate authority is used for athrough digital certificates which is a trusted third party and has the responsibility of certificate generation and verification. If the CA is subverted, then the security of the entire system is lost. Normally RSA algorithm of 1024 bit key size is used which is computationally infeasible to perform the encryption which results in more power consumption and it is not suitable for mobile devices which are battery powered. In proposed system, a new architecture called Supervisory Host (SH) that helps in generating and distributing the Secure Service Certificates (SSC) is employed. Elliptic Curve Digital Signature Algorithm (ECDSA) of 168-bit, key size is used for generating digital signature which results in compact implementation and less heat generation. CHORD DHT (Distributed Hash Table) is used for secure and effective routing. Thus the combination of SH and ECDSA algorithm helps to improve the trust level in organizations.
  R. Jeba Gazelle , M.A. Maluk Mohamed and S. Aravind
  The primary purpose of this study is to effectively conduct the evaluation of test management tools that would replace quality center. The evaluation is done based on comparing the features of the leading test management tool quality center 10.0 with other tools. This study would help business decision-makers to identify the test management tool which will replace quality center. Currently, HP Quality Center is used as a test management tool used across all of the software development process. Since, the cost of the tool is high and lack of some features, the analysis would help in adopting new types of test management tool. Further, the challenges that are involved in moving test management services to cloud are discussed in this study.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility