Skip to main content

Research Repository

Advanced Search

Coupling ontology with reference architectures to facilitate the instantiation process of software system architectures (2019)
Thesis
Al-Bayati, Z. (in press). Coupling ontology with reference architectures to facilitate the instantiation process of software system architectures. (Thesis). University of Salford

A reference architecture can be defined as a generic architecture for a set of information systems that is used as a basis to a software system architecture. It provides the foundation for the design of concrete architectures in terms of architectura... Read More about Coupling ontology with reference architectures to facilitate the instantiation process of software system architectures.

Latency reduction by dynamic channel estimator selection in C-RAN networks using fuzzy logic (2018)
Journal Article
Mahmood, A., Al-Yasiri, A., & Alani, O. (2018). Latency reduction by dynamic channel estimator selection in C-RAN networks using fuzzy logic. Computer Networks, 138, 44-56. https://doi.org/10.1016/j.comnet.2018.03.027

Due to a dramatic increase in the number of mobile users, operators are forced to expand their networks accordingly. Cloud Radio Access Network (C-RAN) was introduced to tackle the problems of the current generation of mobile networks and to supp... Read More about Latency reduction by dynamic channel estimator selection in C-RAN networks using fuzzy logic.

Consolidate the identity management systems to identify the effective actor based on the actors relationship for the Internet of Things (2018)
Presentation / Conference
Majeed, A., & Al-Yasiri, A. (2018, February). Consolidate the identity management systems to identify the effective actor based on the actors relationship for the Internet of Things. Presented at Third International Congress on Information and Communication Technology, London, UK

Service providers in the Internet of Things need to truly establish the identity of the user(s) as the effective actor(s) (EA) identity rather than the communicating objects to offer the right services. Objects are seamlessly interconnected by anyone... Read More about Consolidate the identity management systems to identify the effective actor based on the actors relationship for the Internet of Things.

A new processing approach for reducing computational complexity in cloud-RAN mobile networks (2018)
Journal Article
Mahmood, A., Al-Yasiri, A., & Alani, O. (2018). A new processing approach for reducing computational complexity in cloud-RAN mobile networks. IEEE Access, 6, 6927-6946. https://doi.org/10.1109/ACCESS.2017.2782763

Cloud computing is considered as one of the key drivers for the next generation of mobile networks (e.g. 5G). This is combined with the dramatic expansion in mobile networks, involving millions (or even billions) of subscribers with a greater numbe... Read More about A new processing approach for reducing computational complexity in cloud-RAN mobile networks.

Reducing complexity in developing wireless sensor network systems using model-driven development (2017)
Thesis
Salman, A. (in press). Reducing complexity in developing wireless sensor network systems using model-driven development. (Thesis). University of Salford

Wireless Sensor Network (WSN) is a collection of small and low-powered gadgets called sensor nodes (motes), which are capable of sensing the environment, collecting and processing the sensed data, and communicating with each other to accomplish a spe... Read More about Reducing complexity in developing wireless sensor network systems using model-driven development.

Formulating a global identifier based on actor relationship for the Internet of Things (2017)
Journal Article
Majeed, A., & Al-Yasiri, A. (2017). Formulating a global identifier based on actor relationship for the Internet of Things. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Internet), 190, 79-91. https://doi.org/10.1007/978-3-319-52727-7_10

The Internet of Things (IoT) promising a new generation of services been offered to a human being through a world of interconnected objects (called “things”) that may use different communication technologies. Objects, in IoT, are seamlessly connected... Read More about Formulating a global identifier based on actor relationship for the Internet of Things.

Developing domain-specific language for wireless sensor network application development (2016)
Presentation / Conference
Salman, A., & Al-Yasiri, A. (2016, December). Developing domain-specific language for wireless sensor network application development. Presented at The 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona-Spain

Wireless Sensor Networks (WSNs) have a potential for a wide scope of uses in the real-world environment. However, WSN application development is considered a challenging and complex task because of the complexity in low-level details, which a develop... Read More about Developing domain-specific language for wireless sensor network application development.

SenNet : a programming toolkit to develop wireless sensor network applications (2016)
Presentation / Conference
wireless sensor network applications. Presented at The 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS'16), Larnaca - Cyprus

One of the reasons that Wireless Sensor Network(WSN) applications are not widely available is the complexity in their development. This is a consequence of the complex nature in low-level details, which a developer must manage. The vast majority of... Read More about SenNet : a programming toolkit to develop wireless sensor network applications.

Identifying cloud security threats to strengthen cloud computing adoption framework (2016)
Journal Article
Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Computer Science, 94, 485-490. https://doi.org/10.1016/j.procs.2016.08.075

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses... Read More about Identifying cloud security threats to strengthen cloud computing adoption framework.

Cloud security threats and techniques to strengthen cloud computing adoption framework (2016)
Journal Article
Khan, N., & Al-Yasiri, A. (2016). Cloud security threats and techniques to strengthen cloud computing adoption framework. International Journal of Information Technology and Web Engineering, 11(3), 50-64. https://doi.org/10.4018/ijitwe.2016070104

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses... Read More about Cloud security threats and techniques to strengthen cloud computing adoption framework.

MonSLAR : a middleware for monitoring SLA for RESTFUL services in cloud computing (2015)
Presentation / Conference
Al-Shammari, S., & Al-Yasiri, A. (2015, October). MonSLAR : a middleware for monitoring SLA for RESTFUL services in cloud computing. Presented at IEEE 9th International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Environments (MESOCA), 2015, Bremen, Germany

Measuring the quality of cloud computing provision from the client's point of view is important in order to ensure that the service conforms to the level specified in the service level agreement (SLA). With a view to avoid SLA violation, the main par... Read More about MonSLAR : a middleware for monitoring SLA for RESTFUL services in cloud computing.

GECAF: a framework for developing context-aware pervasive systems (2015)
Journal Article
Al-Yasiri, A. (2015). GECAF: a framework for developing context-aware pervasive systems. Computer Science - Research and Development, 30(1), 87-103. https://doi.org/10.1007/s00450-013-0248-2

Context-aware systems differ in the way they interact with users, the way they interpret the context of their entities and the actions they take. Each system (or system type) is developed in its own way with no common architecture currently available... Read More about GECAF: a framework for developing context-aware pervasive systems.

Framework for cloud computing adoption : a roadmap for SMEs to cloud migration (2015)
Journal Article
Khan, N., & Al-Yasiri, A. (2015). Framework for cloud computing adoption : a roadmap for SMEs to cloud migration. International journal of cloud computing : service and architecture (Print), 5(5/6), 01-15. https://doi.org/10.5121/ijccsa.2015.5601

Small and Medium size Enterprises (SME) are considered as a backbone of many developing and developed economies of the world; they are the driving force to any major economy across the globe. Through Cloud Computing firms outsource their entire infor... Read More about Framework for cloud computing adoption : a roadmap for SMEs to cloud migration.

Discreet verification of user identity in pervasive computing environments using a non-intrusive technique (2014)
Journal Article
Al-Karkhi, A., Al-Yasiri, A., & Linge, N. (2014). Discreet verification of user identity in pervasive computing environments using a non-intrusive technique. Computers and Electrical Engineering, 41, 102-114. https://doi.org/10.1016/j.compeleceng.2014.10.006

This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user’s activities. The technique, termed Non-intrusive Identity Assert... Read More about Discreet verification of user identity in pervasive computing environments using a non-intrusive technique.

Non-intrusive user identity provisioning in the internet of things (2014)
Presentation / Conference
Al-Karkhi, A., Al-Yasiri, A., & Jaseemuddin, M. (2014, September). Non-intrusive user identity provisioning in the internet of things. Presented at MobiWac '14 Proceedings of the 12th ACM international symposium on Mobility management and wireless access, Montreal, Canada

The Internet of Things (IoT) represents an evolutionary vision and a new era of such smart environments that encompass all identifiable things in a dynamic and interacting network of networks. Each user has wide interactions with a huge number of ent... Read More about Non-intrusive user identity provisioning in the internet of things.

An approach for energy efficient service oriented architecture for sensor networks (2013)
Presentation / Conference
Al-Yasiri, A. (2013, December). An approach for energy efficient service oriented architecture for sensor networks. Presented at 4th Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC), Istanbul, Turkey

Wireless sensor networks offer an increasingly attractive method for data gathering in distributed system architectures and dynamic access via wireless connectivity. However, wireless sensor networks have limitations with respect to resources and... Read More about An approach for energy efficient service oriented architecture for sensor networks.

GECAF : a generic and extensible framework for developing context-aware smart environments (2011)
Thesis
Sabagh, A. GECAF : a generic and extensible framework for developing context-aware smart environments. (Thesis). Salford : University of Salford

The new pervasive and context-aware computing models have resulted in the development of modern environments which are responsive to the changing needs of the people who live, work or socialise in them. These are called smart... Read More about GECAF : a generic and extensible framework for developing context-aware smart environments.

An extensible framework for context-aware smart environments (2011)
Journal Article
Al-Yasiri, A. (2011). An extensible framework for context-aware smart environments. Lecture notes in computer science, 6566, 98-109. https://doi.org/10.1007/978-3-642-19137-4_9

The new pervasive and ubiquitous computing model has led to the development of modern environments which are responsive to the changing needs of the people who live, work or socialise in these environments. To achieve this level of intelligence, such... Read More about An extensible framework for context-aware smart environments.

Factors that affect the implementation of G2G E-government in countries with non-traditional governance : Libya as a case study (2010)
Thesis
Ezentani, A. Factors that affect the implementation of G2G E-government in countries with non-traditional governance : Libya as a case study. (Thesis). Salford : University of Salford

This research study clearly explains the application of G2G e-government within nontraditional governance. This research was aimed at developing a framework that identified the key factors that affect the implementation of G2G e-government within... Read More about Factors that affect the implementation of G2G E-government in countries with non-traditional governance : Libya as a case study.

Data aggregation in wireless sensor networks using the SOAP protocol (2007)
Journal Article
Al-Yasiri, A., & Sunley, A. (2007). Data aggregation in wireless sensor networks using the SOAP protocol. Journal of Physics: Conference Series, 76, 012039. https://doi.org/10.1088/1742-6596/76/1/012039

Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to... Read More about Data aggregation in wireless sensor networks using the SOAP protocol.