Books by Amir Mohamed Talib
Virtual communities are gaining attention in many organizations, particularly in Institutes of Hi... more Virtual communities are gaining attention in many organizations, particularly in Institutes of Higher Learning (IHL). The research communities in IHL have similar research practices and often form groups to collaborate in research activities. With proper Internet infrastructure, research communities form virtual communities to share knowledge and find the highest number of potential people to collaborate. However, studies to understand these research communities either in research activities or capturing changes in the communities are lacking. The study of virtual communities is crucial to properly manage group knowledge and enable social interaction using a tool to enable socialization. Ontology design of virtual communities can be used as a form to formalize research communities. Based on the Knowledge Management (KM) approach of finding the right knowledge and the right people to work, a model called
the OntoVC-KMS is proposed. The main objective of this chapter is to address the following questions:(1) What constitutes virtual communities among research communities in IHL? (2) How can virtual communities be formalized using ontology? and (3) Can a KM system support virtual communities in IHL for research communities and practices? To provide the answers, the authors conduct a literature review and develop an ontology design using the ontology development approach of related research. Finally, this chapter describes an approach that promotes ontology design in an organization that focuses
on communities and socialization in an IHL.
Bookmarks Related papers MentionsView impact
With the rise of the era of “cloud computing”, concerns about “Security” continue to increase. Cl... more With the rise of the era of “cloud computing”, concerns about “Security” continue to increase. Cloud computing environments impose new challenges on access control techniques due to the growing scale and dynamicity of hosts within the cloud infrastructure; we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). A prototype of our proposed FCDAC will be designed using Prometheus Methodology and implemented using the Java Agent Development Framework Security (JADE-S).
Bookmarks Related papers MentionsView impact
Papers by Amir Mohamed Talib
International Journal of Advanced Science and Computer Applications
The volume of Big Data produced from various sources is always growing. Such vast amounts of data... more The volume of Big Data produced from various sources is always growing. Such vast amounts of data cannot be stored using conventional techniques. As a result, the majority of businesses have switched to using cloud storage as a substitute for storing Big Data. Cloud storage has made great progress, but there are still several problems, such security worries. This article examines Big Data, its difficulties, and many security concerns from the perspectives of various encryption approaches. Additionally, it presents various views to address these issues and suggests a new classification of Big Data security difficulties
Bookmarks Related papers MentionsView impact
Journal of information security, 2023
Bookmarks Related papers MentionsView impact
2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018
Distance education and e-learning is a way of e-learning remotely without being in regular face-t... more Distance education and e-learning is a way of e-learning remotely without being in regular face-to-face contact with a teacher in the classroom. Multi Agent System (MAS) is one of the emerging systems being used today and the application of MASs is spreading in almost every field. It can provide better solutions to very complex and restrictive system. To enhance distance e-learning capabilities, we propose MAS architecture in order to assists in managing, scheduling, distributing and marking distance e-learning exams. The proposed MAS architecture consists of six agents named Student Interface Agent (SIA), Scheduling Course Exam Agent (SCEA), Exam Distribution List Agent (EDLA), Exam Submission Agent (ESA), Exam Managing Submission Agent (EMSA), and Exam Marking Agent (EMA). A prototype of our proposed MAS architecture will be designed using Prometheus Design Tool (PDT) and implemented using the Java Agent Development Framework (JADE). Our proposed MAS architecture will be testing, validation and evaluation at Deanship of Distance Education and E-learning at AI-Imam Mohammad Ibn Saud Islamic University (IMSIU). These agents collaborate with each other and provide a distance e-learning environment that is interactive and efficient.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
WSEAS Transactions on Computers archive, 2017
Clouds are used through a service-oriented interface that implements the 'as-a-service' p... more Clouds are used through a service-oriented interface that implements the 'as-a-service' paradigm to offer cloud services on demand. The adaptation of cloud users and clouds services and application needs required large-scale infrastructures for high-performance computing, since this could be provided only by cloud computing. This paper discusses the cloud computing models, services and architectures. Specifically, discusses the differences and potential synergies between hybrid cloud computing models and Multi Agent Systems (MASs). The main contribution of this paper is to highlight the challenges of using intelligent software agent in high performance complex hybrid cloud computing models. The convergence of interests between MASs that need reliable distributed infrastructures and cloud computing systems that need intelligent software with flexible, dynamic and autonomous behavior can result in new systems and applications.
Bookmarks Related papers MentionsView impact
Advances in Systems Analysis, Software Engineering, and High Performance Computing, 2020
ERP system provides a central system that integrates most of the core business processes such as ... more ERP system provides a central system that integrates most of the core business processes such as human resources, finance, production, and so on. Due to the integration of such complicated functionalities and rapidly evolving customers expectation, ERP systems evaluation has an important impact on organization business success. The aim of this chapter is to understand the evaluation approaches of the ERP systems, and then to map the identified primary studies into a classification scheme to answer the research questions. A systematic mapping study was employed. A total of 36 studies published between the years 2002 and 2018 were collected, analyzed, classified, and discussed. A list of relevant ERP quality attributes that have been measured is identified. Reliability of the metrics methodology and the validity of indicator generated by the metric are two major issues in the current research. It is worth noting that while both the academic and professional literature has shown a grea...
Bookmarks Related papers MentionsView impact
Journal of Information Security, 2020
Bookmarks Related papers MentionsView impact
Education Research International, 2018
This paper describes a measurement model that is used to measure the student performance in the f... more This paper describes a measurement model that is used to measure the student performance in the final examination of Information Technology (IT) Fundamentals (IT280) course in the Information Technology (IT) Department, College of Computer & Information Sciences (CCIS), Al-Imam Mohammad Ibn Saud Islamic University (IMSIU). The assessment model is developed based on students mark entries of final exam results for the second year IT students, which are compiled and tabulated for evaluation using Rasch Measurement Model, and it can be used to measure the students performance towards the final examination of the course. A study on 150 second year students (male = 52; female = 98) was conducted to measure students knowledge and understanding for IT280 course according to the three level of Bloom’s Taxonomy. The results concluded that students can be categorized as poor (10%), moderate (42%), good (18%), and successful (24%) to achieve Level 3 of Bloom’s Taxonomy. This study shows that...
Bookmarks Related papers MentionsView impact
Journal of Information Security, 2018
Bookmarks Related papers MentionsView impact
Proceedings of the International Conference on Internet of things and Cloud Computing - ICC '16, 2016
Bookmarks Related papers MentionsView impact
Journal of Information Security, 2012
Bookmarks Related papers MentionsView impact
American Journal of Economics and Business Administration, 2011
Bookmarks Related papers MentionsView impact
Communications in Computer and Information Science, 2012
ABSTRACT We believe that data storage security in cloud computing, an area full of challenges and... more ABSTRACT We believe that data storage security in cloud computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. Cloud Computing is the utilization of many servers/ data centers or cloud data storages (CDSs) hosted in many different locations. To ensure the availability of users’ data in the cloud we propose architecture of Multi Agent System (MAS). This architecture consists of two main agents: Cloud Service Provider Agent (CSPA) and Cloud Data Availability Agent (CDAA). CDAA has two types of agents: Cloud Data Distribution Preparation Agent (CDDPA) and Cloud Data Retrieval Agent (CDRA). This paper is also illustrated with an example of how our MAS architecture detects distributed cloud server colluding attacks.
Bookmarks Related papers MentionsView impact
Ontology-Based Applications for Enterprise Systems and Knowledge Management
Virtual communities are gaining attention in many organizations, particularly in Institutes of Hi... more Virtual communities are gaining attention in many organizations, particularly in Institutes of Higher Learning (IHL). The research communities in IHL have similar research practices and often form groups to collaborate in research activities. With proper Internet infrastructure, research communities form virtual communities to share knowledge and find the highest number of potential people to collaborate. However, studies to understand these research communities either in research activities or capturing changes in the communities are lacking. The study of virtual communities is crucial to properly manage group knowledge and enable social interaction using a tool to enable socialization. Ontology design of virtual communities can be used as a form to formalize research communities. Based on the Knowledge Management (KM) approach of finding the right knowledge and the right people to work, a model called the OntoVC-KMS is proposed. The main objective of this chapter is to address the...
Bookmarks Related papers MentionsView impact
Digital Information Processing and Communications, 2011
ABSTRACT With the rise of the era of “cloud computing”, concerns about “Security” continue to inc... more ABSTRACT With the rise of the era of “cloud computing”, concerns about “Security” continue to increase. Cloud computing environments impose new challenges on access control techniques due to the growing scale and dynamicity of hosts within the cloud infrastructure; we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). A prototype of our proposed FCDAC will be designed using Prometheus Methodology and implemented using the Java Agent Development Framework Security (JADE-S).
Bookmarks Related papers MentionsView impact
Proceedings of the International Conference on Cloud Computing & Virtualization 2010 CCV 2010, 2010
Storage in the cloud is slightly different services for slightly different needs, it’s allow user... more Storage in the cloud is slightly different services for slightly different needs, it’s allow users to scale storage space requirements to meet expanding requirements, improve manageability, and can be integrated easily to backup most all aspects of a businesses’ data requirements, from server to laptop. A multi-agent system (MAS) is a collection of agents that work together to achieve goal through communication and collaboration among each other. MAS are often distributed and agent has proactive and reactive features which are very useful. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. In this paper, we focus on cloud data storage security, which has always been an important aspect of quality of service. To verify the correctness, integrity, confidentially and availability of users’ data in the cloud, we propose MAS framework. Considering that the data is distributed, updated, created through different sources. This research shall be carried out in five steps that defined as A Secure Software Development Life Cycle (SecSDLC) used as a research methodology. The MAS followed the Prometheus methodology Tool (PDT) for designing section. In this paper, we consider components of MAS framework, implementing a simulation framework by using JAVA and performing an input analysis of the data and an output analysis of the simulation results.
Bookmarks Related papers MentionsView impact
2011 International Conference on Research and Innovation in Information Systems, 2011
Bookmarks Related papers MentionsView impact
2012 International Conference on Information Retrieval & Knowledge Management, 2012
Software Process Improvement (SPI) is necessity to any Software House Organization (SHO). Process... more Software Process Improvement (SPI) is necessity to any Software House Organization (SHO). Process improvement requires embedding the knowledge into SHO's practice and structure especially in promoting and facilitating knowledge of best practice in SPI for the benefits of members of community of practice (CoP). Hence, in this paper, knowledge management (KM) and knowledge facilitation are investigated in order to find
Bookmarks Related papers MentionsView impact
Uploads
Books by Amir Mohamed Talib
the OntoVC-KMS is proposed. The main objective of this chapter is to address the following questions:(1) What constitutes virtual communities among research communities in IHL? (2) How can virtual communities be formalized using ontology? and (3) Can a KM system support virtual communities in IHL for research communities and practices? To provide the answers, the authors conduct a literature review and develop an ontology design using the ontology development approach of related research. Finally, this chapter describes an approach that promotes ontology design in an organization that focuses
on communities and socialization in an IHL.
Papers by Amir Mohamed Talib
the OntoVC-KMS is proposed. The main objective of this chapter is to address the following questions:(1) What constitutes virtual communities among research communities in IHL? (2) How can virtual communities be formalized using ontology? and (3) Can a KM system support virtual communities in IHL for research communities and practices? To provide the answers, the authors conduct a literature review and develop an ontology design using the ontology development approach of related research. Finally, this chapter describes an approach that promotes ontology design in an organization that focuses
on communities and socialization in an IHL.