International Journal of Innovative Computing and Applications, 2021
Delay tolerant network is a mobile ad hoc network where there are no predefined routes from one n... more Delay tolerant network is a mobile ad hoc network where there are no predefined routes from one node to another, which is used in disaster and emergency communications. Here, we concentrate the analysis of node contact on contact duration aware routings techniques and address the issues of variation of mobile nodes, message copies and buffer size using ONE simulator. We observe that contact increases per hour with the increase of mobile nodes, while goes up and down for varying message copies and remains approximately the same for buffer size, i.e., buffer size does not affect the achievement of contacts. While, inter-contact time (ICT) is high at the beginning of communication for three cases, i.e. for varying message copies, mobile nodes and buffer size. Higher contact time results in higher ICT and number of contacts for varying mobile nodes, while it remains slightly changed for varying message copies and fixed for varying buffer size.
Advances in Computer and Electrical Engineering, 2018
A vagrant is a freeware tool that facilitates to easily manage and configure multiple virtual mac... more A vagrant is a freeware tool that facilitates to easily manage and configure multiple virtual machines. The main goal of its creation is to simplify the environment maintenance in a large project with multi technical tasks. It provides the better manageability and maintainability for the developers and prevents needless maintenance and improve the productivity for development using simple functions. Vagrant supports almost all main languages for the development, but it is written in the Ruby language. Vagrant was initially supported by Virtual Box, but the version 1.1 has the full vital support for VMware, KVM and other virtualization environment as well as for the server like Amazon EC2. It supports many programming languages such as C#, Python, PHP and JavaScript to enhance the project efficiency. Recently, version 1.6 may serve as a fully virtualized operating system due to the added support for Docker containers.
2018 Advances in Wireless and Optical Communications (RTUWO), 2018
Opportunistic Network (OppNet) is a sparse network, finding a stable and reliable path from the s... more Opportunistic Network (OppNet) is a sparse network, finding a stable and reliable path from the source to the destination may not easily achievable. However, if a node transmits a message to all its encounters nodes, its batteries will be consumed insufficiently. Many researches have been done on routing algorithms in opportunistic networks, but few of them consider the energy issue. In this paper, we propose Degree and Contact Epidemic (DC-Epidemic) routing protocol, which is an energy-aware routing scheme for an opportunistic network. The DC-Epidemic routing protocol is based on that to reach a fast delivery with a minimum number of message copies, it is recommended to copy only when the number of neighbors equal to a certain calculated threshold. This threshold calculated based on the maximum degree and contact probability values of the system. We compare the performance of DC-Epidemic routing protocol with basic contact epidemic routing protocol. This comparison conducted using ...
It is our great privilege to present before you Volume 20, Issue 1 of the “Scalable Computing: Pr... more It is our great privilege to present before you Volume 20, Issue 1 of the “Scalable Computing: Practice and Experience”. We had received 41 paper submissions from Belgium, Malaysia, Indonesia, Bangladesh, Yemen and India, and selected 12 papers for publication. The acceptance rate of this issue is 29 percent. The aim of this special issue is to give the solutions of opportunistic networks and security challenges as well as to collect other research problems in opportunistic networks for further research. This special issue gives the new dimensions for opportunistic networks in the perspective of research.
With the development of Internet technologies, huge amounts of data are collected from various so... more With the development of Internet technologies, huge amounts of data are collected from various sources, and used ‘anytime, anywhere’ to enrich and change the life of the whole of society, attract ways to do business, and better perceive people’s lives. Those datasets, called ‘big data’, need to be processed, stored, or retrieved, and special tools were developed to analyze this big data. At the same time, the ever-increasing development of the Internet of Things (IoT) requires IoT devices to be mobile, with adequate data processing performance. The new fog computing paradigm makes computing resources more accessible, and provides a flexible environment that will be widely used in next-generation networks, vehicles, etc., demonstrating enhanced capabilities and optimizing resources. This paper is devoted to analyzing fog computing capabilities for big data provisioning, while considering this technology’s different architectural and functional aspects. The analysis includes exploring...
2021 International Conference on Information Science and Communications Technologies (ICISCT)
In a very less time from its advent, blockchain technology has entered into mainstream research a... more In a very less time from its advent, blockchain technology has entered into mainstream research all over the world. The Bitcoin cryptocurrency is the first open-source implementation of blockchain technology. The application of blockchain technology is not restricted to financial services only; several other sectors especially healthcare is increasingly focusing their attention to grab potential and unique features of blockchain technology like immutability, security, and trust. This paper aims to review the exploration of blockchain technology in the healthcare domain in recent years and study how these emerging technologies help healthcare to speed up treatment procedures and mitigate the effects of the COVID-19 pandemic.
Advances in Computer and Electrical Engineering, 2018
In this chapter, we will discuss in the introduction to KVM, how to create KVM, both command line... more In this chapter, we will discuss in the introduction to KVM, how to create KVM, both command line and using GUI, briefly on KVM management. This chapter also describes the pre-requisites and a brief introduction on all the pre-requisite software. KVM utilizes the CPU virtualization technology on modern AMD and Intel processors, known as AMD-V and Intel-VT. KVM a is free virtualization solution and does not require any licensing, but if your CPU does not support virtualization KVM will be a waste of time. Linux OS, which is used in this chapter, is Cent OS.
International Journal of Innovative Computing and Applications, 2021
Delay tolerant network is a mobile ad hoc network where there are no predefined routes from one n... more Delay tolerant network is a mobile ad hoc network where there are no predefined routes from one node to another, which is used in disaster and emergency communications. Here, we concentrate the analysis of node contact on contact duration aware routings techniques and address the issues of variation of mobile nodes, message copies and buffer size using ONE simulator. We observe that contact increases per hour with the increase of mobile nodes, while goes up and down for varying message copies and remains approximately the same for buffer size, i.e., buffer size does not affect the achievement of contacts. While, inter-contact time (ICT) is high at the beginning of communication for three cases, i.e. for varying message copies, mobile nodes and buffer size. Higher contact time results in higher ICT and number of contacts for varying mobile nodes, while it remains slightly changed for varying message copies and fixed for varying buffer size.
Advances in Computer and Electrical Engineering, 2018
A vagrant is a freeware tool that facilitates to easily manage and configure multiple virtual mac... more A vagrant is a freeware tool that facilitates to easily manage and configure multiple virtual machines. The main goal of its creation is to simplify the environment maintenance in a large project with multi technical tasks. It provides the better manageability and maintainability for the developers and prevents needless maintenance and improve the productivity for development using simple functions. Vagrant supports almost all main languages for the development, but it is written in the Ruby language. Vagrant was initially supported by Virtual Box, but the version 1.1 has the full vital support for VMware, KVM and other virtualization environment as well as for the server like Amazon EC2. It supports many programming languages such as C#, Python, PHP and JavaScript to enhance the project efficiency. Recently, version 1.6 may serve as a fully virtualized operating system due to the added support for Docker containers.
2018 Advances in Wireless and Optical Communications (RTUWO), 2018
Opportunistic Network (OppNet) is a sparse network, finding a stable and reliable path from the s... more Opportunistic Network (OppNet) is a sparse network, finding a stable and reliable path from the source to the destination may not easily achievable. However, if a node transmits a message to all its encounters nodes, its batteries will be consumed insufficiently. Many researches have been done on routing algorithms in opportunistic networks, but few of them consider the energy issue. In this paper, we propose Degree and Contact Epidemic (DC-Epidemic) routing protocol, which is an energy-aware routing scheme for an opportunistic network. The DC-Epidemic routing protocol is based on that to reach a fast delivery with a minimum number of message copies, it is recommended to copy only when the number of neighbors equal to a certain calculated threshold. This threshold calculated based on the maximum degree and contact probability values of the system. We compare the performance of DC-Epidemic routing protocol with basic contact epidemic routing protocol. This comparison conducted using ...
It is our great privilege to present before you Volume 20, Issue 1 of the “Scalable Computing: Pr... more It is our great privilege to present before you Volume 20, Issue 1 of the “Scalable Computing: Practice and Experience”. We had received 41 paper submissions from Belgium, Malaysia, Indonesia, Bangladesh, Yemen and India, and selected 12 papers for publication. The acceptance rate of this issue is 29 percent. The aim of this special issue is to give the solutions of opportunistic networks and security challenges as well as to collect other research problems in opportunistic networks for further research. This special issue gives the new dimensions for opportunistic networks in the perspective of research.
With the development of Internet technologies, huge amounts of data are collected from various so... more With the development of Internet technologies, huge amounts of data are collected from various sources, and used ‘anytime, anywhere’ to enrich and change the life of the whole of society, attract ways to do business, and better perceive people’s lives. Those datasets, called ‘big data’, need to be processed, stored, or retrieved, and special tools were developed to analyze this big data. At the same time, the ever-increasing development of the Internet of Things (IoT) requires IoT devices to be mobile, with adequate data processing performance. The new fog computing paradigm makes computing resources more accessible, and provides a flexible environment that will be widely used in next-generation networks, vehicles, etc., demonstrating enhanced capabilities and optimizing resources. This paper is devoted to analyzing fog computing capabilities for big data provisioning, while considering this technology’s different architectural and functional aspects. The analysis includes exploring...
2021 International Conference on Information Science and Communications Technologies (ICISCT)
In a very less time from its advent, blockchain technology has entered into mainstream research a... more In a very less time from its advent, blockchain technology has entered into mainstream research all over the world. The Bitcoin cryptocurrency is the first open-source implementation of blockchain technology. The application of blockchain technology is not restricted to financial services only; several other sectors especially healthcare is increasingly focusing their attention to grab potential and unique features of blockchain technology like immutability, security, and trust. This paper aims to review the exploration of blockchain technology in the healthcare domain in recent years and study how these emerging technologies help healthcare to speed up treatment procedures and mitigate the effects of the COVID-19 pandemic.
Advances in Computer and Electrical Engineering, 2018
In this chapter, we will discuss in the introduction to KVM, how to create KVM, both command line... more In this chapter, we will discuss in the introduction to KVM, how to create KVM, both command line and using GUI, briefly on KVM management. This chapter also describes the pre-requisites and a brief introduction on all the pre-requisite software. KVM utilizes the CPU virtualization technology on modern AMD and Intel processors, known as AMD-V and Intel-VT. KVM a is free virtualization solution and does not require any licensing, but if your CPU does not support virtualization KVM will be a waste of time. Linux OS, which is used in this chapter, is Cent OS.
Uploads
Papers by Khaleel Ahmad