During the last decades, tourism has been augmented worldwide through which the diversity of tour... more During the last decades, tourism has been augmented worldwide through which the diversity of tourists’ interests is increased and is challenging to tackle with the traditional management system. Such challenges can be overcome by LBSNs (Location-Based Social Networks) such as Yelp, Foursquare, and Facebook which help to collect more personalized information close to tourists’ preferences/interests like check-ins, comments, and reviews. In this regard, solutions have been proposed to exploit the POI (Point of Interest) recommendation, but they failed to overcome sparsity and cold-start problems. Existing methods are also not focusing on important aspects, including geographical context, dynamics preferences and social influence, which are essential factors in POI recommendation. Therefore, this work tried to incorporate these factors and present a unified model using bipartite networks to learn users and POI dynamics. For this purpose, we have represented all the factors using eleven...
This manuscript is devoted to investigate qualitative theory of existence and uniqueness of the s... more This manuscript is devoted to investigate qualitative theory of existence and uniqueness of the solution to a dynamical system of an infectious disease known as measles. For the respective theory, we utilize fixed point theory to construct sufficient conditions for existence and uniqueness of the solution. Some results corresponding to Hyers–Ulam stability are also investigated. Furthermore, some semianalytical results are computed for the considered system by using integral transform due to the Laplace and decomposition technique of Adomian. The obtained results are presented by graphs also.
Abstract Access control with permission delegation mechanism allows fine granular access to secur... more Abstract Access control with permission delegation mechanism allows fine granular access to secure resources. In the literature, existing architectures for permission delegation and access control are either event-based or query-based. These previous works assume a single trusted delegation service, which however is likely biased or fails to service. Also, they fail to allow users to verify delegation service operations, as such cannot be directly applied to IoT (Internet of Things) due to low power, low-bandwidth, ad-hoc and decentralized nature. This paper proposes a novel decentralized architecture for permission delegation and access control for IoT application, with demands on event and query base permission delegation. We further apply Blockchain (BC) technology to make delegation services secure, trusted, verifiable and decentralized. We investigate our proposed approach in Simple PROMELA INterpreter (SPIN) model checker using PROMELA (Process Meta Language). The “Platform Verification”, “Delegation”, “Mutual Exclusion” properties written in Linear Temporal Logic (LTL) are also verified against the PROMELA model.
Intelligent transport system (ITS), owing to their potential to enhance road safety and improve t... more Intelligent transport system (ITS), owing to their potential to enhance road safety and improve traffic management, have attracted attention from automotive industries and academia in recent years. The underlying technology—i.e., vehicular ad-hoc networks (VANETs)—provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. The open nature of ITS as wireless communication technology leads to many security and privacy challenges. These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution. This article aims to propose a novel taxonomy of security and privacy issues and solutions in ITS. Furthermore, categorization of security and privacy schemes in ITS and their limitations are discussed with various parameters—scalability, privacy, computational cost, communication overhead, latency—and various type...
During the last decades, tourism has been augmented worldwide through which the diversity of tour... more During the last decades, tourism has been augmented worldwide through which the diversity of tourists’ interests is increased and is challenging to tackle with the traditional management system. Such challenges can be overcome by LBSNs (Location-Based Social Networks) such as Yelp, Foursquare, and Facebook which help to collect more personalized information close to tourists’ preferences/interests like check-ins, comments, and reviews. In this regard, solutions have been proposed to exploit the POI (Point of Interest) recommendation, but they failed to overcome sparsity and cold-start problems. Existing methods are also not focusing on important aspects, including geographical context, dynamics preferences and social influence, which are essential factors in POI recommendation. Therefore, this work tried to incorporate these factors and present a unified model using bipartite networks to learn users and POI dynamics. For this purpose, we have represented all the factors using eleven...
This manuscript is devoted to investigate qualitative theory of existence and uniqueness of the s... more This manuscript is devoted to investigate qualitative theory of existence and uniqueness of the solution to a dynamical system of an infectious disease known as measles. For the respective theory, we utilize fixed point theory to construct sufficient conditions for existence and uniqueness of the solution. Some results corresponding to Hyers–Ulam stability are also investigated. Furthermore, some semianalytical results are computed for the considered system by using integral transform due to the Laplace and decomposition technique of Adomian. The obtained results are presented by graphs also.
Abstract Access control with permission delegation mechanism allows fine granular access to secur... more Abstract Access control with permission delegation mechanism allows fine granular access to secure resources. In the literature, existing architectures for permission delegation and access control are either event-based or query-based. These previous works assume a single trusted delegation service, which however is likely biased or fails to service. Also, they fail to allow users to verify delegation service operations, as such cannot be directly applied to IoT (Internet of Things) due to low power, low-bandwidth, ad-hoc and decentralized nature. This paper proposes a novel decentralized architecture for permission delegation and access control for IoT application, with demands on event and query base permission delegation. We further apply Blockchain (BC) technology to make delegation services secure, trusted, verifiable and decentralized. We investigate our proposed approach in Simple PROMELA INterpreter (SPIN) model checker using PROMELA (Process Meta Language). The “Platform Verification”, “Delegation”, “Mutual Exclusion” properties written in Linear Temporal Logic (LTL) are also verified against the PROMELA model.
Intelligent transport system (ITS), owing to their potential to enhance road safety and improve t... more Intelligent transport system (ITS), owing to their potential to enhance road safety and improve traffic management, have attracted attention from automotive industries and academia in recent years. The underlying technology—i.e., vehicular ad-hoc networks (VANETs)—provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. The open nature of ITS as wireless communication technology leads to many security and privacy challenges. These challenges pertain to confidentiality, authentication, integrity, non-repudiation, location privacy, identity privacy, anonymity, certificate revocation, and certificate resolution. This article aims to propose a novel taxonomy of security and privacy issues and solutions in ITS. Furthermore, categorization of security and privacy schemes in ITS and their limitations are discussed with various parameters—scalability, privacy, computational cost, communication overhead, latency—and various type...
Uploads
Papers by Gauhar Ali