Search Results - "Tawfeeg, Tawfeeg Mohmmed"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing by Yousif, Adil, Alqhtani, Samar M, Bashir, Mohammed Bakri, Ali, Awad, Hamza, Rafik, Hassan, Alzubair, Tawfeeg, Tawfeeg Mohmmed

    Published in Sensors (Basel, Switzerland) (23-01-2022)
    “…The Internet of Things (IoT) is defined as interconnected digital and mechanical devices with intelligent and interactive data transmission features over a…”
    Get full text
    Journal Article
  2. 2

    Design-Time Reliability Prediction Model for Component-Based Software Systems by Ali, Awad, Bashir, Mohammed Bakri, Hassan, Alzubair, Hamza, Rafik, Alqhtani, Samar M, Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in Sensors (Basel, Switzerland) (06-04-2022)
    “…Software reliability is prioritised as the most critical quality attribute. Reliability prediction models participate in the prevention of software failures…”
    Get full text
    Journal Article
  3. 3

    Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR) by Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil, Hassan, Alzubair, Alqhtani, Samar M., Hamza, Rafik, Bashir, Mohammed Bakri, Ali, Awad

    Published in IEEE access (2022)
    “…The computational cloud aims to move traditional computing from personal computers to cloud providers on the internet. Cloud security represents an important…”
    Get full text
    Journal Article
  4. 4

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms by Hamza, Rafik, Hassan, Alzubair, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M, Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in Entropy (Basel, Switzerland) (06-04-2022)
    “…Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption…”
    Get full text
    Journal Article
  5. 5

    A Secure User Authentication Protocol for Heterogeneous Mobile Environments by Hassan, Alzubair, Hamza, Rafik, Li, Fagen, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M., Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    Published in IEEE access (2022)
    “…Recently, mobile devices have become extensively important to our daily needs. The user authentication protocols with the key agreement are required to solve…”
    Get full text
    Journal Article
  6. 6

    A Load Balancing with Fault Tolerance Algorithm for Cloud Computing by Mohmmed, Tawfeeg, Abdalrahman, Noureldien

    “…Cloud computing technology is evolving as an upcoming technology that acts as a platform for different services. However, there are major challenges that must…”
    Get full text
    Conference Proceeding