Qassim Bani Hani's research while affiliated with University of Bridgeport and other places

Publications (14)

Article
Full-text available
Mobile cloud computing uses features to deliver outsourcing data to remotely available mobile devices. However, the flexible nature of the mobile device is a critical challenge for the mobile cloud computing environment. The mobile phone significantly degrades the data transfer performance when initiating the handover process. Thus, an energy-effic...
Article
Mobile Cloud Computing (MCC) combines the features of mobile computing, cloud computing, and wireless networks to create the healthy computational resources to mobile cloud users. The MCC aims is to execute the highly attractive mobile applications on a plethora of mobile cellular telephones, with highly rich user experience. From perspective of mo...
Conference Paper
Mobile cloud computing has dual benefits that includes cloud computing and mobile computing. In mobile cloud computing data storage and data processing take place outside the mobile device. As a result, there is a high chance of security attack. The security even becomes more critical when mobile phone is initiating the handoff during handover mana...
Conference Paper
The cloud computing environment enables cloud users to outsource their data into the cloud environment because of its cost efficiency and ease of management. However, by out sourcing the data to the cloud, cloud users lose their control over the data. This situation becomes more critical when using a cell phone and initiating the handoff process. T...
Book
In this paper we suggest to develop a vehicle's speed and fines control system to manage and control different aspects of fleet and cruise management system. The system developed to be sponsored by the government, which is represented by Department of Motor Vehicle (DMV) and should be operated by them. The purposes of the proposed project include s...
Conference Paper
Full-text available
Security methodologies are taken into consideration for many applications, where transferring sensitive data over network must be protected from any intermediate attacker. Privacy of data can be granted using encryption, by changing transmitted data into cipher form. Apart from encryption, hiding data represents another technique to transfer data w...
Conference Paper
Full-text available
Security methodologies are taken into consideration for many applications, where transferring sensitive data over network must be protected from any intermediate attacker. Privacy of data can be granted using encryption, by changing transmitted data into cipher form. Apart from encryption, hiding data represents another technique to transfer data w...
Article
Full-text available
Transmission Control Protocol (TCP) is one of the popular transport-level protocols for distributed applications like FTP, http, telnet, email applications due to its rich set of desirable features, including a reliable, ordered, duplex byte stream, flow control, and congestion control. The performance of TCP is affected due to various factors incl...

Citations

... In addition to DNNs, based on the previous studies using DVFS vulnerabilities to attack SGX and TrustZone citexxx, some encryption schemes such as AES and RSA accelerated by GPU clouds [37,42] could be also vulnerable to the Lightning attack. ...
... In most cases, ivory is delivered as processed carvings, ivory utensils, always being shipped by air mail. This data raises the problem of illegal internet commerce, which has already been addressed in previous papers (Lavorgna, 2014;Razaque et al., 2018). Therefore, EU can be considered a source of international internet commerce, so the law enforcement agencies of some EU Member States should be in charge with identifying individual advertisements, finding the advertisers and the stored ivory, and initiating effective criminal cooperation between the EU (origin) and China, as destination. ...
... It also enable the businesses to utilize cloud infrastructure to virtually synchronize and access the data. The PGP and the Kerberos combination are used for double process authentication purposes by integrating the features of both to provide the two-way authentication with the Google Authenticator [9]. The PGP user access can be established by the Google Authenticator. ...
... Recently, cloud computing is a hot topic all over the world [9], [10]. In 2006, Google's CEO, Eric Schmidt, proposed the word "cloud" to describe the business model of providing services across the internet. ...
... Alnezari and Rikli [12] presented the handoff mechanism and offloading strategy in mobile cloud computing using the fuzzy logic model approach and worked on 3G and WLAN environments. Hani and Dichter [13] presented a robust five-layer service-oriented architecture that can perform seamless handoff in WiMAX and helps in reducing the bandwidth and power consumption. In [14,15], researchers have presented the fuzzy approach which is based on multi-criteria and multi-attribute handover decisions respectively. ...
... Results are achieved as per the energy efficiency and wireless network packets. Mobility of different sensors has been addressed by collecting the minimum number of nodes along with the network packets [29]. ...
... Whereas Julius P. Dichter and Q. Bani Hani [12] in their paper proposed an idea in which an encryption key is fragmented and kept on various cloud servers located in different locations. In this scheme, whenever request for accessing data is launched from user to server, the token is requested which was given to owner in registration process. ...
... Firstly, high performance implementation; in English based nique using ECR technique has fast process embedding (Kataria et al., 2013), High invisibility in technique using Reversed Fatah technique (Memon et al., 2008) has standard model transition in Hindi (Changder et al., 2009) and in letter based using Back end interface web page (Mahato et al., 2013). Secondly, feature-based also can embed hidden text in large capacity likes in English based using Deoxyribonucleic Acid (DNA)technique (Reddy et al., 2014) and in Arabic based with reversed Fattah (Memon et al., 2008), vertical displacement technique (Odeh et al., 2012). In Hindi based technique of specific matra (Changder et al., 2010)) and chain code technique. ...
... In order to increase the amount of information that may be hidden, two secret bits per character instead of one may be used [61] to generate four possible positions (i.e., 00, 01, 10, & 11). The two scenarios in hiding the secret bit are point shifting and distance between points. ...