Hassen Alsafi | International Islamic University Malaysia (original) (raw)
Teaching Documents by Hassen Alsafi
Cloud computing grew out of the concept of utility computing. It was believed that computing reso... more Cloud computing grew out of the concept of utility computing. It was believed that computing resources and hardware would become a commodity to the point that companies would purchase them from a central pool and pay only for the amount of CPU cycles, RAM, storage and bandwidth that they used, much like the way you buy electricity from the electric company. This is how it became known as utility computing. The fundamental concept of cloud computing is that the processing (and the related data) is not in a specified, known or static place, but the server location, place and controls are still known to someone in the service delivery chain. It is no wonder then that cloud computing is considered a complex and dynamic IT services production and distribution system in which different layers of service producing infrastructure are controlled and managed by different entities. On the other hand, ITIL books document best practices for managing the complex and dynamic business of delivering IT services. They are not a theory, a standard, nor a detailed how-to, but a collection of what actually works.
Providing security in a distributed system requires more than user authentication with passwords ... more Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions. B ecause of their distributed nature, grid and cloud computing environments are easy targets for intruders looking for possible vulnerabilities to exploit. By impersonating legitimate users, the intruders can use a service's abundant resources maliciously.
Today, many organizations are moving their computing services towards the Cloud. This makes their... more Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. On the other hand, there is great need for technology that enables the network and its hosts to defend themselves with some level of intelligence in order to accurately identify and block malicious traffic and activities. In this case, it is called Intrusion prevention system (IPS). Therefore, in this paper, we emphasize on recent implementations of IDS on Cloud Computing environments in terms of security and privacy. We propose an effective and efficient model termed as the Integrated Intrusion Detection and Prevention System (IDPS) which combines both IDS and IPS in a single mechanism. Our mechanism also integrates two techniques namely, Anomaly Detection (AD) and
Thank you for joining us at this FierceLive! Webinar. We will begin momentarily.
Diseases and drugs have been known to the human being since long time ago. The first recognized d... more Diseases and drugs have been known to the human being since long time ago. The first recognized drug stores were opened in Baghdad and operated by Arabian pharmacists in the year 754 AD . The process of finding new drugs required minimum of 25-30 years. Moreover , it may needed to conduct a lot of laboratory experiments which consider as time consuming and costly . Therefore, the researchers and scientists decided to overcome such issues and they come up with call Structured Based Drug Design (SBDD). It involves the use of computational application known as molecular docking simulation to imitation the real experiment .In this project, Genetic Algorithm has been used as tool to facilitate the researchers and scientists in searching for the best drug candidate. Moreover, The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty drugs. Finally, the malaria disease has been chosen as our target disease to perform the experiment .
Papers by Hassen Alsafi
Description With the rapid development in the amount of molecular biological structures, computat... more Description With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. Genetic Algorithm facilities the researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments.
Abdallah M'Hamed, Institut Mines-Télécom / Télécom SudParis, France Abdulrahman Alkandari, In... more Abdallah M'Hamed, Institut Mines-Télécom / Télécom SudParis, France Abdulrahman Alkandari, International Islamic University Malaysia, Malaysia Abdul Qayoom Hamal, International Islamic University Malaysia, Malaysia Adamu Ibrahim, International Islamic University Malaysia, Malaysia Ahmad Waqas, International Islamic University Malaysia, Malaysia Ali Amer Alwan AL-Juboori, International Islamic University Malaysia, Malaysia Alyaa Ghanim, Mosul University, Iraq Amelia Ritahani, International Islamic University Malaysia, Malaysia Anisur Rahman, International Islamic University Malaysia, Malaysia Azizhadi Ali, University Kuala Lumpur, Malaysia Azlin Nordin, International Islamic University Malaysia, Malaysia Fatimah Khalid, University Putra Malaysia, Malaysia Faez Hasan,Al_Mustansiriyah University, Iraq Firdous Eljadi, International Islamic University Malaysia, Malaysia Ghassan Nashat, University Utara Malayia, Malaysia Hafizur Rahman, International Islamic University Malaysia, Malay...
With the rapid development in the amount of molecular biological structures, computational molecu... more With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach.Moreover,Diseases and drugs have been known to the human being since long time ago. The first recognized drug stores were opened in Baghdad and operated by Arabian pharmacists in the year 754 AD
Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor n... more Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and they interact directly with their physical environments. The applications of WSNs are abundant; many of them are even security critical such as military or security applications. However, strong security practice should be deployed to secure the network from various attacks. The prevention-based approach such as key cryptographic and authentication has been implemented to secure the network from malicious activities. Yet, these techniques will not secure the computer or network system from insider attacks which leads to extract some sensitive information. As the result, intrusion detection turns into a crucial second layer to prote...
With the rapid development in the amount of molecular biological structures, computational molecu... more With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. Moreover, Genetic Algorithm facilities the researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments. In this paper, auto dock 4.2, well known docking simulation has been used to perform the experiment in specific disease called malaria. The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty drugs. It shows the great impacts in the results obtained from the CMD simulation. In the experiment, we used falcipain-2 as our target protein (2GHU.pdb) obtained from the protein data bank and docked with twenty different available anti malaria drugs in order to find the effective and efficient drugs. Drug Diocopeltine A was found as the best lowest binding energy with the value of -8.64 Kcal/mol. Thus, it can be selected as the anti malaria drug candidate.
the wide use of computers in all live pushes software designers to implement a huge number of dif... more the wide use of computers in all live pushes software designers to implement a huge number of different applications in every filed and the applied programs become immeasurable. Mobile dictionary application have moved to the world of multimedia and merged other services rather than classic translation. Even though millions guidelines booklets printed in different languages and distributed among pilgrims even before they depart their countries, however many pilgrims have lack of knowledge about valid procedures of pilgrimage practices. In this paper, mobile dictionary application for Hajj using three different languages is proposed to assist the pilgrim perform their Hajj easily
Today, many organizations are moving their computing services towards the Cloud. This makes their... more Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. On the other hand, there is great need for technology that enables the network and its hosts to defend themselves with s ome level of intelligence in order to accurately identify and block malicious traffic and activities. In this case, it is called Intrusion prevention system (IPS). Therefore, in this paper, we emphasize on recent implementations of IDS on Cloud Computing environments in terms of security and privacy. We propose an effective and efficient model termed as the Integrated Intrusion Detection and Prevention System (IDPS) which combines both IDS and IPS in a single mechanism. Our mechanism also integrates two techniques namely, Anomaly Detection (AD) and Signature Detection (SD) that can work in cooperation to detect various numbers of attacks and stop them through the capability of IPS.
Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor n... more Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has
distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in
energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and
they interact directly with their physical environments. The applications of WSNs are abundant; many of them are even
security critical such as military or security applications. However, strong security practice should be deployed to secure
the network from various attacks. The prevention-based approach such as key cryptographic and authentication has been
implemented to secure the network from malicious activities. Yet, these techniques will not secure the computer or
network system from insider attacks which leads to extract some sensitive information. As the result, intrusion detection
turns into a crucial second layer to protect and keep the network secure from any malicious attack. The aim of this paper
to provide a detailed review about the characteristics and vulnerabilities of WSN. Alongside, we highlighted the use of IDS
framework to protect the network security
With the rapid development in the amount of molecular biological structures, computational molecu... more With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD)
approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this
filed to overcome the recent issues of docking by using genetic algorithm approach. Moreover, Genetic Algorithm facilities the
researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as
time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments. In this
paper, auto dock 4.2, well known docking simulation has been used to perform the experiment in specific disease called malaria.
The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty
drugs. It shows the great impacts in the results obtained from the CMD simulation. In the experiment, we used falcipain-2 as our
target protein (2GHU.pdb) obtained from the protein data bank and docked with twenty different available anti malaria drugs in
order to find the effective and efficient drugs. Drug Diocopeltine A was found as the best lowest binding energy with the value
of -8.64 Kcal/mol. Thus, it can be selected as the anti malaria drug candidate
Cloud computing grew out of the concept of utility computing. It was believed that computing reso... more Cloud computing grew out of the concept of utility computing. It was believed that computing resources and hardware would become a commodity to the point that companies would purchase them from a central pool and pay only for the amount of CPU cycles, RAM, storage and bandwidth that they used, much like the way you buy electricity from the electric company. This is how it became known as utility computing. The fundamental concept of cloud computing is that the processing (and the related data) is not in a specified, known or static place, but the server location, place and controls are still known to someone in the service delivery chain. It is no wonder then that cloud computing is considered a complex and dynamic IT services production and distribution system in which different layers of service producing infrastructure are controlled and managed by different entities. On the other hand, ITIL books document best practices for managing the complex and dynamic business of delivering IT services. They are not a theory, a standard, nor a detailed how-to, but a collection of what actually works.
Providing security in a distributed system requires more than user authentication with passwords ... more Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions. B ecause of their distributed nature, grid and cloud computing environments are easy targets for intruders looking for possible vulnerabilities to exploit. By impersonating legitimate users, the intruders can use a service's abundant resources maliciously.
Today, many organizations are moving their computing services towards the Cloud. This makes their... more Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. On the other hand, there is great need for technology that enables the network and its hosts to defend themselves with some level of intelligence in order to accurately identify and block malicious traffic and activities. In this case, it is called Intrusion prevention system (IPS). Therefore, in this paper, we emphasize on recent implementations of IDS on Cloud Computing environments in terms of security and privacy. We propose an effective and efficient model termed as the Integrated Intrusion Detection and Prevention System (IDPS) which combines both IDS and IPS in a single mechanism. Our mechanism also integrates two techniques namely, Anomaly Detection (AD) and
Thank you for joining us at this FierceLive! Webinar. We will begin momentarily.
Diseases and drugs have been known to the human being since long time ago. The first recognized d... more Diseases and drugs have been known to the human being since long time ago. The first recognized drug stores were opened in Baghdad and operated by Arabian pharmacists in the year 754 AD . The process of finding new drugs required minimum of 25-30 years. Moreover , it may needed to conduct a lot of laboratory experiments which consider as time consuming and costly . Therefore, the researchers and scientists decided to overcome such issues and they come up with call Structured Based Drug Design (SBDD). It involves the use of computational application known as molecular docking simulation to imitation the real experiment .In this project, Genetic Algorithm has been used as tool to facilitate the researchers and scientists in searching for the best drug candidate. Moreover, The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty drugs. Finally, the malaria disease has been chosen as our target disease to perform the experiment .
Description With the rapid development in the amount of molecular biological structures, computat... more Description With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. Genetic Algorithm facilities the researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments.
Abdallah M'Hamed, Institut Mines-Télécom / Télécom SudParis, France Abdulrahman Alkandari, In... more Abdallah M'Hamed, Institut Mines-Télécom / Télécom SudParis, France Abdulrahman Alkandari, International Islamic University Malaysia, Malaysia Abdul Qayoom Hamal, International Islamic University Malaysia, Malaysia Adamu Ibrahim, International Islamic University Malaysia, Malaysia Ahmad Waqas, International Islamic University Malaysia, Malaysia Ali Amer Alwan AL-Juboori, International Islamic University Malaysia, Malaysia Alyaa Ghanim, Mosul University, Iraq Amelia Ritahani, International Islamic University Malaysia, Malaysia Anisur Rahman, International Islamic University Malaysia, Malaysia Azizhadi Ali, University Kuala Lumpur, Malaysia Azlin Nordin, International Islamic University Malaysia, Malaysia Fatimah Khalid, University Putra Malaysia, Malaysia Faez Hasan,Al_Mustansiriyah University, Iraq Firdous Eljadi, International Islamic University Malaysia, Malaysia Ghassan Nashat, University Utara Malayia, Malaysia Hafizur Rahman, International Islamic University Malaysia, Malay...
With the rapid development in the amount of molecular biological structures, computational molecu... more With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach.Moreover,Diseases and drugs have been known to the human being since long time ago. The first recognized drug stores were opened in Baghdad and operated by Arabian pharmacists in the year 754 AD
Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor n... more Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and they interact directly with their physical environments. The applications of WSNs are abundant; many of them are even security critical such as military or security applications. However, strong security practice should be deployed to secure the network from various attacks. The prevention-based approach such as key cryptographic and authentication has been implemented to secure the network from malicious activities. Yet, these techniques will not secure the computer or network system from insider attacks which leads to extract some sensitive information. As the result, intrusion detection turns into a crucial second layer to prote...
With the rapid development in the amount of molecular biological structures, computational molecu... more With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. Moreover, Genetic Algorithm facilities the researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments. In this paper, auto dock 4.2, well known docking simulation has been used to perform the experiment in specific disease called malaria. The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty drugs. It shows the great impacts in the results obtained from the CMD simulation. In the experiment, we used falcipain-2 as our target protein (2GHU.pdb) obtained from the protein data bank and docked with twenty different available anti malaria drugs in order to find the effective and efficient drugs. Drug Diocopeltine A was found as the best lowest binding energy with the value of -8.64 Kcal/mol. Thus, it can be selected as the anti malaria drug candidate.
the wide use of computers in all live pushes software designers to implement a huge number of dif... more the wide use of computers in all live pushes software designers to implement a huge number of different applications in every filed and the applied programs become immeasurable. Mobile dictionary application have moved to the world of multimedia and merged other services rather than classic translation. Even though millions guidelines booklets printed in different languages and distributed among pilgrims even before they depart their countries, however many pilgrims have lack of knowledge about valid procedures of pilgrimage practices. In this paper, mobile dictionary application for Hajj using three different languages is proposed to assist the pilgrim perform their Hajj easily
Today, many organizations are moving their computing services towards the Cloud. This makes their... more Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. In spite of being attractive, Cloud feature poses various new security threats and challenges when it comes to deploying Intrusion Detection System (IDS) in Cloud environments. Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. Hence, there is a need for an integrated scheme which can provide robust protection against a complete spectrum of threats. On the other hand, there is great need for technology that enables the network and its hosts to defend themselves with s ome level of intelligence in order to accurately identify and block malicious traffic and activities. In this case, it is called Intrusion prevention system (IPS). Therefore, in this paper, we emphasize on recent implementations of IDS on Cloud Computing environments in terms of security and privacy. We propose an effective and efficient model termed as the Integrated Intrusion Detection and Prevention System (IDPS) which combines both IDS and IPS in a single mechanism. Our mechanism also integrates two techniques namely, Anomaly Detection (AD) and Signature Detection (SD) that can work in cooperation to detect various numbers of attacks and stop them through the capability of IPS.
Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor n... more Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has
distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in
energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and
they interact directly with their physical environments. The applications of WSNs are abundant; many of them are even
security critical such as military or security applications. However, strong security practice should be deployed to secure
the network from various attacks. The prevention-based approach such as key cryptographic and authentication has been
implemented to secure the network from malicious activities. Yet, these techniques will not secure the computer or
network system from insider attacks which leads to extract some sensitive information. As the result, intrusion detection
turns into a crucial second layer to protect and keep the network secure from any malicious attack. The aim of this paper
to provide a detailed review about the characteristics and vulnerabilities of WSN. Alongside, we highlighted the use of IDS
framework to protect the network security
With the rapid development in the amount of molecular biological structures, computational molecu... more With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD)
approaches become one of the crucial tools in rational drug design (RDD). Currently, number of researchers are working in this
filed to overcome the recent issues of docking by using genetic algorithm approach. Moreover, Genetic Algorithm facilities the
researchers and scientists in molecular docking experiments. Since conducting the experiment in the laboratory considered as
time consuming and costly, the scientists determined to use the computational techniques to simulate their experiments. In this
paper, auto dock 4.2, well known docking simulation has been used to perform the experiment in specific disease called malaria.
The genetic algorithm (GA) approach in the autodock4.2 has been used to search for the potential candidate drug in the twenty
drugs. It shows the great impacts in the results obtained from the CMD simulation. In the experiment, we used falcipain-2 as our
target protein (2GHU.pdb) obtained from the protein data bank and docked with twenty different available anti malaria drugs in
order to find the effective and efficient drugs. Drug Diocopeltine A was found as the best lowest binding energy with the value
of -8.64 Kcal/mol. Thus, it can be selected as the anti malaria drug candidate