Alireza Samar - Academia.edu (original) (raw)

Uploads

Papers by Alireza Samar

Research paper thumbnail of UAA: User authentication agent for managing user identities in cloud computing environments

Cloud computing is the realization for a long-held dream of computing as utility of establishment... more Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one...

Research paper thumbnail of UAA: User authentication agent for managing user identities in cloud computing environments

Cloud computing is the realization for a long-held dream of computing as utility of establishment... more Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one...

Research paper thumbnail of A Systematic Literature Review on Features of Deep Learning in Big Data Analytics

Context: Deep Learning (DL) is a division of machine learning techniques that based on algorithms... more Context: Deep Learning (DL) is a division of machine learning techniques that based on algorithms for learning multiples level of representations. Big Data Analytics (BDA) is the process of examining large scale of data and variety of data types. Objectives: The aims of this study are to identify the existing features of DL approaches for using in BDA and identify the key features that affect the effectiveness of DL approaches. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 4065 papers were retrieved by manual search in four databases which are Google Scholar, Taylor & Francis, Springer Link and Science Direct. 34 primary studies were finally included. Result: From these studies, 70% were journal articles, 25% were conference papers and 5% were contributions from the studies consisted of book chapters. Five features of DL were identified and analyzed. The features are (1) hierarchical layer, (2) high-level abstraction, (3) process high volume of data, (4) universal model and (5) does not over fit the training data. Conclusion: This review delivers the evidence that DL in BDA is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on DL in BDA which could be useful for practitioners.

Research paper thumbnail of UAA: User authentication agent for managing user identities in cloud computing environments

Cloud computing is the realization for a long-held dream of computing as utility of establishment... more Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one...

Research paper thumbnail of UAA: User authentication agent for managing user identities in cloud computing environments

Cloud computing is the realization for a long-held dream of computing as utility of establishment... more Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one...

Research paper thumbnail of A Systematic Literature Review on Features of Deep Learning in Big Data Analytics

Context: Deep Learning (DL) is a division of machine learning techniques that based on algorithms... more Context: Deep Learning (DL) is a division of machine learning techniques that based on algorithms for learning multiples level of representations. Big Data Analytics (BDA) is the process of examining large scale of data and variety of data types. Objectives: The aims of this study are to identify the existing features of DL approaches for using in BDA and identify the key features that affect the effectiveness of DL approaches. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 4065 papers were retrieved by manual search in four databases which are Google Scholar, Taylor & Francis, Springer Link and Science Direct. 34 primary studies were finally included. Result: From these studies, 70% were journal articles, 25% were conference papers and 5% were contributions from the studies consisted of book chapters. Five features of DL were identified and analyzed. The features are (1) hierarchical layer, (2) high-level abstraction, (3) process high volume of data, (4) universal model and (5) does not over fit the training data. Conclusion: This review delivers the evidence that DL in BDA is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on DL in BDA which could be useful for practitioners.

Log In