Mohd Rahul | Taif University, Kingdom of Saudi Arabia (original) (raw)
Papers by Mohd Rahul
Sensor networks are amassed wireless networks of small, low-cost sensors that collect and propaga... more Sensor networks are amassed wireless networks of small, low-cost sensors that collect and propagate environmental data. The emerging field of wireless sensor networks integrates sensing, computation, and communication into a single device. The power of wireless sensor networks verifies in the capability to deploy huge numbers of small nodes that collaborates and configure them. Wireless sensor networks simplify monitoring and handling of physical environments from remote locations with best accuracy. Security protocols associated to sensor network are analyzed in this paper.
— Cloud Computing, the long-held dream of computing as a utility, has the potential to transform ... more — Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service. Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centres that provide those services. The services are referred to as Software as a Service (SaaS). Cloud Computing also provides two more types of services i.e. Infrastructure as a Service (IaaS), Platform as a Service (PaaS). With the significant advances in Information and communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). The paper reviews and explores the actual meaning of Cloud Computing, also demonstrates a dissection of the cloud computing into three main layers, and illustrates their interrelations as well as their int...
Visual cryptography is a secret sharing method that uses human eyes to decrypt the secret. It has... more Visual cryptography is a secret sharing method that uses human eyes to decrypt the secret. It has computation-free decoding process to decrypt the images. Generally visual cryptographic methods utilize the technique of secret sharing in which secret image is divided into shares and when k shares out of n stack together the secret image will reveal. In this paper we proposed a method of visual cryptography for colored images. We are using RGB color model for color images. First of all, image is divided into monochromatic channels then converts each individual image to binary image. After this we can apply basic VCS scheme. The secret image can be recovered by stacking share images. We are using Matlab7.4 for implementing our scheme.
The Classful routing protocol does not carry the subnet mask information in its routing table. RI... more The Classful routing protocol does not carry the subnet mask information in its routing table. RIP version 1 (Routing Information Protocol) is a Classful routing protocol, this was the Internet's first widely used routing protocol in networks. RIP is useful for local and medium size networks. The RIP is known as a distance-vector routing protocol, which works in the hop count as a routing metric, The RIP allowed 15 no's maximum hops counts. The 16th hop count is considered as infinite distance viewing such distance as unreachable and undesirable route in it routing process. The RIP operates the limited size of the networks. The Classless routing protocol can carry the subnet mask information, Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol, Classful routing protocol designed by Cisco Systems. EIGRP is an enhanced version of old routing protocol, as IGRP (Interior Gateway Routing Protocol). EIGRP supports VLSM and CIDR allowi...
Cloud computing comes in focus development of grid computing, virtualization and web technologies... more Cloud computing comes in focus development of grid computing, virtualization and web technologies. The cloud computing is a mingle of technologies where a large number of systems are connected in private or public networks. This technology offers dynamically scalable infrastructure for data, file storage, and application. Scheduling is a main task in a cloud computing environment. In cloud computing environment datacenters take care of this task. The selection of a exacting scheduling algorithm depends upon various factors like the parameter to be optimized (cost or time), quality of service to be provided and information available regarding various aspects of job. Workflow applications are the applications which need various sub-tasks to be executed in a particular fashion in order to complete the whole task. Various scheduling algorithms surveyed in this paper. The goal of cloud task scheduling is to achieve high system throughput and to assign various computing resources to applications. The Complexness of scheduling trouble increases with the size of the task and becomes very difficult to solve effectively. Min-Min algorithm is used to lessen the make span of tasks by assuming the task length. Keeping this in mind, cloud providers should achieve user satisfaction Keywords: Cloud Computing, Scheduling in cloud computing, Main Entities in cloud computing, Types of Scheduling.
Cloud computing is a type of computing based on internet that provides shared processing resource... more Cloud computing is a type of computing based on internet that provides shared processing resources and data to computers and other devices on request. Now a day’s availability of high capacity networks low cost computers and storage devices as well as the global adoption of hardware virtualization service-oriented architecture and autonomic and utility computing have guide to a growth in cloud computing. cloud computing has become a highly demanded service or utility due to the advantages of fast computing power, low cost of services, high performance, scalability, accessibility as well as availability. But in cloud computing task scheduling and provision of resources are main problem areas in cloud computing. However there are so many algorithms are given by various researchers for clouds, but none of the existing algorithms have considered the multi-objective approach to minimize the cost and completion time of a set of tasks for better scheduling of jobs to the resources. Therefo...
International Journal of Advanced Computer Science and Applications, 2017
While we might be thinking, “one of these things is not like the others,” these are all examples ... more While we might be thinking, “one of these things is not like the others,” these are all examples of the Internet of Things (IoT). The Internet of Things (IoT) connects the physical and the cyber worlds. On these days, one of the main objectives of Internet is its own progression. The Internet of Things (IoT) is a pattern where everyday objects can be furnished with classifying, sensing, networking and processing potentials that will allow them to correspond over the Internet to accomplish some purpose. The future of Internet of Things are, transform the real world things into intelligent virtual things. The Internet of Things (IoT)in tends to unite everything in our world under general infrastructures. Every object will have an exclusive identifier and will be able to locate itself and connect to the Internet. Moreover, Radio Frequency Identification (RFID) techniques will be the base of Internet of Things (IoT). Eventually, IoT devices will be pervasive, context-aware and will allow ambient ability and enable knowledge growth in proficiently. This paper reports on the current state of research and the meaning of IoT is defined with its progression structure. Moreover, present study attends to IoT conception through organized review of scholarly research papers, and professional discussions with competent. We also discussed about Internet of Things (IoT) by probing the literature, recognizing current trends and relating challenges that threaten IoT transmission. Though, this paper will give good conception for the new researchers, who want to do research in this field of Internet of
Internet of Things (IoT) is ideas that can visualize all things (objects) those are available aro... more Internet of Things (IoT) is ideas that can visualize all things (objects) those are available around us as the part of Internet. The Internet of Things (IoT) is going to change each and everything including our day-to-day life. This time we can see the uses of the IoT nearby us like in shopping malls, communication, education, science, business, government, and humanity. Clearly, the Internet is one of the most important and powerful creations in all of human history. This time the wireless devices have become the essential part of our everyday life. The purpose of this paper is to investigate the effects of IoT wireless devices on human body. In IoT all devices will be connected via RF (radiofrequency) or Wi-Fi. These devices will emit the harmful radiations which will cause the diseases like male infertility, hearing impairment, brain tumor, fetus, effect on eyes, etc. Besides, these radiations of wireless system severely affect various parts of human body. Although there is limit...
Cloud computing is a technology that uses the Internet and central remote servers to preserve dat... more Cloud computing is a technology that uses the Internet and central remote servers to preserve data and applications in a system. It also allows patrons and enterprises to utilize applications without installation and access their individual files with accessing the Internet at any computer. It also allows for much more well organized computing by centralizing data storage, bandwidth and processing. Within the last few years, Cloud computing has progressed as an important prototype for IT enterprises along with inexpensive in costs, transaction according to makes use of, scalability, quick ease of access along with more elasticity. Utmost undersized, medium and huge scale companies, organizations are moving towards cloud computing as it eliminates setting up of high-investment on IT communications and other services like Paas, NaaS and SaaS. In this system, the client data can be accessible in all around the world, controlled and maintained outside their accessibility. Accordingly, there can be privacy and security issues with the client's data. The services providers in cloud industry should convince their clients by ensuring and providing security to their accessible data. Hence, in this survey paper we present and examine different security and privacy issues obtainable in cloud computing. We have also discussed different security models top cloud service providers. Cloud computing system is consuming the globe, and each day is bringing innovative developments in this world.
—Data mining in large sensor networks just starts to attract interest. Finding patterns in such a... more —Data mining in large sensor networks just starts to attract interest. Finding patterns in such an environment is both compelling and challenging. We also outline our preliminary proposal of solutions to these problems. There has recently been a considerable amount of research work done on using data compression techniques to minimize the volume of the transmitted traffic, and the consequently assist in reducing power consumption levels in Wireless Sensor Networks. A Wireless Sensor Network is the network of small sensor nodes, which are energy constraint devices and have limited data computational and transmission control. The nodes are organized in the form of cluster around a Base Station. In this paper we have define how to improve the energy efficiency of the network by using data mining technique by discovery, usage, and understanding of patterns and knowledge, mining moving object data, mining text, Web, and other unstructured data.
International Journal of Computer Applications, 2013
There are so many researches going on learning technology. However, it is the main issue, how to ... more There are so many researches going on learning technology. However, it is the main issue, how to improve the learning through multimedia devices. Multimedia devices appoint learners and supply important learning convenience. However, it is a subject of observation, how multimedia devices encourage learners to develop a design rather than fascinating descriptions created by leftovers. In this research paper, the discussing is about advantages and disadvantages of learning through multimedia devices. The main goal of research study is, how to learn the information and observation without assets the books, how can it be possible to accomplish the learner and beginner to listen hundred percent through the multimedia devices. Furthermore, in modern days, what would be the need of observation to abstain minimum centralization and considerations through multimedia technique? How can it be popularize or strengthen the learner and observer to not be inattentive of using these multimedia devi...
Voice over IP (VoIP) technology is swiftly accepted by consumers, militaries, enterprises and gov... more Voice over IP (VoIP) technology is swiftly accepted by consumers, militaries, enterprises and governments. This technology recommend higher flexibility and more features than traditional telephony (PSTN) infrastructures, over and above the potential for lower cost through equipment consolidation, new business models for the consumer market. Voice over IP (VoIP) communications is becoming essential to the corporate world. Possibly, Voice over IP should be viewed as a chance to develop new, more effective security policies, infrastructure and processes. These all new policies and practices can have a positive impact on the security of the entire network not only voice communications. This paper provide starting point for understanding the security facets of VoIP in a rapidly evolving set of technologies that are seeing growing deployment and use. The main goal is to provide a better understanding of the security background with respect to VoIP security facet toward directing future re...
E-business security is a central issue in the commercial use of the Internet. Surveys state that ... more E-business security is a central issue in the commercial use of the Internet. Surveys state that the economic success of e-business applications is inhibited because the Internet lacks appropriate security measures. One way to increase the trust of consumers in electronic business applications is to establish a standardized quantification of security. Security is the process containing many things together. The objective of this book is to spread awareness about the security related issues and objectives (Confidentiality, Integrity, Availability, Authenticity and Non-repudation etc.). Also to provide solution to the e-business security
Sensor networks are amassed wireless networks of small, lowcost sensors that collect and propagat... more Sensor networks are amassed wireless networks of small, lowcost sensors that collect and propagate environmental data. The emerging field of wireless sensor networks integrates sensing, computation, and communication into a single device. The power of wireless sensor networks verifies in the capability to deploy huge numbers of small nodes that collaborates and configure them. Wireless sensor networks simplify monitoring and handling of physical environments from remote locations with best accuracy. Security protocols associated to sensor network are analyzed in this paper.
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a ... more Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service. Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centres that provide those services. The services are referred to as Software as a Service (SaaS). Cloud Computing also provides two more types of services i.e. Infrastructure as a Service (IaaS), Platform as a Service (PaaS). With the significant advances in Information and communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). The paper reviews and explores the actual meaning of Cloud Computing, also demonstrates a dissection of the cloud computing into three main layers, and illustrates their interrelations as well as their inter-dependency on preceding technologies. The paper also highlights and discusses the drastic change which Cloud computing has brought and describes its impact on IT Industry.
Books by Mohd Rahul
Sensor networks are amassed wireless networks of small, low-cost sensors that collect and propaga... more Sensor networks are amassed wireless networks of small, low-cost sensors that collect and propagate environmental data. The emerging field of wireless sensor networks integrates sensing, computation, and communication into a single device. The power of wireless sensor networks verifies in the capability to deploy huge numbers of small nodes that collaborates and configure them. Wireless sensor networks simplify monitoring and handling of physical environments from remote locations with best accuracy. Security protocols associated to sensor network are analyzed in this paper.
— Cloud Computing, the long-held dream of computing as a utility, has the potential to transform ... more — Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service. Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centres that provide those services. The services are referred to as Software as a Service (SaaS). Cloud Computing also provides two more types of services i.e. Infrastructure as a Service (IaaS), Platform as a Service (PaaS). With the significant advances in Information and communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). The paper reviews and explores the actual meaning of Cloud Computing, also demonstrates a dissection of the cloud computing into three main layers, and illustrates their interrelations as well as their int...
Visual cryptography is a secret sharing method that uses human eyes to decrypt the secret. It has... more Visual cryptography is a secret sharing method that uses human eyes to decrypt the secret. It has computation-free decoding process to decrypt the images. Generally visual cryptographic methods utilize the technique of secret sharing in which secret image is divided into shares and when k shares out of n stack together the secret image will reveal. In this paper we proposed a method of visual cryptography for colored images. We are using RGB color model for color images. First of all, image is divided into monochromatic channels then converts each individual image to binary image. After this we can apply basic VCS scheme. The secret image can be recovered by stacking share images. We are using Matlab7.4 for implementing our scheme.
The Classful routing protocol does not carry the subnet mask information in its routing table. RI... more The Classful routing protocol does not carry the subnet mask information in its routing table. RIP version 1 (Routing Information Protocol) is a Classful routing protocol, this was the Internet's first widely used routing protocol in networks. RIP is useful for local and medium size networks. The RIP is known as a distance-vector routing protocol, which works in the hop count as a routing metric, The RIP allowed 15 no's maximum hops counts. The 16th hop count is considered as infinite distance viewing such distance as unreachable and undesirable route in it routing process. The RIP operates the limited size of the networks. The Classless routing protocol can carry the subnet mask information, Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol, Classful routing protocol designed by Cisco Systems. EIGRP is an enhanced version of old routing protocol, as IGRP (Interior Gateway Routing Protocol). EIGRP supports VLSM and CIDR allowi...
Cloud computing comes in focus development of grid computing, virtualization and web technologies... more Cloud computing comes in focus development of grid computing, virtualization and web technologies. The cloud computing is a mingle of technologies where a large number of systems are connected in private or public networks. This technology offers dynamically scalable infrastructure for data, file storage, and application. Scheduling is a main task in a cloud computing environment. In cloud computing environment datacenters take care of this task. The selection of a exacting scheduling algorithm depends upon various factors like the parameter to be optimized (cost or time), quality of service to be provided and information available regarding various aspects of job. Workflow applications are the applications which need various sub-tasks to be executed in a particular fashion in order to complete the whole task. Various scheduling algorithms surveyed in this paper. The goal of cloud task scheduling is to achieve high system throughput and to assign various computing resources to applications. The Complexness of scheduling trouble increases with the size of the task and becomes very difficult to solve effectively. Min-Min algorithm is used to lessen the make span of tasks by assuming the task length. Keeping this in mind, cloud providers should achieve user satisfaction Keywords: Cloud Computing, Scheduling in cloud computing, Main Entities in cloud computing, Types of Scheduling.
Cloud computing is a type of computing based on internet that provides shared processing resource... more Cloud computing is a type of computing based on internet that provides shared processing resources and data to computers and other devices on request. Now a day’s availability of high capacity networks low cost computers and storage devices as well as the global adoption of hardware virtualization service-oriented architecture and autonomic and utility computing have guide to a growth in cloud computing. cloud computing has become a highly demanded service or utility due to the advantages of fast computing power, low cost of services, high performance, scalability, accessibility as well as availability. But in cloud computing task scheduling and provision of resources are main problem areas in cloud computing. However there are so many algorithms are given by various researchers for clouds, but none of the existing algorithms have considered the multi-objective approach to minimize the cost and completion time of a set of tasks for better scheduling of jobs to the resources. Therefo...
International Journal of Advanced Computer Science and Applications, 2017
While we might be thinking, “one of these things is not like the others,” these are all examples ... more While we might be thinking, “one of these things is not like the others,” these are all examples of the Internet of Things (IoT). The Internet of Things (IoT) connects the physical and the cyber worlds. On these days, one of the main objectives of Internet is its own progression. The Internet of Things (IoT) is a pattern where everyday objects can be furnished with classifying, sensing, networking and processing potentials that will allow them to correspond over the Internet to accomplish some purpose. The future of Internet of Things are, transform the real world things into intelligent virtual things. The Internet of Things (IoT)in tends to unite everything in our world under general infrastructures. Every object will have an exclusive identifier and will be able to locate itself and connect to the Internet. Moreover, Radio Frequency Identification (RFID) techniques will be the base of Internet of Things (IoT). Eventually, IoT devices will be pervasive, context-aware and will allow ambient ability and enable knowledge growth in proficiently. This paper reports on the current state of research and the meaning of IoT is defined with its progression structure. Moreover, present study attends to IoT conception through organized review of scholarly research papers, and professional discussions with competent. We also discussed about Internet of Things (IoT) by probing the literature, recognizing current trends and relating challenges that threaten IoT transmission. Though, this paper will give good conception for the new researchers, who want to do research in this field of Internet of
Internet of Things (IoT) is ideas that can visualize all things (objects) those are available aro... more Internet of Things (IoT) is ideas that can visualize all things (objects) those are available around us as the part of Internet. The Internet of Things (IoT) is going to change each and everything including our day-to-day life. This time we can see the uses of the IoT nearby us like in shopping malls, communication, education, science, business, government, and humanity. Clearly, the Internet is one of the most important and powerful creations in all of human history. This time the wireless devices have become the essential part of our everyday life. The purpose of this paper is to investigate the effects of IoT wireless devices on human body. In IoT all devices will be connected via RF (radiofrequency) or Wi-Fi. These devices will emit the harmful radiations which will cause the diseases like male infertility, hearing impairment, brain tumor, fetus, effect on eyes, etc. Besides, these radiations of wireless system severely affect various parts of human body. Although there is limit...
Cloud computing is a technology that uses the Internet and central remote servers to preserve dat... more Cloud computing is a technology that uses the Internet and central remote servers to preserve data and applications in a system. It also allows patrons and enterprises to utilize applications without installation and access their individual files with accessing the Internet at any computer. It also allows for much more well organized computing by centralizing data storage, bandwidth and processing. Within the last few years, Cloud computing has progressed as an important prototype for IT enterprises along with inexpensive in costs, transaction according to makes use of, scalability, quick ease of access along with more elasticity. Utmost undersized, medium and huge scale companies, organizations are moving towards cloud computing as it eliminates setting up of high-investment on IT communications and other services like Paas, NaaS and SaaS. In this system, the client data can be accessible in all around the world, controlled and maintained outside their accessibility. Accordingly, there can be privacy and security issues with the client's data. The services providers in cloud industry should convince their clients by ensuring and providing security to their accessible data. Hence, in this survey paper we present and examine different security and privacy issues obtainable in cloud computing. We have also discussed different security models top cloud service providers. Cloud computing system is consuming the globe, and each day is bringing innovative developments in this world.
—Data mining in large sensor networks just starts to attract interest. Finding patterns in such a... more —Data mining in large sensor networks just starts to attract interest. Finding patterns in such an environment is both compelling and challenging. We also outline our preliminary proposal of solutions to these problems. There has recently been a considerable amount of research work done on using data compression techniques to minimize the volume of the transmitted traffic, and the consequently assist in reducing power consumption levels in Wireless Sensor Networks. A Wireless Sensor Network is the network of small sensor nodes, which are energy constraint devices and have limited data computational and transmission control. The nodes are organized in the form of cluster around a Base Station. In this paper we have define how to improve the energy efficiency of the network by using data mining technique by discovery, usage, and understanding of patterns and knowledge, mining moving object data, mining text, Web, and other unstructured data.
International Journal of Computer Applications, 2013
There are so many researches going on learning technology. However, it is the main issue, how to ... more There are so many researches going on learning technology. However, it is the main issue, how to improve the learning through multimedia devices. Multimedia devices appoint learners and supply important learning convenience. However, it is a subject of observation, how multimedia devices encourage learners to develop a design rather than fascinating descriptions created by leftovers. In this research paper, the discussing is about advantages and disadvantages of learning through multimedia devices. The main goal of research study is, how to learn the information and observation without assets the books, how can it be possible to accomplish the learner and beginner to listen hundred percent through the multimedia devices. Furthermore, in modern days, what would be the need of observation to abstain minimum centralization and considerations through multimedia technique? How can it be popularize or strengthen the learner and observer to not be inattentive of using these multimedia devi...
Voice over IP (VoIP) technology is swiftly accepted by consumers, militaries, enterprises and gov... more Voice over IP (VoIP) technology is swiftly accepted by consumers, militaries, enterprises and governments. This technology recommend higher flexibility and more features than traditional telephony (PSTN) infrastructures, over and above the potential for lower cost through equipment consolidation, new business models for the consumer market. Voice over IP (VoIP) communications is becoming essential to the corporate world. Possibly, Voice over IP should be viewed as a chance to develop new, more effective security policies, infrastructure and processes. These all new policies and practices can have a positive impact on the security of the entire network not only voice communications. This paper provide starting point for understanding the security facets of VoIP in a rapidly evolving set of technologies that are seeing growing deployment and use. The main goal is to provide a better understanding of the security background with respect to VoIP security facet toward directing future re...
E-business security is a central issue in the commercial use of the Internet. Surveys state that ... more E-business security is a central issue in the commercial use of the Internet. Surveys state that the economic success of e-business applications is inhibited because the Internet lacks appropriate security measures. One way to increase the trust of consumers in electronic business applications is to establish a standardized quantification of security. Security is the process containing many things together. The objective of this book is to spread awareness about the security related issues and objectives (Confidentiality, Integrity, Availability, Authenticity and Non-repudation etc.). Also to provide solution to the e-business security
Sensor networks are amassed wireless networks of small, lowcost sensors that collect and propagat... more Sensor networks are amassed wireless networks of small, lowcost sensors that collect and propagate environmental data. The emerging field of wireless sensor networks integrates sensing, computation, and communication into a single device. The power of wireless sensor networks verifies in the capability to deploy huge numbers of small nodes that collaborates and configure them. Wireless sensor networks simplify monitoring and handling of physical environments from remote locations with best accuracy. Security protocols associated to sensor network are analyzed in this paper.
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a ... more Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service. Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centres that provide those services. The services are referred to as Software as a Service (SaaS). Cloud Computing also provides two more types of services i.e. Infrastructure as a Service (IaaS), Platform as a Service (PaaS). With the significant advances in Information and communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). The paper reviews and explores the actual meaning of Cloud Computing, also demonstrates a dissection of the cloud computing into three main layers, and illustrates their interrelations as well as their inter-dependency on preceding technologies. The paper also highlights and discusses the drastic change which Cloud computing has brought and describes its impact on IT Industry.