SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Awad Ali Ismail) "

Sökning: WFRF:(Awad Ali Ismail)

  • Resultat 51-60 av 91
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
51.
  • Awad, Ali Ismail (författare)
  • From classical methods to animal biometrics: A review on cattle identification and tracking
  • 2016
  • Ingår i: Computers and Electronics in Agriculture. - : Elsevier BV. - 0168-1699 .- 1872-7107. ; 123, s. 423-435
  • Tidskriftsartikel (refereegranskat)abstract
    • Cattle, buffalo and cow, identification has recently played an influential role towards understanding disease trajectory, vaccination and production management, animal traceability, and animal ownership assignment. Cattle identification and tracking refers to the process of accurately recognizing individual cattle and their products via a unique identifier or marker. Classical cattle identification and tracking methods such as ear tags, branding, tattooing, and electrical methods have long been in use; however, their performance is limited due to their vulnerability to losses, duplications, fraud, and security challenges. Owing to their uniqueness, immutability, and low costs, biometric traits mapped into animal identification systems have emerged as a promising trend. Biometric identifiers for beef animals include muzzle print images, iris patterns, and retinal vascular patterns. Although using biometric identifiers has replaced human experts with computerized systems, it raises additional challenges in terms of identifier capturing, identification accuracy, processing time, and overall system operability. This article reviews the evolution in cattle identification and tracking from classical methods to animal biometrics. It reports on traditional animal identification methods and their advantages and problems. Moreover, this article describes the deployment of biometric identifiers for effectively identifying beef animals. The article presents recent research findings in animal biometrics, with a strong focus on cattle biometric identifiers such as muzzle prints, iris patterns, and retinal vascular patterns. A discussion of current challenges involved in the biometric-based identification systems appears in the conclusions, which may drive future research directions.
  •  
52.
  • Awad, Ali Ismail, et al. (författare)
  • Impact of Some Biometric Modalities on Forensic Science
  • 2014
  • Ingår i: Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. - Cham : Springer International Publishing. - 9783319058849 - 9783319058856 ; , s. 47-62
  • Bokkapitel (refereegranskat)abstract
    • Recently, forensic science has had many challenges in many different types of crimes and crime scenes, vary from physical crimes to cyber or computer crimes. Accurate and efficient human identification or recognition have become crucial for forensic applications due to the large diversity of crime scenes, and because of the increasing need to accurately identify criminals from the available crime evidences. Biometrics is an emerging technology that provides accurate and highly secure personal identification and verification systems for civilian and forensic applications. The positive impact of biometric modalities on forensic science began with the rapid developments in computer science, computational intelligence, and computing approaches. These advancements have been reflected in the biometric modality capturing process, feature extraction, feature robustness, and features matching. A complete and automatic biometric identification or recognition systems have been built accordingly. This chapter presents a study of the impacts of using some biometric modalities in forensic applications. Although biometrics identification replaces human work with computerized and automatic systems in order to achieve better performance, new challenges have arisen. These challenges lie in biometric system reliability and accuracy, system response time, data mining and classification, and protecting user privacy. This chapter sheds light on the positive and the negative impacts of using some biometric modalities in forensic science. In particular, the impacts of fingerprint image, facial image, and iris patterns are considered. The selected modalities are covered preliminarily before tackling their impact on forensic applications. Furthermore, an extensive look at the future of biometric modalities deployment in forensic applications is covered as the last part of the chapter.
  •  
53.
  • Awad, Ali Ismail (författare)
  • Introduction to Information Security Foundations and Applications
  • 2018
  • Ingår i: Information Security. - : Institution of Engineering and Technology. - 9781849199742 - 9781849199766 ; , s. 3-9
  • Bokkapitel (refereegranskat)abstract
    • Information security has extended to include several research directions like user authentication and authorization, network security, hardware security, software security, and data cryptography. Information security has become a crucial need for protecting almost all information transaction applications. Security is considered as an important science discipline whose many multifaceted complexities deserve the synergy of the computer science and engineering communities.
  •  
54.
  • Awad, Ali Ismail, et al. (författare)
  • Preface
  • 2021
  • Ingår i: Security in Cyber-Physical Systems. - : Springer Nature. ; , s. v-ix
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
55.
  • Awad, Ali Ismail, et al. (författare)
  • Preface
  • 2022
  • Ingår i: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications. - : John Wiley & Sons. ; , s. xix-xxiii
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
56.
  •  
57.
  • Baker, Thar, et al. (författare)
  • Enabling Technologies for Energy Cloud
  • 2021
  • Ingår i: Journal of Parallel and Distributed Computing. - : Elsevier. - 0743-7315 .- 1096-0848. ; 152, s. 108-110
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)abstract
    • We are thrilled and delighted to present this special issue, which emphasises on the novel area of Enabling Technologies for Energy Cloud. This guest editorial provides an overview of all articles accepted for publication in this special issue.
  •  
58.
  •  
59.
  • Charif, Bilal, et al. (författare)
  • Business and Government Organizations' Adoption of Cloud Computing
  • 2014
  • Ingår i: Intelligent Data Engineering and Automated Learning – IDEAL 2014. - Switzerland : Springer International Publishing. - 9783319108391 - 9783319108407 ; , s. 492-501
  • Konferensbidrag (refereegranskat)abstract
    • Cloud computing is very much accepted and acknowledged worldwide as a promising computing paradigm. On-demand provisioning based on a pay-per-use business model helps reduce costs through sharing computing and storage resources. Although cloud computing has become popular, some business and government organizations are still lagging behind in adopting cloud computing. This study reports the status of cloud utilization among business and government organizations, and the concerns of organizations regarding the adoption of cloud computing. The study shows that some government agencies are lagging behind in cloud computing use, while others are leading the way. Security is identified as the major reason for delay in adopting cloud computing. The outcomes of the data analysis process prove that some security measures such as encryption, access authentication, antivirus protection, firewall, and service availability are required by clients for adoption of cloud computing in the future.
  •  
60.
  • Charif, Bilal, et al. (författare)
  • Towards smooth organisational adoption of cloud computing : a customer-provider security adaptation
  • 2016
  • Ingår i: Computer fraud & security. - 1361-3723 .- 1873-7056. ; 2016:2, s. 7-15
  • Tidskriftsartikel (refereegranskat)abstract
    • Cloud computing is daily becoming more and more accepted as a promising computing paradigm. For some years now, cloud computing has been in common use for such applications as Google apps (email, documents, etc), MSN Messenger (instant messaging), Skype (voice communications), and Flickr (image sharing). The idea of offering cloud computing facilities as a public utility began as early as the 1960s with John McCarthy.1, 2, 3 and 4 Organisations and universities offered distributed computing starting in the late 1970s through dial-up access.5 Grid computing was introduced in the early 1990s with the idea of providing access to shared computing power similar to the way electricity is shared through the electric power grid. In addition, open source platforms were first introduced by Eucalyptus, OpenNebula, and Nimbus for deploying private and hybrid clouds.6, 7 and 8Although cloud computing has been available for some time, there is still some organisational resistance to its adoption, not least because of security concerns.Bilal Charif, of Luleå University of Technology, Sweden and Ali Ismail Awad of Luleå University and Al Azhar University, Egypt show that a number of organisations have no internal security responsibilities, nor do they have proper information security policies such as business and disaster recovery plans, all of which makes cloud adoption difficult. In contrast, cloud computing offers recovery plans for small and medium-sized organisations that will often otherwise not be implemented.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 51-60 av 91

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy