Mohamed Mohamed

ORCID: 0000-0002-3467-4252
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Service-Oriented Architecture and Web Services
  • Advanced Data Storage Technologies
  • IoT and Edge/Fog Computing
  • Distributed systems and fault tolerance
  • Business Process Modeling and Analysis
  • Peer-to-Peer Network Technologies
  • Blockchain Technology Applications and Security
  • Software System Performance and Reliability
  • Cryptography and Data Security
  • Advanced Software Engineering Methodologies
  • Caching and Content Delivery
  • Context-Aware Activity Recognition Systems
  • Energy Efficient Wireless Sensor Networks
  • Metaheuristic Optimization Algorithms Research
  • Cloud Data Security Solutions
  • Video Surveillance and Tracking Methods
  • Robotic Path Planning Algorithms
  • Privacy-Preserving Technologies in Data
  • Islamic Finance and Banking Studies
  • IoT Networks and Protocols
  • Digital Marketing and Social Media
  • Smart Parking Systems Research
  • Organizational and Employee Performance

University of British Columbia
2024

MIT Lincoln Laboratory
2024

University of Wisconsin–Green Bay
2021

Al-Azhar University
2021

University of Sadat City
2021

Michigan Technological University
2020

University of Bridgeport
2019

IBM Research - Almaden
2015-2019

Apple (United Kingdom)
2019

Northeastern University
2019

Traditional Cloud model is not designed to handle latency-sensitive Internet of Things applications. The new trend consists on moving data be processed close where it was generated. To this end, Fog Computing paradigm suggests using the compute and storage power network elements. In such environments, intelligent scalable orchestration thousands heterogeneous devices in complex environments critical for IoT Service providers. vision paper, we present a framework, called Foggy, that...

10.1109/aims.2017.14 article EN 2017-06-01

The state-of-the-art scheduler of containerized cloud services considers load balance as the only criterion; many other important properties, including application performance, are overlooked. In era Big Data, however, applications evolve to be increasingly more data-intensive thus perform poorly when deployed on services. To that end, this paper aims improve today's service by taking performance into account for next-generation container schedulers. More specifically, in work we build and...

10.1109/tcc.2018.2794344 article EN IEEE Transactions on Cloud Computing 2018-01-16

The study we have conducted of existing cloud platforms shows that their operating requires the use specific and proprietary APIs. This PaaS providers' policy is hampering interactions between different clouds. If appropriate solutions are not considered, this issue would for instance slow down democratization clouds federation cooperation. In paper, propose (i) a unified description model allows representation applications independently targeted hosting (ii) generic application provisioning...

10.1109/cloud.2013.105 preprint EN 2013-06-01

Container management frameworks, such as Docker, package diverse applications and their complex dependencies in self-contained images, which facilitates application deployment, distribution, sharing. Currently, Docker employs a shared-nothing storage architecture, i.e. every Docker-enabled host requires its own copy of an image on local to create run containers. This greatly inflates utilization, network load, job completion times the cluster. In this paper, we investigate option storing...

10.1145/3267809.3267836 article EN 2018-09-28

Docker containers have become a prominent solution for supporting modern enterprise applications due to the highly desirable features of isolation, low overhead, and efficient packaging execution environment. Containers are created from images which shared between users via registry. The amount data registries store is massive; example, Hub, popular public registry, stores at least half million images. In this paper, we analyze over 167 TB uncompressed Hub images, characterize them using...

10.1109/cluster.2019.8891000 article EN 2019-09-01

A modified version of the artificial Bee Colony Algorithm (ABC) was suggested namely Adaptive Dimension Limit- Artificial (ADL-ABC). To determine optimum global path for mobile robot that satisfies chosen criteria shortest distance and collision–free with circular shaped static obstacles on environment. The cubic polynomial connects start point to end through three via points used, so generated paths are smooth achievable by robot. Two case studies (or scenarios) presented in this task...

10.30684/etj.v38i9a.1100 article EN Engineering and Technology Journal 2020-09-25

Cloud Computing is a new supplement, consumption, and delivery model for IT services based on Internet protocols. It typically involves provisioning of dynamically scalable often virtualized resources. In this environment, there are several issues related to the inadequacies hosting platforms mechanisms ensure smooth running service-based applications (communication protocols, ESB, Service containers, etc.). particular, architectures implementations service containers not adapted...

10.1109/cloudcom.2011.54 preprint EN 2011-11-01

Containers are a widely successful technology today popularized by Docker. improve system utilization increasing workload density. Docker containers enable seamless deployment of workloads across development, test, and production environments. Docker's unique approach to data management, which involves frequent snapshot creation removal, presents new set exciting challenges for storage systems. At the same time, management has remained largely unexplored with dizzying array solution choices...

10.1109/fas-w.2017.148 article EN 2017-09-01

Docker container images are typically stored in a centralized registry to allow easy sharing of images. However, with the growing popularity containerized software, number that needs store and rate requests it serve increasing rapidly. Current design requires hosting services across multiple loosely connected servers different roles such as load balancers, proxies, servers, object storage servers. Due various individual components, registries hard scale benefits from optimizations caching...

10.1109/cloud.2019.00065 article EN 2019-07-01

Cloud computing describes a new supplement, consumption, and delivery model for IT services based on Internet protocols, it typically involves provisioning of dynamically scalable often virtualized resources. In this paper, we propose to design implement service micro-container address scalability by reducing memory consumption response time. We dedicate each deployed thus avoid the processing limits classical containers. Our is evaluated compared conventional Web containers highlight our...

10.1109/wetice.2011.51 preprint EN 2011-06-01

Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due criticality for customers. In order speed up adoption by service and consumers make them more actionable, SLAs monitoring should be described in a machine-processable, agile extensible way. Several tools SLA management are available on market but most deal with performance metrics do not refer properties. There other cloud security, non-SLA However, they associated systems....

10.1109/ieee.edge.2017.20 preprint EN 2017-06-01

Managing service quality in heterogeneous Cloud environments is complex: different providers expose management interfaces. To manage Service Level Agreements (SLAs) this context, we have developed the rSLA framework that enables fast setup of SLA monitoring dynamic and environments. The made up three main components: language to formally represent SLAs, Service, which interprets SLAs implements behavior specified them, a set Xlets - lightweight, dynamically bound adapters controlling In...

10.1109/scc.2016.87 preprint EN 2016-06-01

Due to their tight isolation, low overhead, and efficient packaging of the execution environment, Docker containers have become a prominent solution for deploying modern applications. Containers are created from images which stored in registry. An image consists list layers can be shared among images. registries store large amount with increasing popularity Docker, they continue grow. For example, Hub-a popular public registry-stores more than half million In this paper, we analyze over...

10.1109/cloud.2019.00096 article EN 2019-07-01

In this paper, we present C-ABSC, a cooperative privacy preserving attribute based signcryption mechanism. It consists on performing the combined signing and encrypting processes of set data devices' inputs in secure collaborative manner. The main idea behind C-ABSC relies distribution signcrypting operation among different devices, with respect to selected sub-sets general access predicate, such as an untrusted aggregating entity is capable decrypting received aggregated only if sufficient...

10.1109/scc.2018.00040 article EN 2018-07-01

The quality of Cloud services is a key determinant the overall service level provider offers to its customers. Service Level Agreements (SLAs) are crucial for customers ensure that promised levels met, and an important sales instrument differentiating factor providers. providers offer at different abstraction, from infrastructure applications. Also, often selected more dynamically than in traditional IT services, as result, SLAs need be set up monitoring implemented match this speed. This...

10.1109/cloud.2016.0062 preprint EN 2016-06-01

Intrusion Detection is crucial in contemporary cybersecurity landscapes to proactively thwart and identify possible threats. The risk of data breaches, malicious activities, unauthorized access escalates as organizations increasingly rely on interconnected systems. Systems (IDS) are imperative for the continuous monitoring system network quickly identifying patterns or anomalies indicative cyber IDS acts a frontline defense mechanism with ability abnormal behaviors known attack signatures....

10.54216/ijns.240415 article EN International Journal of Neutrosophic Science 2024-01-01

In Internet of Things (IoT) environments, there are multiple sensors and devices monitoring different metrics producing massive amounts data. Monitoring can be done at frequencies. Systems applications that consume data typically use constrained IT resources, e.g., network facilities, storage, display, processing/computing power, energy. Given the limited quantity resources used by these systems applications, it is impossible to able collect all in application's context with a very high...

10.1109/scc.2017.55 article EN 2017-06-01

10.1016/j.future.2018.12.015 article EN Future Generation Computer Systems 2018-12-15

Monitoring and reconfiguration are critical issues in Cloud environments. allows to detect violations specific events, while activate corrective mechanisms or runtime modifications. In this paper we propose an extension for Open Computing Interface (OCCI) enable monitoring reconfiguration. The describes the needed elements manage (i.e., monitor reconfigure) cloud resources on demand. definition entails introduction of new OCCI Resources, Links Mixins. We define one hand types metrics based a...

10.1109/cloudcom.2013.78 preprint EN 2013-12-01

10.1016/j.jss.2016.01.002 article EN Journal of Systems and Software 2016-01-15

There has been an increasing number of companies moving towards cloud computing due to its economic model based on the so-called pay-as-you-go. The is known as a dynamic and scalable environment. These characteristics make management this environment complex task. Using autonomic potentially helps solve complexity managing large provisioned resources. Since using one manager (AM) might result inefficiency in system, we propose paper use decentralized approach for management. problem that are...

10.1109/soli.2015.7367597 article EN 2015-11-01
Coming Soon ...