Blockchain technology has revolutionized economic transactions, and it is expected to spread and ... more Blockchain technology has revolutionized economic transactions, and it is expected to spread and influence other fields. It can create innovative and destructive effects on the systems that need to be executed, store, verified, and continually update digital data among participating parties. Moreover, it provides security, privacy, trust, and transparency. In the education field, there is a shy presence of some blockchain applications, and the majority of them have a pilot character. Hence, a model based on blockchain is introduced in this study, which aims to provides easy to apply for certificates, as well as share and verify these certificates with a third party. Moreover, the mechanism of the proposed model proposes permanent distributed hashes records of students’ certificates in Higher Education to reduce forgery. In conclusion, the study discussed the opportunities, benefits, features, and challenges are represented by deploying this model in the Higher Education field.
JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences, 2017
Malicious software is any type of software or codes which hooks some: private information, data f... more Malicious software is any type of software or codes which hooks some: private information, data from the computer system, computer operations or(and) merely just to do malicious goals of the author on the computer system, without permission of the computer users. (The short abbreviation of malicious software is Malware). However, the detection of malware has become one of biggest issues in the computer security field because of the current communication infrastructures are vulnerable to penetration from many types of malware infection strategies and attacks. Moreover, malwares are variant and diverse in volume and types and that strictly explode the effectiveness of traditional defense methods like signature approach, which is unable to detect a new malware. However, this vulnerability will lead to a successful computer system penetration (and attack) as well as success of more advanced attacks like distributed denial of service (DDoS) attack. Data mining methods can be used to ove...
Waste management & research : the journal of the International Solid Wastes and Public Cleansing Association, ISWA, 2017
Health care activities can generate different kinds of hazardous wastes. Mismanagement of these w... more Health care activities can generate different kinds of hazardous wastes. Mismanagement of these wastes can result in environmental and occupational health risks. Developing countries are resource-constrained when it comes to safe management of hospital wastes. This study summarizes the main issues faced in hospital waste management in developing countries. A review of the existing literature suggests that regulations and legislations focusing on hospital waste management are recent accomplishments in many of these countries. Implementation of these rules varies from one hospital to another. Moreover, wide variations exist in waste generation rates within as well as across these countries. This is mainly attributable to a lack of an agreement on the definitions and the methodology among the researchers to measure such wastes. Furthermore, hospitals in these countries suffer from poor waste segregation, collection, storage, transportation and disposal practices, which can lead to occu...
Proper management of healthcare waste is a critical concern in many countries of the world. Rapid... more Proper management of healthcare waste is a critical concern in many countries of the world. Rapid urbanization and population growth rates pose serious challenges to healthcare waste management infrastructure in such countries. This study was aimed at assessing the situation of hospital waste management in a major city of Pakistan. Simple random sampling was used to select 12 government and private hospitals in the city. Field visits, physical measurements, and questionnaire survey method were used for data collection. Information was obtained regarding hospital waste generation, segregation, collection, storage, transportation, and disposal. Data envelopment analysis (DEA) was used to classify the hospitals on the basis of their relative waste management efficiencies. The weighted average total waste generation at the surveyed hospitals was discovered to be 1.53 kg/patient/day of which 75.15% consisted of general waste and the remaining consisted of biomedical waste. Of the total w...
AbstractTwo embedded processor based fault injection case studies are presented which are applic... more AbstractTwo embedded processor based fault injection case studies are presented which are applicable to Field Programmable Gate Arrays (FPGAs) and FPGA cores in configurable System-on-Chip (SoC) implementations. The case studies include embedded hard core ...
Blockchain technology has revolutionized economic transactions, and it is expected to spread and ... more Blockchain technology has revolutionized economic transactions, and it is expected to spread and influence other fields. It can create innovative and destructive effects on the systems that need to be executed, store, verified, and continually update digital data among participating parties. Moreover, it provides security, privacy, trust, and transparency. In the education field, there is a shy presence of some blockchain applications, and the majority of them have a pilot character. Hence, a model based on blockchain is introduced in this study, which aims to provides easy to apply for certificates, as well as share and verify these certificates with a third party. Moreover, the mechanism of the proposed model proposes permanent distributed hashes records of students’ certificates in Higher Education to reduce forgery. In conclusion, the study discussed the opportunities, benefits, features, and challenges are represented by deploying this model in the Higher Education field.
JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences, 2017
Malicious software is any type of software or codes which hooks some: private information, data f... more Malicious software is any type of software or codes which hooks some: private information, data from the computer system, computer operations or(and) merely just to do malicious goals of the author on the computer system, without permission of the computer users. (The short abbreviation of malicious software is Malware). However, the detection of malware has become one of biggest issues in the computer security field because of the current communication infrastructures are vulnerable to penetration from many types of malware infection strategies and attacks. Moreover, malwares are variant and diverse in volume and types and that strictly explode the effectiveness of traditional defense methods like signature approach, which is unable to detect a new malware. However, this vulnerability will lead to a successful computer system penetration (and attack) as well as success of more advanced attacks like distributed denial of service (DDoS) attack. Data mining methods can be used to ove...
Waste management & research : the journal of the International Solid Wastes and Public Cleansing Association, ISWA, 2017
Health care activities can generate different kinds of hazardous wastes. Mismanagement of these w... more Health care activities can generate different kinds of hazardous wastes. Mismanagement of these wastes can result in environmental and occupational health risks. Developing countries are resource-constrained when it comes to safe management of hospital wastes. This study summarizes the main issues faced in hospital waste management in developing countries. A review of the existing literature suggests that regulations and legislations focusing on hospital waste management are recent accomplishments in many of these countries. Implementation of these rules varies from one hospital to another. Moreover, wide variations exist in waste generation rates within as well as across these countries. This is mainly attributable to a lack of an agreement on the definitions and the methodology among the researchers to measure such wastes. Furthermore, hospitals in these countries suffer from poor waste segregation, collection, storage, transportation and disposal practices, which can lead to occu...
Proper management of healthcare waste is a critical concern in many countries of the world. Rapid... more Proper management of healthcare waste is a critical concern in many countries of the world. Rapid urbanization and population growth rates pose serious challenges to healthcare waste management infrastructure in such countries. This study was aimed at assessing the situation of hospital waste management in a major city of Pakistan. Simple random sampling was used to select 12 government and private hospitals in the city. Field visits, physical measurements, and questionnaire survey method were used for data collection. Information was obtained regarding hospital waste generation, segregation, collection, storage, transportation, and disposal. Data envelopment analysis (DEA) was used to classify the hospitals on the basis of their relative waste management efficiencies. The weighted average total waste generation at the surveyed hospitals was discovered to be 1.53 kg/patient/day of which 75.15% consisted of general waste and the remaining consisted of biomedical waste. Of the total w...
AbstractTwo embedded processor based fault injection case studies are presented which are applic... more AbstractTwo embedded processor based fault injection case studies are presented which are applicable to Field Programmable Gate Arrays (FPGAs) and FPGA cores in configurable System-on-Chip (SoC) implementations. The case studies include embedded hard core ...
Uploads
Papers by Mustafa Ali