Work place: Asia Pacific University of Technology & Innovation (APU), Technology Park Malaysia, Bukit Jalil, 57000 Kuala Lumpur, Malaysia
E-mail: babak.basharirad@apu.edu.my
Website:
Research Interests: Image Processing, Network Security, Image Manipulation, Image Compression, Artificial Intelligence
Biography
Babak Bashari Rad received his B.Sc. of computer engineering (software) in 1996 and M.Sc. of computer engineering (Artificial intelligence and robotics) in 2001 from University of Shiraz; and Ph.D. of computer science (information security) in 2013 from University technology of Malaysia. Currently, he is the program leader of post graduate studies and senior lecturer in school of computing, Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur Malaysia. His main research interest covers a broad range of various areas in computer science and information technology including information security, malware detection, machine learning, artificial intelligence, image processing, robotics, and other relevant fields.
By Tinankoria Diaby Babak Bashari Rad
DOI: https://doi.org/10.5815/ijitcs.2017.06.07, Pub. Date: 8 Jun. 2017
This paper presents a selected short review on Cloud Computing by explaining its evolution, history, and definition of cloud computing. Cloud computing is not a brand-new technology, but today it is one of the most emerging technology due to its powerful and important force of change the manner data and services are managed. This paper does not only contain the evolution, history, and definition of cloud computing, but it also presents the characteristics, the service models, deployment models and roots of the cloud.
[...] Read more.By Harrison John Bhatti Babak Bashari Rad
DOI: https://doi.org/10.5815/ijitcs.2017.04.02, Pub. Date: 8 Apr. 2017
Information Technology industry has been using the traditional relational databases for about 40 years. However, in the most recent years, there was a substantial conversion in the IT industry in terms of commercial applications. Stand-alone applications have been replaced with electronic applications, committed servers with various appropriate servers and devoted storage with system storage. Lower fee, flexibility, the model of pay-as-you-go are the main reasons, which caused the distributed computing are turned into reality. This is one of the most significant revolutions in Information Technology, after the emergence of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting to be more familiar to communities. They highlighted the obstacles of current social databases in terms of usability, flexibility, and provisioning. Cloud databases are essentially employed for information-escalated applications, such as storage and mining of huge data or commercial data. These applications are flexible and multipurpose in nature. Numerous value-based information administration applications, like banking, online reservation, e-trade and inventory administration, etc. are produced. Databases with the support of these types of applications have to include four important features: Atomicity, Consistency, Isolation, and Durability (ACID), although employing these databases is not simple for using in the cloud. The goal of this paper is to find out the advantages and disadvantages of databases widely employed in cloud systems and to review the challenges in developing cloud databases.
[...] Read more.By Michael Onuoha Thomas Babak Bashari Rad
DOI: https://doi.org/10.5815/ijitcs.2017.02.01, Pub. Date: 8 Feb. 2017
As technology continues to advance, the need to create benchmark or standards for systems becomes a necessity so as to ensure that these new advanced systems functions at its maximum capacity over a long period of time without any failure, fault or errors occurring. The internet of things technology promises a broad range of exciting products and services, with car tracking technology as part of the broad range of technological concept under the internet of things paradigm. The car tracking technology involves deploying some basic internet of things components into the tracking of important transportation component; the basic principle behind any technological concept involves delivery of high quality product that conforms to specifications. In this paper, the concept and technological description about the internet of things is discussed with emphasis on the principal functional component, this is to enable a broaden conceptualization about car tracking technology because it needs to function correctly, at all time. The concept of reliability engineering is also discussed in respect to an important quality factor, which entails that systems must function correctly without fault, failure or errors, it provides benchmark, principles, or standards in which the internet of things system must possess for an increased quality assurance.
[...] Read more.By Ugochi Oluwatosin Nwokedi Beverly Amunga Onyimbo Babak Bashari Rad
DOI: https://doi.org/10.5815/ijitcs.2016.05.08, Pub. Date: 8 May 2016
Systems carry sensitive data where users are involved. There is need for security concern for the modern software applications. We can term them as 'untrusted clients'. Internet usage has rapidly grown over the years and, more users are opening their information system to their clientele, it is essential to understand users' data that need protecting and to control system access as well and the rights of users of the system. Because of today's increasingly nomadic lifestyle, where they allow users to connect to information systems from anywhere with all the devices in the market, the users need to carry part of the information system out of the secure infrastructure. Insecurity in user interfaces is caused by user ignoring functionalities in the system where some are not only a threat but can harm the system e.g. leaving network services active even though the user does not need them, or when a user is having little or no information of the available security measures. This research paper aims critically address through a review of existing literature, the importance of balance or trade-off between usability and the security of the system. Systematic review method involved a physical exploration of some conference proceedings and journals to conduct the literature review. Research questions relating to usability and security were asked and the criteria for usability and security evaluations were identified. This systematic literature review is valuable in closing the gap between usability and security in software development process, where usability and security engineering needs to be considered for a better quality end-user software.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals