Information and Computer Science Department Research Profile Information and Computer Science...
-
Upload
chrystal-sherman -
Category
Documents
-
view
217 -
download
5
Transcript of Information and Computer Science Department Research Profile Information and Computer Science...
Information and Computer Information and Computer Science DepartmentScience Department
Research ProfileResearch Profile
Information and Computer Information and Computer Science DepartmentScience Department
Research ProfileResearch Profile
Dr. Sadiq M. Sait
Information and Computer Science Department
King Fahd University of Petroleum & Minerals
Dr. Sadiq M. Sait
Information and Computer Science Department
King Fahd University of Petroleum & Minerals
Information and Computer Science FacultyInformation and Computer Science FacultyInformation and Computer Science FacultyInformation and Computer Science Faculty
25 Professorial Rank faculty members• 1 Full Professor
• 5 Associate Professors
• 19 Assistant Professors
2 PhD. Holders• 1 Instructor
• 1 Lecturer
25 Professorial Rank faculty members• 1 Full Professor
• 5 Associate Professors
• 19 Assistant Professors
2 PhD. Holders• 1 Instructor
• 1 Lecturer
ICS Research AreasICS Research AreasICS Research AreasICS Research Areas
Computer Vision, Image Audio and Video Processing and Arabization.
Artificial Intelligence: Theorem Proving, Software and hardware Verification, machine learning, pattern recognition, Uncertainty and knowledge Reasoning
Computer Networks: Network design, Performance and Optimization, Mobile and Distributed Computing Systems, High-Speed Networks, Sensor Networks, Active Networks.
Operating Systems: OS for Mobile devices, Distributed Systems, Multi-Agent Systems, Multimedia Systems, Computer Security.
Software Engineering: Object-oriented Software Engineering, Software Design, Software Measurements
Computer Science Education and eLearning. Computer Algorithms: Parallel Computing, Computational
Geometry, Randomized Algorithms, Grid Computing, Web-mining, data mining.
Database Systems: Database Design, Query Optimization, XML Databases, Multimedia Databases
Computer Vision, Image Audio and Video Processing and Arabization.
Artificial Intelligence: Theorem Proving, Software and hardware Verification, machine learning, pattern recognition, Uncertainty and knowledge Reasoning
Computer Networks: Network design, Performance and Optimization, Mobile and Distributed Computing Systems, High-Speed Networks, Sensor Networks, Active Networks.
Operating Systems: OS for Mobile devices, Distributed Systems, Multi-Agent Systems, Multimedia Systems, Computer Security.
Software Engineering: Object-oriented Software Engineering, Software Design, Software Measurements
Computer Science Education and eLearning. Computer Algorithms: Parallel Computing, Computational
Geometry, Randomized Algorithms, Grid Computing, Web-mining, data mining.
Database Systems: Database Design, Query Optimization, XML Databases, Multimedia Databases
ICS Research Projects: ICS Research Projects: Computer Vision, Computer Vision, Image, Audio, and Video ProcessingImage, Audio, and Video ProcessingICS Research Projects: ICS Research Projects: Computer Vision, Computer Vision, Image, Audio, and Video ProcessingImage, Audio, and Video Processing
Towards the Further Study of Designing with NURBS & ANURBS: The CAD/CAM/CAE Tools.
Automatic Text Recognition: A Need in Arabization, KFUPM, 2001-2005
Automatic Font Generation: A step ahead in Arabization, KFUPM, 2000-2002
Automatic Classification of music and speech in digitized audio.
Towards the Further Study of Designing with NURBS & ANURBS: The CAD/CAM/CAE Tools.
Automatic Text Recognition: A Need in Arabization, KFUPM, 2001-2005
Automatic Font Generation: A step ahead in Arabization, KFUPM, 2000-2002
Automatic Classification of music and speech in digitized audio.
Arabization ProjectsArabization ProjectsArabization ProjectsArabization Projects
Neural Network based Speech recognition.
The proposed project aims at investigating various structures for ANN/HMM models for phoneme recognition or next generation Arabic Speech recognition. Carnegie Mellon Sphinx-4 will be used as our testing platform.
Neural Network based Speech recognition.
The proposed project aims at investigating various structures for ANN/HMM models for phoneme recognition or next generation Arabic Speech recognition. Carnegie Mellon Sphinx-4 will be used as our testing platform.
ICS Research Projects: ICS Research Projects: Artificial Artificial IntelligenceIntelligenceICS Research Projects: ICS Research Projects: Artificial Artificial IntelligenceIntelligence
Learning Prolog programs: theory and applications in data mining.
Critical Assessment of Key Analytical Methods for Sanding Prediction. 2005-2006.
Develop Fuzzy Logic Models to Generate Permeability Traces in Non-Cored Wells. 2005-2006.
Development of Artificial Intelligence System for Prediction and Quality Control of PVT Properties. 2005-2006.
Multi-Agent Based Ubiquitous Approach for Personalized Information Systems.
Learning Prolog programs: theory and applications in data mining.
Critical Assessment of Key Analytical Methods for Sanding Prediction. 2005-2006.
Develop Fuzzy Logic Models to Generate Permeability Traces in Non-Cored Wells. 2005-2006.
Development of Artificial Intelligence System for Prediction and Quality Control of PVT Properties. 2005-2006.
Multi-Agent Based Ubiquitous Approach for Personalized Information Systems.
ICS Research Projects: ICS Research Projects: Computer Computer NetworksNetworksICS Research Projects: ICS Research Projects: Computer Computer NetworksNetworks
Analytical, Simulation, and Experimental Investigation of the Performance of Popular Interrupt Handling Schemes for Gigabit-Network Hosts, KFUPM, 2005-2007.
Deploying voice and videoconferencing over IP Networks, KFUPM, 2005-2006.
Fuzzy logic based trust modeling. Trust modeling for Peer-to-Peer systems: Issues and approaches. Applications of Genetic Algorithms to MPLS-Based Network
Design. KFUPM July 2005-August 2005. Performance Evaluation and Enhancement of TCP over Wireless. Implementation of Multihoming and Multistreaming features to
Fast TCP. Performance analysis of SCTP over wireless networks.
Analytical, Simulation, and Experimental Investigation of the Performance of Popular Interrupt Handling Schemes for Gigabit-Network Hosts, KFUPM, 2005-2007.
Deploying voice and videoconferencing over IP Networks, KFUPM, 2005-2006.
Fuzzy logic based trust modeling. Trust modeling for Peer-to-Peer systems: Issues and approaches. Applications of Genetic Algorithms to MPLS-Based Network
Design. KFUPM July 2005-August 2005. Performance Evaluation and Enhancement of TCP over Wireless. Implementation of Multihoming and Multistreaming features to
Fast TCP. Performance analysis of SCTP over wireless networks.
Trust Modeling and Its Applications for Peer-Trust Modeling and Its Applications for Peer-to-Peer Computingto-Peer ComputingTrust Modeling and Its Applications for Peer-Trust Modeling and Its Applications for Peer-to-Peer Computingto-Peer Computing What is peer-to-
peer computing? What is trust? Why modeling
trust? Objectives:
• Increase the overall work done by the resources
• Decrease the risk associated with resource sharing
• Enable resource accountability
What is peer-to-peer computing?
What is trust? Why modeling
trust? Objectives:
• Increase the overall work done by the resources
• Decrease the risk associated with resource sharing
• Enable resource accountability
paradigmnode ownership
Node manage-ment
Control policies
discovery mechanisms
peer-to-peer computing
locallocalnonecentralized or distributed
Cluster computing
global (single ownership)
global global job scheduling
Grid computing
localglobal manag-ement under local policies
single controlling policy
centralized or distributed
public computing networks
localglobal management under local policies
multiple controlling policies
distributed
Utility of The Trust ModelUtility of The Trust ModelUtility of The Trust ModelUtility of The Trust Model
Integrating trust into resource management systems (RMSs)• The idea is to make trust cognizant resource
allocations
Integrating trust into computing utility environments
Introducing the notion of trusted regions
Integrating trust into resource management systems (RMSs)• The idea is to make trust cognizant resource
allocations
Integrating trust into computing utility environments
Introducing the notion of trusted regions
Real-time and SimulationReal-time and Simulation
Access control using expert system, artificial neural networks and parallel rules have been tested on both active and non-active platforms.
Real-time platform• Language used: Java.
• Clustering of PCs using PVM.
• Heterogeneous platforms used.
Processing on the fly was tested by linking the C code of PVM to handle MATLAB applications.
A 16-node Active Network system with both ergodic and non-ergodic capabilities have been tested on NS Simulator.
Access control using expert system, artificial neural networks and parallel rules have been tested on both active and non-active platforms.
Real-time platform• Language used: Java.
• Clustering of PCs using PVM.
• Heterogeneous platforms used.
Processing on the fly was tested by linking the C code of PVM to handle MATLAB applications.
A 16-node Active Network system with both ergodic and non-ergodic capabilities have been tested on NS Simulator.
Planned Future WorkPlanned Future WorkPlanned Future WorkPlanned Future Work
In general, the access lists are fixed for a network and so its easy to parallelize them and then apply it using active networks approach.
Future work requires parallelize the rules on-the-fly and allocated job to the respective routers using active networks.
To induce routing decisions using active networks. One scenario is to make Link-state protocols stabilize faster.
In general, the access lists are fixed for a network and so its easy to parallelize them and then apply it using active networks approach.
Future work requires parallelize the rules on-the-fly and allocated job to the respective routers using active networks.
To induce routing decisions using active networks. One scenario is to make Link-state protocols stabilize faster.
ICS Research Projects: ICS Research Projects: Operating SystemsOperating SystemsICS Research Projects: ICS Research Projects: Operating SystemsOperating Systems
Natural Language Voice Interface for Controlling Audio-Video equipment
Multi-agent based Electronic Commerce as an integration technology for the next generation Web
Natural Language Voice Interface for Controlling Audio-Video equipment
Multi-agent based Electronic Commerce as an integration technology for the next generation Web
ICS Research Projects: ICS Research Projects: Software Software EngineeringEngineeringICS Research Projects: ICS Research Projects: Software Software EngineeringEngineering
Investigating Design Quality Characteristics for Refactoring and Refactoring To Patterns Using Software Metrics
Measuring Architectural Stability in Object Oriented Systems
Investigating Design Quality Characteristics for Refactoring and Refactoring To Patterns Using Software Metrics
Measuring Architectural Stability in Object Oriented Systems
Software Engineering research projectSoftware Engineering research projectSoftware Engineering research projectSoftware Engineering research project
Project: Investigating Design Quality Characteristics for Refactoring and Refactoring To Patterns Using Software Metrics
Objective: to confirm or invalidate the claims that cost and time put into refactoring are worthwhile.
In this research we will investigate: • An approach to detect the need to refactor early in the
software process.
• Two refactoring approaches: refactoring to produce design patterns, and refactoring that produces code without design patterns.
Using software metrics, we will quantitatively investigate whether those approaches really improve software quality or not
Project: Investigating Design Quality Characteristics for Refactoring and Refactoring To Patterns Using Software Metrics
Objective: to confirm or invalidate the claims that cost and time put into refactoring are worthwhile.
In this research we will investigate: • An approach to detect the need to refactor early in the
software process.
• Two refactoring approaches: refactoring to produce design patterns, and refactoring that produces code without design patterns.
Using software metrics, we will quantitatively investigate whether those approaches really improve software quality or not
ICS Research Projects: ICS Research Projects: Computer Science Computer Science Education and eLearningEducation and eLearningICS Research Projects: ICS Research Projects: Computer Science Computer Science Education and eLearningEducation and eLearning
Building Computer-Adaptive Testing Using Reinforcement Learning. KFUPM, 2005-2006.
Critical thinking skills in computer science curriculum. Technology-Based Education in KFUPM
Building Computer-Adaptive Testing Using Reinforcement Learning. KFUPM, 2005-2006.
Critical thinking skills in computer science curriculum. Technology-Based Education in KFUPM
ICS Research Projects: ICS Research Projects: Database SystemsDatabase SystemsICS Research Projects: ICS Research Projects: Database SystemsDatabase Systems
Integrating XML documents: KFUPM 2005-2006. Query optimization in XML databases.
Integrating XML documents: KFUPM 2005-2006. Query optimization in XML databases.
ICS Research Projects: ICS Research Projects: Computer Computer AlgorithmsAlgorithmsICS Research Projects: ICS Research Projects: Computer Computer AlgorithmsAlgorithms Two-way linear probing with reassignments. Limit laws for sums of functions of subgraphs of
random graphs.
Two-way linear probing with reassignments. Limit laws for sums of functions of subgraphs of
random graphs.
Information and Computer Information and Computer Science Faculty Research Science Faculty Research
ProfileProfile
Information and Computer Information and Computer Science Faculty Research Science Faculty Research
ProfileProfile