Current Research Topics

Using the Web for Critical Learning of Al-Qur’an’s Language: an Exploratory Case Study

About 80 percent of the world's Muslim populations are non-native speakers of Arabic language. Since ‎it ‎is ‎‎obligatory for all Muslims to recite the Qur'an in Arabic ‎during regular prayers, ‎an ‎extraordinary ‎‎social phenomenon has taken place ‎in some parts of the ‎Muslim ‎world: in schools, children are only taught the complex phonetic rules of the ‎Arabic language ‎in ‎the ‎context of the Qur'an. This has given rise to a demographic segment of adult learners who are interested in a Language for Specific Purposes (LSP) curriculum that would help them learn ‎a closed set of ‎syntactic rules ‎and ‎‎vocabularies in the ‎context ‎of the Qur'an, so that they can recall an idiomatic translation in their native language while they recite or listen to the Qur'an. Little research work exists on the task modeling ‎and user modeling for this purpose. This ‎research work explores the possibilities of ‎using user stereotypes in the creation of ‎task models to be used in development of a comprehensive Computer ‎Assisted Language Learning (CALL) module.

Innovative Approach for ICT Enhanced Education in Islamic perspective

Rapid increase in the development of Information & Communication Technologies (ICT) and the desire of obtaining education has left the society with no choice of education but through ICT. Education facilitated by the new technologies is transforming learning and instruction forms. Sophistication of ICT nowadays gives a challenge to educators and training developers to rethink their approaches to teaching and training. Education in Islam is considered as an instrument by which people can be trained to learn and live in the Islamic way of life. It’s also challenging to achieve the objective of Islamic education through ICT. The study will identify the distinguished strong and weak factors of ICT for e-Learning and then integrate these factors with Islamic education in way that objective of Islamic education may be achieved. We envisage using various networking technologies, multimedia technologies and e-tools and software for our work. Our objective of this study is to propose an innovative approach for e-Learning in Islamic perspective with the aid of ICT equipments and tools.

Analyzing Web Application Security Pitfalls

Web applications are generally considered as common distributed systems whose current security relies primarily on server-side mechanisms. Web applications provide end-users with client access to server functionality through a set of Web pages, which often contain script codes to be executed dynamically within the client Web browser. Most Web applications aim to enforce simple, intuitive security policies, such as, for Web-based email, disallowing any scripts in untrusted email messages. However, many such applications are currently subject to myriad of successful attacks, such as cross-site scripting (XSS), cookie theft, session riding, browser hijacking, and SQL injection. The aim of this work is to find out common Web application security vulnerabilities, their examples and countermeasures to eliminate common security exploits and to secure the emerging class of rich, cross-domain Web applications.

Understanding Mobile Cloud

Mobile Cloud technology is still emerging. There are various theories and visions how mobile users and mobile technologies could be used in conjunction with Cloud technologies for greater flexibility and better service. The objective of this project is to analyze the current state-of-the-art and possible future works to develop interesting and practically implementable ideas and system models.


----------------------------------------------------------------------------------------------------------------------------------------------------------------

Current Research Topics in Collaboration

Routing Metrics of Multi-Hop Underwater Acoustic Networks

 

Underwater Acoustic Networks (UANs) are considerably different in their architecture and way of operation than the traditional wireless networks. Because of the inherent differences in such networks, efficient routing metrics should be taken into consideration to develop any routing protocol. This work aims at investigating the routing issues in UANs and then, find some efficient routing metrics to ensure reliable transmission in under-water scenario.

 

Skip Block based Distributed Source Coding for Hyperspectral Image Compression

 

A key requirement of lossy compression methods of hyperspectral image is reduction of encoder complexity due to the massive amount of information involved in processing and transmission. Distributed Source Coding (DSC) is the enabling technology that reverses the encoder decoder complexity and provides error resilience. In this work, our objective is to devise appropriate and efficient algorithm to deal with complexity reduction in such image processing systems to be used in satellite and aerial vehicle related or, other relevant applications - which usually have embedded processors with limited power for processing.

 

Trusted Cloud Computing

 

The objective of this research project is to devise novel and efficient methods and architectures to ensure trusted Cloud computing for the customers to use.

 

Checkpointing Algorithm for Distributed Mobile Computing

 

The objective of this work is to propose a new efficient Checkpointing Algorithm for Distributed Mobile Computing enviroment. Checkpointing basically is a technique to add fault tolerance into computing systems. It consists on saving snapshots of the application's state, so that it can restart from that point in case of failure. For mobile network or mobile computing environments, the challenges are fairly different than those are for wired fixed networks. Hence, our work is to tackle the challenges associated with mobility, resource constraints, and wireless communication issues.

 


 

 

 
 

IIUM Logo

Institutes Linked