Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hossein Jahankhani is active.

Publication


Featured researches published by Hossein Jahankhani.


global engineering education conference | 2012

An ontology-based adaptive mobile learning system based on learners' abilities

Maryam Yarandi; Hossein Jahankhani; Abdel-Rahman H. Tawil

The rapid development of wireless infrastructure and wide use of mobile devices in our daily life has a major impact on our way of learning using computing technology. Particularly, learning a new language is a challenging task for researchers. Furthermore, adaptive services is nowadays an important research topic in the field of web-based and mobile learning systems as there are no fixed learning path which are appropriate for all learners. However, most studies in this field have only focused on learning styles and habits of learners. Far too little attention has been paid on understanding the ability of learners. Therefore, the purpose of this paper is to propose a new adaptive mobile learning model for learning new languages based on the ability of learners. An ontology-based knowledge modelling technique is proposed to classify language learning materials and describe user profiles in order to provide adaptive learning environment.


database and expert systems applications | 2011

Adaptive E-Learning System Using Ontology

Maryam Yarandi; Abdel-Rahman H. Tawil; Hossein Jahankhani

This paper proposes an innovative ontological approach to design a personalised e-learning system which creates a tailored workflow for individual learner. Moreover, the learning content and sequencing logic is separated into content model and pedagogical model to increase the reusability and flexibility of the system.


International Journal of Electronic Security and Digital Forensics | 2014

Security challenges in the distributed cloud computing

Ikechukwu Nwobodo; Hossein Jahankhani; Aloysius Edoh

Cloud computing has altered the overall representative picture which distributed computing present in IT environment such as grid and server client computing. Cloud computing has born a new innovative meaning to off-premises and distributed computing. Although cloud computing offers more economical benefits than traditional computing, it undoubtedly introduces an imaginable security challenges to information control, management, access and storage from on-premises to off-premises. This paper focuses on security challenges in distributed cloud, describes cloud computing, models and services. Analysis cloud security challenges and presents discussions on considerable solutions to protect threats against confidentiality, integrity and availability of cloud data. This paper presents an implementation of Private Cloud Computing and evaluates its security features.


Global Security, Safety and Sustainability & e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers | 2011

Improved Awareness on Fake Websites and Detecting Techniques

Hossein Jahankhani; Thulasirajh Jayaraveendran; William Kapuku-Bwabw

Fake website pages use the similar page layout, font style and picture to mimic legitimate web pages in an effort to convince internet users to give their personal sensitive information such as bank account number, passwords, personal details etc and also sell fake products like fake ticket, duplicate brand cloths, medication etc. There are many available techniques in the market to identify the fake websites. This paper provides an efficient awareness on detecting fake websites. A novel technique or tool will be proposed, implemented and analysed. This technique visually compares a suspected fake website page with legitimate web page by capturing the snapshot of the fake page and identifies it using the assigned identity pixels which are in the legitimate webpage.


International Conference on Global e-Security | 2008

Evaluation of Tools for Protection of Interest against Hacking and Cracking

Hossein Jahankhani; Branko Antonijevic; Terry H. Walcott

The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.


international conference on global security, safety, and sustainability | 2017

Balancing Targeted Delivery of Content and Personal Freedom in the Digital On-line Video Marketing Landscape

Kenneth Revett; Sérgio Tenreiro de Magalhães; Maria José Magalhães; Hossein Jahankhani

With the maturation of the internet, many organizations have relied on the ubiquitous reach of the internet targeting. On average, every “consumer” is exposed to over 300 advertisements throughout a given 24 h period. What is disturbing is that we remember approximately 12 of these advertisements – a paltry 4%! A viable solution is to utilize a heuristic search for consumers, and this is where audience targeting becomes central to a successful marketing campaign. Audience targeting – tracking our activities, utilizing cookie data, and other strategies for acquiring information necessary for developing individualized consumer-centric models, has clearly engendered distrust amongst many internet consumers. In addition, bots, non-human traffic, and Malvertising all pose threats to our sense of security while on the internet. Somehow, the IT industry, working in conjunction with marketing standards boards must find a way to ensure digital marketing continues, without costing undue levels of distrust from the suer community.


Global Security, Safety and Sustainability & e-Democracy. 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers | 2012

On the Deployment of Artificial Immune Systems for Biometrics

Ruben Krishnamurthy; Kenneth Revett; Hossein Jahankhani

Artificial immune systems (AIS) are a computational metaphor based on biological implementations of immune systems. Natural immune systems are capable of performing computation based on several properties that they possess. Immune systems are capable of adapting to new stimuli – they respond appropriately to novel stimuli, and they can remember previous encounters with stimuli. The processes which natural immune systems utilise are a combination of cellular and humoral responses – which act independently and in concert to perform stimulus identification and eradication, with minimal impact on the host. This provides an overview of artificial immune systems – which attempt to implement the basic functionality of natural systems. The basic properties and their interrelations are described in this paper – which is a prelude to their application in the context of biometrics. It will be demonstrated that the AIS approach is both a natural and potentially very effective approach to providing biometric security within a range of modalities.


International Journal of Information Security and Privacy | 2011

A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment

Hamid Jahankhani; Devon Bennett; Mohammad Dastbaz; Hossein Jahankhani

In developed economies, electronic communication infrastructures are crucial for daily public, private, and business interactions. Cellular systems are extensively used for business communications, private interaction, and in some cases, public information services, via such uses as mass SMS messaging. The Public Switched Telephone Network PSTN is at the core of all communications platforms. It was used primarily for voice communication purposes, but with current technological advances, this platform has been transformed from a voice to voice interface to a web enabled multimedia platform that provides commercial, business, and e-commerce services to the public. In response to the September 11, 2001, terrorist acts in New York City, the UK government introduced a policy of separating and transferring all emergency communication traffic from the PSTN to a digital public safety network based on the TETRA architecture. This paper extends the utilisation of the TETRA deployment by discussing a secure MANET hybrid solution for use in extreme situations as a short/mid-term EMS organisational communication platform for emergency and rescue operations.


international conference on global security, safety, and sustainability | 2010

Analysis of Fingerprint Image to Verify a Person

Hossein Jahankhani; Maktuba Mohid

Identification and authentication technologies are increasing day by day to protect people and goods from crime and terrorism. This paper is aimed to discuss fingerprint technology in depth and analysis of fingerprint image. Verify a person with a highlight on fingerprint matching. Some fingerprint matching algorithms are analysed and compared. The outcomes of the analysis has identified some major issues or factors of fingerprinting, which are location, rotation, clipping, noise, non-linear distortion sensitiveness/ insensitiveness properties, computational cost and accuracy level of fingerprint matching algorithms. Also a new fingerprint matching algorithm proposed in this research work. The proposed algorithm has used Euclidean distance, angle difference, type as matching parameters instead of specific location parameter (like, x or y coordinates), which makes the algorithm location and rotation insensitive. The matching of local neighbourhoods at each stage makes the algorithm non-linear distortion insensitive.


international conference on global security, safety, and sustainability | 2009

The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture

Devon Bennett; Hamid Jahankhani; Hossein Jahankhani

In this era of global communications individual communities and entire cities rely heavily on the public telecommunication platforms to support the emergency services workers to provide a professional service in extreme situations, such as natural disasters - floods, earthquakes and hurricanes etc; or terrorist / political attacks, such as London, New York and Madrid. Previous experiences have demonstrated that in such situations entire cities find their general communication platforms such as the Public Switched Telephone Networks and Cellular systems are overwhelmed with emergency communication traffic, as huge number of calls are made locally and internationally to the disaster area to determine if love ones are injured or safe. Until recently under these extreme conditions the emergency services would have to rely solely on the available telecommunications bandwidth and any contingency bandwidth that has been allocated for such situations. However the UK government has a part of its Critical National Infrastructure as deployed a TETRA based private mobile radio (PMR) system to separate critical emergency communication from the general communication platforms. This paper analyzes whether this new system is resilient or could the use of MANET’s be utilised to operate in extreme situations to provide a crucial short/mid-term communication platform.

Collaboration


Dive into the Hossein Jahankhani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Maryam Yarandi

University of East London

View shared research outputs
Top Co-Authors

Avatar

Liaqat Ali

University of East London

View shared research outputs
Top Co-Authors

Avatar

Devon Bennett

University of East London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kenneth Revett

British University in Egypt

View shared research outputs
Researchain Logo
Decentralizing Knowledge