Syed Hamid Hasan
King Abdulaziz University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Syed Hamid Hasan.
International Journal of Computer Applications | 2014
Ahlam Mohammed; Alamri Alaa Moued Alharthi; Dina Khaled Alharthi; Walaa Saleh Alhabashi; Syed Hamid Hasan
The purpose of this research is to study the relation between the six Total Quality Management practices and the operational performance in one of the largest Saudi telecommunication company. The research shows how to improve organization performance using Total Quality Management. The data used in the research were collected through a survey that distributed in 421 employees in the company. By using Microsoft Office Excel the Cronbachs coefficient alpha value used to determine the reliability of the measurement and the correlation analysis used to find out the strength of the relation between six Total Quality Management practices and operational performance. The results of analyzing data are the result of the research. The research contains a literature review about different research that studies the effect of TQM in operational performance in different countries. The research contains also strategies and theories of TQM, and the final part is about research methodology (analyses and calculation). General Terms Total Quality Management
International Journal of Computer Applications | 2014
Daniyal M. Alghazzawi; Syed Hamid Hasan; Mohamed Salim Trigui
of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in todays world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a few take adequate measures in ensuring the security of their information, preventing unauthorized access, securing data from intrusion and unapproved disclosures etc. The impact any business is going to bear, in case any of the information system is compromised or goes down, is great; hence ensuring stability and security of these information system is of paramount importance to these businesses. KeywordsSystem, Security Protocols, Enterprise security
networked digital technologies | 2011
Daniyal M. Alghazzawi; Trigui Mohamed Salim; Syed Hamid Hasan
This paper describes an efficient simple proxy blind signature scheme. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem(ECDLP). This can be implemented in low power and small processor mobile devices such as smart card, PDA etc. A proxy blind signature scheme is a special form of blind signature which allows a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature and blind signature scheme and satisfies the security properties of both proxy and blind signature scheme.
Scientific Programming | 2016
Mohammed A. S. Mosleh; G. Radhamani; Mohamed A. G. Hazber; Syed Hamid Hasan
Task execution in cloud computing requires obtaining stored data from remote data centers. Though this storage process reduces the memory constraints of the user’s computer, the time deadline is a serious concern. In this paper, Adaptive Cost-based Task Scheduling ACTS is proposed to provide data access to the virtual machines VMs within the deadline without increasing the cost. ACTS considers the data access completion time for selecting the cost effective path to access the data. To allocate data access paths, the data access completion time is computed by considering the mean and variance of the network service time and the arrival rate of network input/output requests. Then the task priority is assigned to the removed tasks based data access time. Finally, the cost of data paths are analyzed and allocated based on the task priority. Minimum cost path is allocated to the low priority tasks and fast access path are allocated to high priority tasks as to meet the time deadline. Thus efficient task scheduling can be achieved by using ACTS. The experimental results conducted in terms of execution time, computation cost, communication cost, bandwidth, and CPU utilization prove that the proposed algorithm provides better performance than the state-of-the-art methods.
International Journal of Computer Applications | 2014
Mashael Ali Haddas; Mona Hasan Asiri; Reham Faya Mukhalid; Salha Saeed Alahmari; Shatha Ali Al-qathtani; Syed Hamid Hasan
paper aims at providing an overview of the evolution, current research and the history of continuous improvement over time through reviewing the literature extensively. The paper covers the inception of continuous improvement and its evolution into todays worlds sophisticated methodologies. The research covers the well known programs of continuous improvement if not covering the entire plethora of the past and the present. It also covers the various tools used by the organizations for addressing the need of continuous improvement and thus may serve the purpose of reference for people who wish to pursue the field of continuous improvement and wants to know its development form its historical form to its modern day avatar. The paper is written in the form of a General review KeywordsTQM, Six Sigma, Lean Production, Quality, Continuous improvement
International Journal of Computer Applications | 2014
Nora Bureak Alharbi; Alia Abdul-rahman Assirri; Budoor Salem Edhah; Syed Hamid Hasan
Today, every modern organizations look forward to catch the successful in each steps in their work. To gain the successful factor they should follow set of tools and fixable technique. This technique can improve process by removing the cause of defect. Six sigma take the role for that purpose. The emergence of six sigma started at 1986 by Motorola and it use today by many industrial sector. In addition, TQM (Total Quality Management) is another key factor to improvement but its for the entire process. Total quality management and six sigmas are considered two independent systems to enhance businesses and organization’s output regardless of they are products or services; both are concerned about improving the quality of the organization. Although each of these two approaches shares common aim however they have some differences. The ultimate goal of total quality management is customer satisfaction by enhancing the quality of products and services. On the other hand, six sigma’s focuses on the continuous improvements
International Journal of Computer Applications | 2013
Daniyal M. Alghazzawi; Syed Hamid Hasan; Mohamed Salim Trigui
In the latest past, research work has been done in the region of steam ciphers and as a answer of which, several design models for stream ciphers were projected. In Order to appreciate a international standard for data encryption that would prove good in the due course of time, endure the action of cryptanalysis algorithms and reinforce the security that will take longer to be broken, this research work was taken up. There is no standard model for Stream cipher and their design, in comparison to block ciphers, is based on a number of structures. We would not try to evaluate the different designs taken up by various stream ciphers, different attacks agreed out on these stream ciphers and the result of these attacks. During this exercise we would also have a better idea of the latest stream ciphers designs.
International Journal of Modern Education and Computer Science | 2014
Aasim Zafar; Syed Hamid Hasan
Archive | 2011
Daniyal M. Alghazzawi; Trigui Mohamed Salim; Syed Hamid Hasan
MAGNT Research Report | 2014
Aasim Zafar; Syed Hamid Hasan; M. Saleem Trigui; Saudi Arabia