Research Interest

Research of interest

1- Bio-informatics: it is an interdisciplinary field that develops methods and software tools for understanding biological data. As an interdisciplinary field of science, bioinformatics combines computer science, statistics, mathematics, and engineering to study and process biological data. (from Wikipedia).

2- Nanotechnology : is the manipulation of matter on an atomic, molecular, and supramolecular scale. The earliest, widespread description of nanotechnology referred to the particular technological goal of precisely manipulating atoms and molecules for fabrication of macroscale products, also now referred to as molecular nanotechnology. (from Wikipedia).

3- Cloud Computing : Is a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. Clouds can be classified as public, private or hybrid.(from Wikipedia).

4- Design Pattern (Human Computer Interaction) : Interaction design patterns are a way to describe solutions to common usability or accessibility problems in a specific context. They document interaction models that make it easier for users to understand an interface and accomplish their tasks. (from Wikipedia).

5- Biometric Encryption : A form of biometrics, also called Biometric Encryption or BioCryptics, in which the prover is protected against the misuse of template data by a dishonest verifier.Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population. This introduces the security and privacy threat that the verifier who steals biometric templates from some (or even all) persons in the data base can perform impersonation attacks. When a private verification system is used on a large scale, the reference data base has to be made available to many different verifiers, who, in general, cannot be trusted. Information stolen from a data base can be misused to construct artificial biometrics to  impersonate people. Creation of artificial biometrics is possible even if only part of the template is available.set.(from Wikipedia).




الساعات المكتبية

الساعات المكتبية

أعلان هام

إعلان هام

أرقام الاتصال

جـــوال:0563046356

داخلى:0164043274

بريد اليكتروني:

[email protected]

[email protected]

خبر عاجل

خبر باطئ

تويتر

إحصائية الموقع

عدد الصفحات: 19

البحوث والمحاضرات: 12

الزيارات: 3550