oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 2 )

2019 ( 188 )

2018 ( 277 )

2017 ( 274 )

Custom range...

Search Results: 1 - 10 of 18964 matches for " Hameed Al-Qaheri "
All listed articles are free for downloading (OA Articles)
Page 1 /18964
Display every page Item
The Intellectual Capital Performance of KuwaitiBanks: An Application of vaicTM1 Model  [PDF]
Fayez Abdulsalam, Hameed Al-Qaheri, Ridha Al-Khayyat
iBusiness (IB) , 2011, DOI: 10.4236/ib.2011.31014
Abstract: The paper uses the Value Added Intellectual Coefficient VAICTM model, a widely used model, to measure the Intellectual Capital efficiency of the Kuwaiti Banks using a ten years period data set from 1996 to 2006. Three value efficiency indicators, Human Capital Efficiency (HCE), Capital Employed Efficiency (CEE) and VAICTM, where used in the analysis. The data set was divided into commercial and no-commercial banks. The non commercial banks were outperformed by almost all the commercial banks in the last 3 years; 2004-2006. The results of the rankings of the banks for the last year (2006) showed that for VAICTM the top two performers in the study were The Commercial Bank of Kuwait followed by the Gulf bank while the worst performer was Kuwait Real Estate Bank. And the results of ranking based on Human Capital Efficiency (HCE), showed similar results as that of VAICTM. However, the ranking results based on Capital Employed Efficiency (CEE) showed the top two performers to be National Bank of Kuwait followed by the Gulf Bank and the worst performer was still the Kuwait Real Estate Bank
DYNAMIC RECONFIGURATION OF WIRELESS SENSOR NETWORKS.
Koustubh Kulkarni,Sudip Sanyal,Hameed Al-Qaheri,Sugata Sanyal
International Journal of Computer Science & Applications , 2009,
Abstract:
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
Sandipan Dey,Hameed Al-Qaheri,Suneeta Sane,Sugata Sanyal
Computer Science , 2010,
Abstract: In this paper, we suggest a lower and an upper bound for the Generalized Fibonacci-p-Sequence, for different values of p. The Fibonacci-p-Sequence is a generalization of the Classical Fibonacci Sequence. We ?first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a p-degree polynomial and then use this result to prove the bounds for generalized Fibonacci-p sequence, thereby generalizing the exponential bounds for classical Fibonacci Sequence. Then we show how these results can be used to prove efficiency for data hiding techniques using generalized Fibonacci sequence. These steganographic techniques use generalized Fibonacci-p-Sequence for increasing number available of bit-planes to hide data, so that more and more data can be hidden into the higher bit-planes of any pixel without causing much distortion of the cover image. This bound can be used as a theoretical proof for efficiency of those techniques, for instance it explains why more and more data can be hidden into the higher bit-planes of a pixel, without causing considerable decrease in PSNR.
Embedding Secret Data in HTML Web Page
Sandipan Dey,Hameed Al-Qaheri,Sugata Sanyal
Computer Science , 2010,
Abstract: In this paper, we suggest a novel data hiding technique in an HTML Web page. HTML Tags are case insensitive and hence an alphabet in lowercase and one in uppercase present inside an HTML tag are interpreted in the same manner by the browser,i.e., change in case in an web page is imperceptible to the browser. We basically exploit this redundancy and use it to embed secret data inside an web page, with no changes visible to the user of the web page, so that he can not even suspect about the data hiding. The embedded data can be recovered by viewing the source of the HTML page. This technique can easily be extended to embed secret message inside any piece of source-code where the standard interpreter of that language is case-insensitive.
Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges
Rolly Seth,Rishi Kapoor,Hameed Al-Qaheri,Sugata Sanyal
Computer Science , 2010,
Abstract: Although 'Halcyon' means serene environment which pervasive computing aims at, we have tried to present a different interpretation of this word. Through our approach, we look at it in context of achieving future 'calm technology'. The paper gives a general overview of the state of pervasive computing today, proposes the 'HALCYON Model' and outlines the 'social' challenges faced by system designers.
Hiding Inside HTML and Other Source Codes
Hameed Al_Qaheri,Sandipan Dey,Sugata Sanyal
Computer Science , 2010,
Abstract: Many steganographic techniques were proposed for hiding secret message inside images, the simplest of them being the LSB data hiding. In this paper, we suggest a novel data hiding technique in an HTML Web page and also propose some simple techniques to extend the embedding technique to source codes written in any programming language (both case insensitive like HTML, Pascal and case sensitive languages like C, C++, Java). We basically try to exploit the case-redundancy in case-insensitive language, while we try hiding data with minimal changes in the source code (almost not raising suspicion). HTML Tags are case insensitive and hence an alphabet in lowercase and one in uppercase present inside an HTML tag are interpreted in the same manner by the browser, i.e., change in case in a web page is imperceptible to the browser. We first exploit this redundancy and use it to embed secret data inside an web page, with no changes visible to the user of the web page, so that he can not even suspect about the data hiding. The embedded data can be recovered by viewing the source of the HTML page. This technique can easily be extended to embed secret message inside any piece of source-code where the standard interpreter of that language is case-insensitive. For case-sensitive programming languages we do minimal changes in the source code (e.g., add an extra character in the token identified by the lexical analyzer) without violating the lexical and syntactic notation for that language) and try to make the change almost imperceptible.
Comparative Study of Environmental Institutional Framework and Setup in the GCC States  [PDF]
Said Al-Saqri, Hameed Sulaiman
Journal of Environmental Protection (JEP) , 2014, DOI: 10.4236/jep.2014.59076
Abstract:

Establishing environmental institutions will aid in providing effective responses on any changes in the status of environment by improving the current policies by having solid management strategies to combat environmental degradation. All the six member countries in the Gulf Cooperation Council (GCC) have established similar environmental institutional bodies that serve with the mandate of conserving and protecting the environment. Degrees of implementation, wealth, state of environment reporting and strategic planning are varying and closer inspection has to be done. Institutionalization in GCC states has to be promoted to cover major framework of sustainable development strategies. This will guarantee the use-effectiveness of those polices and other environmental management tools to ensure sustainable development of the natural resources. This paper attempts to list and examine the current status of all GCC country’s environment institutional framework and setup through comparison of the available information, highlighting the achievement of some and providing some guidance for others on how it could be enhanced.

Shifting to Renewable Energy to Mitigate Carbon Emissions: Initiatives by the States of Gulf Cooperation Council  [PDF]
Hilal Al Shidi, Hameed Sulaiman, Patrick Amoatey
Low Carbon Economy (LCE) , 2016, DOI: 10.4236/lce.2016.73012
Abstract: The Gulf Cooperation Council (GCC) countries approximately have 40% of world’s proven oil reserves and 21.7% of world’s known gas reserves. Low energy costs compiled with low taxation make it lucrative to foreign energy-intensive companies to operate in the region. Energy consumption in GCC has increased by 74% in the period between 2000 and 2010 and it is projected to increase by approximately 10% to 15% between 2010 and 2020. Embracing the general commitment by GCC states to reduce greenhouse gas emission (GHG) of United Nation Framework Convention on Climate Change (UNFCCC) has started the process of environmental awakening in the GCC countries due to its high vulnerability to the effects of climate change. This paper reviews the trends in shift to renewable energy with reference to GCC and also the co-benefits of investing in renewable energy. Solar plant and Building-Integrated Photo-Voltaic (BIPV) systems are the most invested projects. However in the long run, policies and strategies are needed to ensure the successful and larger implementation of mitigation objectives.
The Speech Act Theory in English and Arabic  [PDF]
Fareed Hameed Al-Hindawi, Hameed Hasoon Al-Masu’di, Ramia Fua’d Mirza
Open Journal of Modern Linguistics (OJML) , 2014, DOI: 10.4236/ojml.2014.41003
Abstract:

This paper is mainly concerned with proving that it is not Wittgenstein, the German philosopher, who actually seeded the main gist of the Speech Act Theory; there are others who preceded him (and all those who followed him, the first of whom is Austin) in doing so: Arab scholars. Accordingly, this work starts by reviewing the most basic ideas of the original theory proposed by Austin and developed by Searle. The basic ideas presented by the Arabic theory are presented in the second section, and then a contrast between the two is made.

Venous thromboembolism prophylaxis: Solutions are in our hands
Al-Hameed Fahad
Annals of Thoracic Medicine , 2011,
Abstract:
Page 1 /18964
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.