Mohammed Anowarul Hassan

Learn More
Prior research on mobile computation offloading has mainly focused on how to offload as well as what to of-fload. However, the problem of whether the offloading should be done attracted much less attention. In addition , existing offloading schemes either require special compilation or modification to the applications' source code or binary, making them(More)
Mobile applications are growing fast due to pervasive usage of mobile devices. With inherently limited on-device resources, plenty of research has been conducted on job partitioning/outsourcing strategies to execute mobile computing tasks on external sources, such as public clouds or nearby computers. However, little is known about the performance(More)
More and more overlapping functions on all kinds of mobile devices with these on traditional computers have significantly expanded the usage of mobile devices in our daily life. This also causes the demand surge of pervasively and quickly accessing files across different personal devices owned by a user. Most existing solutions, such as DropBox and(More)
The increasing popularity of mobile devices calls for effective execution of mobile applications. A lot of research has been conducted on properly splitting and outsourcing computing intensive tasks to external resources (e.g., public clouds) by considering insufficient computing resources on mobile devices. However, little attention has been paid to the(More)
Kenya has had a history of health financing policy changes since its independence in 1963. Recently, significant preparatory work was done on a new Social Health Insurance Law that, if accepted, would lead to universal health coverage in Kenya after a transition period. Questions of economic feasibility and political acceptability continue to be discussed,(More)
— Cloud computing has paved a way for resource-constrained mobile devices to speed up their computing tasks and to expand their storage capacity. However, cloud computing is not necessary a panacea for all mobile applications. The high network latency to cloud data centers may not be ideal for delay-sensitive applications while storing everything on public(More)
Cloud storage systems play a key role in many cloud services. To tolerate multiple simultaneous disk failures and reduce the storage overhead, today cloud storage systems often employ erasure coding schemes. To simplify implementations, existing systems, such as Mi-crosoft Azure and EMC Atmos, only support file appending operations. However, this feature(More)
After a long period of neglect, initiatives are being implemented in Sudan to control tsetse and trypanosomosis. Their planning, execution and monitoring require reliable information on the geographic distribution of the disease and its vectors. However, geo-referenced and harmonized data at the national level are lacking, despite the fact that a number of(More)
Dust storm has serious disastrous impacts on environment, human health, and assets. The developments and applications of dust storm models have contributed significantly to better understand and predict the distribution, intensity and structure of dust storms. However, dust storm simulation is a data and computing intensive process. To improve the computing(More)
In this paper, a novel method to estimate the shear wave speed is proposed. This method is a modified version of the lateral Time to Peak (TTP) method that estimates the induced shear wave speed. Lateral TTP algorithm finds the instance at which the maximum displacement is detected at each lateral location under examination at a certain depth. In the(More)