Asso.Prof.Dr.Ghossoon Alsadoon

Asso.Prof.Dr.Ghossoon Alsadoon
AMA International University · BSBI

Doctor of Psychology

About

45
Publications
17,100
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
88
Citations
Citations since 2017
16 Research Items
49 Citations
20172018201920202021202220230246810
20172018201920202021202220230246810
20172018201920202021202220230246810
20172018201920202021202220230246810
Introduction
History and work experience 2016-2020 - AMA 2010 – 2016 Applied Science University, Bahrain 2007 - 2010 University Malaysia Perlis, Malaysia 2002 - 2008 Iraqi Commission for Computers & Informatics (ICCI ), Iraq 1992 - 2002 National Computer Center (NCC), Iraq Education PhD in Computer Science (ICCI) , Computer Science, Baghdad , Iraq, 15/10/2006. MS.c . in Computer Science,University of Technology , , Faculty of Computer Science, Baghdad , Iraq, 30/01/2002. Higher Diploma 1997& BS.c 1992
Additional affiliations
February 2010 - December 2014
Applied Science University
Position
  • Director ASDU
February 2010 - September 2015
Applied Science University
Position
  • Director ASDU
February 2010 - August 2016
Applied Science University
Position
  • Head of Department
Education
October 2002 - December 2006
PhD in Computer Science Iraqi commission for computers & informatics /institute for postgraduate studies in informatics (ICCI) , Faculty of Computer Science
Field of study
  • Computer Science
October 2000 - January 2002
MS.c . in Computer Science University of Technology ,Faculty of Computer Science
Field of study
  • Computer Science
October 1996 - November 1997
Higher Diploma in Computer Science University of Technology collaboration
Field of study
  • Computer Science

Publications

Publications (45)
Article
Full-text available
Tele-training in surgical education has not been effectively implemented. There is a stringent need for a high transmission rate, reliability, throughput, and reduced distortion for high-quality video transmission in the real-time network. This work aims to propose a system that improves video quality during real-time surgical tele-training. The pr...
Preprint
Full-text available
Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized acc...
Article
Full-text available
Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized acc...
Conference Paper
The median survival time of patients with high grade glioma, a form of brain tumour, is 1-3 years. The current best practice adopts Convolutional Neural Network (CNN) for image classification and tumour detection. This method provides a significant improvement in brain tumour segmentation of Magnetic Resonance Imaging (MRI) images in comparison to...
Conference Paper
Full-text available
Activity recognition and enhance performance are the major issues that are faced by wearable technology devices. Therefore, in this paper, we present an exploratory study to examine and evaluate the current issues with wearable technology for analysis of activity recognition for sports. These issues can be controlled by implementing a high sensor a...
Conference Paper
Achieving good quality and minimum distortion of the video frames is one of the most challenging requirements in the telemedicine system. Transmission process for a real-time video over the wireless network is due to various real-time restrictions, such as encoding mechanism, noise, and bandwidth fluctuations. The restrictions introduce distortions...
Conference Paper
Cloud computing security or online storage is an E-business that provides mass storage solutions in return for a periodic set fee. Such services enable individuals to store or upload content over a secure, established network of remote servers hosted on the internet to store, manage, and process data, as an alternative to a local server or a person...
Conference Paper
This research entitled the role of E-learning to improve staff performance in Bahrain Airport Services (BAS), where the research was limited to Bahrain Airport Services and targeted the employees and students who are attending courses at training in BAS Aircraft Engineering Training Center and Bahrain Airport Services Learning and development Cente...
Conference Paper
Abstract: In this paper, the project has successfully designed a unique idea by implementing a Green Computing System of Health and Secure Environment Management System for Ray International W.L.L company. The objective of this project is to indicate the waste minimization and recycling approaches by adapting to the paperless approach and strategy...
Article
Full-text available
With the recent rapid development and growth in information technology, the profile of student learners has changed [1], and the teachers need to improve their quality of teaching and learning to synchronize with the developing growth in technology. In this research paper, confidentiality, integrity and availability (c-i-a) model was used to secure...
Article
Full-text available
ABSTRACT- Structured teaching practices and student-oriented teaching practices both contribute to a positive classroom environment, promoting teachers’ self-efficacy. In the contexts of many countries the classroom environment is believed to impact student outcomes. The main problem of this paper is borne out of the need to make the learning proce...
Chapter
Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining m...
Book
Full-text available
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting...
Chapter
The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. This chapter discusses the main concepts, developments, and future trends of security. There are three main reasons for security development and its innovation. The first reason is: Perfect security does not...
Chapter
Full-text available
The aim of server virtualization is to eliminate the Hardware equipment in the Datacenter and maximize the utilization of the existing resources. This helps companies in achieving the business goals and objectives in cost effective manner and better support and integration. Virtualization technology changes the protection way of security, as most o...
Chapter
Full-text available
The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. There are three main reasons for security development and its innovation. The first reason is: "Perfect security does not exist"; this will lead the researcher to develop more and more methods to defend agai...
Chapter
Full-text available
The encryption method Rijndael Advanced Encryption Standard is applied for security information DBs, to prevent an unauthorized user from accessing any stored information. The security method determines the resources that agents are able to have an access and to give permission to other agents. Security and security assurance are special integrity...
Chapter
Full-text available
The book Intelligent Systems for Science and Information is the remarkable collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2013. It contains twenty-four chapters in the field of Intelligent Systems, which received highly recommended feedback during SAI Confe...
Article
Full-text available
Intrusion Prevention Systems (IPS) as a security solution have their own characteristics in analysing, detecting and preventing intruders’ acts. It provides a quite good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antivirus and any security applications. This is by acti...
Chapter
Full-text available
In recent years there has been a rapidly increasing intensity of work going into investigating various methods of facilitating assisted living for the benefit of the elderly and those with difficulties in mobility. This chapter describes one such effort which distinguishes itself from the rest by considering and describing a system with true commer...
Conference Paper
Full-text available
Intrusion Prevention Systems (IPS) can analyse, detect and prevent intruder attacks. IPS provide a good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antiviruses and any security applications, by actively responding to attacks and affording great flexibility when dealing...
Article
Full-text available
A Virtual Private Network (VPN) is a secure private communication tunnel between two or more devices across a public network such as the Internet. These devices may be either computers running VPN software or special devices such as VPN-enabled routers. VPN allows home computers to be connected to an office network or two home computers to be conne...
Article
Full-text available
Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable. In addition, the only techniques that have been applied to most system...
Article
Full-text available
Trojan virus attacks pose one of the most serious threats to computer security. A Trojan horse is typically separated into two parts - a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection...
Article
Full-text available
Threats have become a big problem since the past few years as computerviruses are widely recognized as a significant computer threat. However, the roleof Information Technology security must be revisit again since it is too often. ITsecurity managers find themselves in the hopeless situation of trying to uphold amaximum of security as requested fro...
Article
Full-text available
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable with spoofed Internet Protocol (IP) address. Th...
Article
Full-text available
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP)...
Article
Full-text available
Today, applications in mobile multi-agent systems require a high degree of confidence that running code inside the system will not be malicious. Also any malicious agents must be identified and contained. Since the inception of mobile agents, the intruder has been addressed using a multitude of techniques, but many of these implementations have onl...
Article
Full-text available
Problem statement: Bluetooth has emerged as very popular ad hoc network standard today. Bluetooth network applications include wireless synchronization, e-mail/internet/intranet access using local personal computer connections, hidden computing through automated applications and networking. Due to this ability, it is not impossible for the network...
Article
Full-text available
Problem statement: Open Source technologies are interesting in that they allow free experimentation and integration by anyone and anywhere. A Jabber user can control presence with very little effort. Another user, regardless of external platform, must subscribe to your presence. You have the choice of rejecting or accepting the subscription at the...
Article
Full-text available
Problem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this r...
Conference Paper
Full-text available
Web services are modular and distributed applications and are based on industry standard technologies. Nowadays, a message traveling through Internet is relatively simple to be read or modified. This is due to the complexity of network and the existence of many points of attack. SOAP is a protocol specification for invoking methods on servers, serv...
Article
Full-text available
This paper presents our effort and to realize possible usage on embedded Linux platform for Intrusion Detection (Port Scan). The approach was to develop software which performs port scan using half-open and udp technique. The software is then executed on a Linux based Single Board Computer (SBC) which runs TS-Linux 2.4.23 kernel developed by Techno...
Conference Paper
There are many architecture characteristics of Multi-Agent Systems like Flexibility, Robustness, Distributed Computing, Facilitating development maintenance, and Facilitating research. In this paper a work depends on how can a distributed systems are used by Multi-Agent Systems (MAS) using the ASP.Net. Here we have focused on Flexibility, because m...

Network

Cited By

Projects

Projects (3)
Project
Annals of Emerging Technologies in Computing (AETiC), a scholarly peer-reviewed open access international research journal enabling low cost publication solutions while projecting an image of quality research. AETiC is published by the International Association for Educators and Researchers (IAER) which is a CIC (Community Interest Company) i.e. a low-profit organization, registered in England and Wales. As an Open Access journal, AETiC aims to provide a channel for quality research to be publicised to a broad audience. Past issues of AETiC are made available online at AETiC website and archived at the British Library, London, UK. Printed format of the journal issues are printed and distributed by Marston Book Services, a printer in Oxfordshire, UK. The Article Processing Fee (APF) also includes two copies of the printed issues of the journal, to be posted to the mailing address of the corresponding author FREE of any additional cost. AETiC welcomes authors to submit, through EasyChair submission site using AETiC’s MS Word Template, their original research, review and survey papers which significantly contributes to the existing domain of research and adds new knowledge in the field of emerging technologies related to computing, software engineering, information technology and communications engineering. More details can be found here: http://aetic.theiaer.org
Project
To enhance the performance for students using the concepts of security C_I_N when applied summative assessment methods