
Asso.Prof.Dr.Ghossoon AlsadoonAMA International University · BSBI
Asso.Prof.Dr.Ghossoon Alsadoon
Doctor of Psychology
About
45
Publications
17,100
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
88
Citations
Citations since 2017
Introduction
History and work experience
2016-2020 - AMA
2010 – 2016 Applied Science University, Bahrain
2007 - 2010 University Malaysia Perlis, Malaysia
2002 - 2008 Iraqi Commission for Computers & Informatics (ICCI ), Iraq
1992 - 2002 National Computer Center (NCC), Iraq
Education
PhD in Computer Science (ICCI) , Computer Science, Baghdad , Iraq, 15/10/2006.
MS.c . in Computer Science,University of Technology , , Faculty of Computer Science, Baghdad , Iraq, 30/01/2002. Higher Diploma 1997& BS.c 1992
Additional affiliations
February 2010 - December 2014
February 2010 - September 2015
February 2010 - August 2016
Education
October 2002 - December 2006
PhD in Computer Science Iraqi commission for computers & informatics /institute for postgraduate studies in informatics (ICCI) , Faculty of Computer Science
Field of study
- Computer Science
October 2000 - January 2002
MS.c . in Computer Science University of Technology ,Faculty of Computer Science
Field of study
- Computer Science
October 1996 - November 1997
Higher Diploma in Computer Science University of Technology collaboration
Field of study
- Computer Science
Publications
Publications (45)
Tele-training in surgical education has not been effectively implemented. There is a stringent need for a high transmission rate, reliability, throughput, and reduced distortion for high-quality video transmission in the real-time network. This work aims to propose a system that improves video quality during real-time surgical tele-training. The pr...
Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized acc...
Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized acc...
The median survival time of patients with high grade
glioma, a form of brain tumour, is 1-3 years. The current best
practice adopts Convolutional Neural Network (CNN) for image
classification and tumour detection. This method provides a
significant improvement in brain tumour segmentation of Magnetic
Resonance Imaging (MRI) images in comparison to...
Activity recognition and enhance performance are the
major issues that are faced by wearable technology devices.
Therefore, in this paper, we present an exploratory study to
examine and evaluate the current issues with wearable
technology for analysis of activity recognition for sports. These
issues can be controlled by implementing a high sensor a...
Achieving good quality and minimum distortion of the video frames is one of the most challenging requirements in the telemedicine system. Transmission process for a real-time video over the wireless network is due to various real-time restrictions, such as encoding mechanism, noise, and bandwidth fluctuations. The restrictions introduce distortions...
Cloud computing security or online storage is an E-business that provides mass storage solutions in return for a periodic set fee. Such services enable individuals to store or upload content over a secure, established network of remote servers hosted on the internet to store, manage, and process data, as an alternative to a local server or a person...
This research entitled the role of E-learning to improve staff performance in Bahrain Airport Services (BAS), where the research was limited to Bahrain Airport Services and targeted the employees and students who are attending courses at training in BAS Aircraft Engineering Training Center and Bahrain Airport Services Learning and development Cente...
Abstract:
In this paper, the project has successfully designed a unique idea by implementing a Green Computing System of Health and Secure Environment Management System for Ray International W.L.L company. The objective of this project is to indicate the waste minimization and recycling approaches by adapting to the paperless approach and strategy...
With the recent rapid development and
growth in information technology, the profile of student
learners has changed [1], and the teachers need to
improve their quality of teaching and learning to
synchronize with the developing growth in technology.
In this research paper, confidentiality, integrity and
availability (c-i-a) model was used to secure...
ABSTRACT- Structured teaching practices and student-oriented teaching practices both contribute to a positive classroom environment, promoting teachers’ self-efficacy. In the contexts of many countries the classroom environment is believed to impact student outcomes.
The main problem of this paper is borne out of the need to make the learning proce...
Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining m...
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community.
Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting...
The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. This chapter discusses the main concepts, developments, and future trends of security. There are three main reasons for security development and its innovation. The first reason is: Perfect security does not...
The aim of server virtualization is to eliminate the Hardware equipment in the Datacenter and maximize the utilization of the existing resources. This helps companies in achieving the business goals and objectives in cost effective manner and better support and integration. Virtualization technology changes the protection way of security, as most o...
The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. There are three main reasons for security development and its innovation. The first reason is: "Perfect security does not exist"; this will lead the researcher to develop more and more methods to defend agai...
The encryption method Rijndael Advanced Encryption Standard is applied for security information DBs, to prevent an unauthorized user from accessing any stored information. The security method determines the resources that agents are able to have an access and to give permission to other agents. Security and security assurance are special integrity...
The book Intelligent Systems for Science and Information is the remarkable collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2013. It contains twenty-four chapters in the field of Intelligent Systems, which received highly recommended feedback during SAI Confe...
Intrusion Prevention Systems (IPS) as a security solution have their own characteristics in analysing, detecting and preventing intruders’ acts. It provides a quite good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antivirus and any security applications. This is by acti...
In recent years there has been a rapidly increasing intensity of work going into investigating various methods of facilitating assisted living for the benefit of the elderly and those with difficulties in mobility. This chapter describes one such effort which distinguishes itself from the rest by considering and describing a system with true commer...
Intrusion Prevention Systems (IPS) can analyse, detect and prevent intruder attacks. IPS provide a good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antiviruses and any security applications, by actively responding to attacks and affording great flexibility when dealing...
A Virtual Private Network (VPN) is a secure private communication tunnel between two or more devices across a public network such as the Internet. These devices may be either computers running VPN software or special devices such as VPN-enabled routers. VPN allows home computers to be connected to an office network or two home computers to be conne...
Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable. In addition, the only techniques that have been applied to most system...
Trojan virus attacks pose one of the most serious threats to computer
security. A Trojan horse is typically separated into two parts - a server and a
client. It is the client that is cleverly disguised as significant software and
positioned in peer-to-peer file sharing networks, or unauthorized download
websites. The most common means of infection...
Threats have become a big problem since the past few years as computerviruses are widely recognized as a significant computer threat. However, the roleof Information Technology security must be revisit again since it is too often. ITsecurity managers find themselves in the hopeless situation of trying to uphold amaximum of security as requested fro...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable with spoofed Internet Protocol (IP) address. Th...
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP)...
Today, applications in mobile multi-agent systems require a high degree of confidence that running code inside the system will not be malicious. Also any malicious agents must be identified and contained. Since the inception of mobile agents, the intruder has been addressed using a multitude of techniques, but many of these implementations have onl...
Problem statement: Bluetooth has emerged as very popular ad hoc network standard today. Bluetooth network applications include wireless synchronization, e-mail/internet/intranet access using local personal computer connections, hidden computing through automated applications and networking. Due to this ability, it is not impossible for the network...
Problem statement: Open Source technologies are interesting in that they allow free experimentation and integration by anyone and anywhere. A Jabber user can control presence with very little effort. Another user, regardless of external platform, must subscribe to your presence. You have the choice of rejecting or accepting the subscription at the...
Problem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this r...
Web services are modular and distributed applications and are based on industry standard technologies. Nowadays, a message traveling through Internet is relatively simple to be read or modified. This is due to the complexity of network and the existence of many points of attack. SOAP is a protocol specification for invoking methods on servers, serv...
This paper presents our effort and to realize possible usage on embedded Linux platform for Intrusion Detection (Port Scan). The approach was to develop software which performs port scan using half-open and udp technique. The software is then executed on a Linux based Single Board Computer (SBC) which runs TS-Linux 2.4.23 kernel developed by Techno...
There are many architecture characteristics of Multi-Agent Systems like Flexibility,
Robustness, Distributed Computing, Facilitating development maintenance, and
Facilitating research. In this paper a work depends on how can a distributed systems are used
by Multi-Agent Systems (MAS) using the ASP.Net. Here we have focused on Flexibility,
because m...
Projects
Projects (3)
Annals of Emerging Technologies in Computing (AETiC), a scholarly peer-reviewed open access international research journal enabling low cost publication solutions while projecting an image of quality research. AETiC is published by the International Association for Educators and Researchers (IAER) which is a CIC (Community Interest Company) i.e. a low-profit organization, registered in England and Wales.
As an Open Access journal, AETiC aims to provide a channel for quality research to be publicised to a broad audience. Past issues of AETiC are made available online at AETiC website and archived at the British Library, London, UK.
Printed format of the journal issues are printed and distributed by Marston Book Services, a printer in Oxfordshire, UK. The Article Processing Fee (APF) also includes two copies of the printed issues of the journal, to be posted to the mailing address of the corresponding author FREE of any additional cost.
AETiC welcomes authors to submit, through EasyChair submission site using AETiC’s MS Word Template, their original research, review and survey papers which significantly contributes to the existing domain of research and adds new knowledge in the field of emerging technologies related to computing, software engineering, information technology and communications engineering. More details can be found here: http://aetic.theiaer.org
To enhance the performance for students using the concepts of security C_I_N when applied summative assessment methods