Imad J. Mohammed

Imad J. Mohammed
University of Baghdad · Department of Computer Science

PhD in Computer Science

About

39
Publications
21,326
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
119
Citations
Introduction
Imad J. Mohamad currently works at the Department of Computer Science, University of Baghdad/Iraq. Imad does research in Computer Communications (Networks), network security, algorithms optimization and analysis. Current projects are related to the network security (Botnet) and Optimization Cloud-SDN data center. The recent project related to the optimization of indoor wireless coverage.

Publications

Publications (39)
Article
Full-text available
This paper proposes a method for improving network security by introducing an Intrusion Detection System (IDS) framework between end devices. It considers big data challenges and the difficulty of updating databases to uncover new threats to firewalls and detection systems. The proposed framework introduces a supervised network using CNN and the UN...
Article
Full-text available
An integral part of any reliable network security infrastructure is the intrusion detection system (IDS). Early attack detection can stop adversaries from further intruding on a network. Machine learning (ML) and deep learning (DL) techniques to automate intrusion threat detection at a scale never previously envisioned have snowballed during the pa...
Article
Full-text available
DDoS attack is a type of network security threat that aims to flood target networks with harmful traffic. Despite the fact that several statistical methods have been designed for DDoS attack detection, creating an offline or real-time detector with low cost is still one of the main concerns. The aim of this research using (ML) techniques is to cate...
Article
Full-text available
Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and inves...
Article
Full-text available
Optimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall pub...
Article
Full-text available
A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-...
Conference Paper
Full-text available
With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defi...
Conference Paper
Full-text available
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer...
Article
Full-text available
Cloud data centers provide various services using efficient and economic infrastructure to facilitate the work of IT providers, companies and different end users. But they may suffer from congestion due to the poor distribution of traffic load among the network links and consequently diminish the network performance. Software defined networking is...
Chapter
Full-text available
Supervised machine learning is a method to predict a class for labeled data, to improve different QoS metrics of several scopes such as educational, industrial and medical etc. This paper presents in-deep study focusing on four supervised classifiers were used widely to distinguish or categorize TCP/IP network traffic model and how they can be empl...
Article
Full-text available
In the 21st century, people are more engrossed in how they can control their homes and secure them from intruders. Such realities have been made possible by the introduction of Short Message Services (SMS) which are used entirely to control different household equipment. These technologies are referred to as smart homes. Many people around the worl...
Article
Full-text available
Forming of the Multicast tree with the best root considered as center selection problem (typically classified as NP-complete type). Alternatively called center Rendezvous Point (RP) due to the direct impact on the multicast routing protocol in terms of the performance. This research article introduces a new compound solution for multicast RP select...
Article
Full-text available
This paper proposes a new hybrid security algorithm called RC4-DNA-Alg. It combines the symmetric stream cipher RC4 algorithm with DNA-indexing algorithm to provide secured data hiding with high complexity inside steganography framework. While RC4 represent one of the widely used algorithms in network security protocols, such as Secure Sockets Laye...
Book
The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast protocols reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, widely used in WAN applications as online games, video conferencing and IPTV. This research focuses on IP...
Article
Full-text available
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tri...
Article
Full-text available
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the "know how" to be able to succeed in choosing the right migration to start time. These papers focus on thetransition to IPv6 mechanisms.Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of...
Article
Full-text available
The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, multicast used widely in LAN/WAN applications such as online games, video conferencing and IPTV. The multicast techn...
Article
Full-text available
Broadband satellite is playing a main role in provision global coverage and onboard processing ability over IP networks to assess user applications. In order to lower the cost, get better security, solve IPv4 addressing limitation, expand the expected advantages of modern routing and mobility characteristics; the next-generation satellite systems o...
Book
Phishing is an identity theft. The attacker steels usernames and passwords of the email users and then uses this information to gain personal benefits or sells this information to other attackers. The danger of phishing is increasing every day. Banks, companies and the email users risk to be attacked. Phish attack causes a loss of million dollars a...
Book
This book is about the proposed scheme EPEGASIS (Enhanced Power Efficient GAthering in Sensor Information System), is developed based on PEGASIS and LEACH routing protocols in WSN. The aim of the proposed scheme is to introduce a transmission power control system based on the energy harvesting and residual energy level of each sensor node to extend...
Article
Full-text available
One of the internet based identity thefts is called phishing. Email phishing is a way that phishers trick the user to give information. The increasing of the phish attack in the resent years cause a lot of problems; credit card number, user name, password were stolen due to the phish attack. Due to this attack people lose their money, personal info...
Article
Full-text available
Wireless Sensor Networks (WSNs) are used to collect and send various kinds of messages to a base station, for instance, WSNs are used in many important applications such as health care, military and monitoring buildings. Routing protocol (such as LEACH and PEGASIS) is one of the important issues in WSN, when applying routing protocol on sensor node...
Book
Full-text available
There are more than 4 billion people own a mobile today more than 50% of those using the Internet service through a mobile and numbers are grown up, through these statistics we must devote part of the research and studies on the mobile and how its programming. In this Book, we will create an objective c application for iPhone operating system IOS s...
Book
Full-text available
This book illustrates the design an offline Arabic handwritten text recognition system using structural techniques and several proposed algorithms. The ultimate aim of handwriting recognition is to make computers able to understand human written texts, with a performance comparable to that of humans. The domain of handwriting in the Arabic script p...
Article
Full-text available
The increasing needs for Iraqi citizens in getting the advantages of e-government services, administration and democracy motivates us to study and look for how to expand the e-government project of Iraq with new e-services. The proposed framework considers a realistic problem in Iraq called the identity of the Civil Status. It verifies the (identit...
Conference Paper
The Shannon capacity predicts the theoretical maximum rate of information transfer through a channel, at a given noise level. However, this concept has limited application in LTE networks. As such, alpha-Shannon capacity, which is modified from Shannon capacity, has been proposed for use in LTE networks. Nonetheless, the existing alpha-Shannon capa...
Book
In this work, an e-learning application is developed that provides many services which are training courses, online assessment, e-library, chat and news. These services are developed to reduce the cost of education, make it available to a wide range of students, and to increase the interaction between the teacher and the students. This application...
Article
Full-text available
Arabic handwriting recognition is the hardest applications in the optical character recognition ( OCR ) because of the characteristics of Arabic characters and the variety of written styles which differ from writer to another, even for the same writer at a different time. To get good recognition , there must be a correct segmentation. This paper pr...
Article
Full-text available
standards, PHS suppresses redundant parts of payload header in MAC service data unit. This paper proposes Label Switched Path-Payload Header Suppression (LSP- PHS), in which an MPLS-enabled backbone route compresses packets over an MPLS LSP without compression or decompression cycles at each router. It has two main contributions for MPLS-IPv6 heade...
Article
Full-text available
Over the past few years, the telecommunications sector has started moving toward the use of Voice over Internet Protocol (VoIP) technology. VoIP technology employs Internet infrastructure and protocols to transfer VoIP data between call parties. Unfortunately, none of the existing Internet transport layer protocols address VoIP application requirem...
Data
Problem statement: Multimedia Conferencing System (MCS) is a server-based video conferencing system. One of the most critical limitations faced by this approach is the scalability issue. In the MCS, the outgoing bandwidth of the server is shared among all concurrent clients. Thus, the more clients there are, the lesser the bandwidth each client can...
Article
Problem statement: Multimedia Conferencing System (MCS) is a server-based video conferencing system. One of the most critical limitations faced by this approach is the scalability issue. In the MCS, the outgoing bandwidth of the server is shared among all concurrent clients. Thus, the more clients there are, the lesser the bandwidth each client can...
Chapter
Today the interest for global broadband access has led to the integration of hybrid networks that can provide wide area coverage and new services. Although satellite network plays a vital role in providing coverage over the surface of the earth, Line-Of-Sight (LOS) is still an obstacle in satellite communications. Thus a hybrid network between sate...
Conference Paper
Full-text available
Wireless ad hoc networks are a collection of mobile nodes spreading over a defined geographical area, enabling realtime collaborative applications such as push-to-talk and VoIP. Unfortunately, wireless ad hoc networks suffer from limited bandwidth and QoS constraints. A proposed eXplicit MultiCAST (XCAST) based routing protocol (P-XCAST) is present...
Article
This paper presents a novel scheme called perpriority flow control (PPFC) as an extension to the IEEE802.3x standard using a simple and efficient node buffer management strategy, where a physical channel was divided into several virtual channel based on the bandwidth value (QoS parameter) embedded into the IPv6 flow label field of each flow. Moreov...
Article
Full-text available
Optimizing the response time for Client-Server IPv6 traffic over label switched path (LSP) is the main contribution for this paper. It is achieved using header suppression for real time IPv6 traffic across MPLS label switched path (LSP). Robust Header Compression (RoHC) and Payload Header Suppression (PHS) are two options defined in IEEE 802.16 for...
Article
Full-text available
The huge coverage space of IPv6 addresses and providing guaranteed support for the ever increasing customer demand, results in the dealing with bigger packet header-size compared to the payload-size especially in some real time video and audio applications, consequently more bandwidth is wasting. Using the advantages of MPLS with IPv6 is still one...
Conference Paper
Full-text available
Wireless ad hoc networks are a type of wireless network that can be easily created without the need of network infrastructure or central administration. Unfortunately, wireless ad hoc networks suffer from some limitations related to the bandwidth leakage. So a proper data flow mechanism should be used to save the bandwidth consumption. So we propos...
Conference Paper
Full-text available
One feature of Dynamic Host Configuration Protocol (DHCP) servers is the ability to assign static (fixed) IP Addresses for well-known clients in the Local Area Network (LAN) based on their Medium Access Control (MAC) addresses. This typically involves manual intervention by the network administrator to enter the correct MAC address and IP address i...

Network

Cited By