Imad J. MohammedUniversity of Baghdad · Department of Computer Science
Imad J. Mohammed
PhD in Computer Science
About
39
Publications
21,326
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
119
Citations
Introduction
Imad J. Mohamad currently works at the Department of Computer Science, University of Baghdad/Iraq. Imad does research in Computer Communications (Networks), network security, algorithms optimization and analysis. Current projects are related to the network security (Botnet) and Optimization Cloud-SDN data center. The recent project related to the optimization of indoor wireless coverage.
Publications
Publications (39)
This paper proposes a method for improving network security by introducing an Intrusion Detection System (IDS) framework between end devices. It considers big data challenges and the difficulty of updating databases to uncover new threats to firewalls and detection systems. The proposed framework introduces a supervised network using CNN and the UN...
An integral part of any reliable network security infrastructure is the intrusion detection system (IDS). Early attack detection can stop adversaries from further intruding on a network. Machine learning (ML) and deep learning (DL) techniques to automate intrusion threat detection at a scale never previously envisioned have snowballed during the pa...
DDoS attack is a type of network security threat that aims to flood target networks with harmful traffic. Despite the fact that several statistical methods have been designed for DDoS attack detection, creating an offline or real-time detector with low cost is still one of the main concerns. The aim of this research using (ML) techniques is to cate...
Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and inves...
Optimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall pub...
A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-...
With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defi...
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer...
Cloud data centers provide various services using efficient and economic infrastructure to facilitate the work of IT providers, companies and different end users. But they may suffer from congestion due to the poor distribution of traffic load among the network links and consequently diminish the network performance. Software defined networking is...
Supervised machine learning is a method to predict a class for labeled data, to improve different QoS metrics of several scopes such as educational, industrial and medical etc. This paper presents in-deep study focusing on four supervised classifiers were used widely to distinguish or categorize TCP/IP network traffic model and how they can be empl...
In the 21st century, people are more engrossed in how they can control their homes and secure them from intruders. Such realities have been made possible by the introduction of Short Message Services (SMS) which are used entirely to control different household equipment. These technologies are referred to as smart homes. Many people around the worl...
Forming of the Multicast tree with the best root considered as center selection problem (typically classified as NP-complete type). Alternatively called center Rendezvous Point (RP) due to the direct impact on the multicast routing protocol in terms of the performance. This research article introduces a new compound solution for multicast RP select...
This paper proposes a new hybrid security algorithm called RC4-DNA-Alg. It combines the symmetric stream cipher RC4 algorithm with DNA-indexing algorithm to provide secured data hiding with high complexity inside steganography framework. While RC4 represent one of the widely used algorithms in network security protocols, such as Secure Sockets Laye...
The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast protocols reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, widely used in WAN applications as online games, video conferencing and IPTV. This research focuses on IP...
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition
mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tri...
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the "know how" to be able to succeed in choosing the right migration to start time. These papers focus on thetransition to IPv6 mechanisms.Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of...
The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, multicast used widely in LAN/WAN applications such as online games, video conferencing and IPTV. The multicast techn...
Broadband satellite is playing a main role in provision global coverage and onboard processing ability over IP networks to assess user applications. In order to lower the cost, get better security, solve IPv4 addressing limitation, expand the expected advantages of modern routing and mobility characteristics; the next-generation satellite systems o...
Phishing is an identity theft. The attacker steels usernames and passwords of the email users and then uses this information to gain personal benefits or sells this information to other attackers. The danger of phishing is increasing every day. Banks, companies and the email users risk to be attacked. Phish attack causes a loss of million dollars a...
This book is about the proposed scheme EPEGASIS (Enhanced Power Efficient GAthering in Sensor Information System), is developed based on PEGASIS and LEACH routing protocols in WSN. The aim of the proposed scheme is to introduce a transmission power control system based on the energy harvesting and residual energy level of each sensor node to extend...
One of the internet based identity thefts is called phishing. Email phishing is a way that phishers trick the user to give information. The increasing of the phish attack in the resent years cause a lot of problems; credit card number, user name, password were stolen due to the phish attack. Due to this attack people lose their money, personal info...
Wireless Sensor Networks (WSNs) are used to collect and send various kinds of messages to a base station, for instance, WSNs are used in many important applications such as health care, military and monitoring buildings. Routing protocol (such as LEACH and PEGASIS) is one of the important issues in WSN, when applying routing protocol on sensor node...
There are more than 4 billion people own a mobile today more than 50% of those using the Internet service through a mobile and numbers are grown up, through these statistics we must devote part of the research and studies on the mobile and how its programming. In this Book, we will create an objective c application for iPhone operating system IOS s...
This book illustrates the design an offline Arabic handwritten text recognition system using structural techniques and several proposed algorithms. The ultimate aim of handwriting recognition is to make computers able to understand human written texts, with a performance comparable to that of humans. The domain of handwriting in the Arabic script p...
The increasing needs for Iraqi citizens in getting the advantages of e-government services, administration and
democracy motivates us to study and look for how to expand the e-government project of Iraq with new e-services. The
proposed framework considers a realistic problem in Iraq called the identity of the Civil Status. It verifies the (identit...
The Shannon capacity predicts the theoretical maximum rate of information transfer through a channel, at a given noise level. However, this concept has limited application in LTE networks. As such, alpha-Shannon capacity, which is modified from Shannon capacity, has been proposed for use in LTE networks. Nonetheless, the existing alpha-Shannon capa...
In this work, an e-learning application is developed that provides many services which are training courses, online assessment, e-library, chat and news. These services are developed to reduce the cost of education, make it available to a wide range of students, and to increase the interaction between the teacher and the students. This application...
Arabic handwriting recognition is the hardest applications in the
optical character recognition
(
OCR
)
because of the characteristics of
Arabic characters and the variety of
written
styles which differ from writer to another,
even for the same writer at a
different time. To get good recognition
,
there must be
a
correct segmentation. This paper pr...
standards, PHS suppresses redundant parts of payload header in MAC service data unit. This paper proposes Label Switched Path-Payload Header Suppression (LSP- PHS), in which an MPLS-enabled backbone route compresses packets over an MPLS LSP without compression or decompression cycles at each router. It has two main contributions for MPLS-IPv6 heade...
Over the past few years, the telecommunications sector has started moving toward the use of Voice over Internet Protocol (VoIP) technology. VoIP technology employs Internet infrastructure and protocols to transfer VoIP data between call parties. Unfortunately, none of the existing Internet transport layer protocols address VoIP application requirem...
Problem statement: Multimedia Conferencing System (MCS) is a server-based video conferencing system. One of the most critical limitations faced by this approach is the scalability issue. In the MCS, the outgoing bandwidth of the server is shared among all concurrent clients. Thus, the more clients there are, the lesser the bandwidth each client can...
Problem statement: Multimedia Conferencing System (MCS) is a server-based video conferencing system. One of the most critical limitations faced by this approach is the scalability issue. In the MCS, the outgoing bandwidth of the server is shared among all concurrent clients. Thus, the more clients there are, the lesser the bandwidth each client can...
Today the interest for global broadband access has led to the integration of hybrid networks that can provide wide area coverage
and new services. Although satellite network plays a vital role in providing coverage over the surface of the earth, Line-Of-Sight
(LOS) is still an obstacle in satellite communications. Thus a hybrid network between sate...
Wireless ad hoc networks are a collection of mobile nodes spreading over a defined geographical area, enabling realtime collaborative applications such as push-to-talk and VoIP. Unfortunately, wireless ad hoc networks suffer from limited bandwidth and QoS constraints. A proposed eXplicit MultiCAST (XCAST) based routing protocol (P-XCAST) is present...
This paper presents a novel scheme called perpriority flow control (PPFC) as an extension to the IEEE802.3x standard using a simple and efficient node buffer management strategy, where a physical channel was divided into several virtual channel based on the bandwidth value (QoS parameter) embedded into the IPv6 flow label field of each flow. Moreov...
Optimizing the response time for Client-Server IPv6 traffic over label switched path (LSP) is the main contribution for this paper. It is achieved using header suppression for real time IPv6 traffic across MPLS label switched path (LSP). Robust Header Compression (RoHC) and Payload Header Suppression (PHS) are two options defined in IEEE 802.16 for...
The huge coverage space of IPv6 addresses and providing guaranteed support for the ever increasing customer demand, results in the dealing with bigger packet header-size compared to the payload-size especially in some real time video and audio applications, consequently more bandwidth is wasting. Using the advantages of MPLS with IPv6 is still one...
Wireless ad hoc networks are a type of wireless network that can be easily created without the need of network infrastructure or central administration. Unfortunately, wireless ad hoc networks suffer from some limitations related to the bandwidth leakage. So a proper data flow mechanism should be used to save the bandwidth consumption. So we propos...
One feature of Dynamic Host Configuration Protocol (DHCP) servers is the ability to assign static (fixed) IP Addresses for well-known clients in the Local Area Network (LAN) based on their Medium Access Control (MAC) addresses. This typically involves manual intervention by the network administrator to enter the correct MAC address and IP address i...