
Mohammed Majid Msallam- MSc. Computer Engineering
- Assistant Lecturer at University of Technology - Iraq
Mohammed Majid Msallam
- MSc. Computer Engineering
- Assistant Lecturer at University of Technology - Iraq
I am working to develop security of Li-Fi technology
About
11
Publications
43,062
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations
Introduction
Mohammed Majid Msallam received a B.Sc degree in Control and System Engineering as a general specialty and Computer Engineering as a Specialization. He is currently working as an assistant engineer at the Control and System Engineering Department, University of Technology, Iraq. His research areas are control systems, encryption data, artificial intelligence, optimization, and controller.
Skills and Expertise
Current institution
Additional affiliations
Education
November 2013 - July 2017
Publications
Publications (11)
Light fidelity (Li-Fi) technology is a communication technology using visible light. Li-Fi technology solves the problem of radio frequency bandwidth shortage in wireless fidelity (Wi-Fi) and is more secure considering the wall is impenetrable to the light. However, an exception can be made if a vulnerability emerges when having indoor communicatio...
With the advancement of technology and the development of the Internet of Things (IoT), the importance of protecting devices is becoming increasingly important to secure them from unauthorized access. The emergence of personal devices such as Personal Computers (PC) and smartphones increases the need for advanced security techniques because these d...
In the digital era, the protection of sensitive data transmitted over the Internet, such as credit card information, is paramount. This study introduces an innovative system that enhances data security during internet transmission by synergizing steganography and cryptography. The proposed method employs a two-stage process: encryption followed by...
In recent years, safe lockers have been spread in public places to secure valuable belongings. The people are concerned about losing safe locker keys or use of the spare key by others and will remain worried about their things. To solve the forenamed matter, this paper proposed a system that depends on biometrics to secure valuable things and can m...
The Light-Fidelity (Li-Fi) is a wireless communication technology that is light-based and can complete wireless fidelity (Wi-Fi) technologies for many applications. Li-Fi technology which uses light spectrum is a technology for solving the lack of radio spectrum at Wi-Fi. One of the main benefits of Li-Fi technology is the ability to communicate by...
Recently, the movement of data between smart devices has piqued the world's curiosity because it transmits important and unimportant data via the Internet. Thus, important data must be encrypted during passing over a network so that information can only access by an intended receiver and processed by it. As a result, information security has become...
Recently, there is increasing interest in data transfer between many different devices. Data must be encrypted before being sent so that the intended receiver can only read it to prevent unauthorized access and processing of a secret message. This paper suggests two levels of security to secure import messages that are sent via the internet. A secr...
The ball and Plate (BaP) system is the typical example of the nonlinear dynamic system that is used in a wide range of engineering applications. So, many researchers in the control field are using the Bap system to check robust controllers under several points that challenge it, such as internal and external disturbances. Our manuscript proposed a...
At present, the need for hydraulic system application in different fields, such as an excavator, is increased. The power of liquid is used in the hydraulic machines to achieve its task. Thus, the power of liquid requires precise control to become its work more accurate. The goal of this paper is to find the best parameter for the fractional proport...
Recently, the world is interested in moving data between various devices. When The data transfer over the internet, maybe it attacks and reads or modifies on containing it. So, Data transmission must be encrypted before sending it to read and interpret bythe intended receiver. Thus, information security is more critical than it used to be. This pap...
Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the least significant bit Steganography method to...
Questions
Questions (13)
Please suggest to me some journals to become a reviewer in them.
I read the system in this paper, and I see that they use the 'multiply' term so I wonder how to use multiply in encryption and decryption.
I have encrypted data and decrypted data. how can I know the strength of the encryption?
I have an article in the encrypted data field. I want to publish it in the journal MethodsX but they need reviewers to review it. can you be a reviewer?
if you can, I need some information about you.
First Name:
Last Name:
Degree:
Position:
Institution:
E-mail:
The link to the journal MethodsX:
Kp =-0.9
Ki=-0.6
Kd=-3.5
Are these values legal??
please anyone has experience about the difference among them, Type to me that difference.