
Murtaja AliUniversity of Basrah
Murtaja Ali
Doctor of Philosophy
About
42
Publications
27,233
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
409
Citations
Introduction
He is a HCI researcher and practitioner, who focuses on designing UI . He is also an enthusiastic self-starter with strong leadership and communication skills. Currently, He is a Research Fellow at HCCR Lab, within the UUM. He is doing his Ph.D. in IT awarded UUM. He is interested in user experience for everyday life and common good and in conducting research that focuses on designing for special target audiences. Currently, compelled by:healthcare, well-being,telecare,creativity and innovation.
Publications
Publications (42)
The growth of internet of things (IoT) devices and apps has caused disruptions in key sectors such as smart environment, healthcare, and mission-critical tool. Security of IoT devices, networks, and infrastructure is the biggest challenge. RPL, a routing protocol optimised for low-power and lossy networks, is applied by the IoT to offer seamless in...
A new technology known as the internet of things (IoT) allows both physical and virtual items to be linked and communicated with one another, creating new digital services that enhance our fineness of sustenance. The IoT system has a number of benefits, but because of its present centralized architecture, there are several problems with regard to d...
As a result of its ultra-low power consumption, simple development, sufficient network coverage, and rapid data transfer speed, Bluetooth low energy (BLE) has emerged as the standard communication standard for internet of things (IoT) nodes. Therefore, in this review paper introduces the concept of Bluetooth low energy for the internet of things (B...
Wireless sensor networks (WSN) are an emerging multidisciplinary intersection of cutting-edge research fields, and their advantages in terms of freedom of formation , high signal-to-noise ratio, high strength, and unattended, which makes WSN have good prospects for application in the field of internet of things (IoT). Considering all the benefits t...
Fake news has gained attention in recent years, particularly among social media
users. The quick spread of fake news has been made possible by the increased
usage of social media as a platform to get the most recent news and information.
As a consequence, it is getting harder to distinguish between real news and fake
news. This essay will outline a...
With the conception of modern technology that rose with 4th industrial revolution, conventional methods of teaching are getting obsolete and the impact of this revolution carves deeply into the current generation of students. Two of the few most effected subjects in education are mathematics and physics as it is harder for a student to visualize th...
After business hours and at night, the majority of office buildings and educational facilities often feature a small selection of food, unless a consumer buys takeout. Only unhealthily marketed drinks and snacks are typically available at on-site vending machines. Freshly prepared food is scarce while restaurants are closed. The idea for a vending-...
A significant security vulnerability in IPv6 is attacks against the Neighbour Discovery Protocol (NDP). Attackers can target the SLAAC process using the Stateless Address Auto-configuration (SLAAC) kind of NDP attack. SLAAC attacks can cause IPv6 link-local network disruption and expose confidential data. Researchers have proposed an attack detecti...
In order to create a complete end-to-end control system to monitor and manage the spread of Covid-19, this study describes an Internet of Things (IoT)-based approach. In light of various adaptive IoT domain types, a general framework of control mechanisms is discussed. This paper reviews pandemic disease prevention strategies, medical industry to i...
The use of unmanned aerial vehicles (UAVs) will be crucial in the next generation of wireless communications infrastructure. When compared to traditional ground-based solutions, it is expected that their use in a variety of communication-based applications will increase coverage and spectrum efficiency. In this paper, we provide a detailed review o...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attacks. The purpose of a DDoS assault is to disrupt service and prevent legitimate users from using it by flooding the central server with a large number of messages or requests that will cause it to reach its capacity and shut down. Because it is carrie...
Bulletin of Electrical Engineering and Informatics (BEEI) is hereby awarding this certificate to Mahmood A. Al-Shareeda, Selvakumar Manickam, and Murtaja Ali Saare in recognition of his/her contribution in this scientific journal as authors for paper entitled "DDoS Attacks Detection Using Machine Learning and Deep Learning Techniques: Analysis and...
Internet of Things (IoT) systems use interconnected devices with limited processing, memory, storage, and power availability. Designing the IoT system requires careful consideration of data security. IoT networks are used to collect, process, and transport data; as a result, it needs to be encrypted and secured. To ensure that the data of IoT syste...
Cybercrimes are becoming a bigger menace to both people and corporations. It poses a serious challenge to the modern digital world. According to Cybersecurity Ventures, the global cost of cybercrime will reach $10.5 trillion annually by 2025, which is significantly more than the annual damage caused by all-natural disasters and more profitable than...
Due to threats from botnets, internet security is becoming less safe. An attack plan can only be planned out to take down the botnet after the monitoring activities to understand the behavior of a botnet. Nowadays, the architecture of the botnet is developed using a Peer-to-Peer (P2P) connection, causing it to be harder to be monitored and tracked...
Neighbour Discovery Protocol (NDP) attacks are a serious security concern for IPv6. Attackers utilize the Stateless Address Auto-configuration (SLAAC) NDP attack type of targeting the SLAAC process. SLAAC attacks can compromise an IPv6 link-local network and expose private data. Attack detection mechanisms, including RA-Guard, Snort IPv6 Plugin, SL...
The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host and router. Fake router advertisement (RA) attacks have been
made possible by this RD protocol design defect. Studies show that the standard
RD protocol is vulnerable to a fake RA attack where the host will be denied a
valid gateway. To cope with this pro...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attacks. The purpose of a DDoS assault is to disrupt service and prevent legitimate users from using it by flooding the central server with a large number of messages or requests that will cause it to reach its capacity and shut down. Because it is carrie...
Drones and the Internet of Things (IoT) are two emerging technologies used in agriculture fields, which replace traditional farming practices with a modern era of rigorous cultivation. In this paper, we propose a smart agriculture system for new farms and farms that practice crop rotation by using drones and IoT sensors. Our proposal includes farm...
It is our pleasure is to inform you that based on the reviewers feedback of
(ICDSIC 2022), your submitted paper entitled: “A Survey of SQL Injection
Attacks, Their Methods, and Prevention Techniques” has been accepted for
presentation in this conference and going to be submitted to the IEEE Xplore
digital library for publication.
It is our pleasure is to inform you that based on the reviewers feedback of
(ICDSIC 2022), your submitted paper entitled: “Intelligent Drone-based IoT
Technology for Smart Agriculture System” has been accepted for
presentation in this conference and going to be submitted to the IEEE Xplore
digital library for publication.
Now more than ever, the government needs to find out that how well the system of Iraq can be transformed to efficiently offer public services to the citizens for consistent development growth. For many reasons, the answer lies in the development, innovation, and application of the latest technologies in Iraq. The use of electronic technology will o...
Graphical abstract Abstract The potential use and effectiveness of simulation games for learning purposes have heavily drawn on human cognition or information processing theories. Lack of acceptance and study on simulation games as learning tool in higher education offer this opportunity to conduct a survey analysis on students' perceptions on how...
After a major disaster, the present communication system fails in providing the services in the affected area. No means of communication proves to be more dangerous as the rescue and relief operations become more difficult. Our current research is about establishing a network in such a disaster-prone area, which would facilitate to communicate and...
This paper is presents a microstrap patch with a T-shaped rectangular antenna workings; the T-shaped patch operating at 3.6 GHz resonating frequency range for 5G application (from 2.9 to 4.4 GHz) repectively. The overall size of the proposed antenna is 22×24×0.25 mm 3 ; the feeding technique using a 50 Ω feed line to the antenna. The proposed anten...
Millions of people are affected by mental illness which remains unnoticed due to lack of awareness, use of appropriate, timely mental health services, associated stigma, and limited resources. Ignorance leads to serious consequences resulted in maladjustment in life functioning. Since adulthood is a period prone to heightened emotionality. Therefor...
Paper based approach to clinical documentation such as handwritten notes among health care providers are cause of errors in medical field. Therefore, health record system needs to be replaced with electronic health record (EHR). Many health professionals in developing countries specifically in Iraq refuse to use the systems implemented for their be...
span id="docs-internal-guid-0cd3701c-7fff-a024-86c4-cd67dde5c463"> In general, mammogram images contaminated with noise which directly affect images quality. Several methods have been proposed to de-noise these images, however, there is always a risk of losing valuable information. In order to overcome the loss of information, the present study pro...
The most significant phenomenon that has caught the attention of the modern computing industry nowadays since the “Internet” is “Big
Data”. The technology platforms that have been developed together with it has allowed for the processing of data of various formats and
structures without having to worry about the constraints that are linked with tra...
Abstract. Cloud computing is a type of computing that base on shared computer resources for delivering information technology services. Distributed Computational system has been considered as best systematic model for sharing resources. Minimization of response time is the requirement in the distributed computational system. Previous Algorithm belo...
In the recent years, mobile is found to be useful since they allow the user to perform more tasks in a mobile context. However, this usefulness come at the expense of the usability of these devices in some contexts. Thus, usability becomes an important factor in the adoption of mobile applications (such as mobile tracking applications, mobile healt...
Fine-grained visual categorization (FGVC) dealt with objects belonging to one class with intra-class differences into subclasses. FGVC is challenging due to the fact that it is very difficult to collect enough training samples. This study presents a novel image dataset named Cowbreefor FGVC. Cowbree dataset contains 4000 images belongs to eight dif...
Cloud computing is a type of computing that base on shared computer resources for delivering information technology services. Distributed Computational system has been considered as best systematic model for sharing resources. Minimization of response time is the requirement in the distributed computational system. Previous Algorithm belongs to the...
p>The aim of this article is to discuss how different factors affect the decision of intention to use and adopt mobile health applications using the extended technology acceptance model (TAM) among older adults in Iraq. “Perceived usefulness (PU), perceived ease of use (PEU), subjective norm (SN), and facilitating conditions (FC)” were four key pre...
This article examines the link between the older adult’s cognitive decline, and Assistive Mobile Health Applications in terms of quality of life as researcher has found scarcity in explaining the mediating role of assistive mobile health applications towards the quality of life of older adults with cognitive decline. Researchers have identified the...
p>Aging is the biological, psychological, or social change that occur with the passage of time which leads to functional impairment, and eventually chronic diseases. The number of people living older is rapidly increasing, and there is a natural decline in physical activity. The reduced mobility affects their daily life activities making them depen...
The integration of Information Technology (IT)
and Communication Technology (CT) creates Information and
Communication Technologies (ICTs), which has changed the
citizens’ lives and the manner they interact. Therefore, the
governments around the world took serious steps to adopt and
implement ICT to provide the best services to their citizens.
Howe...
Students either local or international experience different adjustment problems while moving one place to another place, and out of those problems, finding suitable accommodation is the most challenging one. However, at Universiti Utara Malaysia (UUM), the accommodation centre for the students is utilizing the traditional method for managing and pr...
Recently, most of the previous studies focused on technology use and adoption among adults. However, few studies have been conducted on older adults. More specifically the emphasis is on the problems in different areas i.e. health care, housing, education, employment, and product design. Therefore, in this study, a systematic literature is taken in...