Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Muamer N. Mohammed
Total Records ( 3 ) for Muamer N. Mohammed
  Waleed Khalid Ahmed , Muamer N. Mohammed and Norrozila Sulaiman
  With the rapid growth of the embedded system market, especially in the area of ubiquitous e-services, an increasing number of embedded systems are required to deal with sensitive and private information. In this study, a new algorithm to secure and protect databases is proposed by using a Dynamic Key (DK) and reverse string for each character in the string (or field in the file of a database) and each string (or record in the file of a database). In this paper, a new encryption algorithm for database protection based on Dynamic Key and Reverse String (DKRS). The proposed algorithm (DKRS) specifically protecting the sensitive data because the (DKRS) is using dynamic key for each character in the string. The dynamic key is generated using special equation that depends on length of string, order of the character in the string, ASCII code of the character and string sequence. The (DKRS) algorithm guarantees that no duplicate encryption for each character and each record will be different. Also, (DKRS) algorithm ensures a different encryption for the duplicate data. The (DKRS) algorithm is using the reverse string before the encryption and many steps after that to add more complexity.
  Omar A. Hammood , Mohd Nizam Mohmad Kahar , Muamer N. Mohammed and Waleed A. Hammood
  New technology called Vehicular Ad-hoc Networks (VANETs), this topology quick changing and frequent disconnection has taken huge attention within last years and makes it complex to design an active routing protocol to routing data among vehicles, Vehicle to Vehicle (V2V) communication and Vehicle to roadside Infrastructure (V2I). Routing protocols which existing for VANETs don’t efficient upon meet all traffic scenarios. Hence, the study of an efficient routing protocol has received significant recognition. Therefore, it is really essential to distinguish the pros and cons of routing protocols that can be done for additional growth or development of any new routing protocol. This study present different aspects of VANET technologies that form a real life vehicular network. More detail for the potential applications and current initiatives for the vehicle networks are covered. In addition, brief discussion of existing related work on video streaming in VANETs which are focused on different protocol stack layers. Finally, provides a comprehensive background on vehicular communication networks. Also, the surveys different routing techniques that have improved video broadcasting functionality to achieve acceptable QoS over VANETs.
  Khudhair Abbas Mohammed , Muamer N. Mohammed , Mazlina Abdul Majidmohd and Mohd Sharifuddin Ahmad
  Security aspects are serious issues for multi-agent systems that should be taken into consideration when designing the systems. The significant effects and outcomes of the software agent technology make its application more and more popular in several fields. The rapid development of the agent technology promotes its ability to be applied in many different areas such as transportation, e-Business and healthcare. However as with any other systems, the agent technology is also vulnerable to security threats and consequently, there is a need to equip the system’s functionalities with some security defense system. A number of methodologies are providing methods and techniques for constructing security for multi-agent systems. A survey of the current state-of-the-art of security issues for MAS is the aim of this study. Techniques and models for securing multi-agent systems are presented in this study which is categorized according to the concepts and models regarding agent’s and system’s functionalities. Additionally, possible threats and attacks on multi-agent systems are defined and considered with agent’s roles and communications concerns. Moreover, up to date security solutions are elaborated at both levels: agent and the system levels. Finally, an analysis of existing work problems and the challenges of future research for the security of multi-agents are presented.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility