A Cross-Layer Decision for Mobile IP Handover
Journal Article

Network layer indications are not readily available upon a link change; therefore, general dependes on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handover. If information could be gathered at link layer to determine the need for network layer signaling, then both the delay and signaling load could be really improved over the current standards of Mobile IP.

This paper presents a Cross-layer decision on two layer network and link layers to improve the performance of Enhanced Mobile IP (E-Mobile IP) handover in which reducing packet loss and latency during handover process.

Mohammed Alnaas, (08-2013), Lecture Notes on Software Engineering: international journal, 3 (1), 308-313

A Universal Lexical Steganography Technique International Journal of Computer and Communication Engineering
Journal Article

 In this paper, English language will be used as an instance of natural languages as we will be concerned with the set of all natural language texts. this research tries to employ a set of all synonyms as a way to hide secret message inside a natural language text. 

Ahmed Hassen ELjeealy Ben Alabish, Abduelbaset Mustafa Alia Goweder, (01-2013), International Journal of Computer and Communication Engineering: IJCCE, 2 (159), 153-157

Online Shopping and the Transaction Protection in ECommerce: A case Of Online Purchasing in Libya
Journal Article

Hadya Soliman Hadya Hawedi, (06-2012), International Journal of Scientific and Research Publications: IJSEP, 2 (6), 1-4

CHALLENGES OF SECURITY, PROTECTION AND TRUST ON E-COMMERCE: A CASE OF ONLINE PURCHASING IN LIBYA
Journal Article

Hadya Soliman Hadya Hawedi, (05-2012), International Journal of Advanced Research in Computer and Communication Engineering: IJARCCE, 1 (3), 141-145

Current Challenges and Future Perspective: The Influence of Organizational Intelligence on Libyan Oil and Gas Industry
Journal Article

Hadya Soliman Hadya Hawedi, (01-2011), IJCSNS International Journal of Computer Science and Network Security: IJCSNS, 1 (11), 145-147

Design and Simulation of an Adaptive Intelligent Control System for Direct Current Drive
Conference paper

 Abstract: The paper presents an adaptive intelligent control method to overcome effects of some indeterminate and undealt factors that a DC .drive is suffered. In the speed loop, we use a three-layer neural networks through a backpropagation (BP) algorithm out of line learning to realize the fuzzy-control tactics. We use unit neuron through Hebb algorithm on-line dynamic learning to realize adaptive mechanism. The simulation is based on a MATLAB6.0 neural networks toolbox with simulink. The results of the simulation show that adaptive intelligent control method enables the system to have good dynamic and stability performance. The proposed method develops the use of simulink in the field of electrical drive of adaptive intelligent control.

Abduelbaset Mustafa Alia Goweder, (10-2010), University of Tripoli, Tripoli, Libya.: Proceedings of The Libyan Arab International Conference on Electrical and Electronic Engineering (LAICEEE2010), 72-80

Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information
Journal Article

Handover latency is the primary cause of packet loss resulting in performance degradation of standard Mobile IPv6. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at the IP layer that it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN).

This paper proposes an enhancement to Fast Mobile IPv6 handover (FMIPv6), based on link layer information, we also present performance evaluations in terms of the packet loss and handover latency using evaluation models.

Mohammed Alnaas, (06-2010), Elsevier: Elsevier, 6 (83), 1644-1650

Network Security for QoS Routing Metrics
Conference paper

Abstract— Data security is an essential requirement, especially when sending information over a network. Network security has three goals called confidentiality, integrity and availability (or Access). Encryption is the most common technique used to achieve this goal. However, the computer society has not yet agreed on a standard method to measure data security. The ultimate goal of this study is to define security metrics based on different aspects of network security, and then demonstrate how these metrics could be used in Quality of Service (QoS) routing to find the most secure path connecting two distant nodes (source and destination) across an internetwork. Three security metrics are proposed in this document, these metrics have been derived from three important issues of network security, namely: authentication, encryption and traffic filtration techniques (firewalls and intrusion detection systems). The metrics follow different composition rules in that the first is binary, the second is either concave or additive and the last is multiplicative. Routing algorithms that make use of such metrics have been implemented in the C# programming language to test the viability of the proposed solution. Computational effort and blocking probability are the most commonly used performance measures were used to assess the behavior and the performance of these routing algorithms. Results obtained show that the algorithms were able to find feasible paths between communicating parties and helped in making reasonable savings in the computational effort needed to find an acceptable path. Consequently, higher blocking probabilities were encountered, which is thus the price to be paid for the savings.  

Ibrahem Ali Mohammed Almerhag, Abduelbaset Mustafa Alia Goweder, (05-2010), The International Islamic University, Kuala Lumpur, Malaysia: Proceedings of ICCCE 2010, 151-157

Unsupervised Sentence Boundary Detection Approach for Arabic.
Conference paper

ABSTRACT

Punkt (German for period) is a sentence boundary detection system that divides an English text into a list of sentences using an unsupervised algorithm developed by Kiss and Strunk (2006) [6]. This algorithm is based-on the assumption that a large number of ambiguities in the determination of sentence boundaries can be eliminated once abbreviations have been identified.

    The Punkt system was adapted to support Arabic language. The modified Punkt is trained on Arabic Corpus to build a model for abbreviation words, collocations, and words that start sentences. An evaluation of the performance of the modified Punkt system has revealed that an accuracy rate close to 99% has been achieved for detecting Arabic sentence boundaries.

 


Abduelbaset Mustafa Alia Goweder, (12-2009), University of Science and Technology, Yemen.: Proceedings of ACIT 2009, 289-297

A General Technique for Graduating SQL Schema from XML Schema.
Conference paper

It is possible to generate an SQL schema from XML Schema manually; however automatically generating an SQL schema from XML Schema would generally be very beneficial. This paper presents XML Schema-driven generation architecture components with XSL Stylesheet. In this paper, an algorithm for this type of generation is presented. The inputs of the algorithm are XML Schema and XSL Stylesheet, and the output is an SQL schema. The proposed algorithm shows how this component can automatically be generated. An evaluation of the proposed algorithm is also presented by testing the algorithm with different examples.  

Ali Sayeh Ahmed Elbekai, Abduelbaset Mustafa Alia Goweder, (12-2009), University of Science and Technology, Yemen.: Proceedings of ACIT 2009, 177-185