An Overview of the Development of Mobile Wireless Communication Technologies
Journal Article

Mobile wireless technologies have followed different evolutionary (generation) paths aimed at unified target related to the

performance and efficiency in high mobile environment, which provides access to wide range of telecommunication services

including advanced mobile services supported by mobile and fixed networks. This paper illustrate the developments of the

mobile wireless communication, focus on the specification and capability for each technology to make an idea about the future

technology what will offer.

Mohammed Alnaas, (05-2018), American Journal of Computer Science and Engineering: international journal, 5 (2), 22-29

Using Access Control List against Denial of service attacks
Journal Article

Hadya Soliman Hadya Hawedi, (12-2017), Journal of Economics and Political Science: Faculty of Economics and Commerce / Al-Asmarya Islamic University, 1 (10), 261-274

INFORMATION TECHNOLOGY CAPABILITY AS PREDICTOR OF ORGANIZATIONAL INTELLIGENCE IN LIBYAN OIL AND GAS COMPANIES
Journal Article

Hadya Soliman Hadya Hawedi, (12-2015), ARPN Journal of Engineering and Applied Sciences: ARPN, 10 (23), 18220-18227

A Cross-Layer Decision for Mobile IP Handover
Journal Article

Network layer indications are not readily available upon a link change; therefore, general dependes on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handover. If information could be gathered at link layer to determine the need for network layer signaling, then both the delay and signaling load could be really improved over the current standards of Mobile IP.

This paper presents a Cross-layer decision on two layer network and link layers to improve the performance of Enhanced Mobile IP (E-Mobile IP) handover in which reducing packet loss and latency during handover process.

Mohammed Alnaas, (08-2013), Lecture Notes on Software Engineering: international journal, 3 (1), 308-313

A Universal Lexical Steganography Technique International Journal of Computer and Communication Engineering
Journal Article

 In this paper, English language will be used as an instance of natural languages as we will be concerned with the set of all natural language texts. this research tries to employ a set of all synonyms as a way to hide secret message inside a natural language text. 

Ahmed Hassen ELjeealy Ben Alabish, Abduelbaset Mustafa Alia Goweder, (01-2013), International Journal of Computer and Communication Engineering: IJCCE, 2 (159), 153-157

Online Shopping and the Transaction Protection in ECommerce: A case Of Online Purchasing in Libya
Journal Article

Hadya Soliman Hadya Hawedi, (06-2012), International Journal of Scientific and Research Publications: IJSEP, 2 (6), 1-4

CHALLENGES OF SECURITY, PROTECTION AND TRUST ON E-COMMERCE: A CASE OF ONLINE PURCHASING IN LIBYA
Journal Article

Hadya Soliman Hadya Hawedi, (05-2012), International Journal of Advanced Research in Computer and Communication Engineering: IJARCCE, 1 (3), 141-145

Current Challenges and Future Perspective: The Influence of Organizational Intelligence on Libyan Oil and Gas Industry
Journal Article

Hadya Soliman Hadya Hawedi, (01-2011), IJCSNS International Journal of Computer Science and Network Security: IJCSNS, 1 (11), 145-147

Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information
Journal Article

Handover latency is the primary cause of packet loss resulting in performance degradation of standard Mobile IPv6. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at the IP layer that it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN).

This paper proposes an enhancement to Fast Mobile IPv6 handover (FMIPv6), based on link layer information, we also present performance evaluations in terms of the packet loss and handover latency using evaluation models.

Mohammed Alnaas, (06-2010), Elsevier: Elsevier, 6 (83), 1644-1650