Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muamer N. Mohammed is active.

Publication


Featured researches published by Muamer N. Mohammed.


International Conference of Reliable Information and Communication Technology | 2017

Hybrid LTE-VANETs Based Optimal Radio Access Selection

Ayoob A. Ayoob; Gang Su; Desheng Wang; Muamer N. Mohammed; Omar A. Hammood

In road networks, the mutual metric for the location of the optimal route relaying on two points is either the length of the path or the time of the trip. Hence, the selection of access to any radio access technology (RAT) from a variety of RATs by a user for onward association has been intensively investigated by vehicular ad hoc network (VANET). In particular, it carries and distributes information, inter-communicates, and is capable of communicating with other stationary units deployed along the roadways. The problem is low data packet delivery ratio, high delay, link transmission instability, and the number of hopes per route. This paper proposed an ancient hybrid optimal radio access selection algorithm (ORAS) which combines the LTE and VANET networks with accomplishing high data packet delivery ratios and low delay, while maintaining the minimum level of cellular infrastructure usage by means of increasing the stability of link transmission and reducing the number of hopes per route. The proposed algorithm is the multi-hop-routing-protocol-based IEEE 802.11p/LTE hybrid architecture. The optimal radio access selection algorithm (ORAS), based on IEEE 802.11p radio resource management (RRM), examines the IEEE 802.11p network load through the monitor mechanism of network load. The monitor mechanism, in turn, observes the queue length to determine the current network loads. The ORAS/RRM entity broadcasts beacons through its IEEE 802.11p interface once the queue length is inferior to a particular threshold limit. Nonetheless, the existing network load might cause a collision case which leads to severe performance degradation on the condition that the queue length exceeds specific threshold limit.


Journal of Advances in Computer Networks | 2014

Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs

Ayoob A. Ayoob; Norrozila Sulaiman; Muamer N. Mohammed; Ghaidaa M. Abdulsahib

Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it’s a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the Internet and are typically created between participants. This means that a formed network can be de-formed on-the-fly without the need for any system administration. Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. The DSR (Dynamic Source Routing) routing protocol dependent on the cache memory for every node to store the routing path from source to destination. This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. The simulation results show a low delay, stable link in routing and better performance in terms of Route Discovery Time. It indicates that DSR cache outperforms DSR standard and had a high quality of packet delivery.


Archive | 2019

Vehicular Ad Hoc Network: An Intensive Review

Ayoob A. Ayoob; Gang Su; Muamer N. Mohammed

Vehicular Ad-hoc Network (VANET) is a new emerging wireless technology concept that supports communication amongst various nearby vehicles themselves and enables vehicles to have access to the Internet. This networking technology provides vehicles with endless possibilities of applications, including safety, convenience, and entertainment. Examples of these applications are safety messaging exchange, real-time traffic information sharing, route condition updates, besides a general purpose Internet access. The goal of vehicular networks is to provide an efficient, safe, and convenient environment for vehicles on the road. In this paper some wireless access standards for Vehicular Ad hoc Network (VANET) and describe was present, this paper starts with the basic architecture of networks, then discusses some of the recent VANET trials, also briefly present some of the simulators currently available to VANET researchers. Finally, discusses the popular research issues and general research methods, and ends up with the analysis of challenges and future trends of VANETs.


international conference software and computer applications | 2018

Review on the Effect of Student Learning Outcome and Teaching Technology in Omani's Higher Education Institution's Academic Accreditation Process

Ragad M. Tawafak; Muamer N. Mohammed; Ruzaini Abdullah Arshah; Awanis Romli

Academic accreditation standards are defined clearly in Higher Educational Institutions (HEI) plans, management, and delivering results of assessment student with learning outcomes. In recent years, all universities and institutions work hard to increase their approval privileges, skills, achievements through getting the accreditation from HEI. The aim of this integrative review was to examine the current evidence on the impact of technology learning on student learning and academic performance and analysis the main factors of an institution accreditation process. The authors searched several electronic databases for relevant articles, with different learning techniques. The main contribution of this study lies in showing the general criterias of accreditation standards that focus on essential technology enhanced learning, student learning outcomes, and faculty technology experience on academic performance of universities. The result from this paper is showing the relations between what have been done and presented before with methods, factors, suggestions to identify these activities.


Advanced Science Letters | 2018

A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems

M. Ismail Saba; Ahmed Hussam Alddin S.; Muamer N. Mohammed; Ameedeen M. A.

The information transmission domain had well been extended by the recent and fast developments in the telecommunication technologies specifically, the mobile networks and internet services. These new developments in turn, had come up with cutting-edge resolutions to secure information from being wiretapped. Countless in-depth studies in the field of cryptography had been carried out with the intent to propose a revolutionary solution for data protection of cryptographic techniques. This paper had proposed a new pseudo-random number generator (PRNG) design that had employed two chaotic systems which were logistics and tent maps, both of which had various operational and initialization values, which had subsequently contributed to the sequential distinction of the statistical properties. A compilation of a well- formulated assessment that had been provided by the National Institute of Standard Technology (NIST) was the foundation to ascertain the accuracy and exclusivity of the generated sequence and features with regards to this area of study. Moreover, a security analysis on key space and key sensitivity had been performed and it was concluded that the proposed PRNG was relevant for the implementation of cryptography.


international conference communication and information systems | 2016

Iris Template Protection based on Enhanced Hill Cipher

Emad Taha Khalaf; Muamer N. Mohammed; Norrozila Sulaiman

Biometric is uses to identify authorized person based on specific physiological or behavioral features. Template protection is a crucial requirement when designing an authentication system, where the template could be modified by attacker. Hill Cipher is a block cipher and symmetric key algorithm it has several advantages such as simplicity, high speed and high throughput can be used to protect Biometric Template. Unfortunately, Hill Cipher has some disadvantages such as takes smaller sizes of blocks, very simple and vulnerable for exhaustive key search attack and known plain text attack, also the key matrix which entered should be invertible. This paper proposed an enhancement to overcome these drawbacks of Hill Cipher by using a large and random key with large data block, beside overcome the Invertible-key Matrix problem. The efficiency of encryption has been checked out by Normalized Correlation Coefficient (NCC) and running time.


Procedia Technology | 2012

Intrusion Detection System Based on SVM for WLAN

Muamer N. Mohammed; Norrozila Sulaiman


international conference on intelligent systems, modelling and simulation | 2014

Effect of Using Different Propagations on Performance of OLSR and DSDV Routing Protocols

Norrozila Sulaiman; Ghaidaa M. Abdulsahib; Osamah Ibrahem Khalaf; Muamer N. Mohammed


Indian journal of science and technology | 2016

An Efficient Route Selection Based on AODV Algorithm for VANET

Nassir Sallom Kadhim; Muamer N. Mohammed; Mazlina Abdul Majid; Sinan Q. Mohamd; Hai Tao


Archive | 2014

Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET

Norrozila Sulaiman; Osamah Ibrahem Khalaf; M. Abdulsahib; Muamer N. Mohammed; Ayoob A. Ayoob

Collaboration


Dive into the Muamer N. Mohammed's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Omar A. Hammood

Universiti Malaysia Pahang

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ayoob A. Ayoob

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Emad Taha Khalaf

Universiti Malaysia Pahang

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge