|   24 نوفمبر 2024م
Mourad Mohamed Henchiri
Mourad Mohamed Henchiri
Lecturer
Department of Information Systems.......
كلية الاقتصاد والادارة ونظم المعلومات
  • هاتف: 25446 461(968+)
  • محول: 461
  • البريد الإلكتروني: mourad@unizwa.edu.om
  • موقع المكتب: 11-H-21........
  • يعمل في الجامعة: منذ 2012
  • الحالة الاجتماعية: .............

  • Mourad M.H Henchiri is an active researcher and his research interests over the fields of radio transmission, software defined radio, networks security, software and web security.

    Mourad M.H Henchiri has got his bachelor degree in computer science from Gafsa university, Tunisia. And his master degree in information technologies and networks administration. Currently, Mourad is pursuing a P.hD program in computer science, major information security at the KICT college, IIUM university Malaysia.

    Reviewer @ the Journal of Intelligent & Fuzzy Systems:

     x 

    IFS-242374- Unmasking the True Identity: Revealing the Real IP Addresses Concealed by VPNs / Proxies

    Reviewer @ IJDIWC:

     x 

    567 - Utilization of the Fast Discrete Curvelet Transform in the OFDM System

     x 

    562 - Artificial Intelligence Based Drug Discovery Techniques for COVID-19 Detection

     x 

    563 - Ultra-fast observation orbit refinement model established on DOP value for GNSS system

     o 

    504 - Modeling Efficient Radio Resource Allocation Scheme for MTC and HTC over Mobile Wireless Networks

     x 

    566 - The Adaptation of Vehicle Assisted Data Delivery Protocol in IoV Networks

     x 

    565 - Libyan E-government Research yLandscape

     o 

    502 - RoboGAap

     o 

    559 - Custom OCR for Identity Documents:OCRXNet

     o 

    556 - A Context-Aware Clustered Routing Approach for Video Transmission over VANETs with Long Lifetime Neighbourhood

     o 

    557 - A Study for Development of Home Appliances Identification Method using Load Current

     o 

    558 - A Study for Development of Route Prediction Method for Vessel \\ using Machine Learning

     o 

    537 - Refutation of Artificial Intelligence’ Myth ``Artificial Intelligence will ultimately replace human employees throughout workplace`` (Reality and Fiction)

     o 

    494 - Modeling Delay and Energy Consumption for Wireless Sensor Networks with Heavy-Tailed Job Size Distributions

     o 

    530 - Modeling the Traffic Load of Selected Key Parameters for GSM Networks in Nigeria

     o 

    500 - Prioritized Cooperative Communication with Network Coding in Wi-Fi networks

     o 

    499 - Combining the Methodology of Life-time Acceleration and Clone Detection in Wireless Sensor Networks.

     o 

    498 - Reviewing and Classifying the Effective Factors in Selection Telecommunication Antenna Towers Sites

     o 

    536 - IOT Politics, Regulations and Civic Engagement

     o 

    523 - Genetic and Firefly algorithm in Instance and Feature Selection: An Approach for Malware Detection

     o 

    524 - Outage probability of device to device communication underlaid cellular networks over Nakagami-m / Rayleigh fading

     o 

    525 - An Energy-Efficient Clustering Routing Protocol for WSN based on MRHC

     o 

    527 - The Growing Effect of Cloud Computing on Technological Innovation: A Decision-Making Framework for Hybrid Managers

     x 

    560 - A N ovel Approach for Facial Attenda nce:Attend X Net

     o 

    538 - Utilizing Pripority-Based Queen Bee Algorithm for Power Conservation in Wierless Sensor Networks

     o 

    539 - Design and implementation of multipurpose radio controller unit using nRF24L01 wireless transceiver module and Arduino as MCU

     o 

    501 - Pakistani University Students Perspective on Whatsapp Usage: From the Lens of Uses & Gratification Constructs

     o 

    549 - The Impact of the User Experience (UX) on the Quality of the Requirements Elicitation

     o 

    505 - Optimized Two-Level Scheduler for Video Traffic in LTE Downlink Framework

     x 

    564 - Investigating the Efficiency of Secret Key Encryption Algorithms with similar key length and block size

     o 

    553 - Utilization of the Fast Discrete Curvelet Transform in OFDM System

     o 

    531 - Building a Generic Big Data Analytics Framework for E-commerce

     o 

    532 - Modeling Routing Protocols in ASMETAL

     o 

    533 - Ground Model and Refinements in Modeling for Manet

     o 

    555 - Mid Square Hash Bezier Secured Routing for IoT Enabled Wireless Sensor Networks

     o 

    506 - An implementation of EMA based position servo system using SEQUEL

     o 

    507 - SOLDIER TRACKING AND HEALTH MONITORING SYSTEM USING GPS AND ACCELER APPLICATION

     o 

    508 - A Hybrid Preemptive/Non-preemptive M/G/1 Priority Control Scheme for Cognitive Radio Networks

     o 

    509 - SWOT Analysis for Adopting of Big Data in the Higher Education Institution (Yemen)

     o 

    554 - the injection of FMDBZP mothod for acquisition process in GNSS receiver of observation satellite

     o 

    493 - The Influences of Meteorological Parameters on Digital Terrestrial Television (DTT) Signal in the Tropics

     o 

    510 - An Enhance Approach for Detecting and Preventing Single and Collaborative Attacks in Mobile Ad-Hoc Networks

     o 

    516 - Development Of an Access Point Positioning Optimization Algorithm Under the Analysis of SINR and Probability of Connectivity

     o 

    540 - The Impact of Raindrop Diameters on Specific Rainfall Attenuation in a Tropical Region

     o 

    541 - A Review on the State of the Art for Failure Diagnosis and Prognosis techniques for Wind Conversion System.

     o 

    520 - A Policy-based Mechanism for restricting Execution of malicious apps in Android Smartphone

     o 

    518 - Learning Overcomplete Representations using Leaky Linear Decoders

     o 

    521 - E-Go vernment as an Anti-Corruption Tool in Yemen: Citizens’ Perspective

     o 

    522 - An Analytica study to Calibrate Quality of Service and Security Parameters of Voice Transmission over IPSec (QSVoIP) for Minimum Number of Calls with Acceptable Voice Quality

     o 

    528 - Fog Computing for Network slicing in 5G Networks: An overview

     o 

    529 - DIGITAL NOTICE BOARD AND ITS APPLICATION IN EDUCATIONAL INSTITUTIONS.

     o 

    480 - 2-LIB: An Efficient 2-Level-Inversion Coding Scheme for Digital Data Transmission over Bandlimited Channels

     o 

    481 - VULNERABILITY ASSESSMENT OF SOME KEY NIGERIA GOVERNMENT WEBSITES

     o 

    482 - Channel Capacity Optimization in Downlink WiMAX Network

     o 

    484 - Data Mining and Analysis for off Grid Solar PV Power System

     o 

    478 - Throughput Maximization based Spectrum Allocation Algorithm for underlay Cognitive Radio Network

     o 

    472 - Vulnerability Assessment and Penetration Testing: A proactive approach towards Network and Information Security

     o 

    475 - circular pin fed linearly polarized patch antenna



    Editor @ ASTESJ:

     o 

    18M-08-242 - The Chimera and the Cyborg - Hybrid Compute: HPC, Cloud, and Container Implementations 

     o 

    17M-11-426 - A Multilingual System for Cyberbullying Detection: Arabic Content Detection 

     o 

    17M-10-375 - Distributing the computation in combinatorial optimization experiments over the cloud 

    Scholar ID
    ``GoogleScholar``




    المؤهلات الأكاديمية
    • PhD In Computer Science, AI in Cybernetics & Cyber Security as a Major، IIUM, Malaysia، 2024
    • Master in Computer Science، Gafsa University, Tunisia، 2010
      الأنشطة البحثية
      - الاهتمامات البحثية
      • Networks and Radio technology that can automatically detect available channels in a wireless spectrum using the Cognitive Radio (CR) which is an adaptive, intelligent radio transceiver
      • Cyber security; HMI, cryptography
      • Software security; programming languages predicates
      • Windows environment and pen testing methodologies
      • The spread spectrum communications systems as a mean to enhanced reliability, increased bandwidth and improved security in a wireless network
      • Distributed and parallel programming, as a solution to inter-system operability
      • Software Defined Radio
      • Web Security
      - العرض في المؤتمرات
      • Artificial Intelligence Techniques in Smart Parking Systems Smart and predicting techniques، WD`19 (Dubai – April 2019)، 09/04/2019
      • Just Enough Administration (JEA) via Sysinternals Microsoft Secured Infrastructure، ICRIET 2017 (Hyderabad – December 2017)، 22/12/2017
      • Safe Clustering Algorithm in Vehicular Ad-hoc Networks، ICICT 12/2014, Published, University of Nizwa, Oman، 11/12/2014
      • Cognitive Radio for ‘dedicated’ traces detection, Explosives traces detection، ICAICT 04/2014, Published, ELSEVIER، 12/04/2014
        - المنشورات
          مقال:
        • 1. 2024 Innovative Remote Irrigation Model- Hyperparameters for Decision Making، IJEAIS, Vol. 8 Issue 1 January - 2024, Pages: 77-80
        • 2. 2019 Handles for Pentesting Modern Secure Coding: bypassing mobile security
        • 3. 2019 The Art of Anonymity: Traces Detection
        • 4. 2019 Islam «Soluble» in Modernity and Technology
        • 5. 2019 Digital trust: Ethics and security to strengthen «Islamization» Ethical social relationships
        • 6. 2019 Islam in Modernity and Ethical «Secure» Technology
        • 7. 2017 Software Engineering Security Modern Malware
        • 8. 2017 Digital Signal Processing, Antenna architecture
        • 9. 2017 GPS and Localization Web Services Implementation over Android Modern Satellite Navigation
        • 10. 2016 LOAD BALANCING ALGORITHM (LBA) AS A LOCAL SPOOFING THREATS & PREVENTION SOLUTION FOR DoS AND DDoS PAQUETS
        • 11. 2016 Sparse Matrices Technologies for APT Counter Measures
        • 12. 2015 Cognitive Radio for ‘dedicated’ traces detection, Human Flesh Detection
        • 13. 2014 An Effective Approach of Data Security for Distributed Shared Memory Multiprocessors
        • 14. 2013 Clustering of Wireless Ad Hoc Networks: An Efficient Probabilistic Technique
        • 15. 2010 Winsock et la communication interprocessus.

                  ...




                  الرابط المباشر للصفحة: https://www.unizwa.edu.om/staff/cemis/mourad    |    تنزيل السيرة الذاتية