Abdul Mohssen J. Abdul Hossen

Work place: Computer Science Department, University of Technology, Baghdad, Iraq

E-mail: Abdulmoohsen53@yahoo.com

Website:

Research Interests: Computational Mathematics, Mathematics of Computing, Mathematics

Biography

Abdul Mohssen J. Abdul Hossen is an Associate Professor of Applied mathematics, Computer Science Department, University of Technology, where he teaches undergraduate and graduate courses in Mathematics. Dr. Abdul Hossen received the B.Sc. in Mathematics from Mustansiriyah University, Iraq 1977, the M.Sc. degree in Applied Mathematics from Bagdad University, Iraq. in1980, the Ph.D. in Applied Mathematics from University of Technology, Iraq, 2005. He is a member of the IEEE system, and Member of the Editorial Journal.

Author Articles
New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher

By Instructor Omar A. Dawood Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2017.04.04, Pub. Date: 8 Apr. 2017

In this paper, we have proposed a new iterated symmetric cipher, which is designed with Substitution and Permutation Network (SPN) structure and depends on strong mathematical built. It uses a compact algorithm for encryption and decryption processes, which consists of four main stages that roughly similar in its work to the Advance Encryption Standard (AES) stages. Starting by the SubByte operation, ReversibleShiftrows operation, ReversibleMixcolumns operation, and Round key addition. The proposed operations in this cipher have implemented in a straightforward manner relatively in both Encryption/Decryption by an elegant way. These four stages designed to reduce the hardware requirements and to produces high efficiency, which keeps the encryption and decryption process at the same speed in the hardware devices and eliminates the difference of execution times as well as creates a balance in forward and backward operations. The proposed cipher interested with modern design by adopted new algebraic operations and clear mathematical notations to ensure a high level of security. The proposed cipher did not build suddenly or arbitrarily but it acts as a sequence of developments and represents as a long process of design for long time, since several proposed ciphers have been published recently by us that paved the way to its new design, so the designed cipher inherited a good properties from a proven famous algorithms’ features to produce high resistance against all known attacks and to submit a high performance on many platforms and in a wide range of hardware and software applications.

[...] Read more.
Design and Implementation of Secure Building Monitoring System using Programmable Wireless Mobile Camera

By Instructor Baidaa A. Atya Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2017.03.04, Pub. Date: 8 Mar. 2017

In the last decades, monitoring cameras begin to play a vital role in securing sensitive systems such as government sites or establishments. Generally, these kinds of cameras are fixed-location (i.e. outdoor camera) such that the viewpoint is limited to small area and not covering the whole place. In addition, there are some drawbacks that appear when using these kinds of cameras such as being breakable (intentionally or not) which may lead to camera malfunction or breaking in the linked electrical wires that may cause disconnection between the camera, monitor and its receiver. However, the main problem is the lacking of secure protecting system that prevents intruders from entering into the system disabling or malfunction it.
In this research a new system is proposed in order to solve these problems by using wireless-mobile camera with embedded programmable operating system which enables controlling this camera remotely by sending wireless commands through the embedded component called Arduino card controller. This card enables the connection between the camera and the server to be programmatic by the user or developer. The main goal of this research is to design a monitoring system to detect any suspicious events and to ensure that the transferring monitoring data from the camera to the server is not infiltrated by unauthorized person by applying a set of techniques from image detection, object tracking and security algorithms to the instructions or the program of the camera. Compared with other researches, this work achieved the following goals: 1- Using Arduino card for programming the camera. 2- IP camera does not require user name and password. 3- The images and the other information are (encrypted) when sending to/from computer, 4- Using Mobile-wireless camera. 5- Process of keys exchanging between camera and computer. The results of this research are good and achieved the main goals of new developed technique.

[...] Read more.
Generalized Method for Constructing Magic Cube by Folded Magic Squares

By Omar A. Dawood Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijisa.2016.01.01, Pub. Date: 8 Jan. 2016

In the present paper we have developed a new method for constructing magic cube by using the folded magic square technique. The proposed method considers a new step towards the magic cube construction that applied a good insight and provides an easy generalized technique. This method generalized the design of magic cube with N order regardless the type of magic square whether odd order, singly even order or doubly even order. The proposed method is fairly easy, since it have depended mainly on the magic square construction methods, and all what the designer need is just how to builds six magic square sequentially or with constant difference value between each pair of the numbers in the square matrix, whereby each one of this magic square will represents the surface or dimension for magic cube configuration. The next step for the designer will be how to arrange each square in the proper order to constitute the regular cube in order to maintain the properties of magic cube, where the sum of rows, columns and the diagonals from all directions are the same.

[...] Read more.
Other Articles