Researcher Image
محمد علاء حسين التميمي - Dr. Mohammed Alaa H. Altemimi
PhD - lecturer
Al-Khwarizmi College of Engineering , Department of Information and Communications Engineering
[email protected]
Qualifications
  • PhD (E-Governanace and Cyber Security Management System for Public Sector).

  • Master (Information System Management and Security for Public Sector).

  • BSC.

Awards and Memberships
  • عدد من كتب الشكر والتقدير من دوائر ومؤسسات الدولة العراقية

  • عدد كبير من كتب الشكر والتقدير الجامعية (عمداء كليات ورؤساء جامعات)

Academic Area
  • CyberSecurity and Networking.
  • E-Governance of IT Strategic Planning and Digital Transformation in Public Sector.
  • Business-IT Alignment.
  • Management Information System (MIS).
  • Adoption of IS by organizations and Failure Analysis.
  • Information Technology Service Delivery and Benefits Realization.
  • Enterprise Architecture (EA) and IT Control Framework and practices.
Teaching
  • E- Governance.
  • Cyber Security.
  • Information Security & Cryptography.
  • Computer Networking & Network Protocol.
  • Network Security
  • Management Information System.
  • Programming Concept (C++ / Python).
  • System Concept and Thinking.
  • Business Process Management & Workflow Automation.
  • Project and Chanage Management (PMP).
  • Computer Organization.
Supervision

Undergraduate


  • 2023-2024, Enhancing Cyber Security of Networking using Firewall.
  • 2021-2022, Design Security of Hospital Network by using Packet Tracer.
  • 2021-2022, Building Weather Station using IoT in Greenhouses.
  • 2020-2021, IoT Based Smart Home Automation System using Node MCU.
  • 2020-2021, Implementing IP phone using VOIP (Voice over IP).
  • 2020-2021, Automated Vehicle Detection System Using IOT.
  • 2019-2020, DataBase Management System for graduation project using MySQL and Java.
  • 2019-2020, Free Space Optics.
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Frontiers In Health Informatics
The Implementation Of Artificial Intelligence In Education: Systematic Analysis
...Show More Authors

Background: The rapid evolution of Artificial Intelligence (AI) has significantly influenced Education, demonstrating substantial potential to transform traditional teaching and learning methods. AI reshapes teacher-student interactions and the relationship with knowledge. Objective: To analyze the potential benefits, ethical challenges, and limitations of AI in Education based on recent scientific literature, emphasizing the balance between technology and human interaction. Methods: A documentary research approach with a descriptive focus was employed, following the PRISMA protocol for systematic reviews. The search strategy involved analyzing evidence from 18 scientific articles published within the last six years. Results:AI o

... Show More
View Publication
Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Title
Category
Date
Antivirus, Thteat and Cyber Security
Workshops ورش العمل
2025-01-22