أ. مريممساعد

قسم الشبكات كلية تقنية المعلومات

الاسم الكامل

أ. مريم أبوعجيلة مساعد مساعد

المؤهل العلمي

ماجستير

الدرجة العلمية

محاضر

ملخص

مريم مساعد هي احد اعضاء هيئة التدريس بقسم الشبكات بكلية تقنية المعلومات. تعمل السيدة مريم مساعد بجامعة طرابلس كـمحاضر مساعد منذ 2013-12-16 ولها العديد من المنشورات العلمية في مجال تخصصها

تنزيل السيرة الذاتية

معلومات الاتصال

روابط التواصل

المؤهلات

ماجستير

حاسب الى
جامعة طرابلس / كلية العلوم
1 ,2013

بكالوريوس

حاسب الى
جامعة طرابلس / كلية العلوم
6 ,2007

المنشورات

Implementation Network Management Solution Using PRTG and Solar Winds Tools

Successful companies know that network management is crucial for the proper support and maintenance of network infrastructure. When it comes to managing a large-scale or highly complex network, you’ll need a powerful network management system that will meet your challenging business needs. There are several programs suggested different types of solutions. PRTG and SolarWinds are an excellent solution, since they have many features that help the network engineer, administrator or technician to easily control, manage and monitor the devices comprehensively. Moreover, PRTG and SolarWinds can integrate with monitoring and management protocols such as SNMP and NetFlow to provide an excellent integrated unified management solution. That being said, PRTG and SolarWinds will facilitate the management of network devices throughout performing configuration, Security, Fault, Performance and Accounting management which will increase productivity, Quality, Revenue and lower the cost. arabic 9 English 66
Mariam Abojela Msaad, Mohamed Fathi Almograbi , Anas Moftah Alshoukri (12-2019)


Study and test performance of the Zigbee Wireless technology in some network models by using Opnet software

ZigBee Wireless Technology is the leading global standard for implementing low-cost, Low-data-rate, short-range wireless networks with extended battery life. The ZigBee standard provides network, security, and application support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer (PHY) wireless standard. It employs a suite of technologies to enable scalable, self-organizing, and self-healing networks that can manage various data traffic patterns, The low cost allows the technology to be widely deployed in wireless control and monitoring applications, the low power-usage allows longer life with smaller batteries, and the mesh networking provides high reliability and larger range. ZigBee has been developed to meet the growing demand for capable wireless networking between numerous low power devices. In this paper , we will try to give a complete picture about ZigBee technology including the structure of this technology, the layers where this technology works referred to the OSI model, how this technology works, the main components that use to create a ZigBee network, The objective of this simulation is to establish tree topology networkby; using an OPNET Modeller 14.5 program, and to investigate the performance of the network model, and see the effect on data when we change the time of transmission and finally we will investigate the performance of some network models that employ IEEE 802.15.4 protocol using different scenarios. arabic 19 English 91
Mariam Abojela Msaad, Almoatasem Aboaisha , Ahmed Eshoul(12-2019)


Using sequence DNA chips data to Mining and Diagnosing Cancer Patients

Deoxyribonucleic acid (DNA) micro-arrays present a powerful means of observing thousands of gene terms levels at the same time. They consist of high dimensional datasets, which challenge conventional clustering methods. The data’s high dimensionality calls for Self Organizing Maps (SOMs) to cluster DNA micro-array data. The DNA micro-array dataset are stored in huge biological databases for several purposes . The proposed methods are based on the idea of selecting a gene subset to distinguish all classes, it will be more effective to solve a multi-class problem, and we will propose a genetic programming (GP) based approach to analyze multi-class micro-array datasets. This biological dataset will be derived from multiple biological databases. The procedure responsible for extracting datasets called DNA-Aggregator. We will design a biological aggregator, which aggregates various datasets via DNA micro-array community-developed ontology based upon the concept of semantic Web for integrating and exchanging biological data. Our aggregator is composed of modules that retrieve the data from various biological databases. It will also enable queries by other applications to recognize the genes. The genes will be categorized in groups based on a classification method, which collects similar expression patterns. Using a clustering method such as k-mean is required either to discover the groups of similar objects from the biological database to characterize the underlying data distribution. arabic 10 English 60
Mariam Abojela Msaad, Zakaria Suliman Zubi(1-2010)


Sequence Mining in DNA chips data for Diagnosing Cancer Patients

: Deoxyribonucleic acid (DNA) micro-arrays present a powerful means of observing thousands of gene terms levels at the same time. They consist of high dimensional datasets, which challenge conventional clustering methods. The data’s high dimensionality calls for Self Organizing Maps (SOMs) to cluster DNA micro-array data. The DNA micro-array dataset are stored in huge biological databases for several purposes . The proposed methods are based on the idea of selecting a gene subset to distinguish all classes, it will be more effective to solve a multi-class problem, and we will propose a genetic programming (GP) based approach to analyze multi-class micro-array datasets. This biological dataset will be derived from multiple biological databases. The procedure responsible for extracting datasets called DNA-Aggregator. We will design a biological aggregator, which aggregates various datasets via DNA micro-array community-developed ontology based upon the concept of semantic Web for integrating and exchanging biological data. Our aggregator is composed of modules that retrieve the data from various biological databases. It will also enable queries by other applications to recognize the genes. The genes will be categorized in groups based on a classification method, which collects similar expression patterns. Using a clustering method such as k-mean is required either to discover the groups of similar objects from the biological database to characterize the underlying data distribution. arabic 9 English 55
Mariam Abojela Msaad, Zakaria Suliman Zubi(1-2011)


NETWORK SOLUTION FROM GSM to LTE

LTE’s study phase began in late 2004. The overall goal was to select technology that would keep 3GPP’s Universal Mobile Telecommunications System (UMTS) at the forefront of mobile wireless well into the next decade. Key project objectives were set in the following areas: peak data throughput; spectral efficiency; flexible channel bandwidths; latency; device complexity; and overall system cost. The main decision was whether to pursue the objectives by continuing to evolve the existing W-CDMA air interface (which incorporates HSPA (highspeed packet access) or adopt a new air interface based on OFDM. arabic 5 English 27
Mariam Abojela Msaad, Amer R. Zerek, Fareda A. Elmaryami(1-2014)


Multiprotocol Label Switching

Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as Asynchronous Transfer Mode (ATM) or Frame Relay, or it can operate in an entirely IP native environment; this can allow users to take advantage of existing Customer Premises Equipment (CPE) while making a move towards converging all network traffic, such as data, video and voice, at a pace that users can accommodate and afford. MPLS provides. its users a number of advantageous features such as traffic engineering, network convergence, failure protection, and the ability to guarantee Quality of Service (QoS) over IP. arabic 2 English 27
Mariam Abojela Msaad, Amer R. Zerek , Wesam M. Tohamei(1-2012)


Studying and Investigation of Virtual Private Networking

Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to establish a virtual private “tunnel” to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. A VPN is a communications environment in which access is controlled to permit peer connections only within a defined community of interest, and is constructed though some form of partitioning of a common underlying communications medium, where this underlying communications medium provides services to the network on a nonexclusive basis. arabic 6 English 50
Mariam Abojela Msaad, Amer R. Zerek, Hana H. saleh(1-2012)


Study of Multipath Transmission Control Protocol

Multipath Transmission Control Protocol (MPTCP) has been proposed by the Internet Engineering Task Force (IETF) working group, in order to get benefit of the interfaces in the network devices, as most of these network devices are equipped with more than one interface. MPTCP splits a single data stream across multiple paths. This has obvious benefits for reliability, and it can also lead to more efficient use of network resources. The main aim of this paper is to study the main mechanism of the MPTCP and some of the multipath transmission protocols. arabic 5 English 43
Mariam Abojela Msaad, Taha Arabi , Amer R. Zerek(1-2013)


Performance Evaluation of Multimedia Streaming Applications in MPLS Networks Using OPNET

This paper describes the place of MPLS in current state-of-the-art networking as a quality of service means through performing performance analysis of VoIP and video conferencing applications by comparing the effect of different protocols (OSPF, IS-IS, EIRGP) and the effect of various queuing techniques (PQ, WFQ, MWRR) in order to find the good combination of MPLS, routing, and queuing type that provides efficient suitable quality of service levels. The obtained results illustrate a competent combination of MPLS with queuing discipline, and routing could be achieved for each application, such as MPLS and EIGRP with WFQ queuing is an efficient arrangement for video conferencing application
Azeddien M. Sllame, Reema A. Saad, Mariam Abojella Msaad(5-2021)
Publisher's website


A Simulation based analysis study for DDoS attacks on Computer Networks

A denial of service attacks are usually employed to interrupt the system's activity by getting a large number of fake requests, which leads to slowing down and stopping information system or network operations. This paper outlines the basic principles of DDoS attacks, explains how DDoS attack works. The paper presents an experimental using OPNET simulation tool in which traffic from three different applications VoIP, FTP, and HTTP is used to make the practical model with a firewall shield to model and simulate DDoS over Internet. However, three scenarios have been developed to illustrate different aspects of the DDoS over networks. The results clearly demonstrate how firewalls can be configured to mitigate DDoS attacks
Azeddien M. Sllame, Reema A. Saed, Mariam Abojella Msaad(5-2021)
Publisher's website