Hossam Abdel Rahman Mohamed

Work place: Computer & Information System Dept- SAMS, Maady Cairo

E-mail: Habdel@ENR.gov.eg


Research Interests: Computer Science & Information Technology, Computer systems and computational processes, Computer Architecture and Organization, Information Systems, Data Structures and Algorithms


Hossam Abdel Rahman Mohamed: Master of computer science & information system - Sadat Academy - Dept Computer and Information System ,Maady , Cairo , Egypt - He is currently position Data Center Operation Team leader at Trans IT Company - Ministry of Transportation.

Author Articles
A Proposed Model for IT Disaster Recovery Plan

By Hossam Abdel Rahman Mohamed

DOI: https://doi.org/10.5815/ijmecs.2014.04.08, Pub. Date: 8 Apr. 2014

IT disaster recovery planning is no longer an option. Reliable IT services have become an integral part of most business processes. To ensure the continued provision of information technology, firms must engage in IT disaster recovery planning. Surprisingly, there is little research on this topic. IT disaster recovery planning has not been fully conceptualized in mainstream IT research. A previously framework for assessing the degree of IT disaster recovery planning. Practitioners can use this study to guide IT disaster recovery planning. Our Disaster Recovery Plan is designed to ensure the continuation of vital business processes in the event that a disaster occurs. This plan will provide an effective solution that can be used to recover all vital business processes within the required time frame using vital records that are stored off-site. This Plan is just one of several plans that will provide procedures to handle emergency situations. These plans can be utilized individually but are designed to support one another. The first phase is a Functional Teams and Responsibilities the Crisis Management Plan. This phase allows the ability to handle high-level coordination activities surrounding any crisis situation. We will also discuss the development, finally maintenance and testing of the Disaster Recovery Plan.

[...] Read more.
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPS (The Study for Egyptian National Railways)

By Hossam Abdel Rahman Mohamed

DOI: https://doi.org/10.5815/ijisa.2014.04.08, Pub. Date: 8 Mar. 2014

The Technological evolution which occurred in digital systems favored the appearance of new services to be applied in railways. Radio communications played an important role in the management, exploration, and maintenance of railway transports. Due to the vital importance of security, the track-to-train communications system is studied in depth, with significant changes through the integration in its operation of the global system for mobile communication and global positioning systems. This paper has proposed the implementation of a global positioning system (GPS) based train monitoring system that could locate a train at every instant. Here a GPS–GPRS module transmits the location information to a web server. The paper also presents a low-budget system to track the trains inside tunnels. The paper presents a solution implemented at Egyptian National railways, to provide an intelligent train tracking and management system to improve the existing railway transport service.

[...] Read more.
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Networks Performance

By Nashaat el-Khameesy Hossam Abdel Rahman Mohamed

DOI: https://doi.org/10.5815/ijitcs.2013.11.05, Pub. Date: 8 Oct. 2013

One of the most important techniques for improving the performance of web based applications is web proxy caching Technique. It is used for several purposes such as reduce network traffic, server load, and user perceived retrieval delays by replicating popular content on proxy caches that are strategically placed within the network. The use of web proxy caching is important and useful in the government organizations that provides services to citizens and has many branches all over the country where it is beneficial to improve the efficiency of the computer networks performance, especially remote areas which suffer from the problem of poor network communication. Using of proxy caches provides all users in the government computer networks by reducing the amount of redundant traffic that circulates through the network. It also provides them by getting quicker access to documents that are cached. In addition, there are a lot of benefits we can obtain from the using of proxy caches but we will address them later. In this research, we will use web proxy caching to provide all of the above benefits that we are mentioned above and to overcome on the problem of poor network communication in ENR (Egyptian National Railways). We are going to use a scheme to achieve the integration of forward web proxy caching and reverse proxy caching.

[...] Read more.
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security

By Nashaat el-Khameesy Hossam Abdel Rahman Mohamed

DOI: https://doi.org/10.5815/ijitcs.2013.04.07, Pub. Date: 8 Mar. 2013

Defense in Depth is practical strategy for achieving Information Assurance in today’s highly datacenter environments. It is a “best practices” strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational considerations. This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight. Companies need to address the security challenges of datacenter using a comprehensive defense-in-depth strategy. No single security solution will keep a determined thief from the goal of compromising the hardware or software given enough time and resources. Applying multiple layers of system security will slow the progress made by a thief, and hopefully, force the thief to abandon the pursuit, at the least, resale of the stolen property, and at worst, of confidential corporate data. The Defense in depth is the concept of protecting a Datacenter with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. In this paper, the main focus is given to highlight the security aspects of data center from perspectives of threats and attacks from one side and approaches for solutions from the other side. The paper also proposes an effective and flexible distributed scheme with two salient features. Our scheme achieves the integration of continual security improvement and Security Risk localization. This paper deals with the implementation of defense in depth at a strategic, principle-based level and provides additional guidance on specific sets of controls that may be applicable to support an organization’s defense in depth initiatives. The paper will present in Section (1) the Defense in depth concept, Section (2) Threats, Adversaries, Motivations, Classes of Attack and Vulnerability Analysis, Section (3) Information Security Assurance, Defense in Multiple Places, Layered Defenses, Security Robustness, Section (4) Design Goals and finally proposed solution and provide The IT Security Role & Functional Matrix.

[...] Read more.
A Proposed Virtualization Technique to Enhance IT Services

By Nashaat el-Khameesy Hossam Abdel Rahman Mohamed

DOI: https://doi.org/10.5815/ijitcs.2012.12.02, Pub. Date: 8 Nov. 2012

System virtualization is an antique art that will continue as long as applications need isolation and performance independence. Virtualization provides many benefits and greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environmental control, more availability, reduced project timelines by eliminating hardware procurement, improved disaster recovery capability, more central control of the desktop, and improved outsourcing services. In this paper we will deliver new and enhanced IT services in less time and with greater agility. The goal of providing rapid near real-time response to customer requirements is in part being achieved by taking advantage of virtualization. Virtualization provides many benefits, including improved physical resource utilization, improved hardware efficiency, and reduced power and cooling expenses. However, it introduces another set of systems (virtual machines) that have to be controlled, provisioned, managed, updated, patched, and retired. This paper is organized into the following areas- An introduction to virtualization and its benefits, the Challenges of Virtualization techniques, an overview of the hardware virtualization technique, an overview of the software virtualization technique. The paper also proposes an effective and flexible distributed scheme with three phases, opposing to its predecessors. Our scheme achieves reducing the workload of a data center and continual service improvement.

[...] Read more.
Other Articles