حسام توفيق خليفة حقاف
عضو هيئة تدريس
عضو هيئة تدريس قار
المؤهل العلمي: ماجستير
الدرجة العلمية: محاضر
التخصص: تقنية المعلومات - الحاسب الالي
هندسة البرمجيات - تقنية المعلومات
المنشورات العلمية
Analysis and Evaluation QoS of VoIP over WiMAX and UMTS Networks
Conference paperAbstract:
The real-time service such as voice over internet protocol (VoIP) is considered the best type of conversational voice due to ability and the possibility of making a VoIP calls at any time and from anywhere with the lowest cost. In this paper, we explore the performance of UMTS and WiMAX networks for VoIP service. This work focuses on VoIP quality when sent under various network loads such as HTTP, Email, FTB and Video Conferencing. In UMTS network, the VoIP was congested with HTTP traffic, while in WiMAX network the VoIP was congested with many types of traffic such as HTTP, Email, FTP and Video Conferencing. These traffic flow effects on voice traffic are analyzed and evaluated in terms of end-to-end delay, jitter and packet loss with service quality (QoS). All simulation scenarios are performed with OPNET modeller 14.5.
albahlool mohamad ali abood, HOSAM ALI ALZAWAM ALFAZANI, HUSAM TOFIQ KHALEFA HAQAF, (05-2021), Tripoli, Libya: IEEE, 787-793
Understanding key skills for information security managers
Journal ArticleInformation security management is a necessity for all institutions and enterprises that regard company information as valuable assets. Developing, auditing and managing information security depends upon professional expertise in order to achieve the desired information security governance. This research seeks the key skills required for the position of information security management as well as the methods to develop these skills through professional training programs. The study adopts the Delphi method which requires building a list of items through a literature survey and involves experts with certain expertise to modify the list until a consensus on less than 20% of the items is reached. Through completing three rounds of the Delphi technique - data collection, relevance voting and ranking - sixteen skills are shortlisted as the key skills. In the final list, the majority belong to core information security skills, and the top two skills belong to project/process management skills and risk management skills, indicating the importance of these skills for the information security manager role. In addition, a series of related professional training programs and certifications are surveyed, the outcome of which highlights a number of most comprehensive and appropriate programs to develop these determined skills.
HUSAM TOFIQ KHALEFA HAQAF, (12-2018), تركيا: International Journal of Information Management, 43 (2018), 165-172