Books by Mohamed Shouman
א א אאא ... more א א אאא ã¹]<gè…‚jÖ]ae<ËÖ]<Üé×Ãj×Ö<íÚ^ÃÖ]<퉉ö¹] אאאא א א א א אאא ã¹]<gè…‚jÖ]ae<ËÖ]<Üé×Ãj×Ö<íÚ^ÃÖ]<퉉ö¹] אאא א א
This Reference Manual and Reporting Format were developed by the Advanced Product Quality Plannin... more This Reference Manual and Reporting Format were developed by the Advanced Product Quality Planning (APQP) and the Control Plan teams that were sanctioned by Chrysler, Ford, General Motors Supplier Quality Requirements Task Force.
Papers by Mohamed Shouman
e have entered a new age of cyber warfare that threatens the survival and reliability of e-organi... more e have entered a new age of cyber warfare that threatens the survival and reliability of e-organizations. This threat necessitates developing a new generation of security solutions that are able to provide instantaneous in-line layered preemptive protection. Developing such a security solution is a challenge, since threats against e-organizations have increased in number and sophistication, to the point where many security experts believe that the situation is out of control.
The frequency and sophistication of attacks and the speed at which they propagate requires a new ... more The frequency and sophistication of attacks and the speed at which they propagate requires a new breed of technologies that are able to prevent intrusions accurately. Intrusion Prevention solutions become successful proactive network defense solutions deigned to detect and block attacks and to identify network malicious activities. The challenge in adopting these solutions is in detection of the intrusions. This paper introduces a new hybrid technique that can detect header and payload attacks and network malicious activities using rule-based and specification-based detection techniques.
recently the landscape of doing business becomes internet-based. Meanwhile the attacks and malwar... more recently the landscape of doing business becomes internet-based. Meanwhile the attacks and malwares spread through internet awfully. So this necessitates new generation of defense-in-depth (Multi-Layered) security solutions. In this paper, we introduce proactive defense-indepth anti-malware and intrusion prevention services that deliver intelligent and real-time layered network security protection against attacks and malwares.

A mobile ad hoc network is an autonomous system that is made up of collaborative mobile nodes. No... more A mobile ad hoc network is an autonomous system that is made up of collaborative mobile nodes. Nodes in mobile ad hoc networks have limited capabilities and dynamic topology. Authentication of network nodes and the establishment of secret keys among nodes are both target security objectives in ad hoc networks. The constrained devices and other special properties of ad hoc networks make achieving those security properties a challenging task. This paper proposes an authentication protocol, Ad-hoc On Demand Authentication Chain Protocol (AOAC), which allow individual node to authenticate each other and to establish a shared key for secure peer-to-peer communication, the authentication does not rely on any centralize trusted authority or fixed server and is not based on public key cryptography. To provide both node authentication and pair-wise authenticated key establishment we proposed a transitive authentication technique by which active attacks, specially the main in the middle attack, can be prevented. The security of our protocol is analyzed using GNY logic. We also provided simulation and performance analysis of the proposed authentication protocol.

A wireless ad-hoc network is an autonomous system that is made up of collaborative mobile nodes. ... more A wireless ad-hoc network is an autonomous system that is made up of collaborative mobile nodes. Nodes in wireless ad-hoc networks have limited capabilities. The communication security in these networks is commonly based on cryptographic techniques which are based on shared secret keys. The procedure for creating such a common secret for a group of communicating entities is called group key management. Due to the salient nature of the network implementing a secure and efficient key management is a challenging task and is vulnerable to man in the middle (MITM) attack. In this paper we proposed a key management scheme which is based on both key agreement and key transport algorithms. It is also based on local broadcast which means that nodes are allowed to exchange the key establishment protocol messages with only its immediate neighbors, during the setup phase, using local broadcast. This prevents MITM attack. These groups of immediate neighbors agree on a common key using the proposed transitive authentication technique. The proposed scheme support dynamic membership operation and consider the dynamic behavior of the network topology.
Scheduling in¯exible manufacturing systems (FMSs) differs from that conventional job shop because... more Scheduling in¯exible manufacturing systems (FMSs) differs from that conventional job shop because each operation of a job may be performed by any one of several machines. In the current paper, the interactive process between routing¯exibility index (single route index up to 192 route index are classi®ed into nine route¯exibility indices), different interruption ratios (zero up to 100% are classi®ed into six interruption indices), as well as 16 dispatching polices are studied. The dispatching mechanism that will perform the best with the considered measuring performance criteria for each route¯exibility index and model con®guration has been determined. Global conclusions and trend of variations have been highlighted. # 2000 Published by Elsevier Science B.V. (M.A. Shouman).
Scheduling job shop problem is searching for good schedule or optimization with the goal of findi... more Scheduling job shop problem is searching for good schedule or optimization with the goal of finding the best schedule. The main objective of this paper is to develop some heuristic rules for job shop scheduling problem. These heuristic rules are developed and tested in their scheduling performances with other common rules in benchmark problems. Six measures are considered for performance evaluation. Seventy instance cases are used as jobs for scheduling process. The results are compared with eighteen common heuristic rules for the considered test cases. The proposed heuristics are found to be promising in their effectiveness in scheduling job shop problem. A computer program could be designed to test the validity of the proposed heuristics.
Software Quality Assurance Models, A Comparative Study

There are several models for software quality assurance, such as Capability Maturity Model Integr... more There are several models for software quality assurance, such as Capability Maturity Model Integration (CMMI), ISO/IEC 9000-3, and the Software Process Improvement and Capability dEtermination (SPICE). However, the proper selection and implementation of these models is often a difficult and a costly task for software companies especially small and medium ones. Expert system technology is beginning to play an important role and will become more common in the-future in quality management. This paper discusses the SQA models and Expert System technology illustrating how the Expert System can be used to automate the selection and implementation process of such SQA models. The paper provides a detailed comparative study between eight models, TQM, CMMI, ISO, SIX-SIGMA, BOOTSTRAP, TRILLIUM, TICKIT, and SPICE according to a proposed framework of 30 characteristics in 5 categories. The results of this study can be used as a first step for building an expert system for software quality assurance which can be used to help software-producing organizations in selecting the most suitable models to be adopted according to their properties and needs.
Smoothing Influence of Heighest Priority Resouce Order on Lower Priority Order in Project Scheduling

All business involves risk. One of the roles of management is to assess the impact of potential r... more All business involves risk. One of the roles of management is to assess the impact of potential risk to the business and to set in place management controls that will minimize the impact of the identified risk. In this paper, risk and emergency management concept is applied to develop Risk and Emergency Management System (REMS). RESM provides a systematic, proactive approach to guide departments and agencies at all levels of government, nongovernmental organizations, and the private sector to work seamlessly to prevent, protect against, respond to, recover from, and mitigate the effects of incidents. REMS capabilities are functioned regardless of cause, size, location, or complexity and in order to save lives, preserve the environment and protect property and the economy. REMS is designed and developed using FAIR risk analysis tool. This tool is simple to use, helps to reduce individual bias, provides a framework for explaining how the findings are achieved and enables the manager to identify the key factors and estimate the likelihood of a worst-case outcome.
Job-shop scheduling problem (JSSP) is one of the most difficult scheduling problems, as it is cla... more Job-shop scheduling problem (JSSP) is one of the most difficult scheduling problems, as it is classified as NP-hard problem. In this paper, a hybrid approach based on a genetic algorithm and some heuristic rules for solving (JSSP) is presented. The scheduling heuristic rules are integrated into the process of genetic evolution. The algorithm is designed and tested for the scheduling process in two cases in which the first generation the initial population is either random generation or the results obtained from some active heuristics rules. To speed up the generation of heuristics rules, a weighted priority rules are used as heuristic rules for achieving better performances for generating feasible schedules. The results of the purposed hybrid algorithm of this paper are promising where these results are compared to benchmark problems results.
Uploads
Books by Mohamed Shouman
Papers by Mohamed Shouman