الجامعة التكنولوجية
I have received my Ph.D. degree in Information Technology from University of Technology in Iraq. My research interests are in information and software system and their security, data base system and GIS information. I have several publications in the areas of date base and GIS and management improving and IS security
56644150900
6
19
97
Signal Processing
Control and Optimization
Modeling and Simulation
Computer Science Applications
Electrical and Electronic Engineering
Process Chemistry and Technology
Theoretical Computer Science
Architecture
Health Informatics
Computational Theory and Mathematics
Economics, Econometrics and Finance (miscellaneous)
Hardware and Architecture
Software
Biomedical Engineering
Computer Networks and Communications
Materials Science (miscellaneous)
Computer Science (all)
Computer Vision and Pattern Recognition
Information Systems
Industrial and Manufacturing Engineering
Physics and Astronomy (all)
Computer Graphics and Computer-Aided Design
Statistics and Probability
Education
Control and Systems Engineering
Artificial Intelligence
Mechanical Engineering
عنوان البحث | تاريخ النشر | اسم المجلة | رابط |
---|---|---|---|
Geo-Blockchain Verification Based on Proof of Secret Sharing Modification via Chialvo Map | 2025-06-01 | Cybernetics and Information Technologies | عرض |
Context-Aware Recommendation System Based on Collaborative Filtering for Cold Start Resolving | 2025-05-06 | Aip Conference Proceedings | عرض |
Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security | 2025-01-10 | Mesopotamian Journal of Cybersecurity | عرض |
A Context-Aware Recommendation System with Effective Contextual Pre-Filtering Model | 2025-01-01 | Informatica Slovenia | عرض |
Detection SQL Injection Attacks Against Web Application by Using Support Vector Machine with Principal Component Analysis | 2024-02-14 | Aip Conference Proceedings | عرض |
A Review of Recommendation System: Techniques, Limitation and Evaluation | 2023-12-22 | Aip Conference Proceedings | عرض |
Using Random Forest with Principal Component Analysis to Detect SQLIA | 2023-09-29 | Aip Conference Proceedings | عرض |
Detection SQL Injection Attacks Against Web Application by Using K-Nearest Neighbors with Principal Component Analysis | 2023-01-01 | Lecture Notes in Networks and Systems | عرض |
Analyzing SQL payloads using logistic regression in a big data environment | 2023-01-01 | Journal of Intelligent Systems | عرض |
Analysis of the False Prediction of the Logistic Regression Algorithm in SQL Payload Classification and its Impact on the Principles of Information Security (CIA) | 2023-01-01 | Iraqi Journal for Computer Science and Mathematics | عرض |
Naïve-Bayes family for sentiment analysis during COVID-19 pandemic and classification tweets | 2022-10-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
E-Voting System using Solana Blockchain | 2022-01-01 | 4th International Conference on Current Research in Engineering and Science Applications Iccresa 2022 | عرض |
Optimization of the Database Function Transactions by using the Fireworks Algorithm | 2021-03-08 | Journal of Physics Conference Series | عرض |
A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System | 2021-01-01 | International Journal of Interactive Mobile Technologies | عرض |
A new hybrid shape moment invariant techniques for face identification in thermal and visible visions | 2020-11-28 | Proceedings 2020 21st International Arab Conference on Information Technology Acit 2020 | عرض |
A proposed hybrid cryptography algorithm based on GOST and salsa (20) | 2020-01-01 | Periodicals of Engineering and Natural Sciences | عرض |
Comparative Study of Moments Shape Descriptors and propose a new hybrid Descriptor technique | 2019-12-01 | Proceedings 2019 IEEE 9th International Conference on Intelligent Computing and Information Systems Icicis 2019 | عرض |
Face Image Retrieval Based on Fireworks Algorithm | 2019-10-01 | Nicst 2019 1st Al Noor International Conference for Science and Technology | عرض |
Secure and time efficient hash-based message authentication algorithm for wireless sensor networks | 2014-12-01 | Gscit 2014 Global Summit on Computer and Information Technology | عرض |