Research activity of the computer department 2023

No

Research name

researchers’ names

research link

1

An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN

Hiba Imad Nasser, Mohammed Abdulridha Hussain

https://doi.org/ 10.37917/ijeee.19.2.2

2

Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems

Zaid Alaa Hussien, HusamA. Abdulmalik, Mohammed Abdulridha Hussain, Vincent Omollo Nyangaresi , Junchao Ma, Zaid Ameen Abduljabbar  and Iman Qays Abduljaleel

https://www.mdpi.com/2076-3417/13/2/691

3

Secure Electronic Healthcare Record based on Distributed Global Database and Schnorr Signcryption

Mohammad Fareed, Ali A Yassin

Press here

4

An Intelligent Early Flood Forecasting and Prediction Leveraging Machine and Deep Learning Algorithms with Advanced Alert System

 Israa M. Hayder, Taief Alaa Al-Amiedy
, Wad Ghaban
, Faisal Saeed
, Maged Nasser
,
Ghazwan Abdulnabi Al-Ali
and Hussain A. Younis

https://www.mdpi.com/2227-9717/11/2/481

5

Provably secure and efficient audio compression based on compressive sensing

Enas Wahab Abood, Zaid Alaa Hussien, Haifaa Assy Kawi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Saad Ahmad Ali Kalafy

https://ijece.iaescore.com/index.php/IJECE/article/view/27495

6

A lightweight and secure multilayer authentication scheme for wireless body area networks in healthcare system

Mohammad Fareed, Ali A. Yassin

https://search.proquest.com/openview/42174e99a5600b46acaa42a5cd59224e/1?pq-origsite=gscholar&cbl=1686344

7

Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment

Zainab Amin Al-Sulami, Hayder Salah Hashim, Nor’ashikin Ali, Zaid Ameen Abduljabbar

https://ijece.iaescore.com/index.php/IJECE/article/view/26929

8

Omicron virus emotions understanding system based on deep  learning architecture

Eman Thabet Khalid, Mustafa Salah Khalefa, Wijdan Yassen, Ali Adil Yassin

 https://link.springer.com/article/10.1007/s12652-023-04615-8

9

Towards for Designing Educational System Using Role-Based Access Control

Maha Kadhim Kabier, Ali A. Yassin, Zaid Ameen Abduljabbar

10.22266/ijies2023.0430.05

10

Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography

Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma

https://www.informatica.si/index.php/informatica/article/view/4628

11

Secure Electronic Healthcare Record Using Robust Authentication Scheme

Aqeel A. Yaseen, Kalyani Patel, Ali A. Yassin, Abdulla J. Aldarwish, Haitham A. Hussein

https://www.iaeng.org/IJCS/issues_v50/issue_2/IJCS_50_2_16.pdf

12

Bi-Directional Adaptive Probabilistic Method With a Triangular Segmented Interpolation for Robot Path Planning in Complex Dynamic-Environments

Suhaib Al-Ansarry, SALAH AL-DARRAJI, ASMAASHAREEF, DHAFER G. HONI l, FRANCESCA FALLUCCHI

https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10168122

13

Breast Cancer Prediction Using Soft Voting Classifier Based on Machine Learning Models

Mohammed S. Hashim,Ali A.Yassin

https://www.iaeng.org/IJCS/issues_v50/issue_2/IJCS_50_2_40.pdf

14

Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture

Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Hend Muslim Jasim, Junchao Ma,
Mohammed Abdulridha Hussain, Zaid Alaa Hussien and Abdulla J. Y. Aldarwish

https://www.mdpi.com/2071-1050/15/13/10264

15

Improving the Performance of Searchable Symmetric Encryption by Optimizing Locality

,Aya A. Alyousif, Ali A. Yassin, Zaid A. Abduljabbar, Ke Xu

https://jou.jobrs.edu.iq/index.php/home/article/view/37

16

Secure Electronic Healthcare Record Using Robust Authentication Scheme

Aqeel A. Yaseen, Kalyani Patel, Ali A. Yassin, Abdulla J. Aldarwish, Haitham A. Hussein

https://www.iaeng.org/IJCS/issues_v50/issue_2/IJCS_50_2_16.pdf

17

AnEfficient Path Planning in Uncertainty Environments using Dynamic Grid-Based and Potential Field Methods

Suhaib Al-Ansarry, Salah Al-Darraji and Dhafer G. Honi

https://ijeee.edu.iq/Papers/Vol19-Issue2/1570897039.pdf

18

Authentication Healthcare Scheme in WBAN

Abdullah Mohammed Rashid,  A. Yassin, Abdulla J. Y. Aldarwish, Aqeel A. Yaseen, Hamid Alasadi, Ammar Asaad, and Alzahraa J. Mohammed

https://ijeee.edu.iq/Papers/Vol19-Issue2/1570909222.pdf

19

Content-Based Image Retrieval using Hard Voting Ensemble Method of Inception, Xception, and Mobilenet Architectures

Meqdam A. Mohammed, Zakariya A. Oraibi, Mohammed Abdulridha Hussain

https://doi.org/10.37917/ijeee.19.2.17

20

Virtual SmartCards-based Authentication in Healthcare Systems and Applications

Abdulla J.Y. Aldarwish, Dr. Kalyani Patel, Ali A. Yassin, Aqeel A. Yaseen

https://mirlabs.net/ijcisim/regular_papers_2023/Paper46.pdf

21

A Robust End-to-End CNN Architecture for Efficient COVID-19 Prediction form X-ray Images with Imbalanced Data‏

Zakariya A. Oraibi, Safaa Albasri

https://informatica.si/index.php/informatica/article/viewFile/4790/2358

22

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles

Vincent Omollo Nyangaresi, Hend Muslim Jasim , Keyan Abdul-Aziz Mutlaq ,
Zaid Ameen Abduljabbar, Junchao Ma 6, Iman Qays Abduljaleel and Dhafer G. Honi

https://www.mdpi.com/2079-9292/12/17/3688

23

Authentication Healthcare Scheme in WBAN

Abdullah Mohammed Rashid, Ali A Yassin, Abdulla JY Aldarwish, Aqeel A Yaseen, Hamid Alasadi, Ammar Asaad, Alzahraa J Mohammed

https://ijeee.edu.iq/Papers/Vol19-Issue2/1570909222.pdf

24

Enhanced PSO Algorithm for Detecting DRDoS Attacks on LDAP Servers

Riyadh Rahef Nuiaa, Saif Ali Abd Alradha Alsaidi, Bahaa Kareem Mohammed,
Ali Hakem Alsaeedi, Zaid Abdi Alkareem Alyasseri, Selvakumar Manickam,
Mohammed Abdulridha Hussain

10.22266/ijies2023.1031.61

25

Knowledge Management and its Role in the Development of a Smart University in Iraq

Zainab Amin Al-Sulami, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Junchao Ma

https://www.temjournal.com/content/123/TEMJournalAugust2023_1582_1592.html

26

Locality Improvement Scheme Based on QR Code Technique within Inverted Index

 Aya Abdulhussein Alyousif, Ali Adil Yassin

https://informatica.si/index.php/informatica/article/download/4745/2356

27

Secure two-factor mutual authentication scheme using shared image in medical healthcare environment

Husam A Abdulmalik, Ali A. Yassin

https://beei.org/index.php/EEI/article/download/4459/3341

28

Using Pearson Correlation and Mutual Information (PC-MI) to Select Features for Accurate Breast Cancer Diagnosis Based on a Soft Voting Classifier

Mohammed S. Hashim, Ali A Yassin

https://ijeee.edu.iq/Papers/Vol19-Issue2/1570872339.pdf

29

Vision Transformer Neural Nets Application for Object Recognition over Water in Um Qaser Port

Fatima Mallak Hanoon+ Khawla Hussein Ali

International journal of intelligent systems and applications in Engineering(IJISAE)

30

Automatic Diagnosis of CoronavirusUsing Conditional Generative Adversarial Network (CGAN)

Haneen Majid*, Khawla Hussein Ali

raqi Journal of Science

31

Provably Efficient Multi-Cancer Image Segmentation Based on Multi-Class Fuzzy Entropy

Hend Muslim Jasim, Mudhafar Jalil Jassim Ghrabat , Luqman Qader Abdulrahman, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar Iman Qays Abduljaleel9

https://www.informatica.si/index.php/informatica/article/view/4840