Research activity of the computer department 2022

Computer Science Department research for the academic years 2020-2021 and 2021-2022

 

Research Title

Journal

Researchers

year

scopus

sci

Local/International

Links

1

Privacy preserving scheme for document similarity detection

Turkish Journal of Electrical Engineering & Computer Sciences

د. اياد ابراهيم+ م.م. ظافرغني +د. صلاح فليح

2022

*

*

 

https://journals.tubitak.gov.tr/cgi/viewcontent.cgi?article=3801&context=elektrik

2

Privacy Preserving Image Matching Scheme with Aggregated Local Descriptors

International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)

م.م. ظافر غني + د. حسام عاكف+ د. اياد ابراهيم + د. صلاح فليح

2022

*

 

 

https://ieeexplore.ieee.org/document/9683330

3

Energy Efficient WSN Sink-Cloud Server Authentication Protocol

International Conference on Information Systems and Computer Networks (ISCON)

د. زيد امين

2022

*

 

 

https://ieeexplore.ieee.org/abstract/document/9702365

4

Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges

Electrical, Computer and Energy Technologies (ICECET), International Conference on

د. اياد ابراهيم+ د. زيد امين

2022

*

 

 

https://ieeexplore.ieee.org/document/9698744

5

Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping

IEEE access

د. زيد امين + م.م. ظافرغني +د. اياد ابراهيم

2022

*

*

 

https://ieeexplore.ieee.org/document/9712337

6

Model to enhance knowledge sharing process in academia during COVID-19

Bulletin of Electrical Engineering and Informatics

د. زيد امين

2022

*

 

 

https://beei.org/index.php/EEI/article/view/3543

7

Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks

 International Conference on Signal, Control and Communication (SCC)

د. زيد امين

2022

*

 

 

https://ieeexplore.ieee.org/document/9768338

8

Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids

ADHOCNETS 2021

د. زيد امين

2022

*

 

 

https://link.springer.com/chapter/10.1007/978-3-030-98005-4_14

9

Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids

CROWNCOM 2021

د. زيد امين

2022

*

 

 

https://link.springer.com/chapter/10.1007/978-3-030-98002-3_24

10

Audio steganography with enhanced LSB method for securing encrypted text with bit cycling

Bulletin of Electrical Engineering and Informatics

د. زيد امين

2022

*

 

 

https://beei.org/index.php/EEI/article/view/3279

11

Sentiment analysis system for COVID-19 vaccinations using data of Twitter

Indonesian Journal of Electrical Engineering and Computer Science

م.م. انتصار برجس+ م.م. ايمان ثابت+ د. علي عادل

2022

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/27029

12

GLDM and Tamura features based KNN and particle swarm optimization for automatic diabetic retinopathy recognition system

Multimedia Tools and Applications

م.م. انتصار برجس+ م.م. ايمان ثابت

2022

*

*

 

https://link.springer.com/article/10.1007/s11042-022-13282-4

13

Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system

Bulletin of Electrical Engineering and Informatics

د. علي عادل

2022

*

 

 

https://beei.org/index.php/EEI/article/view/3658/2785

14

An Improvement of The MRI Segmentation Algorithm on The Human Brain

International Journal of Mechanical Engineering

د. خولة حسين

2022

*

 

 

لايوجد

15

Automatic Diabetic Retinopathy Recognition Method based on GLDM Features and Feed Forward Neural Network Classifier.

Al-Qadisiyah journal of pure science

م.م. انتصار برجس+ م.م. ايمان ثابت

2022

 

 

*

https://qu.edu.iq/journalsc/index.php/JOPS/article/view/1449

16

Segmentation of Human Brain Gliomas Tumour Images using U-Net Architecture with Transfer Learning

Diyala Journal of Engineering Sciences

د. خولة حسين

2022

 

 

*

https://djes.info/index.php/djes/article/view/935

17

Brain MRI Images Segmentation Based on U-Net Architecture

Iraqi Journal for Electrical and Electronic Engineering

د. خولة حسين

2022

 

 

*

http://ijeee.edu.iq/Papers/Vol18-Issue1/1570769744.pdf

18

Semantic Segmentation of Aerial Images Using U-Net Architecture

Iraqi Journal for Electrical and Electronic Engineering

د. خولة حسين

2022

 

 

*

 

19

Design a sturdy and secure authentication scheme capable of early detection of COVID-19 patients using WBANS

Indonesian Journal of Electrical Engineering and Computer Science

م.عبد الله جاسم+ د. علي عادل+ د. حامد +  ايمان ثابت

2022

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/28577

20

Privacy-preserve content-based image retrieval using aggregated local features

Iraqi Journal for Electrical and Electronic Engineering

د. اياد

2022

 

 

*

https://ijeee.edu.iq/Papers/Vol18-Issue2/1570802496.pdf

21

Secure Content-Based Image Retrieval with Copyright Protection under Cloud Computing Environment

Iraqi Journal for Electrical and Electronic Engineering

د. اياد

2022

 

 

*

https://ijeee.edu.iq/Papers/Vol18-Issue2/1570815485.pdf

22

Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs

 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)-22

د. زيد امين

2022

*

 

 

https://ieeexplore.ieee.org/document/9799997

23

Neural network for classification waters sample of shatt al Arabe River

Muthanna Journal of Pure Science

م. انتصار برجس

2022

 

 

*

https://muthjps.mu.edu.iq/neural-network-for-classification-waters-sample-of-shatt-al-arabe-river/

24

Enhanced Semantic Segmentation of Aerial images with Spatial Smoothness Using CRF Model

Muthanna International Conference on Engineering Science and Technology (MICEST)

د. خولة حسين

2022

*

 

 

https://ieeexplore.ieee.org/document/9790187

25

Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption

Iraqi Journal for Electrical and Electronic Engineering

د. علي عادل

2022

 

 

*

https://ijeee.edu.iq/Papers/Vol18-Issue1/1570789078.pdf

26

Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment

Global Power, Energy and Communication Conference (GPECOM)

د. زيد امين

2022

*

 

 

https://ieeexplore.ieee.org/document/9815685

27

Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

د. زيد امين

2022

*

 

 

https://www.springerprofessional.de/en/stochastic-security-ephemeral-generation-protocol-for-5g-enabled/23249018

28

SMPP-CBIR: Shorted and Mixed Aggregated Image Features for Privacy-Preserving Content-Based Image Retrieval

Bulletin of Electrical Engineering and Informatics

د. اياد ابراهيم

2022

*

 

 

https://beei.org/index.php/EEI/article/view/4323

29

Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks

IEEE International Energy Conference and Exhibition (EnergyCon)

د. زيد امين

2022

*

 

 

https://ieeexplore.ieee.org/document/9830257/authors#authors

30

Segmentation of Human Brain Gliomas Tumour Images using U-Net Architecture with Transfer Learning

Diyala Journal of Engineering Sciences Vol.15, No 1, March 2022

د. خولة حسين

2022

 

 

*

http://djes.info/index.php/djes/article/view/935

31

Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices

IEEE Access

د.زيد امين + د.مصطفى صلاح

2022

 

*

 

https://ieeexplore.ieee.org/document/9842900

32

MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures

د.زيد امين + د.مصطفى صلاح + ظافر +  Junchao +Vincent

2022

*

 

 

https://link.springer.com/chapter/10.1007/978-3-031-15101-9_2

33

Secure authentication and privacy-preserving to improve video streaming vehicle ad-hoc network

Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)

عقيل قاسم + علي عادل + مشتاق+مصطفى

2022

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29264

34

Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks

Journal of Sensor and Actuator Networks

زيد امين + عبد الله جاسم + Junchao +Vincent

2022

*

*

 

https://www.mdpi.com/2224-2708/11/3/55

35

Predicting reaction based on customer's transaction using machine learning approaches

International Journal of Electrical and Computer Engineering

غزوان عبد النبي

2022

*

 

 

https://ijece.iaescore.com/index.php/IJECE/article/view/27216

36

Employee Attrition Prediction Using Deep Neural Networks

MDPI: computers

د. صلاح فليح+ م.م. ظافر غني + د. اياد ابراهيم

2021

*

*

 

https://www.mdpi.com/2073-431X/10/11/141/pdf?version=1637235248

37

Lightweight, Secure, Similar-Document Retrieval over Encrypted Data

MDPI: applied sciences

د. اياد ابراهيم+د. زيد امين

2021

*

*

 

https://www.mdpi.com/2076-3417/11/24/12040/htm

38

Towards design strong emergency and COVID-19 authentication scheme in VANET

Indonesian Journal of Electrical Engineering and Computer Science

. د. علي عادل+ م. مشتاق عبد المطلب

2021

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23546

39

Electronic Health Records System Using Blockchain Technology

Webology, Volume 18, Special Issue on Current Trends in Management and Information
Technology

د. علي عادل

2021

*

 

 

http://openaccess.altinbas.edu.tr/xmlui/handle/20.500.12939/2213

40

Goal location prediction based on deep learning using RGB-D camera

Bulletin of Electrical Engineering and Informatics

د. صلاح فليح

2021

*

 

 

https://beei.org/index.php/EEI/article/view/3170

41

Towards Security and Privacy Preservation in 5G Networks

IEEE

د. زيد امين

2021

*

 

 

https://ieeexplore.ieee.org/document/9653385

42

Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data

IEEE Annual International Computer Software and Applications Conference (COMPSAC)

د. زيد امين + د. اياد ابراهيم

2021

*

 

 

https://ieeexplore.ieee.org/document/9529552

43

Towards Iris-Based Authentication for Smart Devices in the Cloud

Proceedings of Sixth International Congress on Information and Communication Technology

د. زيد امين

2021

*

 

 

https://link.springer.com/chapter/10.1007/978-981-16-1781-2_82

44

Prediction of COVID-19 from Chest X-ray Images Using Multiresolution Texture Classification with Robust Local Features

IEEE Annual International Computer Software and Applications Conference (COMPSAC)

د. زكريا احمد

2021

*

 

 

https://ieeexplore.ieee.org/document/9529393

45

Telehealth utilization during the Covid-19 pandemic: A systematic review

Computers in Biology and Medicine

م.م. ايمان ثابت

2021

*

*

 

https://www.sciencedirect.com/science/article/pii/S0010482521006727

46

 

Secure Multi-keyword Similarity Search Over Encrypted Data With Security Improvement

Iraqi Journal for Electrical and Electronic Engineering

د. اياد ابراهيم

2021

 

 

*

https://www.iasj.net/iasj/article/218789

47

Backward Private Searchable Symmetric Encryption with Improved Locality

Iraqi Journal for Electrical and Electronic Engineering

د. اياد ابراهيم

2021

 

 

*

http://ijeee.edu.iq/Papers/Vol17-Issue2/1570733805.pdf

48

Towards for Designing Intelligent Health Care System Based on Machine Learning

Iraqi Journal for Electrical and Electronic Engineering

د. علي عادل

2021

 

 

*

http://ijeee.edu.iq/Papers/Vol17-Issue2/1570744563.pdf

49

A Survey on Segmentation Techniques for Image Processing

Iraqi Journal for Electrical and Electronic Engineering

رنا جاسم

2021

 

 

*

http://ijeee.edu.iq/Papers/Vol17-Issue2/1570736047.pdf

50

Efficient Multi-keyword Similarity search Over Encrypted Cloud Documents

Indonesian Journal of Electrical Engineering and Computer Science

د. اياد+ د.صلاح+م. ظافر

2021

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25134/15221

51

تطبيق طريقة التزامن من نوع PCعلى الدائرة االلكترونية الفوضوية من نوع – attraction repulsion

مجلد 3 عدد 2 (2021): Samarra Journal of Pure and Applied Science

انتصار برجس

2021

 

 

*

https://sjpas.com/index.php/sjpas/article/view/206

52

An Efficient Mechanism to Prevent the Phishing Attacks

Iraqi Journal for Electrical and Electronic Engineering

د. علي عادل

2021

 

 

*

http://ijeee.edu.iq/Papers/Vol17-Issue1/1570720622.pdf

53

Decision making system based on FWQI to assess of drinking water in basrah Iraq

Communication & Information Technology (ICICT), 2021 International Conference on

د. حامد + د. مصطفى

2021

*

 

 

https://ieeexplore.ieee.org/document/9568485

54

Securing audio transmission based on encoding and steganography

Indonesian Journal of Electrical Engineering and Computer Science

د. زيد امين+محمد عبد الرضا

2021

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/24150

55

A new approach for finding duplicated words in scanned Arabic documents based on OCR and SURF

Journal of Basrah Researches ((Sciences))

د. خولة حسين

2021

 

 

*

https://www.iasj.net/iasj/download/3bb9884417d158a8

56

Secure data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology

Applied Sciences- MDPI

د. زيد امين

2021

*

*

 

https://www.mdpi.com/2076-3417/11/14/6376/pdf

57

Password authentication scheme based on smart card and QR code

Indonesian Journal of Electrical Engineering and Computer Science

د. علي عادل + م. مشتاق عبد المطلب+ م. عبد الله جاسم+د. حامد

2021

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25153/15163

58

Face Recognition System Against Adversarial Attack Using Convolutional Neural Network

Iraqi Journal for Electrical and Electronic Engineering

د. صلاح فليح

2021

 

 

*

http://ijeee.edu.iq/Papers/Vol18-Issue1/1570765472.pdf

59

MT Hybrid RRT-A* Regression-based: An Enhanced Path Planning Method for an Autonomous Mobile Robots

Journal of Basrah Researches ((Sciences))

د. صلاح فليح+ م.م. صهيب عبد اللطيف

2021

 

 

*

https://www.iasj.net/iasj/download/86d2cbcca61b32ea

60

Multi-keyword search over encrypted data with security proof

Journal of Basrah Researches ((Sciences))

د. اياد ابراهيم

2021

 

 

*

https://www.iasj.net/iasj/article/223601

61

Security proof for backward searchable encryption scheme

Journal of Basrah Researches ((Sciences))

د. اياد ابراهيم

2021

 

 

*

https://www.iasj.net/iasj/article/222327

62

Web application database protection from SQLIA using permutation encoding

ICISS 2021: 2021 The 4th International Conference on Information Science and Systems

د. محمد عبد الرضا +مصطفى صلاح+ د. زيد امين

2021

*

 

 

https://dl.acm.org/doi/10.1145/3459955.3460594

63

A novel image encryption scheme based on DCT transform and DNA sequence

Indonesian Journal of Electrical Engineering and Computer Science

د. علي عادل+ م. عبد الله جاسم

2020

*

 

 

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23732/0

64

Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud

IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)

زيد امين عبد الجبار+محمد عبد الرضا

2020

x

 

 

https://ieeexplore.ieee.org/document/9259519

65

SMART CITY SECURITY: FACE-BASED IMAGE RETRIEVAL MODEL USING GRAY LEVEL CO-OCCURRENCE MATRIX

Journal of information and technology

د. علي عادل ياسين+ م. عبد الله جاسم

2020

x

 

 

http://e-journal.uum.edu.my/index.php/jict/article/view/6303/2270

66

Role of biological Data Mining and Machine Learning Techniques in Detecting and Diagnosing the Novel Coronavirus (COVID-19): A Systematic Review

Journal of medical science

ايمان ثابت

2020

x

x

 

https://doi.org/10.1007/s10916-020-01582-x

67

Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System

IEEE Access

زيد امين عبد الجبار+محمد عبد الرضا

2020

x

x

 

https://ieeexplore.ieee.org/abstract/document/9274321

68

SECURE SIMILAR DETECTION FOR DOCUMENTS

Journal of Basrah Researches ((Sciences)) Vol. (46). No. 1 (2020)

اياد ابراهيم عبد السادة

2020

 

 

x

https://www.iasj.net/iasj/download/6d5fb891ae083894

69

Multiwavelength fiber laser employing semiconductor optical amplifier in nonlinear optical loop mirror with polarization controller and polarization maintaining fiber

AIP Conference Proceedings

حامد علي عبد

2020

X

 

 

https://aip.scitation.org/doi/10.1063/1.5142122

70

Characteristics of multiwavelength fiber laser employing semiconductor optical amplifier in nonlinear optical loop mirror with different length polarization maintaining fiber

AIP Conference Proceedings

حامد علي عبد

2020

X

 

 

https://aip.scitation.org/doi/10.1063/1.5142121

71

Enhanced Clustering Algorithm for Efficient Clustering in Wireless Sensor Network

International Journal of
Computing and Digital Systems
ISSN (2210-142X) Int. J. Com. Dig.
Sys. 9, No.4 (July-2020)

حامد علي عبد

2020

X

 

 

http://journal.uob.edu.bh/handle/123456789/3878

72

A Critical Comparative Review of Nature-Inspired Optimization Algorithms (NIOAs)

International Journal of Simulation -- Systems, Science & Technology

حامد علي عبد

2020

 

 

X

DOI 10.5013/IJSSST.a.21.03.09

73

Classification of Groundwater Quality using Artificial Neural Networks in Safwan and Al-Zubayr in Basra

Advances in Computer, Signals and
Systems (2020) 4: 25-35, Clausius
Scientific Press, Canada

حامد علي عبد

2020

 

 

X

10.23977/acss.2020.040105

74

Multi-factor Authentication for an Administrator's Devices in an IoT Environment

2nd International Conference on
Advances in Cybersecurity (ACeS
2020), CCIS 1347, pp. 27–47

عبد الله جاسم ياسين

2020

X

 

 

https://www.springerprofessional.de/multi-factor-authentication-for-an-administrator-s-devices-in-an/18834330

75

VPPCS: VANET-Based Privacy-Preserving Communication Scheme

IEEE Access

علي عادل ياسين

2020

X

X

 

https://ieeexplore.ieee.org/abstract/document/9169647

76

DESIGN A LIGHTWEIGHT AUTHENTICATION SCHEME FOR WBAN IN HEALTHCARE SYSTEMS

Journal of Basrah Researches (Sciences)

علي عادل ياسين

2020

 

 

X

https://www.iasj.net/iasj/article/185609

77

Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing Network

Proceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things

زيد امين عبد الجبار

2020

X

 

 

https://dl.acm.org/doi/abs/10.1145/3429523.3429529

78

Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval

IEEE Access

زيد امين عبد الجبار

2020

X

X

 

https://ieeexplore.ieee.org/abstract/document/8876847

79

Encoding Query Based Lightweight Algorithm for Preventing SQL injection attack

Journal of Basrah Researches ((Sciences)

محمد عبد الرضا حسين

2020

 

 

X

https://www.iasj.net/iasj/download/c0f4a95423736c35

80

Toward awareness locality algorithms of Peer-to-Peer file sharing network

CCIOT 2020: Proceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things

د. زيد امين

2020

*

 

 

https://dl.acm.org/doi/10.1145/3429523.3429529

81

Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach

Multimedia Tools and Applications volume

م.م. ايمان ثابت

2020

*

*

 

https://link.springer.com/article/10.1007/s11042-020-09903-5

82

Hybrid RRT-A*: An Improved Path Planning Method for an Autonomous Mobile Robots

Iraqi Journal for Electrical and Electronic Engineering

د. صلاح فليح+ م.م. صهيب عبد اللطيف

2020

 

 

*

http://ijeee.edu.iq/Papers/Vol17-Issue1/1570715176.pdf