Computer Science Department research for the academic years 2020-2021 and 2021-2022 |
|||||||||
|
Research Title |
Journal |
Researchers |
year |
scopus |
sci |
Local/International |
Links |
|
1 |
Privacy preserving scheme for document similarity detection |
Turkish Journal of Electrical Engineering & Computer Sciences |
د. اياد ابراهيم+ م.م. ظافرغني +د. صلاح فليح |
2022 |
* |
* |
|
https://journals.tubitak.gov.tr/cgi/viewcontent.cgi?article=3801&context=elektrik |
|
2 |
Privacy Preserving Image Matching Scheme with Aggregated Local Descriptors |
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) |
م.م. ظافر غني + د. حسام عاكف+ د. اياد ابراهيم + د. صلاح فليح |
2022 |
* |
|
|
||
3 |
Energy Efficient WSN Sink-Cloud Server Authentication Protocol |
International Conference on Information Systems and Computer Networks (ISCON) |
د. زيد امين |
2022 |
* |
|
|
||
4 |
Provably Secure Session Key Agreement Protocol for Unmanned Aerial Vehicles Packet Exchanges |
Electrical, Computer and Energy Technologies (ICECET), International Conference on |
د. اياد ابراهيم+ د. زيد امين |
2022 |
* |
|
|
||
5 |
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Mapping |
IEEE access |
د. زيد امين + م.م. ظافرغني +د. اياد ابراهيم |
2022 |
* |
* |
|
||
6 |
Model to enhance knowledge sharing process in academia during COVID-19 |
Bulletin of Electrical Engineering and Informatics |
د. زيد امين |
2022 |
* |
|
|
||
7 |
Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks |
International Conference on Signal, Control and Communication (SCC) |
د. زيد امين |
2022 |
* |
|
|
||
8 |
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids |
ADHOCNETS 2021 |
د. زيد امين |
2022 |
* |
|
|
https://link.springer.com/chapter/10.1007/978-3-030-98005-4_14 |
|
9 |
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids |
CROWNCOM 2021 |
د. زيد امين |
2022 |
* |
|
|
https://link.springer.com/chapter/10.1007/978-3-030-98002-3_24 |
|
10 |
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling |
Bulletin of Electrical Engineering and Informatics |
د. زيد امين |
2022 |
* |
|
|
||
11 |
Sentiment analysis system for COVID-19 vaccinations using data of Twitter |
Indonesian Journal of Electrical Engineering and Computer Science |
م.م. انتصار برجس+ م.م. ايمان ثابت+ د. علي عادل |
2022 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/27029 |
|
12 |
GLDM and Tamura features based KNN and particle swarm optimization for automatic diabetic retinopathy recognition system |
Multimedia Tools and Applications |
م.م. انتصار برجس+ م.م. ايمان ثابت |
2022 |
* |
* |
|
https://link.springer.com/article/10.1007/s11042-022-13282-4 |
|
13 |
Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system |
Bulletin of Electrical Engineering and Informatics |
د. علي عادل |
2022 |
* |
|
|
||
14 |
An Improvement of The MRI Segmentation Algorithm on The Human Brain |
International Journal of Mechanical Engineering |
د. خولة حسين |
2022 |
* |
|
|
لايوجد |
|
15 |
Automatic Diabetic Retinopathy Recognition Method based on GLDM Features and Feed Forward Neural Network Classifier. |
Al-Qadisiyah journal of pure science |
م.م. انتصار برجس+ م.م. ايمان ثابت |
2022 |
|
|
* |
https://qu.edu.iq/journalsc/index.php/JOPS/article/view/1449 |
|
16 |
Segmentation of Human Brain Gliomas Tumour Images using U-Net Architecture with Transfer Learning |
Diyala Journal of Engineering Sciences |
د. خولة حسين |
2022 |
|
|
* |
||
17 |
Brain MRI Images Segmentation Based on U-Net Architecture |
Iraqi Journal for Electrical and Electronic Engineering |
د. خولة حسين |
2022 |
|
|
* |
||
18 |
Semantic Segmentation of Aerial Images Using U-Net Architecture |
Iraqi Journal for Electrical and Electronic Engineering |
د. خولة حسين |
2022 |
|
|
* |
|
|
19 |
Design a sturdy and secure authentication scheme capable of early detection of COVID-19 patients using WBANS |
Indonesian Journal of Electrical Engineering and Computer Science |
م.عبد الله جاسم+ د. علي عادل+ د. حامد + ايمان ثابت |
2022 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/28577 |
|
20 |
Privacy-preserve content-based image retrieval using aggregated local features |
Iraqi Journal for Electrical and Electronic Engineering |
د. اياد |
2022 |
|
|
* |
||
21 |
Secure Content-Based Image Retrieval with Copyright Protection under Cloud Computing Environment |
Iraqi Journal for Electrical and Electronic Engineering |
د. اياد |
2022 |
|
|
* |
https://ijeee.edu.iq/Papers/Vol18-Issue2/1570815485.pdf |
|
22 |
Efficient Extreme Gradient Boosting Based Algorithm for QoS Optimization in Inter-Radio Access Technology Handoffs |
International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)-22 |
د. زيد امين |
2022 |
* |
|
|
||
23 |
Neural network for classification waters sample of shatt al Arabe River |
Muthanna Journal of Pure Science |
م. انتصار برجس |
2022 |
|
|
* |
https://muthjps.mu.edu.iq/neural-network-for-classification-waters-sample-of-shatt-al-arabe-river/ |
|
24 |
Enhanced Semantic Segmentation of Aerial images with Spatial Smoothness Using CRF Model |
Muthanna International Conference on Engineering Science and Technology (MICEST) |
د. خولة حسين |
2022 |
* |
|
|
||
25 |
Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption |
Iraqi Journal for Electrical and Electronic Engineering |
د. علي عادل |
2022 |
|
|
* |
||
26 |
Verifiable Security and Privacy Provisioning Protocol for High Reliability in Smart Healthcare Communication Environment |
Global Power, Energy and Communication Conference (GPECOM) |
د. زيد امين |
2022 |
* |
|
|
||
27 |
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things |
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering |
د. زيد امين |
2022 |
* |
|
|
||
28 |
SMPP-CBIR: Shorted and Mixed Aggregated Image Features for Privacy-Preserving Content-Based Image Retrieval |
Bulletin of Electrical Engineering and Informatics |
د. اياد ابراهيم |
2022 |
* |
|
|
||
29 |
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks |
IEEE International Energy Conference and Exhibition (EnergyCon) |
د. زيد امين |
2022 |
* |
|
|
https://ieeexplore.ieee.org/document/9830257/authors#authors |
|
30 |
Segmentation of Human Brain Gliomas Tumour Images using U-Net Architecture with Transfer Learning |
Diyala Journal of Engineering Sciences Vol.15, No 1, March 2022 |
د. خولة حسين |
2022 |
|
|
* |
http://djes.info/index.php/djes/article/view/935 |
|
31 |
Biometric-Based Packet Validation Scheme for Body Area Network Smart Healthcare Devices |
IEEE Access |
د.زيد امين + د.مصطفى صلاح |
2022 |
|
* |
|
https://ieeexplore.ieee.org/document/9842900 |
|
32 |
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones |
International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures |
د.زيد امين + د.مصطفى صلاح + ظافر + Junchao +Vincent |
2022 |
* |
|
|
https://link.springer.com/chapter/10.1007/978-3-031-15101-9_2 |
|
33 |
Secure authentication and privacy-preserving to improve video streaming vehicle ad-hoc network |
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) |
عقيل قاسم + علي عادل + مشتاق+مصطفى |
2022 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29264 |
|
34 |
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks |
Journal of Sensor and Actuator Networks |
زيد امين + عبد الله جاسم + Junchao +Vincent |
2022 |
* |
* |
|
https://www.mdpi.com/2224-2708/11/3/55 |
|
35 |
Predicting reaction based on customer's transaction using machine learning approaches |
International Journal of Electrical and Computer Engineering |
غزوان عبد النبي |
2022 |
* |
|
|
https://ijece.iaescore.com/index.php/IJECE/article/view/27216 |
|
36 |
Employee Attrition Prediction Using Deep Neural Networks |
MDPI: computers |
د. صلاح فليح+ م.م. ظافر غني + د. اياد ابراهيم |
2021 |
* |
* |
|
https://www.mdpi.com/2073-431X/10/11/141/pdf?version=1637235248 |
|
37 |
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data |
MDPI: applied sciences |
د. اياد ابراهيم+د. زيد امين |
2021 |
* |
* |
|
||
38 |
Towards design strong emergency and COVID-19 authentication scheme in VANET |
Indonesian Journal of Electrical Engineering and Computer Science |
. د. علي عادل+ م. مشتاق عبد المطلب |
2021 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23546 |
|
39 |
Electronic Health Records System Using Blockchain Technology |
Webology, Volume 18, Special Issue on Current Trends in Management and Information |
د. علي عادل |
2021 |
* |
|
|
http://openaccess.altinbas.edu.tr/xmlui/handle/20.500.12939/2213 |
|
40 |
Goal location prediction based on deep learning using RGB-D camera |
Bulletin of Electrical Engineering and Informatics |
د. صلاح فليح |
2021 |
* |
|
|
https://beei.org/index.php/EEI/article/view/3170 |
|
41 |
Towards Security and Privacy Preservation in 5G Networks |
IEEE |
د. زيد امين |
2021 |
* |
|
|
||
42 |
Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data |
IEEE Annual International Computer Software and Applications Conference (COMPSAC) |
د. زيد امين + د. اياد ابراهيم |
2021 |
* |
|
|
https://ieeexplore.ieee.org/document/9529552 |
|
43 |
Towards Iris-Based Authentication for Smart Devices in the Cloud |
Proceedings of Sixth International Congress on Information and Communication Technology |
د. زيد امين |
2021 |
* |
|
|
https://link.springer.com/chapter/10.1007/978-981-16-1781-2_82 |
|
44 |
Prediction of COVID-19 from Chest X-ray Images Using Multiresolution Texture Classification with Robust Local Features |
IEEE Annual International Computer Software and Applications Conference (COMPSAC) |
د. زكريا احمد |
2021 |
* |
|
|
https://ieeexplore.ieee.org/document/9529393 |
|
45 |
Telehealth utilization during the Covid-19 pandemic: A systematic review |
Computers in Biology and Medicine |
م.م. ايمان ثابت |
2021 |
* |
* |
|
https://www.sciencedirect.com/science/article/pii/S0010482521006727 |
|
46 |
|
Iraqi Journal for Electrical and Electronic Engineering |
د. اياد ابراهيم |
2021 |
|
|
* |
https://www.iasj.net/iasj/article/218789 |
|
47 |
Backward Private Searchable Symmetric Encryption with Improved Locality |
Iraqi Journal for Electrical and Electronic Engineering |
د. اياد ابراهيم |
2021 |
|
|
* |
http://ijeee.edu.iq/Papers/Vol17-Issue2/1570733805.pdf |
|
48 |
Towards for Designing Intelligent Health Care System Based on Machine Learning |
Iraqi Journal for Electrical and Electronic Engineering |
د. علي عادل |
2021 |
|
|
* |
http://ijeee.edu.iq/Papers/Vol17-Issue2/1570744563.pdf |
|
49 |
A Survey on Segmentation Techniques for Image Processing |
Iraqi Journal for Electrical and Electronic Engineering |
رنا جاسم |
2021 |
|
|
* |
http://ijeee.edu.iq/Papers/Vol17-Issue2/1570736047.pdf |
|
50 |
Efficient Multi-keyword Similarity search Over Encrypted Cloud Documents |
Indonesian Journal of Electrical Engineering and Computer Science |
د. اياد+ د.صلاح+م. ظافر |
2021 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25134/15221 |
|
51 |
تطبيق طريقة التزامن من نوع PCعلى الدائرة االلكترونية الفوضوية من نوع – attraction repulsion |
مجلد 3 عدد 2 (2021): Samarra Journal of Pure and Applied Science |
انتصار برجس |
2021 |
|
|
* |
https://sjpas.com/index.php/sjpas/article/view/206 |
|
52 |
An Efficient Mechanism to Prevent the Phishing Attacks |
Iraqi Journal for Electrical and Electronic Engineering |
د. علي عادل |
2021 |
|
|
* |
||
53 |
Decision making system based on FWQI to assess of drinking water in basrah Iraq |
Communication & Information Technology (ICICT), 2021 International Conference on |
د. حامد + د. مصطفى |
2021 |
* |
|
|
https://ieeexplore.ieee.org/document/9568485 |
|
54 |
Securing audio transmission based on encoding and steganography |
Indonesian Journal of Electrical Engineering and Computer Science |
د. زيد امين+محمد عبد الرضا |
2021 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/24150 |
|
55 |
A new approach for finding duplicated words in scanned Arabic documents based on OCR and SURF |
Journal of Basrah Researches ((Sciences)) |
د. خولة حسين |
2021 |
|
|
* |
https://www.iasj.net/iasj/download/3bb9884417d158a8 |
|
56 |
Secure data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology |
Applied Sciences- MDPI |
د. زيد امين |
2021 |
* |
* |
|
https://www.mdpi.com/2076-3417/11/14/6376/pdf |
|
57 |
Password authentication scheme based on smart card and QR code |
Indonesian Journal of Electrical Engineering and Computer Science |
د. علي عادل + م. مشتاق عبد المطلب+ م. عبد الله جاسم+د. حامد |
2021 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/25153/15163 |
|
58 |
Face Recognition System Against Adversarial Attack Using Convolutional Neural Network |
Iraqi Journal for Electrical and Electronic Engineering |
د. صلاح فليح |
2021 |
|
|
* |
http://ijeee.edu.iq/Papers/Vol18-Issue1/1570765472.pdf |
|
59 |
MT Hybrid RRT-A* Regression-based: An Enhanced Path Planning Method for an Autonomous Mobile Robots |
Journal of Basrah Researches ((Sciences)) |
د. صلاح فليح+ م.م. صهيب عبد اللطيف |
2021 |
|
|
* |
https://www.iasj.net/iasj/download/86d2cbcca61b32ea |
|
60 |
Multi-keyword search over encrypted data with security proof |
Journal of Basrah Researches ((Sciences)) |
د. اياد ابراهيم |
2021 |
|
|
* |
https://www.iasj.net/iasj/article/223601 |
|
61 |
Security proof for backward searchable encryption scheme |
Journal of Basrah Researches ((Sciences)) |
د. اياد ابراهيم |
2021 |
|
|
* |
https://www.iasj.net/iasj/article/222327 |
|
62 |
Web application database protection from SQLIA using permutation encoding |
ICISS 2021: 2021 The 4th International Conference on Information Science and Systems |
د. محمد عبد الرضا +مصطفى صلاح+ د. زيد امين |
2021 |
* |
|
|
https://dl.acm.org/doi/10.1145/3459955.3460594 |
|
63 |
A novel image encryption scheme based on DCT transform and DNA sequence |
Indonesian Journal of Electrical Engineering and Computer Science |
د. علي عادل+ م. عبد الله جاسم |
2020 |
* |
|
|
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23732/0 |
|
64 |
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud |
IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC) |
زيد امين عبد الجبار+محمد عبد الرضا |
2020 |
x |
|
|
https://ieeexplore.ieee.org/document/9259519 |
|
65 |
SMART CITY SECURITY: FACE-BASED IMAGE RETRIEVAL MODEL USING GRAY LEVEL CO-OCCURRENCE MATRIX |
Journal of information and technology |
د. علي عادل ياسين+ م. عبد الله جاسم |
2020 |
x |
|
|
http://e-journal.uum.edu.my/index.php/jict/article/view/6303/2270 |
|
66 |
Role of biological Data Mining and Machine Learning Techniques in Detecting and Diagnosing the Novel Coronavirus (COVID-19): A Systematic Review |
Journal of medical science |
ايمان ثابت |
2020 |
x |
x |
|
||
67 |
Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System |
IEEE Access |
زيد امين عبد الجبار+محمد عبد الرضا |
2020 |
x |
x |
|
https://ieeexplore.ieee.org/abstract/document/9274321 |
|
68 |
SECURE SIMILAR DETECTION FOR DOCUMENTS |
Journal of Basrah Researches ((Sciences)) Vol. (46). No. 1 (2020) |
اياد ابراهيم عبد السادة |
2020 |
|
|
x |
||
69 |
Multiwavelength fiber laser employing semiconductor optical amplifier in nonlinear optical loop mirror with polarization controller and polarization maintaining fiber |
AIP Conference Proceedings |
حامد علي عبد |
2020 |
X |
|
|
https://aip.scitation.org/doi/10.1063/1.5142122 |
|
70 |
Characteristics of multiwavelength fiber laser employing semiconductor optical amplifier in nonlinear optical loop mirror with different length polarization maintaining fiber |
AIP Conference Proceedings |
حامد علي عبد |
2020 |
X |
|
|
https://aip.scitation.org/doi/10.1063/1.5142121 |
|
71 |
Enhanced Clustering Algorithm for Efficient Clustering in Wireless Sensor Network |
International Journal of |
حامد علي عبد |
2020 |
X |
|
|
||
72 |
A Critical Comparative Review of Nature-Inspired Optimization Algorithms (NIOAs) |
International Journal of Simulation -- Systems, Science & Technology |
حامد علي عبد |
2020 |
|
|
X |
DOI 10.5013/IJSSST.a.21.03.09 |
|
73 |
Classification of Groundwater Quality using Artificial Neural Networks in Safwan and Al-Zubayr in Basra |
Advances in Computer, Signals and |
حامد علي عبد |
2020 |
|
|
X |
10.23977/acss.2020.040105 |
|
74 |
Multi-factor Authentication for an Administrator's Devices in an IoT Environment |
2nd International Conference on |
عبد الله جاسم ياسين |
2020 |
X |
|
|
https://www.springerprofessional.de/multi-factor-authentication-for-an-administrator-s-devices-in-an/18834330 |
|
75 |
VPPCS: VANET-Based Privacy-Preserving Communication Scheme |
IEEE Access |
علي عادل ياسين |
2020 |
X |
X |
|
https://ieeexplore.ieee.org/abstract/document/9169647 |
|
76 |
DESIGN A LIGHTWEIGHT AUTHENTICATION SCHEME FOR WBAN IN HEALTHCARE SYSTEMS |
Journal of Basrah Researches (Sciences) |
علي عادل ياسين |
2020 |
|
|
X |
https://www.iasj.net/iasj/article/185609 |
|
77 |
Toward Awareness Locality Algorithms of Peer-to-Peer File Sharing Network |
Proceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things |
زيد امين عبد الجبار |
2020 |
X |
|
|
||
78 |
Greedy Learning of Deep Boltzmann Machine (GDBM)’s Variance and Search Algorithm for Efficient Image Retrieval |
IEEE Access |
زيد امين عبد الجبار |
2020 |
X |
X |
|
https://ieeexplore.ieee.org/abstract/document/8876847 |
|
79 |
Encoding Query Based Lightweight Algorithm for Preventing SQL injection attack |
Journal of Basrah Researches ((Sciences) |
محمد عبد الرضا حسين |
2020 |
|
|
X |
https://www.iasj.net/iasj/download/c0f4a95423736c35 |
|
80 |
Toward awareness locality algorithms of Peer-to-Peer file sharing network |
CCIOT 2020: Proceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things |
د. زيد امين |
2020 |
* |
|
|
https://dl.acm.org/doi/10.1145/3429523.3429529 |
|
81 |
Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach |
Multimedia Tools and Applications volume |
م.م. ايمان ثابت |
2020 |
* |
* |
|
https://link.springer.com/article/10.1007/s11042-020-09903-5 |
|
82 |
Hybrid RRT-A*: An Improved Path Planning Method for an Autonomous Mobile Robots |
Iraqi Journal for Electrical and Electronic Engineering |
د. صلاح فليح+ م.م. صهيب عبد اللطيف |
2020 |
|
|
* |
http://ijeee.edu.iq/Papers/Vol17-Issue1/1570715176.pdf |