Items filtered by date: كانون1/ديسمبر 2024
- منح قسم علوم الحاسوب درجة الماجستير للطالبة انسام صباح بدر علوم حاسوب/نظم المعلومات عن رسالتها الموسومة "انشاء نظام امن للتعليم الالكتروني لاحد مختبرات قسم علوم الحاسوب بالاعتماد على خوارزمية الRSA و ال ZNP. Secure E-Learnig Platform For Selected Computer Laboratory Based RSA and ZNP
يوم الاثنين ٢٠٢٠/٨/١٠ وعلى قاعة المناقشات في بناية قسم علوم الحاسوب ، تالفت لجنه المناقشة من :
ا.م.د.عبير طارق مولود رئيسا
ا.م.د.اسراء عبدالامير عبدالجبار عضوا
ا.م.د.ميثاق طالب كاطع عضوا
ا.م.د.شيماء حميد شاكر عضوا ومشرفا
ا.م.د.ميساء عبد علي عضوا ومشرفا
هدفت هذه الرسالة الى اقتراح نظام للتعلم الالكتروني لجعل كلمةمرور تسجيل دخول المستخدم سرية وكذلك المصادقة باستخدام خوارزميةRSA -OAEP واثبات المعرفة الصفرية. يتكون النظام من ثلاثة اجزاء رئيسية الجزء الاول هو تصميم وتنفيذ منصة للتعلم والجزء الثاني يركز على تحسين امن النظام اما الجزء الثالث هو مصادقة كلمة مرورتسجيل دخول المستخدمين. تم تقييم النظام المقترح من خلال الاختبارات الاحصائية التي تم استخدامها.




المصدر: اعلام القسم

Published in أخبار القسم
الأحد, 13 أيلول/سبتمبر 2020 10:52

Yossra Hussain Ali

Head of the Profile

Yossra Hussain Ali

Computer Sciences Department

Professor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Professor Dr. Yossra Hussain Ali. She received her B.Sc., M.Sc., and Ph.D. degrees in 1996, 2002, and 2006 respectively in Computer Sciences from Iraq, University of technology, department of Computer Sciences. She joined the University of Technology, Iraq in 1997. During her postgraduate studies, she worked on Computer Network, Information systems, Agent Programming, and Image Processing, she has some experience in Artificial Intelligent and Computer Data Security, She Reviewer at many conference and journals, she supervision of undergraduate and postgraduate (Ph.D. and M.Sc.) dissertations for many students in Computer sciences, she has a number of professional certificates, Yossra has published in well-regarded journals.

CV  

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Ph.D. Computer Sciences / Software University of Technology 2006
  • MSc. in computer Sciences / University of Technology / 2002.
  • BSC in Computer Sciences/ Computer Sciences Department/ University Of Technology, 1996.

  • Multimedia and Image Processing
  • Computer Data Security
  • Artificial Intelligent and Agent Programming
  • Computer Networking
  • Information Systems

  • Motion Planning Method Using Cell Decomposition with Ptri Nets, Journal of Information Technology Iraqi Vol.2,No. 1, 2008.
  • Using Generated Digital Images in Image Cryptography, Iraqi Journal for Information Technology Vol.2 No. 2, 2009.
  • Proposed Cascaded Design of 640-bit RC6 Block Cipher, First Computer Science Conference Proceedings, University of Technology, computer science department, 2010.
  • Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network, eng. & Tech. Journal, Vol. 28, No. 12, 2010.
  • Text Summarization for Social Network Conversation, IEEE, Advanced Computer Science Applications and Technologies (ACSAT), International Conference on 2014.
  • Real Time Face Recognition in Video Using Linear Discriminate Analysis and Local Binary Patterns, Eng & Tech. Journal, Vol. 33 part (B), No. 4, 2015.
  • A Survey of Similarity Measures in Web Image Search, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 4, Issue 4, 2015.
  • Images Encryption Using Chaos and Random Generation, Eng & Tech. Journal Vol 34 part (B), No. 1 , 2016.
  • Watermarking for Relational Database by using Threshold Generator, Eng. & Tech. Journal, Vol 29, No. 1, 2011.
  • Developed Method in Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography, Eng & Tech. Journal, Vol 29, No. 2, 2011.
  • Smart electronic examination System using Multi-Agent Platform, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) , Volume 3, Issue 1, January – February 2014.
  • Face Retrieval Using Image Moments and Genetic Algorithm, Eng & Tech. Journal, Vol 34 part (B), No. 1 , 2016.
  • Image Encryption Using Block Cipher Based Serpent Algorithm, Eng & Tech. Journal, Vol. 34 part (B), No. 2 , 2016.
  • Genetic –Based Face Retrieval Using Statistical Features, Ibn Al-Haitham J. for Pure & Appl. Sci., Vol.29 (1) 2016.
  • A Survey: Medical Augmented Reality, International Journal of Emerging Trends & Technology in Computer Science, (IJETTCS), Vol. 5,Issue 2, March 2016.
  • Fast and accurate registration method for MIR images, International Journal for Sciences and Technology, Amman-Jordan, IJST, Vol. 11, No. 2, June 2016.
  • Centerline Extraction: A Review, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 5, Issue 4, July 2016.
  • Speed up Eulerian Video Motion Magnification , Kurdistan Journal of Applied Research kjar.spu.edu.iq Volume 2, Issue 3, August 2017 P-ISSN: 2411-7684 – E-ISSN: 2411-7706.
  • Reflection Removal Algorithms: A Review, Research Journal of Applied Sciences, Engineering and Technology 14(9): 347-351, DOI:10.19026/rjaset.14.5075, ISSN: 2040-7459; e-ISSN: 2040-7467 Maxwell Scientific Publication Corp. Submitted: June 24, 2017.
  • Background modeling in video surveillance by using parallel computing, Iraqi Journal of Science, Vol. 58, No. 3B, pp: 1516-1522, DOI: 10.24996/ ijs.2017.58.3B.16, ISSN: 0067-2904, 2017.
  • Enhancement the Augmented Reality Framework Using Proposed Registration Method, Journal of Al-Nahrain University,Vol.20 (2), June, pp.153-161, 2017. http://jnus.org/pdf/1/2017/1/1274.pdf
  • Hiding and Encryption of Secret Image Using Secret Sharing Scheme, Iraqi Journal of Science, Vol. 57, No.4A, pp: 2502-2512 , 2016.
  • Palm Vein Recognition Based on Centerline, Iraqi Journal of Science, 2017, Vol. 58, No.2A, pp: 726-734.
  • A Proposed Registration Method Using Tracking Interest Features for Augmented Reality, Eng & Tech. Journal Vol 34 part (B), No. 6 , 2016.
  • Remove Reflection Using Wavelet transformation Estimation, Iraqi Journal of Science, Vol. 59, No.1C, pp: 629-634, DOI:10.24996/ijs.2018.59.1C.20, 2018.
  • Proposed KDBSCAN Algorithm for Clustering, Iraqi Journal of Science, Vol. 59, No.1A, pp: 173-178, DOI: 10.24996/ijs.2018.59.1A.18, ISSN: 0067-2904, 2018.
  • Heartbeat Amplification and ECG Drawing from Video (Black and White or Colored Videos), Iraqi Journal of Science, Vol. 59, No.1B, pp: 408-419 DOI: 10.24996/ijs.59.1B.21, ISSN: 0067-2904, 2018.
  • Enhancement of Principal Component Analysis using Gaussian Blur Filter, Iraqi Journal of Science, Vol. 59, No.3B, pp: 1509-1517 DOI:10.24996/ijs.59.3B.17, ISSN: 0067-2904 2018.
  • Reflections Removal Using K-Means Clustering, Journal of Al-Nahrain University, Vol.21 (3), pp.162-168, September, 2018.
  • Performance Enhancement of Image Encryption By Using BK-Cube Network Design, Journal of engineering and applied Sciences 13(18), 7708-7715, ISSN 1816-949X, Medell Journal, 2018.
  • Distributed AMELSB Replacement Method For Text Hiding, Iraqi Journal of Information Technology, Vol.: 8, No.:2, January ,2018.
  • Remove Reflections using Bisquare Iterative Reweighted Least Square, Iraqi Journal of Science, 2019, Vol. 60, No. 4, pp: 868-874.
  • Simple Approach for documents classification, Journal of College of Education for pure sciences(JCEPS) Volume 8, Number 1, March 2018.
  • Text File Hiding Randomly Using Secret Sharing Scheme, Engineering and Technology Journal, Vol. 36, Part B, No. 1, 2018.
  • Extracting Background Model in Video Surveillance, By Using Hybrid Techniques, Al-Mansour Journal/ Issue (31) 2019. 37.
  • Single Image Reflection Removal, Diyala Journal for Pure Science, Vol. 15, No. 3, ISSN: 2222-837, July 2019.
  • Fuzzy logic and Genetic Algorithm based Text Classification Twitter, 2nd Scientific Conference of Computer Sciences (SCCS), University of Technology - Iraq, 2019.
  • Remove Reflections using Motion and Clustering Techniques, 2nd Scientific Conference of Computer Sciences (SCCS), University of Technology – Iraq, 2019.
  • A Survey of Localization Systems in the Sea Based on New Categories, MAICT Conference, Journal of Physics: Conference Series 1530 (2020) 012064, IOP Publishing doi:10.1088/1742-6596/1530/1/012064, 2020.
  • Documents classification based on Deep Learning, International Journal of Scientific & Technology Research. International Journal Of Scientific & Technology Research Volume 9, Issue 02, February 2020, ISSN 2277-8616.
  • Extract the similar Images Using the Grey Level Co-Occurrence Matrix and the Hu Invariants Moments, Engineering and Technology Journal/University of Technology, Vol. 38, Part A (2020), No. 05, Pages 719-727.
  • Automatic Vehicles Detection, Classification and Counting Techniques / Survey, Iraqi Journal of Science, 2020, Vol. 61, No. 7, pp: 1811-1822, DOI: 10.24996/ijs.2020.61.7.30, ISSN: 0067-2904, Received: 20/1/2020 Accepted: 15/3/2020.
  • Heart Rate Measurement and Blood Pressure level Detection from (Black and White or Colored) Videos, Al-Mansour Journal/ Issue (33) 2020.
  • Clustering and Analysis of Dynamic Ad Hoc Network Nodes Movement Based on FCM Algorithm, International Journal of Online and Biomedical Engineering (iJOE) – eISSN: 2626-8493, iJOE ‒ Vol. 16, No. 12, 2020.
  • Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors, International Journal of Intelligent Engineering and Systems (IJIES), Vol.14, No.1, 2021 DOI: 10.22266/ijies2021.0228.28.
  • Similar Image Retrieval Based on Grey Level Co-Occurrence Matrix and the Hu Invariants Moments Using Parallel Computing, Advances in Intelligent Systems and Computing, pp 141-155
  • Real Time Heart Rate Measurement and Heart Wave Drawing (ECG) Using Webcam, Yossra Hussain, Ahmed A. Shkara, Al Mansour Journal/ Issue (34) 2020
  • Classifying Texts of Twitter Data Using a Modified Fuzzy Logic Method, Yossra H. Ali, Nuha J. Ibrahim, Mohammed A. Jaleel, Al-Mansour Journal/ Issue (34) 2020
  • Review on Real Time Background Extraction: Models, Applications, Environments, Challenges and Evaluation Approaches, International Journal of Online and Biomedical Engineering (iJOE),ISSN 2626-8493, Vol. 17, No. 02, 2021,PP 37-68.
  • A Survey of Positioning Systems for Ships Based on New Categories, DeSE2020.
  • Vehicles Detection System at Different Weather Conditions, Iraqi Journal of Science, 2021, Vol. 62, No. 6, pp: 2040-2052
  • Survey of Latest Techniques in Medical Image Classification Wid A. Hassan;Yossra H. Ali;Nuha J. Ibrahim Publication: 2021 International Conference on Communication & Information Technology (ICICT), IEEE,Year: 2021, Page(s):68 – 73
  • An Automated Task Scheduling Model Using a Multi-Objective Improved Cuckoo Optimization Algorithm, International Journal of Intelligent Engineering and Systems, Vol.15, No.1, 2022 DOI: 10.22266/ijies2022.0228.27 p 295-304., ISSN: 2185-3118
  • Intelligent Image Enhancement System based on Similarity Pixels, Webology, ISSN: 1735-188x, Volume 19, Number 1, January, 2022 , p 1731-1749
  • Localization Technique Model of Ships Ad Hoc Network (SANET) Using Geographic's Database and Clustering Analysis, International Journal of Online and Biomedical Engineering (iJOE), ISSN 2626-8493, vol 18,No. 06,2022
  • Brain Tumours Classification using Support Vector Machines Based on Feature Selection by Binary Cat Swarm Optimization, TIoTC 2021 - Track 3: IOT in Healthcare Industry
  • Text image secret sharing with hiding based on color feature, Periodicals of Engineering and Natural Sciences, Vol. 10, No. 2, April 2022, pp.358-375
  • Deep learning model for cyber-attacks detection method in wireless sensor networks, Periodicals of Engineering and Natural Sciences, Vol. 10, No. 2, April 2022, pp.251-259
  • Hybrid Swarm Optimization based on Chicken and Bat for Task Scheduling in Cloud Computing, NeuroQuantology | April 2022 | Volume 20 | Issue 4 | Page 262-270 | doi: 10.14704/nq.2022.20.4.NQ22117
  • Comparative Analysis of GMM, KNN, and ViBe Background Subtraction Algorithms Applied Dynamic Scenes of Video Surveillance System, Engineering and Technology Journal 40 (04) (2022) 617-626
  • Hybrid Swarm Optimization based on Chicken and Bat for Task Scheduling in Cloud Computing, NeuroQuantology | April 2022 | Volume 20 | Issue 4 | Page 262-270 | doi: 10.14704/nq.2022.20.4.NQ22117
  • Study of Cyber Security Effects on Wireless Sensors Networks, Shaymaa Mahmood Naser, Yossra Hussain Ali Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 4, December 2021. DOI:
  • Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity Maryam A. Yasir, Yossra Hussain Ali, International Journal of Online and Biomedical Engineering (iJOE)VOL. 18 NO. 09 (2022).
  • Hybrid Cyber-Security Model for Attacks Detection Based on Deep and Machine Learning, Shaymaa Mahmood Naser, Yossra Hussain Ali and Dhiya Al-Jumeily , International Journal of Online and Biomedical Engineering iJOE ‒ Vol. 18, No. 11, 2022.
  • Task Scheduling in Cloud Computing Based on The Cuckoo Search Algorithm, Sajjad Jaber, Yossra Ali, Nuha Ibrahim Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 22, No. 1, March 2022.
  • An Efficient Hybrid Classification Approach for COVID-19 Based on Harris Hawks Optimization and Salp Swarm Optimization, International Journal of Online and Biomedical Engineering iJOE ‒ Vol. 18, No. 13, 2022 Abubakr S. Issa, Yossra Hussain Ali, Tarik A. Rashid. Article submitted 2022-06-11. Resubmitted 2022-08-11. Final acceptance 2022-08-11. Final version published as submitted by the authors.
  • Comparative Analysis of Background Subtraction Models Applied on a Local Dataset Using a New Approach for Ground-truth Generation, International Journal of Recent Contributions from Engineering, Science & IT (iJES) – eISSN: 2197-8581 ‒ Vol. 10, No. 03, 2022, Maryam A. Yasir, Yossra Hussain Ali.
  • Systematic Review of Cyber-Security Applications, Shaymaa Mahmood Naser, Yossra Hussain Ali, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 22, No. 4, December 2022.
  • Multi-Layered Non-Local Bayes Model for Lung Cancer Early Diagnosis Prediction with the Internet of Medical Things, Bioengineering 2023, 10(2), 138; Yossra Hussain Ali, Seelammal Chinnaperumal, Raja Marappan, Sekar Kidambi Raju, Ahmed T. Sadiq, Alaa K. Farhan and Palanivel Srinivasan Bioengineering 2023, 10(2), 138.
  • Optimization System Based on Convolutional Neural Network and Internet of Medical Things for Early Diagnosis of Lung Cancer, Bioengineering 2023, 10, 320.
  • Perspectives on the Impact of E-Learning Pre- and Post-COVID-19 Pandemic—The Case of the Kurdistan Region of Iraq, Sustainability 2023, 15, 4400. https://doi.org/10.3390/su15054400 Dler O. Hasan , Aso M. Aladdin, Azad Arif Hama Amin, Tarik A. Rashid, Yossra H. Ali, Mahmood Al-Bahri, Jafar Majidpour , Ioan Batrancea, and Ema Speranta Masca.
  • Comparative Analysis of Swarm Algorithms to Classification of covid19 on X-Rays, Abubakr S. Issa, Yossra H. Ali and Tarik A. Rashid, 2022 International Conference on Data Science and Intelligent Computing (ICDSIC), Publisher: IEEE, march 2023.
  • New Approach of Generating Ground-Truth for Local Surveillance Dataset Tested with Benchmark Background Subtraction Models, Maryam A. Yasir and Yossra H. Ali , Iraqi Journal of Science, ISSN: 0067-2904, 2023, Vol. 64, No. 4, pp: 2037-2050, DOI: 10.24996/ijs.2023.64.4.38.


˙ Supervising a 4th-year student's Projects, 2002-till now.
˙ Sharing in theoretical and practical teaching lecture, 2002- till now.
˙ Supervised on M.Sc. and Ph.D. students in computer sciences, 2011-till now.
˙ M.Sc., Students University of technology, computer sciences Dept.- Parallel Programming, Computer Networks, E-Technique,
˙ Ph.D., Students University of technology, Computer Sciences Dept.- Information Technology, Cloud Computing, Data Compression.
˙ 1st year class University of Technology, computer sciences Dept. - Pascal and c languages, 1998- 2003.
˙ 3rd year class – University of Technology, Computer sciences Dept.-Algorithm Complexity, 2004.
˙ 3rd year class – University of Technology, Computer sciences Dept. - Compiler Design, 2005-2010.
˙ 4th year class – University of Technology, Computer sciences Dept. , Operating System, 2012.
˙ 3rd year class – University of Technology, Computer sciences Dept. - Software Engineering, 2010-2013.
˙ 1st year class – University of Technology, Computer sciences Dept.- Structured Programming c++ and Visual basics, 2014-2017.
˙ 4th year class – University of Technology, Computer sciences Dept. , Window Programming, 2017- to till now.
˙ 1st year class – University of Technology, Computer sciences Dept. -Fundamental of Programming Design, 2017- to till now.
˙ 1st year class – University of Technology, Computer sciences Dept. - Software Development, 2017 to till now.
˙ 4th year class University of Technology, Computer science Dept. Cloud Computing, 2020.
Published in cv
الأحد, 13 أيلول/سبتمبر 2020 10:35

Yasir M. smaeel

Head of the Profile

Yasir M. smaeel

Computer Sciences Department

Lecturer

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Yasir M. Ismaeel is a faculty member in the Department of computer science at the University of Technology (UOT) since 2005. Yasir was the decision maker for Information System branch from 2008 to 2015, then he became the decision maker of the department from 2015. Yasir M. Ismaeel earned his MSc in computer science, from the Information Institute for Postgraduate Studies in 2001 Yasir interested in database systems design and programming, he designed three computerized systems: Examination comity system , Student registration system , Student absent system
• Member of Database Comity at the University of Technology 2010-2012
• Team Work member to prepare and teaching an Oracle database training course to the Ministry of Interior, 2013

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • MSc, Computer Science, Information Institute for Postgraduate Studies, 2001.
  • BSc, Computer Science, Al-Mansour University College, 1993.

  • One published paper in the first computer science conference at the university of technology – computer science department 2010 )A Proposed Algorithm for Image Hiding Using 3D Geometrical Object)
  • One shared paper at Engineering and Technology Journal/ University of Technology 2011 With Dr. Emad k. Jbbar (Proposed Algorithm for Extracting Association Rule Depend on Closed Frequent Item set)

  • Computer graphics 2006 - 2010 university of technology – computer science department
  • Database fundamentals 2010-2020 university of technology – computer science department
  • Database design 2010-2020 university of technology – computer science department

  • Nine thank letters from the head of the department
  • Three thanks certificate from the head of the department
  • Twelve thank letters from the university chancellor
  • Three thank letter from the ministry of higher education and scientific research
Published in cv
الأحد, 13 أيلول/سبتمبر 2020 10:06

Nidaa Flaih Hassan

Head of the Profile

Nidaa Flaih Hassan

Computer Sciences Department

Assistants Professor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Nidaa Flaih Hassan earned her BSc. in 1988, MSc. in 2006 and Ph.D. in 2005 from Computer Science Department at University of Technology-Iraq. Nidaa is a faculty member in the Computer Science Department at University of Technology-Iraq since 1988; she dedicated to educate BSC. MSc. and PhD. students with research emphasis on multimedia security and compression. Her experience includes teaching, research and contributed to the preparation and development of study plans for the sections of Computer Science Department .

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Assistance Professor / Computer Security / University of Technology- Iraq / 2005

  • Data Security ( Information Hiding and Cryptography )
  • Multimedia Security
  • Network Security
  • Image Processing
  • Data Compression

  • Suggested Coding Procedure as Preprocessing Operation before Encrypted Database Vol. 29, No. 4, (2020), pp. 2330 – 2340
  • Suggested Coding Procedure as Preprocessing Operation before Encrypted Database Vol. 29, No. 4, (2020), pp. 2330 – 2340
  • Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning Vol. 20, No. 3, December 2020, pp. 1413~1418 ISSN: 2502-4752
  • Structured Programming Languages Visual Programming Languages Operating Software Engineering Computer Organization Microprocessors and Assembly Languages. Image Processing.
  • Computer Vision and Image Processing Multimedia and Data Compression Web Engineering Parallel Computer Architecture

  • Structured Programming Languages Visual Programming Languages Operating Software Engineering Computer Organization Microprocessors and Assembly Languages. Image Processing.
  • Computer Vision and Image Processing Multimedia and Data Compression Web Engineering Parallel Computer Architecture


    • A certificate of appreciation from Head University of Technology-Iraq of for the contribution to the symposium: the pioneering role of women in community service in
    • Thanks and appreciation Head University of Technology-Iraq of for the membership in university promotion committee in December 2, 2018.
    • Thank for outstanding service as a reviewer for the Second Conference of Computer Sciences 2019 (SCCS 2019) in April 27, 2019.
    • Thanks from Head of collage of science /University of Bagdad for membership in Discussion master thesis committee in May, 4, 2019.
    • Thank you for completing reviewing research from Iraqi Journal of Science (IJS) in May 18 , 2020.
Published in cv
الأحد, 13 أيلول/سبتمبر 2020 09:48

Ekhlas khalaf Gbashi

Head of the Profile

Ekhlas khalaf Gbashi

Computer Sciences Department

Lecturer-assist prof

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Dr.Ekhlas Khalaf Gbashi earned her Ph.D. in networks security from the Department of computer sciences at the Technology University. Ekhlas earned her bachelor’s and master’s degree in computer sciences from the University of Technology (UOT), Baghdad, Iraq in 1998, 2005. Ekhlas is a faculty member in the computer sciences Department at the University of Technology (UOT) since 2000; where she became Head of registration unit in computer sciences department at 2010 and a Head of computer security Branch at the UOT from 2016 until 2020. Her research interested focus on in networks security (intrusion detection system), data security, computer networks, Educational Assessment, Comparative Education and Computer Architecture, image processing,AI

CV  

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus


˙ PhD, networks security, university of technology, Iraq, 2015.
˙ Msc, computer sciences, University of Technology, 2005.
˙ Bsc, computer sciences, University of Technology, 1998.


˙ Data and computer security
˙ communications and Computer netwokrs
˙ intrusion detection system
˙ Image processing
˙ Information system

  • 1- Proposed vision for Network Intrusion Detection System Using Latent Semantic Analysis and Data Mining", Ikhlas K. Gbashi¹ Dr. Soukaena H. Hashem¹ Dr. Saad K. Majeed,2014 6th computer science and electronic engineering conference(CEEC),university of Essex,UK,2014.
  • 2- Improvement Personalization of Website Using Database and Cookies",Ekhlas Khalaf Gbashi. Eng. & Tech. Journal, Vol. 28 , No. 8, 2010.
  • 3- "proposal to WNIDS wireless network Intusion detection system",Ikhlas Khalaf Gbashi,Dr.Soukaena Hassan Hashim,Dr.Saad kadhim majeed, Volume : 2 | Issue : 10 | October 2013 • ISSN No 2277 – 8179.
  • 4- " Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System", Dr. Saad K. Majeed¹ Dr. Soukaena H. Hashem¹ Ikhlas K. Gbashi, CSI International Journal of Computer Science Issues, Vol. 10, Issue 5, No 2, September 2013.
  • 5- "Generate Cryptographic key using generated 3D- Digital Image", Dr.Hala B. Abdul Wahab*, Dr.Suhad M. Kadhum* & Ekhlas K. Gbashi, Eng. & Tech. Journal ,Vol.27, No.2,2009.
  • 6- " A Proposed System for Sound Retrieval Using MAS and ANN",Dr.Abeer Tariq,Ikhlas Khalaf,Shatha Habeeb, Eng. & Tech. Journal, Vol.30 , No.14, 2012.
  • 7- " Wired/wireless intrusion detection system Using heuristic based principle component analysis", Ekhlas K. Gbashi, Saad K. Majeed, Soukaena H. Hashem,and Sufian Yousef,the faculty of science &Technology 4th Annual Research and Scholarship Conference ,14th May 2014,Anglia Ruskin University ,United Kingdom,2014.
  • 8- "Modify frequent item set discovery in huge data set",Ekhlas khalaf Gbashi,computer science Dept. Conference,2010.
  • 9- "IMPORTANT PARAMETERS ANALYSIS OF THE SINGLE-WALLED CARBON NANOTUBES COMPOSITE MATERIALS", Fareq Malek; Yaseen Naser Jurn; Sawsen Abdulahadi Mahmood; Wei-Wen Liu; Ekhlas Khalaf Gbashi, MALAYSIAN TECHNICAL UNIVERSITIES CONFERENCE ON ENGINEERING AND TECHNOLOGY 2015 (MUCET 2015).
  • 10- Text Compression & Encryption Method Based on RNA and MTF”,Dr.Ekhlas Khalaf Gbashi,computer science dept., university of technology,Iraq Journal of science(IJS),university of Baghdad,VOL 58,ISSUE (2C),2017.
  • 11- Proposed secret encoding method based genetic algorithm for elliptic curve cryptography method”,Dr.Ekhlas Khalaf Gbashi,computer science dept., university of technology,Iraqi associatation of information technology,2017.
  • 12- “ “Region of interest detection using scale invariant feature transform”,Dr.Ekhlas Khalaf Gbashi,Suha mohammed Saleh,journal of of college of education,
  • 14- “Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor”,Ekhlas Khalaf Gbashi,Suha Mohammed Saleh,Vol.14(3)2017,Baghdad Science Journal,2017.
  • 15- Survey of Scale -invariant Feature Transform Algorithm”, Ekhlas Khalaf Gbashi, Suha Mohammed Saleh, Iraqi Journal of Science, 2017, Vol. 58, No.1B, pp: 292-301, 2017.
  • 16- “Spam Classification Using MOEA/D”, Rand Ahmad Atta*, Soukaena H. Hashem,Ekhlas Khalaf Gbashi, Al-Nahrain Journal of Science , Vol.21 (4), December, 2018, pp.109-118 ,2018.
  • 17- “Spam Classification Using Genetic Algorithm “, Rand Ahmad Atta, Dr. Soukaena H. hashem Dr.Ekhlas Khalaf Gbashi, Iraqi Journal of Information Technology. V.9 N.2. 2018.

  • Parallel Computer Architecture 2016/2017
  • Web Applications Development 2018/2019
  • cloud cryptography & security 2019/2020
  • Network Security 2016/2017
  • Information technology Introduction to computer networks HTL language 2010-2015
  • Communications and computer networks Cyber security 2015-2020

  • many awards from minister of higher education and scientific research
  • many Awards from head of university of technology
  • Many awards from head of computer science department
Published in cv
Top