Ekhlas khalaf Gbashi

Ekhlas khalaf Gbashi
Computer Sciences Department
Lecturer-assist prof
This email address is being protected from spambots. You need JavaScript enabled to view it.
Dr.Ekhlas Khalaf Gbashi earned her Ph.D. in networks security from the Department of computer sciences at the Technology University. Ekhlas earned her bachelor’s and master’s degree in computer sciences from the University of Technology (UOT), Baghdad, Iraq in 1998, 2005. Ekhlas is a faculty member in the computer sciences Department at the University of Technology (UOT) since 2000; where she became Head of registration unit in computer sciences department at 2010 and a Head of computer security Branch at the UOT from 2016 until 2020. Her research interested focus on in networks security (intrusion detection system), data security, computer networks, Educational Assessment, Comparative Education and Computer Architecture, image processing,AI
˙ PhD, networks security, university of technology, Iraq, 2015.
˙ Msc, computer sciences, University of Technology, 2005.
˙ Bsc, computer sciences, University of Technology, 1998.
˙ Data and computer security
˙ communications and Computer netwokrs
˙ intrusion detection system
˙ Image processing
˙ Information system
- 1- Proposed vision for Network Intrusion Detection System Using Latent Semantic Analysis and Data Mining", Ikhlas K. Gbashi¹ Dr. Soukaena H. Hashem¹ Dr. Saad K. Majeed,2014 6th computer science and electronic engineering conference(CEEC),university of Essex,UK,2014.
- 2- Improvement Personalization of Website Using Database and Cookies",Ekhlas Khalaf Gbashi. Eng. & Tech. Journal, Vol. 28 , No. 8, 2010.
- 3- "proposal to WNIDS wireless network Intusion detection system",Ikhlas Khalaf Gbashi,Dr.Soukaena Hassan Hashim,Dr.Saad kadhim majeed, Volume : 2 | Issue : 10 | October 2013 • ISSN No 2277 – 8179.
- 4- " Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System", Dr. Saad K. Majeed¹ Dr. Soukaena H. Hashem¹ Ikhlas K. Gbashi, CSI International Journal of Computer Science Issues, Vol. 10, Issue 5, No 2, September 2013.
- 5- "Generate Cryptographic key using generated 3D- Digital Image", Dr.Hala B. Abdul Wahab*, Dr.Suhad M. Kadhum* & Ekhlas K. Gbashi, Eng. & Tech. Journal ,Vol.27, No.2,2009.
- 6- " A Proposed System for Sound Retrieval Using MAS and ANN",Dr.Abeer Tariq,Ikhlas Khalaf,Shatha Habeeb, Eng. & Tech. Journal, Vol.30 , No.14, 2012.
- 7- " Wired/wireless intrusion detection system Using heuristic based principle component analysis", Ekhlas K. Gbashi, Saad K. Majeed, Soukaena H. Hashem,and Sufian Yousef,the faculty of science &Technology 4th Annual Research and Scholarship Conference ,14th May 2014,Anglia Ruskin University ,United Kingdom,2014.
- 8- "Modify frequent item set discovery in huge data set",Ekhlas khalaf Gbashi,computer science Dept. Conference,2010.
- 9- "IMPORTANT PARAMETERS ANALYSIS OF THE SINGLE-WALLED CARBON NANOTUBES COMPOSITE MATERIALS", Fareq Malek; Yaseen Naser Jurn; Sawsen Abdulahadi Mahmood; Wei-Wen Liu; Ekhlas Khalaf Gbashi, MALAYSIAN TECHNICAL UNIVERSITIES CONFERENCE ON ENGINEERING AND TECHNOLOGY 2015 (MUCET 2015).
- 10- Text Compression & Encryption Method Based on RNA and MTF”,Dr.Ekhlas Khalaf Gbashi,computer science dept., university of technology,Iraq Journal of science(IJS),university of Baghdad,VOL 58,ISSUE (2C),2017.
- 11- Proposed secret encoding method based genetic algorithm for elliptic curve cryptography method”,Dr.Ekhlas Khalaf Gbashi,computer science dept., university of technology,Iraqi associatation of information technology,2017.
- 12- “ “Region of interest detection using scale invariant feature transform”,Dr.Ekhlas Khalaf Gbashi,Suha mohammed Saleh,journal of of college of education,
- 14- “Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor”,Ekhlas Khalaf Gbashi,Suha Mohammed Saleh,Vol.14(3)2017,Baghdad Science Journal,2017.
- 15- Survey of Scale -invariant Feature Transform Algorithm”, Ekhlas Khalaf Gbashi, Suha Mohammed Saleh, Iraqi Journal of Science, 2017, Vol. 58, No.1B, pp: 292-301, 2017.
- 16- “Spam Classification Using MOEA/D”, Rand Ahmad Atta*, Soukaena H. Hashem,Ekhlas Khalaf Gbashi, Al-Nahrain Journal of Science , Vol.21 (4), December, 2018, pp.109-118 ,2018.
- 17- “Spam Classification Using Genetic Algorithm “, Rand Ahmad Atta, Dr. Soukaena H. hashem Dr.Ekhlas Khalaf Gbashi, Iraqi Journal of Information Technology. V.9 N.2. 2018.
- Parallel Computer Architecture 2016/2017
- Web Applications Development 2018/2019
- cloud cryptography & security 2019/2020
- Network Security 2016/2017
- Information technology Introduction to computer networks HTL language 2010-2015
- Communications and computer networks Cyber security 2015-2020
- many awards from minister of higher education and scientific research
- many Awards from head of university of technology
- Many awards from head of computer science department
Abeer Tariq MaoLood

Abeer Tariq MaoLood
Computer Sciences Department
Assistant Professor
This email address is being protected from spambots. You need JavaScript enabled to view it.
Assist. Prof. Dr. Abeer Tariq Maolood received theMSc. and PhD. in Computer Science from University of Technology, Iraq, 2005 and 2010 respectively. She has around 15 years of teaching experience. Her areas of interest's computer and network security, neural networks and web applications security.
- BSc.-Computer science- University of Technology-1997/1998
- MSc.-Computer science- University of Technology-2005/2006
- PhD.- Computer and Data Security- University of Technology-2009/2010
˙ Cyber security
˙ Neural Networks/Deep Learning
˙ Ethical Hacking-Web Apps. And Web Apps. Security
˙ Network Security /Cloud Computing security
- E-commerce: Security Enhancement In Internet Banking
- Improving Diffie-Hellman Key Exchange Using Irreducible Polynomials
- Propose System for Sound Retrieval Using MAS and ANN
- A new approach for hiding data within executable computer program files using an improvement cover
- Improving Laboratories Efficiency through Website Using Text Mining
- SMSCC: Smarter and More Secure Credit Card Using Neural Networks in Zero Knowledge protocol
- PROPOSAL TO ENHANCE FINGERPRINT RECOGNITION SYSTEM
- Enhance Criminal Investigation by Proposed Fingerprint Recognition System
- The Future for Adaptive Software Development in Cloud Computing Environment Using Multi Agent System
- MSOM: Modified Self Organizing Map for Faster Winning Cluster Detection
- Improve Image Retrieval using Modified Fuzzy color& texture Histogram
- Propose more efficient e- commerce website for searching and purchasing
- Modifying Advanced Encryption Standard (AES) Algorithm
- “ Signature-based and Supervised Learning to Improve Data Loss Protection ”
- E-commerce Transactions of Behaviors Anomaly Detection System
- An Effective Preprocessing Step Algorithm in Text Mining Application
- Best approximate of vector space model by using SVD
- A Fuzzy approach based for documents datasets clustering
- “Proposed Method to Enhance Text Document Clustering Using Improved Fuzzy C Mean Algorithm with Named Entity Tag “
- Performance Evaluation of the Electromagnetic Behavior of the Bundle SWCNTs with Circular Geometry
- Enhancing supervised detection using decision tree and decision table
- Proposed Data Loss Protection in Electronic health record
- User behaviors attributes of database anomaly detection model
- Towards Generating Robust Key Based on Neural Networks and Chaos Theory
- Towards Generating a New Strong key for AES Encryption Method Depending on 2D Henon Map
- Network Anomaly Detection Using Unsupervised Machine Learning: Comparative Study
- Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder
- Determining of Robust Factors for Detecting IoT Attacks
- Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning
- Design the Modified Multi Practical Swarm Optimization to Enhance Fraud Detection
- Machine Learning-Based Detection of Credit Card Fraud: A Comparative Study
- Banking Intrusion Detection Systems based on customers behavior using Machine Learning algorithms: Comprehensive study
- Improve The Support Vector Machine Using Modified Practical Swarm Optimization to Enhance Fraud Detection
- Credit card Anomaly detection using improved deep Auto encoder algorithm
- Adaptive Algorithms/5 Years University of Technology
- Compiler Design/10 years University of Technology
- Computer and Data Security/1 year University of Technology
- Computation Theory/4 year University of Technology
- Adaptive Algorithms/5 Years University of Technology
- Compiler Design/10 years University of Technology
- Computer and Data Security/1 year University of Technology
- Computation Theory/4 year University of Technology
- Ethical Hacking/1 year University of Technology
- E-Techniques/MSc./5 Years University of Technology
- Intrusion Detection/MSc./1 Year University of Technology
- IT Security/MSc. 1 Year University of Technology
- Cloud Cryptography/1 Year University of Technology
- Business Process and development systems/2 Years University of Technology
- Women’s day award 2017/ University of Technology
- Award in 2nd computer science conference,2019
Nuha Jameel Ibrahim

Nuha Jameel Ibrahim
Computer Sciences Department
Lecturer
This email address is being protected from spambots. You need JavaScript enabled to view it.
Nuha Jameel Ibrahim earned her Ph.D. in Computer Science from the Department of computer science at the University of Technology-Iraq. Nuha earned her bachelor’s degree in computer science from the University of Technology, Baghdad, Iraq in 2006 , master’s degree in computer science from the University of Technology, Baghdad, Iraq in 2008, and Ph.D. of philosophy in computer science in Department of Computer Science of University of Technology, Baghdad- Iraq in 2015. Nuha is a faculty member in the Department of computer science at the University of Technology since 2008; where she became a manager of Graduate Studies between 2009-2013, she became a Head of Multimedia branch in computer science department at the University of Technology between 2017-2020. Her research interested focus on multimedia image processing, Pattern recognition , audio , video, security and artificial intelligent.
˙ 2006 B.Sc. in computer science in Department of Computer Science of University of Technology, Baghdad-Iraq.
˙ 2008 M.Sc. in computer science in Department of Computer Science of University of Technology, Baghdad-Iraq.
˙ 2015 Ph.D. of philosophy in computer science in Department of Computer Science of University of Technology, Baghdad- Iraq.
- Multimedia
- Image processing
- Pattern recognition
- computer security
- artificial intelligent
- 1. video image for security system by using chaotic oscillator, nuha jameel dr.emad kadum, 2009/1/22, Journal eng& tech journal, Volume 27 Issue 6
- 2. Foreground detection by using multi features Dr. Emad Kadum Jabbar, Dr. Ahmed Tariq Sadiq, Nuha Jameel Ibrahim ,IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. X (Mar-Apr. 2014)
- 3. Mining Sophisticated Patterns and Actionable Knowledge from Massive Moving Object Data, Nuha Jameel Al-Zubedy, Ahmed Tariq Saadiq, Emad Kadum Jabbar, Journal of Advanced Computer Science and Technology Research, Vol.8, No 1, March 2018, 11 - 35
- 4. Fuzzy logic and Genetic Algorithm based Text Classification Twitter, Mohammed Abdul-Jaleel, Yossra Hussain Ali, Nuha Jameel Ibrahim, Conference: 2019 2nd Scientific Conference of Computer Sciences (SCCS), At: Baghdad, Iraq, March 2019
- 5. SUBSTITUTION-SHIFTING-FOLDING CIPHER ALGORITHM WITH DYNAMIC SYMMETRIC ENCRYPTION KEY, Nuha Jameel Ibrahim1, Farah Tawfiq
- 6. Engineering and Technology Journal Extract the Similar Images Using the Grey Level Co- Occurrence Matrix and the Hu Invariants Moments, Beshaier A. Abdulla , Yossra H. Ali , Nuha J. Ibrahim,Engineering and Technology Journal , Vol. 38, Part A (2020), No. 05, Pages 719-727
1. 3rd year class – University of Technology, Computer science Dept.- compiler design, 2010.
2. 2nd year class – University of Technology, Computer science Dept. – artificial Intelligence , 2011.
3. 2nd year class – University of Technology, Computer science Dept. – computation theory, 2011-2014.
4. 1st year class – University of Technology, Computer science Dept. – structure programming, 2015,2016.
5. 1st year class – University of Technology, Computer science Dept. – coding techniques, 2017-2020.
6. 1st year class – University of Technology, Computer science Dept. – probability theory, 2017.
7. 3rd year class – University of Technology, Computer science Dept.- data security, 2018.
8. 4th year class – University of Technology, Computer science Dept.- cloud computing security, 2019.
9. 1st year class – University of Technology, Computer science Dept. – computer skills, 2020.
10. Responsible for visual basic laboratory.
11. Supervising a 4th year student reports from 2009-till now.
12. Supervised on M.Sc. students in computer science, 2018-till now.
Ayad Rodhan Abbas

Assist. Prof. Dr. Ayad Rodhan Abbas
Computer Sciences Department
Assistant Professor
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prof. Dr. Ayad Rodhan Abbas, Date of Birth: 16-10- 1973 Professor Dr. in Computer Science Department/ University of Technology. E-Mail: This email address is being protected from spambots. You need JavaScript enabled to view it., I have a PH.D., in Artificial Intelligent, from Wuhan University, School of Computer Science, China, 2009, M.SC., in Computer Science, from University of Technology, Computer Science Department, Iraq, 2005, B.Sc., in Computer Science, from University of Technology, Computer Science Department, Iraq, 2003, and B.Sc., in Chemical Engineering, from University of Baghdad, in Chemical Engineering Department, Iraq, 1999
- PH.D., Artificial Intelligent, Wuhan University, School of Computer Science, China, 2009
- M.SC., Computer Science, University of Technology, Computer Science Department, Iraq, 2005
- B.S., Computer Science, University of Technology, Computer Science Department, Iraq, 2003
- B.S., Chemical Engineering, University of Baghdad, Chemical Engineering Department, Iraq, 1999
- Artificial Intelligent
- Machine learning
- Natural Language Processing
- Deep Learning
- Data mining
- Web mining
- Information retrieval
- Soft Computing
- E-learning
- E-Commerce
- Recommended System
- 1. Abbas, A.R.; Abbas, A.R.; Mahdi, B.S.; Fadhil, O.Y. Breast and Lung Anticancer Peptides Classification Using N-Grams and Ensemble Learning Techniques. Big Data Cogn. Comput. 2022, doi:10.3390/bdcc6020040.
- 2. Aliwy, A.H.; Abbas, A.R.; Hadi, M.J. Key Challenges and Proposed Solutions to Design Sentiment Analysis System. 2022.
- 3. Hadi, W.J.; Kadhem, S.M.; Abbas, A.R. Fast Discrimination of Fake Video Manipulation. Int. J. Electr. Comput. Eng. 2022, 12.
- 4. Hadi, W.J.; Kadhem, S.M.; Abbas, A.R. Unmasking Deepfakes by Fusing Rich Features from Two-Stream CNN Model. Basrah J. Sci. 2022, 40, 486–496.
- 5. Jameel, W.J.; Kadhem, S.M.; Abbas, A.R. Detecting Deepfakes with Deep Learning and Gabor Filters. {ARO}-{THE} {SCIENTIFIC} {JOURNAL} {OF} {KOYA} {UNIVERSITY} 2022, 10, 18–22, doi:10.14500/aro.10917.
- 6. Lateef, R.A.; Abbas, A.R. Tuning the Hyperparameters of the 1D CNN Model to Improve the Performance of Human Activity Recognition. Eng. Technol. J. 2022, 40, 547–554.
- 7. Lateef, R.A.; Abbas, A.R. Human Activity Recognition Using Smartwatch and Smartphone: A Review on Methods, Applications, and Challenges. Iraqi J. Sci. 2022, 363–379.
- 8. Shaker, D.R.; Abbas, A.R. Foreign Object Debris Material Recognition Based on Ensemble Learning Algorithm. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing, 2022; Vol. 2322, p. 12091.
- 9. Abbas, A.R.; Aliwy, A.; Abbas, A.; Alkhayyat, A. NERWS: Towards Improving Information Retrieval of Digital Library Management System Using Named Entity Recognition and Word Sense. Big Data Cogn. Comput. 2021, doi:10.3390/bdcc5040059.
- 10. Abbas, A.R.; Nahma, D.R. A Study about Patient Opinion Mining on Drug Reviews. J. Al-Ma’moon Coll. 2021.
- 11. Abd, D.H.; Abbas, A.R.; Sadiq, A.T.; Alatabi, H.A.; Abbas, A.R.; Farooq, A.O.; Kareem, A.R. Analyzing Sentiment System to Specify Polarity by Lexicon-Based. Iraqi J. Sci. 2021, 10, 283–289.
- 12. Hussein, N.K.; Abbas, A.R.; Mahdi, B.S. Fraud Classification and Detection Model Using Different Machine Learning Algorithm. Tech-Knowledge 2021, 1, 13–22.
- 13. Abbas, A.R.; Sadiq, A.T.; Abd, D.H. PAAD: POLITICAL ARABIC ARTICLES DATASET FOR AUTOMATIC TEXT CATEGORIZATION. Iraqi J. Comput. Informatics 2020, 46, 1–11.
- 14. Abd, D.H.; Sadiq, A.T.; Abbas, A.R. Political Arabic Articles Classification Based on Machine Learning and Hybrid Vector. CITISIA 2020 - IEEE Conf. Innov. Technol. Intell. Syst. Ind. Appl. Proc. 2020.
- 15. Alatabi, H.A.; Abbas, A.R. Sentiment Analysis in Social Media Using Machine Learning Techniques. Iraqi J. Sci. 2020, 193–201.
- 16. Nahma, D.R.; Abbas, A.R. Patient Opinion Mining: Analysis of Patient Drugs Satisfaction Using Support Vector Machine and Logistic Regression Algorithm. J. Madenat Alelem Univ. Coll. 2020, 12, 164–171.
- 17. Qader, S.A.; Abbas, A.R. Dual-Stage Social Friend Recommendation System Based on User Interests. Iraqi J. Sci. 2020, 1759–1772.
- 18. Abbas, A.R.; Farooq, A.O. Skin Detection Using Improved ID3 Algorithm. Iraqi J. Sci. 2019, 402–410.
- 19. Abd, D.H.; Sadiq, A.T.; Abbas, A.R. Classifying Political Arabic Articles Using Support Vector Machine with Different Feature Extraction. In Proceedings of the International Conference on Applied Computing to Support Industry: Innovation and Technology; Springer, Cham, 2019; pp. 79–94.
- 20. Abd, D.H.; Sadiq, A.T.; Abbas, A.R. Political Articles Categorization Based on Different Naïve Bayes Models. In Proceedings of the International Conference on Applied Computing to Support Industry: Innovation and Technology; Springer, Cham, 2019; pp. 286–301.
- 21. Qader, S.A.; Abbas, A.R. Survey of User to User Recommendation System in Online Social Networks. Eng. Technol. J. 2019, 37, 422–428.
- 22. Abbas, A.R.; Farooq, A.O. Human Skin Colour Detection Using Bayesian Rough Decision Tree. In Proceedings of the Communications in Computer and Information Science; 2018; Vol. 938, pp. 240–254.
- 23. Abbas, A.R.; Kareem, A.R. Age Estimation Using Support Vector Machine. Iraqi J. Sci. 2018, 59, 1746–1756, doi:10.24996/IJS.2018.59.3C.19.
- 24. Abbas, A.R.; Kareem, A.R. Intelligent Age Estimation From Facial Images Using Machine Learning Techniques. Iraqi J. Sci. 2018.
- 25. Abbas, A.R. Prediction and Classification of Cardiovascular Diseases (CVDs) Using Averaged One-Dependence Estimators (AODE) Classifier. J. AL-Turath Univ. Coll. 2017, 23.
- 26. Abbas, A.R.; Ashor, S. Designing Personalized Recommendation in E-Commerce Site Based on Content-Based and Collaborative Filtering. J. Al-Nahrain Univ. 2017, 20, 142–152, doi:10.22401/jnus.20.2.19.
- 27. Ayad R Abbas, M.A.S. Diagnosis the Breast Cancer Using Bayesian Rough Set Classifier. Iraqi J. Sci. 2017.
- 28. Ayad R. Abbas, S.A. Design Recommendation System in E-Commerce Site. Iraqi J. Sci. 2016.
- 29. Dhiaa Mohammed Abed Abdul Mohsen Jaber, A.R.A. Improving Security of ID Card and Passport Using Cubic Spline Curve. Iraqi J. Sci. 2016, 57.
- 30. Abbas, A.R. An Adaptive E-Commerce: Applying of Psychological Testing Method to Improve Buying Decision Process. Eng. Technol. J. 2015.
- 31. Aliwy, A.H.; Abbas, A.R. Improvement WSD Dictionary Using Annotated Corpus and Testing It with Simplified Lesk Algorithm. In Proceedings of the CCSIT, SIPP, AISC, NLP - 2015; AIRCC, 2015; Vol. 5, pp. 89–97.
- 32. Ayad R Abbas, A.S.A. Automated Arabic Essay Scoring (AAES) Using Vector Space Model (VSM) and Latent Semantic Indexing (LSI). Eng. Technol. J. 2015.
- 33. Ayad R Abbas, A.S.A. Automated Arabic Essay Scoring (AAES) Using Vector Space Model (VSM). J. AL-Turath Univ. Coll. 2014.
- 34. Abbas, A.; Liu, J. Designing an Intelligent Recommender System Using Partial Credit Model and Bayesian Rough Set. Int. Arab J. Inf. Technol. 2012, 9.
- 35. Abbas, A.R.; Juan, L. Design E-Learning Recommendation System Using PIRT and VPRS Model. In Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2009; Vol. 5854 LNCS, pp. 489–498.
- 36. Abbas, A.R.; Juan, L. Personalized SCORM Learning Experience Based on Rating Scale Model. In Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2009; Vol. 5551 LNCS, pp. 689–698.
- 37. Abbas, A.R.; Juan, L. Supporting E-Learning System with Modified Bayesian Rough Set Model. In Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2009; Vol. 5552 LNCS, pp. 192–200.
- 38. Al-Mamory, S.O.; Zhang, H.; Abbas, A.R. IDS Alarms Reduction Using Data Mining. In Proceedings of the Proceedings of the International Joint Conference on Neural Networks; 2008; pp. 3564–3570.
- 39. Al-Mamory, S.O.; Zhang, H.; Abbas, A.R. Modeling Network Attacks for Scenario Construction. In Proceedings of the Proceedings of the International Joint Conference on Neural Networks; 2008; pp. 1495–1502.
- 40. Abbas, A.R.; Juan, L.; Mahdi, S.O. A New Version of Bayesian Rough Set Based on Bayesian Confirmation Measures. In Proceedings of the 2007 International Conference on Convergence Information Technology, ICCIT 2007; 2007; pp. 284–289.
- 41. Abbas, A.R.; Juan, L.; Mahdi, S.O. Improved Variable Precision Rough Set Model and Its Application to Distance Learning. In Proceedings of the Proceedings - 2007 International Conference on Computational Intelligence and Security, CIS 2007; 2007; pp. 191–195.
- 42. Abbas, A.R. Design and Implementation of Web Course Tools (WebCT), University of Technology, 2005.
- Artificial Intelligent, BSc. Course, University of Technology-Computer Science Dep.
- Machine Learning, BSc. & MSc. Courses, University of Technology-Computer Science Dep.
- Data mining, BSc. & MSc. Courses, University of Technology-Computer Science Dep.
- Intelligent Applications, BSc. Course, Imam Jaafar Al Sadiq University
- E-learning, MSc. Course, University of Technology-Computer Science Dep.
- Fuzzy set, BSc. Course, University of Technology-Computer Science Dep.
- Adaptive Systems, BSc. Course, University of Technology-Computer Science Dep.
- Algorithm Design and Analysis, BSc. Course, University of Technology-Computer Science Dep.
- Artificial Intelligent, Ph.D. Course, University of Technology-Mechanical Engineering.
- Natural Language Understanding, Ph.D. Course, University of Technology-Computer Science Dep.
- The Ministry of Higher Education Award in Science Day 2009
- The University of Technology Award in Women Day 2013
- The University of Technology Award in University Day 2015.
- The University of Technology Award for Post Graduate Studies 2015.
- The University of Technology Award for Post Graduate Studies 2014-2015-2016.
- Al Nahrain Center for Strategies Studies 2020.
- Certificate of Appreciation in the management of the research session Participation in the 2017 National Conference on New Trends in ICT Applications (NTCT'2017).
- Certificate of Appreciation in the management of the research session at IBN ALIHITHAM FIRST INTERNATIONAL CONFERENCE OF SCIENCE 2017
- Certificate of Appreciation participation in research at the First International Conference on Engineering and Computing, 2017 (ICEC2017).
- Certificate of Appreciation, in the preparation of a seminar on "Electronic Management in Community Service", University of Technology, 20-3-2018.
- Certificate of Appreciation in the management of the research session at "e-management in community service", University of Technology, 20-3-2018.
- Certificate of Appreciation, participating in the Second International Conference Department of Computer Science at the University of Technology sponsored by IEEE 2018
- Certificate of Appreciation, participating in the First International Conference Department of Electrical Engineering at the University of Technology sponsored by ieee 2018.
- A certificate of appreciation to participate in the Second International Conference of the University of Information and Communications Technology under the auspices of the Springer Foundation 2019.
- A certificate of appreciation to participate in the evaluation of research submitted to the Iraqi Journal of Computers and Information 2019.
- A certificate of appreciation to participate in the First International Conference, Department of Computer Science, Faculty of Education, Al-Mustansiriya University, sponsored by IEEE 2019.
May Sabri Mohammed

May sabri mohammed
Computer Sciences Department
Assistance Lecture
This email address is being protected from spambots. You need JavaScript enabled to view it.
Hi I'm may , I'm assistant lecturer at the University of Technology - Department of Computer Sciences / Iraq - Baghdad, I obtained my B.Sc degree in computer science – IS in 2007, and my M.Sc degree in 2016, currently I am lecturer teaching programming of microprocessor , and data security program. I do research in computer security programming
- Bsc, Computer science , University of Technology, 2007.
- Msc, computer science , University of Technology, 2016.
- Computer security
- Information Hiding Using Geographic Information System (GIS) Vector Fil R.F. Hassan
- Data structure 2016,2017 University of Technology
- microprocessor 2016- Till present University of Technology
- Data security 2017- Till present University of Technology
- OS programing 2018-2019 University of Technology





