البحوث المنشورة

ت

اسم التدريسي

اسم البحث

1 أ.د. برهان فخرالدين جمعة 

1- A NUMERICAL TECHNIQUE OF THE TIME FRACTIONAL GAS DYNAMICS EQUATION USING FINITE ELEMENT APPROACH WITH CUBIC HERMIT

 2- Numerical solutions to the 1-D Burgers’ equation by a cubic Hermite finite element method

 3- Homotopy perturbation technique to solve nonlinear systems of Volterra integral equations of 1st kind

 4- Modified of Homotopy Perturbation Technique and Its Application to System of Nonlinear Fredholm Integral Equations Of 2 nd Kind

 5- Estimating the Parameter of RNA by using Hybrid Bat with Modified CG Algorithms

 6- Estimating the Parameter of RNA by using Hybrid Bat with Modified CG Algorithms

 7- Travelling wave solution for some partial differential equations

 8- Soliton Solutions for Space-Time Fractional Korteweg-De Vries Equation

 9- Traveling wave solutions for the time fractional Zoomeron equation

 10- Solving the System of Two Nonlinear Voltera Intehral Equations of the Second Kind Using the Trapezoidal Predictor – Corrector Method

 11- Non-Polynomial Spline Method for the Solution of the System of two Nonlinear Volterra Integral Equations

 12- Numerical Solutions Based on Finite Difference Techniques for Two Dimensional Advection-Diffusion Equation

 13- Numerical Solution of System of Non-linear Volterra Integral Equations of the Second Kind using Runge-Kutta Method

 14- A Combined numerical Technique to Solve a System of Non-Linear Volterra Integral Equations of Second Kind

 15- Using Predictor-Corrector Methods for Numerical Solution of System of Non-linear Volterra Integral Equations of Second Kind

 16- Fourth Order Block-by-block Method to Solve System of Non-linear Volterra Integral Equations of the Second Kind

 17- An Approximate Solution of Non-Linear System of Volterra Integral Equation

 18- Numerical Solution of Non-linear Volterra Integral Equation of The Second Kind

 19- IMPROVE THE SOLUTION OF THE SYSTEM OF NONLINEAR VOLTERA INTEGRAL EQUATIONS USING HERIMITE INTERPOLATION

2 

أ.د. عيسى إبراهيم عيسى

 1- Software Simulation For 20Gbps RoF Architecture Over SSMF Using VCSEL And RZ As Modulation Format Based On WDM\ 2018\  AURUM JOURNAL OF ENGINEERING SYSTEMS AND ARCHITECTURE

 2-E. I. Essa, “Task Scheduling for Cloud Computing Based on Firefly Algorithm\ 2019\  Journal of Physics: Conference Series

 3- Transmission power optimization of high speed 32 channels× 12.8 Tbps CWDM based on multi-span SSMF using RZ modulation format\ 2019\  Periodicals of Engineering and Natural Sciences (PEN)

 4- Software simulation for the study of the fiber optic properties and its impact on the output power\ 2020\  Periodicals of Engineering and Natural Sciences (PEN)

 5- Investigation and performance optimization of mesh networking in Zigbee\ 2019\  Periodicals of Engineering and Natural Sciences (PEN)

 6- Free Space Optic/Optical Wireless Communication: A Survey\ 2022\  Journal of Robotics and Control (JRC)

 7- New hybrid Filtering Methods to remove noise from Digital Images\ 2022\  Journal of Advanced Sciences and Nanotechnology

 8- Multi-Channel of High-Speed Optical Network Based RoF/WDM Architecture\  Journal of Advanced Sciences and Nanotechnology

 9- Intelligent Information Retrieval (IIR) Based Clustering Algorithms: State-of-The-Art\ 2023\  Journal of Advanced Sciences and Nanotechnology

 10- Optimization-based feature selection and hybrid machine learning algorithms for big data classification: An investigation\  Journal of Advanced Sciences and Nanotechnology

 11- A 10Gb/s Bit Rate Radio Over Fiber Using (SCM/ASK) Based On Bidirectional Optical Fiber With Presence of SPM\ 2012\  Tikrit Journal for Pure Sciences

 12- MVDR Beamformer Model for Array Response Vector Mismatch Reduction\ 2016\  Conference Proceedings

 13- Controlling Smart Home Activities Using IoT\ 2019\  IEEE- Conference Proceedings

 14- New Big Scale Data Sharing Environment\ 2019\  IEEE- Conference Proceedings

 15- A New Hybrid Architecture of Radio over Fiber/Wavelength Division Multiplexing in Optical Network\ 2019\  IEEE- Conference Proceedings

 16- Fuzzy PID Controller for Induction Motor with DSP Wavelet\ 2019\  Conference Proceedings

 17- Performance Analysis of Hybrid MIMO/FSO Architecture Based on Optical Network\ 2022\  Conference Proceedings

 18- Radio over Fiber (RoF) Techniques: A Survey\ 2022\  Conference Proceedings

 19- Improving Big Data Classification Process Using Hybrid Machine Learning Algorithms\ 2022\  Conference Proceedings

 20- K-means text clustering technique to improve the intelligent information retrieval(IIR)\ 2023\  Conference Proceedings

3 م.د. ادريس محمد حسين

 1- Mitigate the Reverberant Effects on Speaker Recognition via Multi-training

 2- PranCS: A Protocol and Discrete Controller Synthesis Tool

 3- A hot method for synthesising cool controllers

 4- Program Generation Using Simulated Annealing and Model Checking

 5- Synthesis of Protocols and Discrete Controllers

4

م.د. شهاب أحمد إبراهيم

 1- A new global optimization technique by auxiliary function method in a directional search, Optimization Letters, 2019

 2- A new filled function method with two parameters in a directional search, Journal of Multidisciplinary Modeling and Optimization, 2019

 3- Smoothing approximations to non-smooth functions, Journal of Multidisciplinary Modeling and Optimization,2018

 4-Fuzzy logic modeling for prediction of the nuclear tracks, Journal of Multidisciplinary Modeling and Optimization, 2018

 5- Improved image segmentation method based on optimized higher-order polynomial, International Journal of Nonlinear Analysis and Applications, 2023

 6- A New Method for Solving Image Segmentation Problems using Global Optimization,  International Journal of Intelligent Systems and Applications in Engineering, 2023

 7- Increasing the Effects of Auxiliary Function by Multiple Extrema in Global Optimization,   Numerical Solutions of Realistic Nonlinear Phenomena, 2020

 8- Using Global Optimization Techniques to Segmentation of Magnetic Resonance Images (MRI), Journal of Current Research on Engineering, Science and Technology, 2023

 9- Using Markov chain absorbent in predicting numbers of graduate students to some sections College of Science, Kirkuk University Journal-Scientific Studies, 2015

 10- Exponential Filled Function Method for Solving Multi-dimension Global Optimization,  Journal of Current Research on Engineering, Science and Technology, 2023

5

م.د. وليد خالد عبدالوهاب

 1- ADAPTIVE REDUCED PATHS SUCCESSIVE CANCELLATION LIST DECODING FOR POLAR CODES

 2- Comparative Study of Channel Coding Schemes for 5G

 3- Internal Pilot Insertion for Polar Codes

 4- Reduced Path Successive Cancellation List Decoding for Polar Codes

 5- Scalable video transmission using OFDM schemes over wireless channels

 6- Signal Denoising by Better Multiwavelet Basis using Fuzzy Logic

6 م.د. احسان حسين عبدالقادر

 1- Abdulqadder, I. H., & Zhou, S. (2022). SliceBlock: Context-aware Authentication Handover and Secure Network Slicing using DAG-Blockchain in Edge-assisted SDN/NFV-6G Environment. IEEE Internet of Things Journal.

 2- Lopes IO, Zou D, Abdulqadder IH, Ruambo FA, Yuan B, Jin H. Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach. Computer Communications. 2022 Oct 1;194:55-65.

 3- Imran, R. M., Saeed, M. R., Mohammed, M. A., Suhry, O. A., Abdulqadder, I. H. et al. (2022). Voltage Profile Enhancement and Power Loss Reduction with Economic Feasibility Using Small Capacity Distribution Transformers. Energy Engineering, 119(6), 2447–2467.

 4- Aziz, I. T., Abdulqadder, I. H., & Jawad, T. A. (2022). Distributed Denial of Service Attacks on Cloud Computing Environment. Cihan University-Erbil Scientific Journal6(1), 47-52.

 5- Aziz, I. T., & Abdulqadder, I. H. (2021). An Overview on SDN and NFV Security Orchestration in Cloud Network Environment. Cihan University-Erbil Scientific Journal5(1), 20-27.

 6- I. H. Abdulqadder, S. Zhou, I. T. Aziz, D. Zou, X. Deng and S. M. Abrar Akber, "An Effective Lightweight Intrusion Detection System with Blockchain to Mitigate Attacks in SDN/NFV Enabled Cloud," 2021 6th International Conference for Convergence in Technology (I2CT), 2021, pp. 1-8, doi: 10.1109/I2CT51068.2021.9417961.

 7- Aziz, Israa T., Ihsan H. Abdulqadder, Sabah M. Alturfi, Rasool M. Imran, and Firas MF Flaih. "A Secured and Authenticated State Estimation Approach to Protect Measurements in Smart Grids." In 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), pp. 1-5. IEEE, 2020.

 8- Abdulqadder, Ihsan H., Shijie Zhou, Deqing Zou, Israa T. Aziz, and Syed Muhammad Abrar Akber. "Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT." In 2020 IEEE 20th International Conference on Communication Technology (ICCT), pp. 499-507. IEEE, 2020.

 9- Abdulqadder, Ihsan H., Shijie Zhou, Deqing Zou, Israa T. Aziz, and Syed Muhammad Abrar Akber. "Multi-layered Intrusion Detection and Prevention in the SDN/NFV Enabled Cloud of 5G Networks using AI-based Defense Mechanisms." Computer Networks (2020): 107364.

 10- Aziz, Israa T., Hai Jin, Ihsan H. Abdulqadder, Sabah M. Alturfi, Wisam H. Alobaidi, and Firas MF Flaih. "T2S2G: A novel two-tier secure smart grid architecture to protect network measurements." Energies 12, no. 13 (2019): 2555.

 11- Abdulqadder, Ihsan, Deqing Zou, Israa Aziz, Bin Yuan, and Weiqi Dai. "Deployment of robust security scheme in SDN based 5G network over NFV enabled cloud environment." IEEE Transactions on Emerging Topics in Computing (2018).

 12- Abdulqadder, Ihsan H., Deqing Zou, Israa T. Aziz, and Bin Yuan. "Enhanced attack aware security provisioning scheme in SDN/NFV enabled over 5G network." In 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1-9. IEEE, 2018.

 13- Aziz, Israa T., Hai Jin, Ihsan H. Abdulqadder, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, and Firas MF Flaih. "A lightweight scheme to authenticate and secure the communication in smart grids." Applied Sciences 8, no. 9 (2018): 1508.

 14- Abdulqadder, Ihsan H., Deqing Zou, Israa T. Aziz, and Bin Yuan. "Validating user flows to protect software defined network environments." Security and Communication Networks 2018 (2018).

 15- Abdulqadder, Ihsan H., Deqing Zou, Israa T. Aziz, Bin Yuan, and Weiming Li. "SecSDN-cloud: defeating vulnerable attacks through secure software-defined networks." IEEE Access 6 (2018): 8292-8301.

 16- Abdulqadder, Ihsan H., Deqing Zou, Israa T. Aziz, and Bin Yuan. "Modeling software defined security using multi-level security mechanism for SDN environment." In 2017 IEEE 17th International Conference on Communication Technology (ICCT), pp. 1342-1346. IEEE, 2017.

 17- Aziz, Israa T., Hai Jin, Ihsan H. Abdulqadder, Rasool M. Imran, and Firas MF Flaih. "Enhanced PSO for network reconfiguration under different fault locations in smart grids." In 2017 International conference on smart technologies for smart nation (SmartTechCon), pp. 1250-1254. IEEE, 2017.

 18- Abbas, A.A., Abdulqadder, I.H. and Sultan, M.T., 2015. Proposing an Enhanced Face Recognition Technique Using Multi-Wavelet Transform. International Journal103.

7

أ.م. بناز أنور قادر

 1- Detect and Mitigate Blockchain-Based DDoS Attacks Using Machine Learning and Smart Contracts

 2- Evolving and training of Neural Network to Play DAMA Board Game Using NEAT Algorithm

  3-An electronic irrigation system using IoT and neural networks

  4-An improved vigener algorithm based on circular-left-shift key and MSB binary for data security

  5-Multivariate Time Series Forecasting with LSTM for Madrid, Spain pollution

  6-An Electronic Registration for Undergraduate Students with Department Selection Based on Artificial Neural Network

  7-E-Management System of Kirkuk University Based on Distributed Database

  8-Facebook Hacking

 9-Knowledge-Driven Decision Support System Based on Knowledge Warehouse and Data Mining for Market Management

  10- Data Pre-processing for knowledge discovery

8

م. محمد فخرالدين عبدالقادر

 1- COCO (Cooperative Capacity Control In Mobile Adhoc Network); International Journal of Network Security & Nano-Technology; 2013.
 2- A model for Home Security System (Intruder Warning, Fire Alert, etc) using Zig-Bee Standard in WSN; International Journal of Scientific Engineering and Technology Research; 2014.
 3- Penetration Testing on FTP Server; International Journal of Enhanced Research in Science, Technology & Engineering; 2016.
 4- Penetration Testing of Wireless Networks; ٢٠١٦؛مجلة كلية العلوم / جامعة كركوك.
 5- Topology Control in Mobile Ad-hoc Networks with Cooperative Communications; ٢٠١٦؛مجلة كلية العلوم / جامعة كركوك.
 6- Iterative Cancellation of Non-Linear Distortion Noise in Digital Communication Systems; International Journal of Advanced Technology and Innovation Research; 2016.
 7- Design and Implementation of Home Security System Using Zigbee and Arduino Controller with Sensors; Kirkuk University Journal / Scientific Studies; 2019.
 8- Performance Evaluation of ARQ and HARQ in Cooperative MIMO; International Journal of Interdisciplinary Environmental Studies; 2019.
 9- Temperature Control For A Hospital Using MP 8085; Journal of Southwest Jiaotong University; 2020.
 10- Effects of Impulse Noise on Massive MIMO; Journal of Physics: Conference Series; 2020.
 11- Securing Network Services and Protocols; Journal of Optoelectronics Laser; 2022.
 12- A secure sharing control framework supporting elastic mobile cloud computing; International Journal of Electrical and Computer Engineering; 2022.

9 م. يلماز نجم الدين طاهر

 1-Exploration of Institutional Challenges for Adopting Cloud Computing in E-Learning Systems

 2- E-Management System of Kirkuk University Based on Distributed Database
10 م.م. يوسف محمد وهاب

 1- A Framework for Blockchain Based E-Voting System for Iraq

 2- A systematic literature review of blockchain technology

 3- Developing the Real Estate Rental Sector in Third World Countries Using Blockchain Technology: Iraq as Case Study

 4- The Impact of Standard and Quality in e-Learning System

 

 

 

 

 

 

 

 

أوقات الدوام

حالة الطقس في مدينة كركوك