
Diyar ZeebareeDuhok Polytechnic University | DPU · Research Center
Diyar Zeebaree
Doctor of Philosophy
I currently work as Dean General of the Research Center at the Duhok Polytechnic University
About
96
Publications
45,715
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,530
Citations
Citations since 2017
Introduction
Research Focus: Machine Learning, Deep Learning, Artificial Intelligence, Image processing, Medical Images Analysis, Swarm Intelligence. My research looks at the integration and analyses of machine learning, deep learning, and evolutionary paradigms across computational applications in object detection, swarm intelligence and analytics.
Publications
Publications (96)
Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. Therefore, more robust and relevant fea...
The developing of deep learning systems that used for chronic diseases diagnosing is challenge. Furthermore, the localization and identification of objects like white blood cells (WBCs) in leukemia without preprocessing or traditional hand segmentation of cells is a challenging matter due to irregular and distorted of nucleus. This paper proposed a...
Breast cancer detection using mammogram images at an early stage is an important step in disease diagnostics. We propose a new method for the classification of benign or malignant breast cancer from mammogram images. Hybrid thresholding and the machine learning method are used to derive the region of interest (ROI). The derived ROI is then separate...
There have been quite a few studies on facial expression recognition over the years, and it is still a challenging subject due to the significant inter-class variability. Facial expression research in this field focuses on the development of techniques to identify, code, and extract facial expressions to improve prediction by computer. With great s...
In the last decade, the Facial Expression Recognition field has been studied widely and become the base for many researchers, and still challenging in computer vision. Machine learning technique used in facial expression recognition facing many problems, since human emotions expressed differently from one to another. Nevertheless, Deep learning tha...
Digital watermarking is getting more research and industry attention. Digital multimedia data allows for robust and simple data editing and modification. However, the spread of digital media presents concerns for digital content owners. It is important to note that digital data can be copied without quality or content loss. This has a considerable...
Machine learning and data mining have established several effective applications in gene selection analysis. This paper review semi-supervised learning algorithms and gene selection. Semi-Supervised learning is learning that includes experiences that are familiar with the environment because it can deal with labeled and unnamed data. Gene selection...
The importance of the plant for the human being and the environment led to deeply been studied and classified in detail. The advancement of the technology is the main factor in finding many ways for plant identification process. Some kind of initial intelligence systems in order to identify plant, followed by many theories and concepts using method...
Prediction is vital in our daily lives, as it is used in various ways, such as learning, adapting, predicting, and classifying. The prediction of parameters capacity of RNNs is very high; it provides more accurate results than the conventional statistical methods for prediction. The impact of a hierarchy of recurrent neural networks on Predicting p...
Machine learning algorithms have been used in many fields, like economics, medicine, etc. Education data mining is one of the areas concerned with exploring patterns of data in an educational environment. One of the most important uses is to predict students' performance to improve the existing educational situation. It can be considered as one of...
Nature-inspired algorithms are often used by several diverse areas of engineering and science due to their easiness and versatility. Because metaheuristics operate by structurally changing and improving an established problem, they can often be extended to any optimization issues. The recent creation of meta-heuristic algorithms has rendered them e...
Coronavirus (COVID-19) is a new contagious disease reasoned by a new virus that is widely spread over the world, this virus never has been identified in humans before. Respiratory disease can be affected by this virus such as flu with several symptoms, for example, fever, headache, cough, and pneumonia. COVID-19 presence in humans can be tested thr...
Blood is one of the most vital and essential elements in human existence. When the population increases, so do the request for blood. People who need blood in an emergency are unable to provide it promptly. This paper suggests an effective method of contacting donors, that can be useful in an emergency. When a person requires blood, they request it...
Data Mining is the process of finding knowledge through the processing of massive amounts of data from different viewpoints and combining them into valuable information; data mining has been a crucial part in various aspects of human life. It is used to recognize the covered up patterns in a huge amount of data. Classification methods are supervise...
Leukemia refers to a disease that affects the white blood cells (WBC) in the bone marrow and/or blood. Blood cell disorders are often detected in advanced stages as the number of cancer cells is much higher than the number of normal blood cells. Identifying malignant cells is critical for diagnosing leukemia and determining its progression. This pa...
Early diagnosis is considered important for medical images of breast cancer, the rate of recovery and safety of affected women can be improved. It is also assisting doctors in their daily work by creating algorithms and software to analyze the medical images that can identify early signs of breast cancer. This review presents a comparison has been...
Classification is the most widely applied machine learning problem today, with implementations in face recognition, flower classification, clustering, and other fields. The goal of this paper is to organize and identify a set of data objects. The study employs K-nearest neighbors, decision tree (j48), and random forest algorithms, and then compares...
In December 2019, SARS-CoV-2 caused coronavirus disease (COVID-19) distributed to all countries, infecting thousands of people and causing deaths. COVID-19 induces mild sickness in most cases, although it may render some people very ill. Therefore, vaccines are in various phases of clinical progress, and some of them being approved for national use...
Disasters could cause communication systems to partially or
completely down. In such a case, relief operations need a rapidly deployed
communication system to save lives. Exchanging information among the rescue
team is a vital factor to make important decisions. Communication system re�quired to be robust to failures, rapidly deployable, easily...
This paper proposes a watermarking method for grayscale images, in which lifting wavelet transform and singular value decomposition are exploited based on multi-objective artificial bee colony optimization to produce a robust watermarking method. Furthermore, for increasing security encryption of the watermark is done prior to the embedding operati...
p> Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new a...
Skin cancer is a significant health problem. More than 123,000 new cases per year are recorded. Melanoma is the most popular type of skin cancer, leading to more than 9000 deaths annually in the USA. Skin disease diagnosis is getting difficult due to visual similarities. While Melanoma is the most common form of skin cancer, other pathology types a...
Collective improvement in the acceptable or desirable accuracy level of breast cancer image-related pattern recognition using various schemes remains challenging. Despite the combination of multiple schemes to achieve superior ultrasound image pattern recognition by reducing the speckle noise, an enhanced technique is not achieved. The purpose of t...
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. VPN is commonly used in business situations to provide secure communication channels...
Segmentation of the breast region and pectoral muscle are fundamental subsequent steps in the process of Computer-Aided Diagnosis (CAD) systems. Segmenting the breast region and pectoral muscle are considered a difficult task, particularly in mammogram images because of artefacts, homogeneity among the region of the breast and pectoral muscle, and...
Machine Learning (Supervised,Unsupervised,Reinforcement),Algorithms.
The wireless communication system was investigated by novel methods, which produce an optimized data link, especially the software-based methods. Software-Defined Radio (SDR) is a common method for developing and implementing wireless communication protocols. In this paper, SDR and artificial intelligence (AI) are used to design a self-management c...
Publication-Process-Flow
Complex problems take a long time to solve, with low efficiency and performance. So, to overcome these barriers and problems, studies have headed towards a way to divide the problem into independent parts, to solve and remedy each of the parts separately in a way that each component can implement part of it, with simultaneous problems with others....
Reasons journals reject submissions:
• not relevant to the context (local concerns not explained to a wider context).
• not relevant to the readership/key concerns of the journal.
• not new/original enough.
• weaknesses within the paper (methodology, argument, findings).
• a good paper, but not as good as others that were received.
• methodological...
A Guide to Quantitative and Qualitative Dissertation Research.
Contextual Factors Influencing a Research Design
What is Impact Factor
* A citation metric
* The impact factor of a journal is the average number of citations received per paper published in that
journal
* The journal must be published in 2 consecutive years, so the IF can be calculated in the 3rd year
WHAT DO YOU NEED TO KNOW
Example of IF calculation:
• In 2008, a journal has an impact factor o...
Decision-making flowchart to decide whether to read the chosen article or not.
Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text, audio, video and image for hiding confidential data in it are collectively called Steganography. The key challenge of steganographic system design is to maintain a fair trade-off betwee...
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
Structure of a typical research project
Structure and Key Characteristics of Manuscript Sections
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
This paper is review of wavelet applications in medical images. The main task of image processing is image demising wavelet transforms are used to apply medical images to image compression. The main aim of digital images compression is to decrease the rate of data transfer. Images of living objects are using different modal such as X-ray, Magnetic...
An infectious disease caused by a coronavirus (=a type of virus), that usually causes fever, tiredness, and a cough, and can also cause breathing problems. Most often the disease is not serious but it can lead to severe illness in some people. The poster is on COVID-19 details and the effect on economics worldwide
Due to sharp increases in data dimensions, working on every data mining or machine learning (ML) task requires more efficient techniques to get the desired results. Therefore, in recent years, researchers have proposed and developed many methods and techniques to reduce the high dimensions of data and to attain the required accuracy. To ameliorate...
The smart cities concept highlights the use of Information and Communication Technology (ICT) to increase the quality and build more efficient technological solutions in different urban network services of a city life. One of the most famous models used to make a smart city is Internet Of Things (IOT), this is of the IOT abilities to build and orga...
High-dimensional data is interpreted with a considerable number of features, and new problems are presented in groups. The so-called "high dimension" is initially created to explain the common increase in time complexity of many computational problems, and therefore the performance of general aggregation algorithms is unsuccessful. Accordingly, man...
The recognition of human beings via the utilization of biometric characteristics is currently the latest innovative trend. Previous years have witnessed great interest in biometric recognition due to its security significance. Amongst the presently used biometric recognition, the fingerprint is categorised to be a pragmatic technique. Techniques th...
The Data Compression is a creative skill which defined
scientific concepts of providing contents in a compact form. Thus, it
has turned into a need in the field of communication as well as in
different scientific studies. Data transmission must be sufficiently
secure to be utilized in a channel medium with no misfortune; and
altering of information...