Diyar Zeebaree

Diyar Zeebaree
Duhok Polytechnic University | DPU · Research Center

Doctor of Philosophy
I currently work as Dean General of the Research Center at the Duhok Polytechnic University

About

96
Publications
45,715
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,530
Citations
Citations since 2017
94 Research Items
1522 Citations
20172018201920202021202220230200400600
20172018201920202021202220230200400600
20172018201920202021202220230200400600
20172018201920202021202220230200400600
Introduction
Research Focus: Machine Learning, Deep Learning, Artificial Intelligence, Image processing, Medical Images Analysis, Swarm Intelligence. My research looks at the integration and analyses of machine learning, deep learning, and evolutionary paradigms across computational applications in object detection, swarm intelligence and analytics.

Publications

Publications (96)
Article
Full-text available
Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. Therefore, more robust and relevant fea...
Article
Full-text available
The developing of deep learning systems that used for chronic diseases diagnosing is challenge. Furthermore, the localization and identification of objects like white blood cells (WBCs) in leukemia without preprocessing or traditional hand segmentation of cells is a challenging matter due to irregular and distorted of nucleus. This paper proposed a...
Article
Full-text available
Breast cancer detection using mammogram images at an early stage is an important step in disease diagnostics. We propose a new method for the classification of benign or malignant breast cancer from mammogram images. Hybrid thresholding and the machine learning method are used to derive the region of interest (ROI). The derived ROI is then separate...
Article
Full-text available
There have been quite a few studies on facial expression recognition over the years, and it is still a challenging subject due to the significant inter-class variability. Facial expression research in this field focuses on the development of techniques to identify, code, and extract facial expressions to improve prediction by computer. With great s...
Article
Full-text available
In the last decade, the Facial Expression Recognition field has been studied widely and become the base for many researchers, and still challenging in computer vision. Machine learning technique used in facial expression recognition facing many problems, since human emotions expressed differently from one to another. Nevertheless, Deep learning tha...
Conference Paper
Full-text available
Digital watermarking is getting more research and industry attention. Digital multimedia data allows for robust and simple data editing and modification. However, the spread of digital media presents concerns for digital content owners. It is important to note that digital data can be copied without quality or content loss. This has a considerable...
Conference Paper
Full-text available
Machine learning and data mining have established several effective applications in gene selection analysis. This paper review semi-supervised learning algorithms and gene selection. Semi-Supervised learning is learning that includes experiences that are familiar with the environment because it can deal with labeled and unnamed data. Gene selection...
Article
Full-text available
The importance of the plant for the human being and the environment led to deeply been studied and classified in detail. The advancement of the technology is the main factor in finding many ways for plant identification process. Some kind of initial intelligence systems in order to identify plant, followed by many theories and concepts using method...
Article
Full-text available
Prediction is vital in our daily lives, as it is used in various ways, such as learning, adapting, predicting, and classifying. The prediction of parameters capacity of RNNs is very high; it provides more accurate results than the conventional statistical methods for prediction. The impact of a hierarchy of recurrent neural networks on Predicting p...
Article
Full-text available
Machine learning algorithms have been used in many fields, like economics, medicine, etc. Education data mining is one of the areas concerned with exploring patterns of data in an educational environment. One of the most important uses is to predict students' performance to improve the existing educational situation. It can be considered as one of...
Article
Full-text available
Nature-inspired algorithms are often used by several diverse areas of engineering and science due to their easiness and versatility. Because metaheuristics operate by structurally changing and improving an established problem, they can often be extended to any optimization issues. The recent creation of meta-heuristic algorithms has rendered them e...
Article
Full-text available
Coronavirus (COVID-19) is a new contagious disease reasoned by a new virus that is widely spread over the world, this virus never has been identified in humans before. Respiratory disease can be affected by this virus such as flu with several symptoms, for example, fever, headache, cough, and pneumonia. COVID-19 presence in humans can be tested thr...
Article
Full-text available
Blood is one of the most vital and essential elements in human existence. When the population increases, so do the request for blood. People who need blood in an emergency are unable to provide it promptly. This paper suggests an effective method of contacting donors, that can be useful in an emergency. When a person requires blood, they request it...
Article
Full-text available
Data Mining is the process of finding knowledge through the processing of massive amounts of data from different viewpoints and combining them into valuable information; data mining has been a crucial part in various aspects of human life. It is used to recognize the covered up patterns in a huge amount of data. Classification methods are supervise...
Article
Full-text available
Leukemia refers to a disease that affects the white blood cells (WBC) in the bone marrow and/or blood. Blood cell disorders are often detected in advanced stages as the number of cancer cells is much higher than the number of normal blood cells. Identifying malignant cells is critical for diagnosing leukemia and determining its progression. This pa...
Article
Full-text available
Early diagnosis is considered important for medical images of breast cancer, the rate of recovery and safety of affected women can be improved. It is also assisting doctors in their daily work by creating algorithms and software to analyze the medical images that can identify early signs of breast cancer. This review presents a comparison has been...
Article
Full-text available
Classification is the most widely applied machine learning problem today, with implementations in face recognition, flower classification, clustering, and other fields. The goal of this paper is to organize and identify a set of data objects. The study employs K-nearest neighbors, decision tree (j48), and random forest algorithms, and then compares...
Article
Full-text available
In December 2019, SARS-CoV-2 caused coronavirus disease (COVID-19) distributed to all countries, infecting thousands of people and causing deaths. COVID-19 induces mild sickness in most cases, although it may render some people very ill. Therefore, vaccines are in various phases of clinical progress, and some of them being approved for national use...
Article
Full-text available
Disasters could cause communication systems to partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system re�quired to be robust to failures, rapidly deployable, easily...
Article
Full-text available
This paper proposes a watermarking method for grayscale images, in which lifting wavelet transform and singular value decomposition are exploited based on multi-objective artificial bee colony optimization to produce a robust watermarking method. Furthermore, for increasing security encryption of the watermark is done prior to the embedding operati...
Article
Full-text available
p> Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new a...
Article
Full-text available
Skin cancer is a significant health problem. More than 123,000 new cases per year are recorded. Melanoma is the most popular type of skin cancer, leading to more than 9000 deaths annually in the USA. Skin disease diagnosis is getting difficult due to visual similarities. While Melanoma is the most common form of skin cancer, other pathology types a...
Article
Full-text available
Collective improvement in the acceptable or desirable accuracy level of breast cancer image-related pattern recognition using various schemes remains challenging. Despite the combination of multiple schemes to achieve superior ultrasound image pattern recognition by reducing the speckle noise, an enhanced technique is not achieved. The purpose of t...
Article
Full-text available
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. VPN is commonly used in business situations to provide secure communication channels...
Article
Full-text available
Segmentation of the breast region and pectoral muscle are fundamental subsequent steps in the process of Computer-Aided Diagnosis (CAD) systems. Segmenting the breast region and pectoral muscle are considered a difficult task, particularly in mammogram images because of artefacts, homogeneity among the region of the breast and pectoral muscle, and...
Cover Page
Machine Learning (Supervised,Unsupervised,Reinforcement),Algorithms.
Article
Full-text available
The wireless communication system was investigated by novel methods, which produce an optimized data link, especially the software-based methods. Software-Defined Radio (SDR) is a common method for developing and implementing wireless communication protocols. In this paper, SDR and artificial intelligence (AI) are used to design a self-management c...
Cover Page
Artificial Intelligence
Article
Complex problems take a long time to solve, with low efficiency and performance. So, to overcome these barriers and problems, studies have headed towards a way to divide the problem into independent parts, to solve and remedy each of the parts separately in a way that each component can implement part of it, with simultaneous problems with others....
Method
Reasons journals reject submissions: • not relevant to the context (local concerns not explained to a wider context). • not relevant to the readership/key concerns of the journal. • not new/original enough. • weaknesses within the paper (methodology, argument, findings). • a good paper, but not as good as others that were received. • methodological...
Research Proposal
A Guide to Quantitative and Qualitative Dissertation Research.
Book
What is Impact Factor * A citation metric * The impact factor of a journal is the average number of citations received per paper published in that journal * The journal must be published in 2 consecutive years, so the IF can be calculated in the 3rd year WHAT DO YOU NEED TO KNOW Example of IF calculation: • In 2008, a journal has an impact factor o...
Article
Full-text available
Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text, audio, video and image for hiding confidential data in it are collectively called Steganography. The key challenge of steganographic system design is to maintain a fair trade-off betwee...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The most prevalent cancer amongst women is woman breast cancer. Ultrasound imaging is a widely employed method for identifying and diagnosing breast abnormalities. Computer-aided diagnosis technologies have lately been developed with ultrasound images to help radiologists enhance the accuracy of the diagnosis. This paper presents several ultrasound...
Article
Full-text available
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
Cover Page
Machine Learning
Research Proposal
Structure and Key Characteristics of Manuscript Sections
Cover Page
Machine Learning Evolution Over the Years
Data
Contents Of An APA Style Research Propsel.
Article
Full-text available
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover im...
Article
Full-text available
This paper is review of wavelet applications in medical images. The main task of image processing is image demising wavelet transforms are used to apply medical images to image compression. The main aim of digital images compression is to decrease the rate of data transfer. Images of living objects are using different modal such as X-ray, Magnetic...
Cover Page
How to Choose A Performance Metric
Article
An infectious disease caused by a coronavirus (=a type of virus), that usually causes fever, tiredness, and a cough, and can also cause breathing problems. Most often the disease is not serious but it can lead to severe illness in some people. The poster is on COVID-19 details and the effect on economics worldwide
Article
Full-text available
Due to sharp increases in data dimensions, working on every data mining or machine learning (ML) task requires more efficient techniques to get the desired results. Therefore, in recent years, researchers have proposed and developed many methods and techniques to reduce the high dimensions of data and to attain the required accuracy. To ameliorate...
Article
Full-text available
The smart cities concept highlights the use of Information and Communication Technology (ICT) to increase the quality and build more efficient technological solutions in different urban network services of a city life. One of the most famous models used to make a smart city is Internet Of Things (IOT), this is of the IOT abilities to build and orga...
Article
Full-text available
High-dimensional data is interpreted with a considerable number of features, and new problems are presented in groups. The so-called "high dimension" is initially created to explain the common increase in time complexity of many computational problems, and therefore the performance of general aggregation algorithms is unsuccessful. Accordingly, man...
Article
Full-text available
The recognition of human beings via the utilization of biometric characteristics is currently the latest innovative trend. Previous years have witnessed great interest in biometric recognition due to its security significance. Amongst the presently used biometric recognition, the fingerprint is categorised to be a pragmatic technique. Techniques th...
Conference Paper
The Data Compression is a creative skill which defined scientific concepts of providing contents in a compact form. Thus, it has turned into a need in the field of communication as well as in different scientific studies. Data transmission must be sufficiently secure to be utilized in a channel medium with no misfortune; and altering of information...