• Home
  • Mazin S. Al-Hakeem
Mazin S. Al-Hakeem

Mazin S. Al-Hakeem
  • Computer Science PhD
  • Dean of HiUC at Al Hikma University College

About

41
Publications
92,808
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
66
Citations
Introduction
Mazin S. Al-Hakeem (PhD) is Iraqi Professor of ICT. He is currently Dean of Al Hekma University College. Have 6 books, several scientific articles & researches in many international conferences and journals. He is a reviewer at IJACSA- USA & at many international conferences. He is a founder and former manager of UoT-ICT Center & former Head of Coordination Department in RDD at MoHE Iraqi. Has 13 years' experience on Network Technology & Security and Web Technology. Visit: dr-mazin.net
Current institution
Al Hikma University College
Current position
  • Dean of HiUC
Additional affiliations
August 2013 - present
Lebanese French University (LFU)
Position
  • Head of IT Department
August 2013 - March 2015
Independent Researcher
Independent Researcher
Position
  • Research Assistant
November 2003 - July 2012
University of Technology
Position
  • Manager of Information and Communication Technology Center

Publications

Publications (41)
Book
Full-text available
Presentation
Full-text available
This work presents for BICEIT2018 BABYLON INTERNATIONAL CONFERENCE, 11~12 October 2018
Article
Full-text available
هذه المقالة هى الثالثة من سلسلة مقالات حول إنترنت الأشياء ... والتي سيتم التطرق خلالها الى اهم بروتوكولات شبكة إنترنت الأشياء. حيث شاركت معظم الشركات الرائدة في مجال إنترنت الأشياء لأصدار العديد من البروتوكولات المصممة خصيصاً لدعم "الأشياء" وتمكينها من العمل ضمن شبكة إنترنت الأشياء، فقد بدى العام 2014 حافلاً بالأنتقالات الحقيقية لعالم بروتوكولات إ...
Article
Full-text available
تعريف "الاشياء" الى شبكة انترنت الاشياء – IoT هذه المقالة هى الثانية من سلسلة مقالات حول انترنت الاشياء ... مع التطور الهائل في استخدام شبكة الانترنت في حياتنا اليومية، ظهرت مساحة جديدة لاستخدام الانترنت كوسط يتيح للألات والاجهزة الذكية والاشياء الالكترونية (الاشياء) من الاتصال والتفاعل فيما بينها عبر شبكة الانترنت بهدف "إنشاء واقع حياة افضل للانس...
Article
Full-text available
هذه المقالة هى الاولى من سلسلة مقالات حول انترنت الاشياء ... في السنوات الاخيرة، حظيت شبكة انترنت الاشياء بأهتمام كبير في المجتمع البحثي و الاكاديمي ولاسيما بعد التطور الصناعي المهول في تصنيع وتطوير "الاشياء – Things" التي لها القابلية على "تعريف نفسها ضمن الشبكة" و القابلية على "الاتصال عبر شبكة الانترنت" و القابلية على "التفاعل مع الاشياء الاخر...
Article
Full-text available
Due to wireless sensor networks (WSNs) is one of a key technology for IoT, the performance of WSNs have become a hot challenge task. This paper present an analysis of the performance for main three reactive and proactive routing protocols of wireless sensor networks (WSNs) in IoT environment. The performance of each protocol is characterized within...
Article
Full-text available
Although the philosophy of education of many universities began shifted gradually towards using computers and information and communication technologies to establish effective education environment, the traditional style of examinations (that suffering from real problems related to the type of using paper and pen) is still used in these technologic...
Article
Full-text available
Models with advanced access in general practice have been introduced worldwide in order to enhance healthcare services throughout last decade. This has led to obtaining benefits such as eliminating waiting lists, enhancing patient’s timely access to services and lowering no show. Despite, implementing these models in Kurdistan’s public hospitals, m...
Conference Paper
Full-text available
Models with advanced access in general practice have been introduced worldwide in order to enhance healthcare services throughout last decade. This has led to obtaining benefits such as eliminating waiting lists, enhancing patient’s timely access to services and lowering no show. Despite, implementing these models in Kurdistan’s public hospitals, m...
Article
Full-text available
Models with advanced access in general practice have been introduced worldwide in order to enhance healthcare services throughout last decade. This has led to obtaining benefits such as eliminating waiting lists, enhancing patient’s timely access to services and lowering no show. Despite, implementing these models in Kurdistan’s public hospitals, m...
Conference Paper
Full-text available
Internet of Things (IoT) refers to a prospective in which physical objects are used in our daily life are going to be connected to the Internet by appropriate mode of information and communication technologies, but far from traditional desktop environment. The aim of IoT is to create a better world for human beings using a common infrastructure to...
Conference Paper
Internet of Things (IoT) refers to a prospective in which physical objects are used in our daily life are going to be connected to the Internet by appropriate mode of information and communication technologies, but far from traditional desktop environment. The aim of IoT is to create a better world for human beings using a common infrastructure to...
Book
Full-text available
Everything about Internet of Things and Smart Cities Applications - كل شيء عن انترنت الاشياء و تطبيقات المدن الذكية
Article
Full-text available
Big Data can bring big benefits for all sectors of our life via smarter moves, for examples, by analyzing huge dataset immediately and allowing for making decisions based on what they have learned, by gauging customer needs immediately and analyzing customer satisfaction in a timely manner, or by providing many diagnosis or treatment options quickl...
Article
Full-text available
The world has started to appreciate more and more the value of information and its impact on humanity and sustainable developments. However, due to the increase in cybercrimes, information technology needs to be secured using certain policies and laws. In Iraq, as one of the developing countries, information technology field has evolved but the rea...
Article
Full-text available
In the recent years, everything like refrigerators, cars, fans, lights, sprinklers are interconnected to create a better world for human beings, these devices are now collectively called the Internet of Things (IoT). While IoT have made life easier, they have also created new attack area for hackers especially internal attack issues. The number of...
Book
Full-text available
The "OBJECT ORIENTED PROGRAMMING IN C++ " book has two primary objectives; to teach the basic principles of object oriented programming as outlined in curricula at many leading universities, and to teach how to implement it. This book has been written for the students of sciences and engineering departments and colleges who aspiring to learn and ve...
Article
Full-text available
The tenets of flipping teaching are not new, and lecturers already use a variety of methods based technology to address learner needs with different points of view. The aim of integrating technology in teaching is to establish effective teaching environment with particular attention to activities that generate awareness, initiative, inquire, collab...
Article
Smart mobile technology is increasingly being utilized as a tool for information dissemination and collection; in addition to support many services such as telephone calls, SMS and MMS messages, e-mail, Web access, etc. The open architecture of these devices is encourages for rapid application development and release. Most people who own smart mobi...
Article
Full-text available
Smart mobile technology is increasingly being utilized as a tool for information dissemination and collection; in addition to support many services such as telephone calls, SMS and MMS messages, e-mail, Web access, etc. The open architecture of these devices is encourages for rapid application development and release. Most people who own smart mobi...
Article
Full-text available
There is a great need to transfer information between hosts and networks in fast with reliable and secure way; this is a big challenge with open environment especially Internet and TCP based Networks. There are several extra file transfer protocols behind core FTP protocol, but each of them suffer from either slow, unreliable or unsecure workflow....
Conference Paper
Full-text available
This paper proposes a network connectivity model for e-learning environment based on integration a number of modern information and communication techniques for deliver the learning materials between e-learning system-servers and students' clientdevices. The proposed network connectivity model is based on three logical layers, Layer-I use the moder...
Book
Full-text available
"Fundamentals of Web Engineering" book includes six chapters that deals with important web issues: First issue, explain the principles of website engineering that are used for developing the website, web crisis and website engineering, process models, website life cycle, and web promotion. Second issue, explains the proposed standard specification...
Book
Full-text available
Wireless web devices outnumber the desktop browser devices, and there is a growing need to provide alternative means to access web content and services through the cellular mobile devices. According to this need, the website must be prepared and the techniques must have the ability to deliver the website’s contents suited to their unique needs. Thi...
Article
Full-text available
Multimedia (include video, images, audio and text media) is characterized by its high dimensionality, which makes information retrieval and data mining even more challenging. This research proposesa method to build an indexes database for huge collection of video clips, to make the video retrieval and mining much more efficient and perfectthat by c...
Article
Full-text available
Most of the previous spatial mining works are depend on strategy of organizing the huge spatial data in a suitable data structure and usually the data organized as RTree. The data mining algorithms then applied on each level of R-Tree. This method causes time consuming and takes huge storage area and leads to inadequate results. The proposed approa...
Conference Paper
Full-text available
Network security controls (preventive controls) like firewall, VPN (Virtual Private Network), PKI (Public Key Infrastructure) and others are important tools to keep the web more secure, but they are not enough to ensure web site security. Therefore, the web environment must be viewed as a whole. In this paper, Anti Web site Defacement System (AWDS)...
Conference Paper
Full-text available
The variety web recommendation systems uses several methods to observe the behavior of web users and collect comprehensive information about them, then automatically recommend the interest hyperlinks for each individual or group of web users, in order to help users locate information and services on the large website(s). The processes of active use...
Conference Paper
Full-text available
This research introduces the notion of enhance the existing Data Mining – A Priori Boolean association algorithm, which is used widely as a tool to influence how related webpage recommendations are made in the web personalization – based recommendation systems. The enhanced Data Mining – A Priori association algorithm (which is called EAPriori algo...
Conference Paper
Full-text available
This research introduces the notion of using Data Mining – web usage techniques as a tool to influence how 'Related Web-page Recommendations' (RWR) are made. The Data Mining – web usage techniques will be implemented in the 'Adaptive Website Agents' – which is introduced in 2002 by [9]-to improve the work of these agents to recommend relevant web p...
Conference Paper
Full-text available
WAP (Wireless Application Protocol) is not a service but a technology for developing various wireless applications. WAP is a complete open technology for delivering Web content to mobile devices such as: cellular mobile phones, PDAs (Personal Digital Assistants) and pagers independent of carrier, vendor, or network technology. Users need to maintai...
Article
Full-text available
In our earlier works [1], we described our standard specification for Web Site Design (WSD). However, in this paper, basic principles for Web Site design have been given. Then we proposed a second version of Standard Specification (SS2) for Web Sites design (called SS2-WSD). The SS2-WSD is a set of guidelines for Web Developers, Authors, and Design...
Article
A Suggested Methods for Information Hiding in Email Written in HTML
Article
A Proposed Method to Hide Text inside HTML Web Page File
Conference Paper
A Proposed for Extending Web Page Services and Capabilities
Article
Full-text available
Multimedia (include video, images, audio and text media) is characterized by its high dimensionality, which makes information retrieval and data mining even more challenging. This research proposesa method to build an indexes database for huge collection of video clips, to make the video retrieval and mining much more efficient and perfectthat by c...

Network

Cited By