• Home
  • Rizgar R. Zebari
Rizgar R. Zebari

Rizgar R. Zebari

MSc of IT

About

53
Publications
74,539
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,912
Citations
Citations since 2017
53 Research Items
1910 Citations
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
Additional affiliations
September 2019 - present
Duhok Polytechnic University
Position
  • Lecturer
Education
January 2017 - December 2018
Duhok Polytechnic University
Field of study
  • Information Technology
September 2002 - July 2006

Publications

Publications (53)
Article
Full-text available
Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish sec...
Article
Full-text available
Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish sec...
Article
Full-text available
During the past decades, sport, in general, has become one of the most powerful competitions and the most popular in the world. As well as, everyone is waiting for the winner, and who will be the champion in the end in different tournaments. Among these sports, football's popularity is more than all other sports. Football matches results predicting...
Article
Full-text available
Server Supported by Cloud and GPS based on Backpropagation
Conference Paper
Full-text available
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This a...
Article
Full-text available
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This a...
Article
Full-text available
Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types...
Article
Full-text available
Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs...
Conference Paper
Full-text available
There are relatively new approaches of Parallel Distributed Processing. Distributed cloud uses cloud computing technology from different geographic locations to interconnect data and applications served. Distributed, in the sense of information technology (IT), something is exchanged between various systems that may also be in different places. The...
Conference Paper
Full-text available
Nowadays, eye tracking and blink detection are increasingly popular among researchers and have the potential to become a more important component of future perceptual user interfaces. The real-time eye-tracking system has been a fundamental and challenging problem for machine learning problems. The main purpose of this paper is to propose a new met...
Conference Paper
Full-text available
Diabetes Mellitus is a chronic disease that spreads quickly worldwide. It results from increasing the blood glucose level and causes complications in the heart, kidney, and eyes. Diabetic Retinopathy (DR) is an eye disease that refers to the bursting of blood vessels in the retina as Diabetes exacerbates. It is considered the main reason for blindn...
Article
Full-text available
Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges...
Article
Full-text available
In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. In internet traffic encryption, symmetrical block chips play an essent...
Article
Full-text available
With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets constantly produce a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the end devices' energy, and storage spaces are strictly constrained by Self-organization and microorganisms. IoT networks enable out-sourced dat...
Article
Full-text available
Disasters could cause communication systems to partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily main...
Conference Paper
Full-text available
Face expression recognition technology is one of the most recently developed fields in machine learning and has profoundly helped its users through forensic, security, and biometric applications. Many researchers and program developers have allocated their time and energy to figure out various techniques which would add to the technology's function...
Conference Paper
Full-text available
Electronic Human Resource Management System (EHRMS) is a paperless-based system, which plays a vital role in facilitating organizational processes, overcoming all obstacles of a paper-based system, reducing cost, time, and efforts, enhancing the quality of services (QoS), and providing more accurate data. In addition, it is beneficial for competiti...
Article
Full-text available
Facial exprestion recognition as a recently developed method in computer vision is founded upon the idea of analazing the facial changes in which are witnessed due to emotional impacts on an individual. This paper provides a performance evaluation of a set of supervised classifiers used for facial expression recognition based on minimum features se...
Conference Paper
Full-text available
Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of service of each E-organization. Hence, mitigation this type of attack is considered a persistent need. In this pa...
Conference Paper
In this paper, a professional integrated operating system performance measurement system is proposed, designed, and implemented in order to monitor processes and threads. Because monitoring itself is not enough, so this system provides full control of the CPU forcing, Priority-changing, and pausing-resuming-killing of these processes/threads. Durin...
Article
Full-text available
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdis...
Article
Full-text available
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been a...
Article
Full-text available
Every era introduces different challenges to healthcare organizations, and the start of the twenty-first century has been no different. Today there is the unprecedented concentration on the quality of health services. A strong health-care system distributes quality services to all people, where and whenever they need it. Vaccination is one of the m...
Article
Full-text available
In recent, the high available internet service is the main demand of most people. However, online services occasionally become inaccessible due to various threats and attacks. Synchronization (SYN) flood distributed denial of service (DDoS) is the most used and has a serious effect on public network services. Hence, the outcome of this attack on th...
Article
Full-text available
p>In recent, the high available internet service is main demand of the most people. However, online services occasionally become inaccessible due to various threats and attacks. Synchronization (SYN) flood Distributed Denial of Service (DDoS) is the most used and has a serious effect on the public network services. Hence, the outcome of this attack...
Article
Full-text available
Internet of Things (IoT) and Cloud computing are extremely distinct technologies which are by now playing an important role in our life. It is expected that adopting and using them would be more and more common, that makes them significant components for the Future Internet (FI).The upcoming internet-associated revolution is almost there with the e...
Article
Full-text available
Over recent years, the evolution of mobile wireless communication in the world has become more important after arrival 5G technology. This evolution journey consists of several generations start with 1G followed by 2G, 3G, 4G, and under research future generations 5G is still going on. The advancement of remote access innovations is going to achiev...
Article
Full-text available
The importance of process monitoring applications continues to grow. Generally, many of the developments in process monitoring are being driven by access to more and more data. Process monitoring is important to understand the variation in a process and to assess its current state. Process monitoring and controlling an organization is of high impor...
Article
Full-text available
Cloud computing is a new technology which managed by a third party "cloud provider" to provide the clients with services anywhere, at any time, and under various circumstances. In order to provide clients with cloud resources and satisfy their needs, cloud computing employs virtualization and resource provisioning techniques. The process of providi...
Article
Full-text available
Distributed system can be composed of, possibly computing and heterogeneous nodes linked through a communication network. The entire resources of any node supposed to be transparently and easily accessible from other nodes. A critical part of a distributed system design configuration is the decision of a load sharing or global planning procedure. T...
Article
Full-text available
Distributed systems performance is affected significantly by cache coherence protocols due to their role in data consistency maintaining. Also, cache coherent protocols have a great task for keeping the interconnection of caches in a multiprocessor environment. Moreover, the overall performance of distributed shared memory multiprocessor system is...
Article
Full-text available
Facial Expression Recognition (FER) became an important and interest challenging area in the field of computer vision. Due to its major application possibilities, FER is an active topic of research papers since the 1990s, also for the same reason, FER has accomplished a high role in the image processing area. Typically, FER is processed in three ma...
Article
Full-text available
a system that comprises of self-sufficient computers that are associated utilizing a conveyance middleware is called distributed system. Also, computations-over-Internet are fundamentals in the field of present-day processing frameworks. Where cloud suppliers need to give a successful asset to the clients to expand its QoSThe computations-over-Inte...
Article
Full-text available
Multi-core is one of the most significant speed-enhancing trends of processors for getting a boost in performance. Thus, making the new direction manufacturers are focusing on to be Multi-Core-Processors (MCP). Boosting the multitasking computing-power is one of many advantages of MCP. These kinds of processors provide few complete execution cores...
Article
Full-text available
Enterprise Resource Planning (ERP) systems is a comprehensive integrated system that governs all aspects of a business. It gives your business automation and integration for core processes such as taking client orders, planning operations and maintaining inventory records and commercial data. Using ERP systems provide the user transparency into the...
Article
Full-text available
In recent years the graphic processing units (GPUs) programmability has increased and this lead to use in several areas. GPUs can tackle enormous data parallel issues at a higher speed than the conventional CPU. Moreover, GPUs considered more affordable and energy-efficient than distributed systems. This paper gives a comprehensive review of the se...
Article
Full-text available
Due to sharp increases in data dimensions, working on every data mining or machine learning (ML) task requires more efficient techniques to get the desired results. Therefore, in recent years, researchers have proposed and developed many methods and techniques to reduce the high dimensions of data and to attain the required accuracy. To ameliorate...
Article
Full-text available
The cloud is the best method used for the utilization and organization of data. The cloud provides many resources for us via the internet. There are many technologies used in cloud computing systems; each one uses a different kind of protocols and methods. Many tasks can execute on different servers per second, which cannot execute on their compute...
Article
Full-text available
Since the last decade, Internet users increased rapidly and most of them are depending on the World Wide Web (WWW) service for achieving daily routine. Having Internet access and especially WWW sometimes users face difficulties because of various security problems. The most dangerous and serious threats that make Internet services impossible is Den...
Article
Full-text available
The last days, the data and internet are become increasingly growing which occurring the problems in big-data. For these problems, there are many software frameworks used to increase the performance of the distributed system. This software is used for available of large data storage. One of the most beneficial software frameworks used to utilize da...
Article
Full-text available
In this paper, several works has been presented related to the clustering parallel computing for distributed system. The trend of the paper is to focus on the strength points of previous works in this field towards enhancing performance of the distributed systems. This concentration conducted via presenting several techniques where each of them has...
Article
Full-text available
Nowadays, the massive load on the internet by the demanders and diversity of web applications, the web servers have become crucial. Therefore, many related companies and web developers try to generate powerful structures and efficient systems for web servers in order to satisfy internet users and the web servers from being overworked. Furthermore,...
Article
Full-text available
Nowadays, the massive load on the internet by the demanders and diversity of web applications, the web servers have become crucial. Therefore, many related companies and web developers try to generate powerful structures and efficient systems for web servers in order to satisfy internet users and the web servers from being overworked. Furthermore,...
Article
Full-text available
Advancement in Information and Communications Technology (ICT) has become the communication medium for virtually every small or large industry around the world. This technology changed the ways of doing business and has led to the invention of a new concept called Electronic Business (E-Business). E-Business involves various activities for any busi...
Article
Full-text available
Enterprise systems have a clear role in the market processes, especially e-business systems which play basic role in the world today, with presence of technological evolution many recent technologies appeared which can serve e-business trend such as Internet of Things (IoT), cloud computing and virtual marketplace engineering, which facilitate gene...
Thesis
In the past few years, the Internet has become increasingly very important to current society. Also, it has changed our way of communication, business modes, and made information publicly accessible from almost anywhere and anytime. Moreover, is the main demand for almost all the people is to continuously and without any errors accessing the Intern...
Conference Paper
Full-text available
Nowadays, continuously accessing Internet services is vital for the most of people. However, due to Denial of Service (DoS) and its severe type ‘Distributed Denial of Service (DDoS), online services becomes unavailable to users in sometimes. Rather than DDoS is dangerous and has serious impact on the Internet consumers, there are multiple types of...

Questions

Question (1)
Question
What is required for Republishing an article in a book? How we can distinguish a valid publishing agency from a fake one?

Network

Cited By

Projects

Projects (9)
Project
1-Sharing & recommending publications. 2-Connecting with colleagues. 3-Seeking new collaborations. 4-Obtaining statistics and metrics on use of uploaded publications. 5-Asking questions of researchers around the world that have the same set of interests. 6-Job seeking or recruitment. 7- Journal Invitations (Editorial Board, Reviewer) 8- Call for papers 9- International Conferences