About
53
Publications
74,539
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,912
Citations
Citations since 2017
Introduction
Additional affiliations
September 2019 - present
Education
January 2017 - December 2018
September 2002 - July 2006
Publications
Publications (53)
Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish sec...
Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish sec...
During the past decades, sport, in general, has become one of the most powerful competitions and the most popular in the world. As well as, everyone is waiting for the winner, and who will be the champion in the end in different tournaments. Among these sports, football's popularity is more than all other sports. Football matches results predicting...
Server Supported by Cloud and GPS based on Backpropagation
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This a...
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This a...
Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types...
Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs...
There are relatively new approaches of Parallel Distributed Processing. Distributed cloud uses cloud computing technology from different geographic locations to interconnect data and applications served. Distributed, in the sense of information technology (IT), something is exchanged between various systems that may also be in different places. The...
Nowadays, eye tracking and blink detection are increasingly popular among researchers and have the potential to become a more important component of future perceptual user interfaces. The real-time eye-tracking system has been a fundamental and challenging problem for machine learning problems. The main purpose of this paper is to propose a new met...
Diabetes Mellitus is a chronic disease that spreads quickly worldwide. It results from increasing the blood glucose level and causes complications in the heart, kidney, and eyes. Diabetic Retinopathy (DR) is an eye disease that refers to the bursting of blood vessels in the retina as Diabetes exacerbates. It is considered the main reason for blindn...
Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges...
In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. In internet traffic encryption, symmetrical block chips play an essent...
With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets constantly produce a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the end devices' energy, and storage spaces are strictly constrained by Self-organization and microorganisms. IoT networks enable out-sourced dat...
Disasters could cause communication systems to partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily main...
Face expression recognition technology is one of the most recently developed fields in machine learning and has profoundly helped its users through forensic, security, and biometric applications. Many researchers and program developers have allocated their time and energy to figure out various techniques which would add to the technology's function...
Electronic Human Resource Management System (EHRMS) is a paperless-based system, which plays a vital role in facilitating organizational processes, overcoming all obstacles of a paper-based system, reducing cost, time, and efforts, enhancing the quality of services (QoS), and providing more accurate data. In addition, it is beneficial for competiti...
Facial exprestion recognition as a recently developed method in computer vision is founded upon the idea of analazing the facial changes in which are witnessed due to emotional impacts on an individual. This paper provides a performance evaluation of a set of supervised classifiers used for facial expression recognition based on minimum features se...
Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of service of each E-organization. Hence, mitigation this type of attack is considered a persistent need. In this pa...
In this paper, a professional integrated operating system performance measurement system is proposed, designed, and implemented in order to monitor processes and threads. Because monitoring itself is not enough, so this system provides full control of the CPU forcing, Priority-changing, and pausing-resuming-killing of these processes/threads. Durin...
Technology has changed our life and the way we work; however, technology has affected several methods of working in Small and Medium Enterprises (SME)s. Human Resource (HR) is one of the core components in businesses, and nowadays most businesses are using technology for daily basis tasks. However, it still is not used all over the world. In Kurdis...
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, is being clearer when considering that malware and other types with cyberattacks attack such portable structures. Malware has always been a...
Every era introduces different challenges to healthcare organizations, and the start of the twenty-first century has been no different. Today there is the unprecedented concentration on the quality of health services. A strong health-care system distributes quality services to all people, where and whenever they need it. Vaccination is one of the m...
In recent, the high available internet service is the main demand of most people. However, online services occasionally become inaccessible due to various threats and attacks. Synchronization (SYN) flood distributed denial of service (DDoS) is the most used and has a serious effect on public network services. Hence, the outcome of this attack on th...
p>In recent, the high available internet service is main demand of the most people. However, online services occasionally become inaccessible due to various threats and attacks. Synchronization (SYN) flood Distributed Denial of Service (DDoS) is the most used and has a serious effect on the public network services. Hence, the outcome of this attack...
Internet of Things (IoT) and Cloud computing are extremely distinct technologies which are by now playing an important role in our life. It is expected that adopting and using them would be more and more common, that makes them significant components for the Future Internet (FI).The upcoming internet-associated revolution is almost there with the e...
Over recent years, the evolution of mobile wireless communication in the world has become more important after arrival 5G technology. This evolution journey consists of several generations start with 1G followed by 2G, 3G, 4G, and under research future generations 5G is still going on. The advancement of remote access innovations is going to achiev...
The importance of process monitoring applications continues to grow. Generally, many of the developments in process monitoring are being driven by access to more and more data. Process monitoring is important to understand the variation in a process and to assess its current state. Process monitoring and controlling an organization is of high impor...
Cloud computing is a new technology which managed by a third party "cloud provider" to provide the clients with services anywhere, at any time, and under various circumstances. In order to provide clients with cloud resources and satisfy their needs, cloud computing employs virtualization and resource provisioning techniques. The process of providi...
Distributed system can be composed of, possibly computing and heterogeneous nodes linked through a communication network. The entire resources of any node supposed to be transparently and easily accessible from other nodes. A critical part of a distributed system design configuration is the decision of a load sharing or global planning procedure. T...
Distributed systems performance is affected significantly by cache coherence protocols due to their role in data consistency maintaining. Also, cache coherent protocols have a great task for keeping the interconnection of caches in a multiprocessor environment. Moreover, the overall performance of distributed shared memory multiprocessor system is...
Facial Expression Recognition (FER) became an important and interest challenging area in the field of computer vision. Due to its major application possibilities, FER is an active topic of research papers since the 1990s, also for the same reason, FER has accomplished a high role in the image processing area. Typically, FER is processed in three ma...
a system that comprises of self-sufficient computers that are associated utilizing a conveyance middleware is called distributed system. Also, computations-over-Internet are fundamentals in the field of present-day processing frameworks. Where cloud suppliers need to give a successful asset to the clients to expand its QoSThe computations-over-Inte...
Multi-core is one of the most significant speed-enhancing trends of processors for getting a boost in performance. Thus, making the new direction manufacturers are focusing on to be Multi-Core-Processors (MCP). Boosting the multitasking computing-power is one of many advantages of MCP. These kinds of processors provide few complete execution cores...
Enterprise Resource Planning (ERP) systems is a comprehensive integrated system that governs all aspects of a business. It gives your business automation and integration for core processes such as taking client orders, planning operations and maintaining inventory records and commercial data. Using ERP systems provide the user transparency into the...
In recent years the graphic processing units (GPUs) programmability has increased and this lead to use in several areas. GPUs can tackle enormous data parallel issues at a higher speed than the conventional CPU. Moreover, GPUs considered more affordable and energy-efficient than distributed systems. This paper gives a comprehensive review of the se...
Due to sharp increases in data dimensions, working on every data mining or machine learning (ML) task requires more efficient techniques to get the desired results. Therefore, in recent years, researchers have proposed and developed many methods and techniques to reduce the high dimensions of data and to attain the required accuracy. To ameliorate...
The cloud is the best method used for the utilization and organization of data. The cloud provides many resources for us via the internet. There are many technologies used in cloud computing systems; each one uses a different kind of protocols and methods. Many tasks can execute on different servers per second, which cannot execute on their compute...
Since the last decade, Internet users increased rapidly and most of them are depending on the World Wide Web (WWW) service for achieving daily routine. Having Internet access and especially WWW sometimes users face difficulties because of various security problems. The most dangerous and serious threats that make Internet services impossible is Den...
The last days, the data and internet are become increasingly growing which occurring the problems in big-data. For these problems, there are many software frameworks used to increase the performance of the distributed system. This software is used for available of large data storage. One of the most beneficial software frameworks used to utilize da...
In this paper, several works has been presented related to the clustering parallel computing for distributed system. The trend of the paper is to focus on the strength points of previous works in this field towards enhancing performance of the distributed systems. This concentration conducted via presenting several techniques where each of them has...
Nowadays, the massive load on the internet by the demanders and diversity of web applications, the web servers have become crucial. Therefore, many related companies and web developers try to generate powerful structures and efficient systems for web servers in order to satisfy internet users and the web servers from being overworked. Furthermore,...
Nowadays, the massive load on the internet by the demanders and diversity of web applications, the web servers have become crucial. Therefore, many related companies and web developers try to generate powerful structures and efficient systems for web servers in order to satisfy internet users and the web servers from being overworked. Furthermore,...
Advancement in Information and Communications Technology (ICT) has become the communication medium for virtually every small or large industry around the world. This technology changed the ways of doing business and has led to the invention of a new concept called Electronic Business (E-Business). E-Business involves various activities for any busi...
Enterprise systems have a clear role in the market processes, especially e-business systems which play basic role in the world today, with presence of technological evolution many recent technologies appeared which can serve e-business trend such as Internet of Things (IoT), cloud computing and virtual marketplace engineering, which facilitate gene...
In the past few years, the Internet has become increasingly very important to
current society. Also, it has changed our way of communication, business
modes, and made information publicly accessible from almost anywhere and
anytime. Moreover, is the main demand for almost all the people is to
continuously and without any errors accessing the Intern...
Nowadays, continuously accessing Internet services is vital for the most of people. However, due to Denial of Service (DoS) and its severe type ‘Distributed Denial of Service (DDoS), online services becomes unavailable to users in sometimes. Rather than DDoS is dangerous and has serious impact on the Internet consumers, there are multiple types of...
Questions
Question (1)
What is required for Republishing an article in a book? How we can distinguish a valid publishing agency from a fake one?
Projects
Projects (9)
1-Sharing & recommending publications.
2-Connecting with colleagues.
3-Seeking new collaborations.
4-Obtaining statistics and metrics on use of uploaded publications.
5-Asking questions of researchers around the world that have the same set of interests.
6-Job seeking or recruitment.
7- Journal Invitations (Editorial Board, Reviewer)
8- Call for papers
9- International Conferences