Siddeeq Yousif Ameen

Siddeeq Yousif Ameen
Duhok Polytechnic University | DPU · Research Center Director

BSc, MSc, PhD, SMIEEE, FHEA
Professor, Research Center Director, and Educational Programmes Development

About

111
Publications
75,848
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
733
Citations
Citations since 2017
60 Research Items
647 Citations
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
Introduction
Experienced Professor with a demonstrated history of 28 years academic working profession in teaching, research and administration. I have been educated in Digital Data Communication and Processing in my Master and PhD at a leading University in UK, Loughborough University. Since 1990, my teaching experience started till now spreading from data communication to computer networking, information and network security and information systems management and development. Many workshops related to education and quality assurance have attended especially in Bahrain arranged by the HEC, QAAET, UoB, GU and ASU and HEA UK that offer me HEA fellowship in 2016. Other workshops and certificates were also gained from International organization such as UN IIE, ABET and IREX Education. Research skills h
Additional affiliations
September 2012 - September 2015
University of Mosul
Position
  • Professor

Publications

Publications (111)
Article
Full-text available
The demands for higher throughput, data rate, low latency, and capacity in 5G communication systems prompt the use of millimeter-wave frequencies that range from 3-300 GHz with spatial multiplexing and beamforming. To get the maximum benefit from this technology, it's important to study all the challenges of using mm-wave for 5G and beyond. One of...
Conference Paper
With the onset of the 2019 coronavirus disease outbreak (COVID19), the shift from traditional in-person care to mostly virtual or remote care has been accelerated. Choosing the appropriate telemedicine communication services and interaction modes is critical to the success of remote disease management infrastructures for a better future healthcare...
Article
Full-text available
WiMAX technology with up to 30 miles of coverage compared to other technologies is more vulnerable to jamming attacks, and therefore, the security issue was a major concern. The jamming attack affected the network by reducing throughput and increasing delay in different applications, several solutions and protocols were introduced for this issue. O...
Article
Full-text available
Third-party libraries are frequently utilized to save implementation time when developing new software. The significance of libraries in the creation of mobile applications cannot be overstated. Others can use the programmer's library created and shared with the rest of the world in their own projects as a result of your efforts. The purpose of thi...
Article
Full-text available
The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With the second approach two kinds of destruction techniques have been adopted these are filtering and dis...
Article
Machin learning (ML) and Deep Learning (DL) technique have been widely applied to areas like image processing and speech recognition so far. Likewise, ML and DL play a critical role in detecting and preventing in the field of cybersecurity. In this review, we focus on recent ML and DL algorithms that have been proposed in cybersecurity, network int...
Article
Cardiovascular disorders are one of the major causes of sad death among older and middle-aged people. Over the past two decades, health monitoring services have evolved quickly and had the ability to change the way health care is currently provided. However, the most challenging aspect of the mobile and wearable sensor-based human activity recog...
Article
Blockchain technology is now becoming highly appealing to the next generation because it is better tailored to the information age. Blockchain technologies can also be used in the Internet of Things (IoT) and fog computing. The development of IoT and Fog Computing technologies in different fields has resulted in a major improvement in distributed n...
Conference Paper
Multi Input Multi Output MIMO and Orthogonal Frequency Division Multiplexing OFDM based communication strategies have gained popularity in the industry and research fields due to the rising demand for wireless cellular communication. Massive MIMO-OFDM-based cellular communication has recently become popular in a variety of realtime applications. Ho...
Article
Full-text available
Multi Input Multi Output MIMO and Orthogonal Frequency Division Multiplexing OFDM based communication strategies have gained popularity in the industry and research fields due to the rising demand for wireless cellular communication. Massive MIMO-OFDM-based cellular communication has recently become popular in a variety of realtime applications. Ho...
Article
Full-text available
The vulnerabilities in most web applications enable hackers to gain access to confidential and private information. Structured query injection poses a significant threat to web applications and is one of the most common and widely used information theft mechanisms. Where hackers benefit from errors in the design of systems or existing gaps by not f...
Article
Full-text available
Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio,...
Article
Full-text available
Vehicular communications, referring to information exchange among vehicles, and infrastructures. It has attracted a lot of attention recently due to its great potential to support intelligent transportation, various safety applications, and on-road infotainment. The aim of technologies such as Vehicle-to-Vehicl (V2V) and Vehicle to-Every-thibg (V2X...
Article
Full-text available
Biometrics is developing into a technological science in this lifelong technology for the defense of identification. Biometrics is the technology to recognize individuals based on facial features, fingerprints, iris, retina, speech, handprints, etc. Biometric features are used for human recognition and identification. Much research was done in the...
Article
Full-text available
Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among severa...
Article
Full-text available
Clients can adequately control PCs and create reports by speaking with the guide of innovation, discourse acknowledgment empowers records to be delivered all the more effectively in light of the fact that the program normally produces words as fast as they expressed, which is typically a lot faster than a human can compose. Discourse acknowledgment...
Article
With the exponential growth of the information on the Internet, there is a high demand for making this information readable and processable by machines. For this purpose, there is a need for the Natural Language Processing (NLP) pipeline. Natural language analysis is a tool used by computers to grasp, perceive, and control human language. This pape...
Article
Full-text available
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a det...
Article
Full-text available
With the increased access of Users Equipment’s (UE)s during congested or full load traffic, the existed beams for each base station (BS) will be less than the number of active (UE)s. At this challenging condition, it is essential to create additional beams to serve those (UE)s. In this paper, at congested traffic only, a beam assigned to any UE wil...
Article
Full-text available
Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. T...
Article
Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. T...
Article
Full-text available
The Internet of Things (IoT) is one of today's most rapidly growing technologies. It is a technology that allows billions of smart devices or objects known as "Things" to collect different types of data about themselves and their surroundings using various sensors. They may then share it with the authorized parties for various purposes, including c...
Article
Full-text available
With the increased access of Users Equipment’s (UE)s during congested or full load traffic, the existed beams for each base station (BS) will be less than the number of active (UE)s. At this challenging condition, it is essential to create additional beams to serve those (UE)s. In this paper, at congested traffic only, a beam assigned to any UE wil...
Article
Full-text available
In recent years, when users across the world have embraced smart devices in greater numbers owing to recent advances and appealing applications, they have also become a target for criminals who are zealously attempting to breach protection. As a result, a significant number of attacks have been observed on these systems. As a result, several passwo...
Article
Full-text available
The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and respondin...
Article
Full-text available
Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, incr...
Article
Full-text available
Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs...
Article
Full-text available
New research into human-computer interaction seeks to consider the consumer's emotional status to provide a seamless human-computer interface. This would make it possible for people to survive and be used in widespread fields, including education and medicine. Multiple techniques can be defined through human feelings, including expressions, facial...
Article
Full-text available
The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and respondin...
Article
Full-text available
One of the most serious problems facing the community around the world is car accidents. These accidents occur mainly due to the high-speed of vehicles. Thus, the paper aims to capture, track, and control high-speed vehicles using LTE-A mobile networks to avoid high-speed situations as well as decrease the number of accidents. The paper assumes tha...
Article
Full-text available
It is well known that social media networks have a rapid growth in the number of users, since it is widely adopted as a way of communication, sharing knowledge, sharing thoughts, photos, videos, forming networks and many other features that attract more and more people worldwide. This increase raises the threats and risk consequences because of the...
Article
Full-text available
It is well known that social media networks have a rapid growth in the number of users, since it is widely adopted as a way of communication, sharing knowledge, sharing thoughts, photos, videos, forming networks and many other features that attract more and more people worldwide. This increase raises the threats and risk consequences because of the...
Article
Full-text available
With the increasing development of technical service, the security problem still appears as an obstacle between user and these services, especially when the windows operating system users haven't enough expertise. As a result, the user will be more susceptible to many problems. Therefore, this paper aims to detect local attacks in such environments...
Article
Full-text available
With the increasing development of technical service, the security problem still appears as an obstacle between user and these services, especially when the windows operating system users haven't enough expertise. As a result, the user will be more susceptible to many problems. Therefore, this paper aims to detect local attacks in such environments...
Article
Full-text available
The paper describes the design and implementation of a remote Smart Oil Pipeline Surveillance System (SOPSS), with the ability to detect and report vandalism activities in the pipeline system before it takes place via SMS, email or by a phone call. The proposed system enriches with a vast range of sensors to increase sensing capability and accuracy...
Conference Paper
The task of estimating, tracking and controlling the speed of user equipment (UE), particularly with speed above allowed limits, is a challenge which has a significant impact on radio resource and mobility management in Long Term Evolution (LTE). This is very essential to control the speed and avoid traffic accidents with the help of the LTE networ...
Article
Full-text available
Packet Scheduling (PS) is essential in Long Term Evolution (LTE) cellular system to handle huge traffic via allocating common resources among users. The main target of PS, in LTE systems, is the Radio Resource Management (RRM) by including strategies, algorithms, and schemes to control important parameters and factors such as transmit power, data r...
Article
Full-text available
Information and network security have received a great attention in the past two decades and this attention will increase as the world moving dramatically towards making governmental and organizational systems computerized. Several events and scandals occurred that show that there are security breaches in most the powerful information security syst...
Preprint
Full-text available
The paper investigates a major challenge of the protection of mutual and transmitted data that exchanged between smart buildings and data centers that works through a private cloud computing environment. This challenge faces the operators and officials of private cloud computing and smart building. The paper highlighted a protection system to secur...
Article
Full-text available
The paper investigates the performance enhancement of MIMO-OFDM system by using LMS, VSSLMS, SignLMS and RLS adaptive equalizers. Precisely the paper compares between two methods of training mode in equalizers that are used with MIMO-OFDM system, the Full Frame (FF) method that uses one frame from sets of frames as a desired signal and the Pa...
Article
Abstract: The paper investigates the performance enhancement of MIMO-OFDM system by using four proposed adaptive algorithms AtanLMS, LogLMS, LnLMS and ExpLMS used to adjust the taps weight of an equalizer. The paper compares the performance of these proposed algorithms with the conventional LMS and VSSLMS adaptive algorithms taking into account the...
Article
Full-text available
The paper investigates the performance enhancement of MIMO-OFDM system by using LMS, VSSLMS, SignLMS and RLS adaptive equalizers. Precisely the paper compares between two methods of training mode in equalizers that are used with MIMO-OFDM system, the Full Frame (FF) method that uses one frame from sets of frames as a desired signal and the Part Fra...
Article
Full-text available
The paper investigates the performance enhancement of MIMO-OFDM system by using LMS, VSSLMS, SignLMS and RLS adaptive equalizers. Precisely the paper compares between two methods of training mode in equalizers that are used with MIMO-OFDM system, the Full Frame (FF) method that uses one frame from sets of frames as a desired signal and the Part Fra...
Article
Full-text available
This paper evaluates the effects of high mobility of Users Equipment (UEs) on the performances of different data rate services using four scheduling algorithms in the uplink of LTE system using the uplink Vienna simulator.The uplink reports Channel Quality Indicator (CQI), Precoding Matrix Indicator (PMI) and Rank Indicator (RI) to inform the evolv...
Article
Full-text available
In this paper a new simplified adaptive filter algorithm is introduced which is based on the hybrid operation of variable step-size and fixed step-size least mean square adaptive algorithm. In this proposed algorithm the variable step-size is used in the first stage, the algorithm adopts the fixed step size least mean square (LMS) whenever an accep...
Conference Paper
Full-text available
In this paper a new simplified adaptive filter algorithm is introduced which is based on the hybrid operation of variable step-size and fixed step-size least mean square adaptive algorithm. In this proposed algorithm the variable step-size is used in the first stage, the algorithm adopts the fixed step size least mean square (LMS) whenever an accep...
Article
Full-text available
This paper evaluates the performance of Long Term Evolution (LTE) high data-rate services for User Equipment (UE) in rural environments with speeds up to 200 km/hr using system-level simulations. We assess the performance in terms of impediments of Channel Quality Indicator (CQI), Block Error Rate (BLER), Bit Error Rate (BER) and throughput. One of...
Article
Full-text available
The paper investigates the effects of Users Equipment (UEs) mobility on the performance of 4G LTE-A under high data rate services. One of the key techniques supporting LTE services is Adaptive Modulation and Coding (AMC) in which the modulation scheme and the coding rate are adaptively changed to match the current channel conditions as reported by...
Article
Full-text available
Abstract— The paper attempts to modify the conventional Advanced Encryption Standard (AES) to obtain a customized and more secure algorithm. This modification is based on the use of artificial neural networks for key expansion schedule processes. The latter is achieved with use of symmetric key cipher based on Pseudo Random Number Generation PRNG i...
Article
Full-text available
The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator h...
Article
Full-text available
Cooperative communication systems are considered to be a promising technology to improve the system capacity, reliability and performances over fading wireless channels. Cooperative relaying system with a single antenna will be able to reach the advantages of multiple antenna communication systems. It is ideally suitable for the distributed communi...
Article
Full-text available
Energy consumption is one of the important challenge in WSNs deployment and applications. This is because power of WSNs is limited by battery which is difficult if not impossible to replace or recharge in some manner in the sensor nodes. Power consumption can be controlled in WSNs in more than one layer. In this thesis, power efficiency problems an...
Conference Paper
Full-text available
This paper investigates the best way for representing wireless sensor networks using various topologies of ZigBee. The use of coordination with such networks was investigated together with coordinator load. The investigation has been achieved via the use of different scenarios in the OPNET Modeler simulator. The simulation study investigates the us...
Conference Paper
Full-text available
Bahrain's electrical grid system faces a major problem in the summer due to the increase in the energy consumption and particularly in refrigeration and air-conditioning. With sophisticated modern methods being developed to reduce the energy consumption of such electrical load, the research is concerned and applied to the case of Bahrain's electric...
Conference Paper
Full-text available
Information and network security have received a great attention in the past two decades and this attention will increase as the world moving dramatically towards making governmental and organizational systems computerized. Several events and scandals occurred that show that there are security breaches in most the powerful information security syst...
Article
Full-text available
This paper proposed an image encryption algorithm that can be called Modified Stream Image Encryption to verify the requirements of secure image transfer. The proposed algorithm is based on the symmetric key encryption approach. The system employs Neural Networks (NN) based pseudo random number generator with back propagation learning algorithm. Th...