• Home
  • Subhi R. M. Zeebaree
Subhi R. M. Zeebaree

Subhi R. M. Zeebaree
DPU · DPU Presidency

Prof. Dr. Eng. in Computer Engineering

About

187
Publications
190,508
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,338
Citations
Citations since 2017
176 Research Items
4334 Citations
201720182019202020212022202305001,0001,5002,000
201720182019202020212022202305001,0001,5002,000
201720182019202020212022202305001,0001,5002,000
201720182019202020212022202305001,0001,5002,000
Introduction
Distributed Systems, OS, Web Development, Cloud Computing, Smart City, Semantic Web, Parallel Processing, Fault Tolerance, Web Servers.
Additional affiliations
May 2019 - April 2020
Duhok Polytechnic University
Position
  • Manager
July 2018 - April 2019
Duhok Polytechnic University
Position
  • Manager
January 2017 - June 2018
Nawroz University
Position
  • Head of Department

Publications

Publications (187)
Article
Full-text available
The demands for higher throughput, data rate, low latency, and capacity in 5G communication systems prompt the use of millimeter-wave frequencies that range from 3-300 GHz with spatial multiplexing and beamforming. To get the maximum benefit from this technology, it's important to study all the challenges of using mm-wave for 5G and beyond. One of...
Article
Full-text available
As the amount of medical images transmitted over networks and kept on online servers continues to rise, the need to protect those images digitally is becoming increasingly important. However, due to the massive amounts of multimedia and medical pictures being exchanged, low computational complexity techniques have been developed. Most commonly used...
Article
Full-text available
Getting to know sign language is of great research importance as it affects the lives of deaf and mute people and societies in general. The rapid development of deep learning techniques presents new horizons in sign language recognition because it can give more accurate results and deal with large amounts of data. This paper provides an overview of...
Article
Full-text available
Load balancing algorithms are used to deal with DDoS attacks to identify the optimal server and are responsible for the optimal allocation of requests to the servers. The managing method of the distribution of the requests between servers directly impacts network performance. Denial of service (DDoS) attacks are malicious attempts to interrupt regu...
Article
Full-text available
The Internet of Drone Things (IoDT) is a trending research area where drones are used to gather information from ground networks. In order to overcome the drawbacks of the Internet of Vehicles (IoV), such as congestion issues, security issues, and energy consumption, drones were introduced into the IoV, which is termed drone-assisted IoV. Due to th...
Article
Full-text available
With an ever-increasing number of electric vehicles (EVs) on the roads, there is a high demand for EV charging infrastructure. The present charging infrastructure in the market requires a lot of space and sometimes leads to traffic congestion, increasing the risk of accidents and obstruction of emergency vehicles. As the current infrastructure requ...
Article
Full-text available
Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish sec...
Article
Full-text available
Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish sec...
Article
Full-text available
In today's society, technology is rapidly development, especially Internet communications, which significantly facilitates human work in various fields such as the military, offices, factories, medical, and directorates. As an effective field, the tourist information management systems (TIMS) are becoming more popular as the tourism industry grows...
Article
Full-text available
Recently, development an efficient Tourism Management System (TMS), become an important issue in tourism toward industry. Internet act one of most common role in popularity information and data to the tourists by uploaded this information include the tourism places, distance view between these places using GPS system through internet. Tourism Manag...
Article
Full-text available
Cloud-based data storage has grown in popularity due to its flexibility and concerns about security and confidentiality. In computer science, cloud computing is a relatively new concept. Users are using fewer resources while increasing their reliance on cloud resources. Cloud computing, mobile computing, and wireless networks are combined in Mobile...
Article
Full-text available
Histopathology is the investigation of tissues to identify the symptom of abnormality. The histopathological procedure comprises gathering samples of cells/tissues, setting them on the microscopic slides, and staining them. The investigation of the histopathological image is a problematic and laborious process that necessitates the expert's knowled...
Article
Full-text available
e main aim of this study was to address the problem of congestion in TCP nonlinear systems in the presence of mismatched exogenous disturbances. To achieve this problem, two methods are proposed: the first is active queuing management, based on two proposed controllers, an NLPID and STC-SM, while the second is the application of active queuing mana...
Article
Full-text available
The Internet of Things (IoT) enables a range of applications in the area of information technology, one of which is linked and smart health care. A successful Monitoring patients' health state in real time through an IoT healthcare system is the goal, to avert critical patient scenarios, and to enhance patient quality of life via smart IoT settings...
Conference Paper
The popularity of mobile applications is rapidly increasing in the age of smartphones and tablets. Communication, social media, news, sending emails, buying, paying, viewing movies and streams, and playing games are just a few of the many uses for them. Android is currently the most popular mobile operating system on the planet. The android platfor...
Article
Full-text available
This work proposes a new kind of trajectory tracking controller for the differential drive mobile robot (DDMR), namely, the nonlinear neural network fractional-order proportional integral derivative (NNFOPID) controller. The suggested controller’s coefficients comprise integral, proportional, and derivative gains as well as derivative and integral...
Article
Full-text available
Increasing demands for information and the rapid growth of big data have dramatically increased the amount of textual data. In order to obtain useful text information, the classification of texts is considered an imperative task. Accordingly, this article will describe the development of a hybrid optimization algorithm for classifying text. Here, p...
Conference Paper
Population growth and the creation of new equipment are accompanied by a constant increase in energy use each day and have created significant consumer issues in energy management. Smart meters (SM) are simply instruments for measuring energy usage and are a significant resource of the evolving technological energy management system. Including prec...
Article
Full-text available
Distributed memory is a term used in computer science to describe a multiprocessor computer system in which each processor has its own private memory. Computational jobs can only work with local data, so if you need remote data, you'll have to communicate with one or more remote processors. Parallel and distributed computing are frequently used tog...
Article
Full-text available
In this era, technology is playing a central role in many areas of human life, but the classical hardcopy-based approaches are still being used for land registration. The Internet-based methods provide excellent facilities for overcoming the drawbacks of handwritten-based style and communication among different government sectors. Nowadays, Informa...
Article
Full-text available
During the past decades, sport, in general, has become one of the most powerful competitions and the most popular in the world. As well as, everyone is waiting for the winner, and who will be the champion in the end in different tournaments. Among these sports, football's popularity is more than all other sports. Football matches results predicting...
Conference Paper
Multi Input Multi Output MIMO and Orthogonal Frequency Division Multiplexing OFDM based communication strategies have gained popularity in the industry and research fields due to the rising demand for wireless cellular communication. Massive MIMO-OFDM-based cellular communication has recently become popular in a variety of realtime applications. Ho...
Article
Full-text available
Multi Input Multi Output MIMO and Orthogonal Frequency Division Multiplexing OFDM based communication strategies have gained popularity in the industry and research fields due to the rising demand for wireless cellular communication. Massive MIMO-OFDM-based cellular communication has recently become popular in a variety of realtime applications. Ho...
Article
Full-text available
1. Abstract The innovative and disruptive technology of the Internet of Things (IoT)-based smart home applications are mainly restricted and dispersed. To offer insightful analyses of technological settings and assist researchers, we must first grasp the available choices and gaps in this field of study. Thus, this study aims to review to organize...
Article
Full-text available
Accurate dietary appraisal has been found by literature to be very significant in the evaluation of weight loss treatments. Most current methods of dietary evaluation, however, depend on recollection. The development of a modern computer-based food recognition system for reliable food evaluation is now possible across comprehensive mobile devices a...
Article
Full-text available
In emotion studies, critiques of the use of a static facial expression have been directed to its resulting from poor ecological validity. We conducted a study of studies in the present work, which specifically contrasted recognizing emotions using dynamic facial expressions. Brain imaging experiments and behavioural studies with associated physiolo...
Article
Full-text available
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a det...
Article
Full-text available
The Internet of Things (IoT) is a paradigm shift that enables billions of devices to connect to the Internet. The IoT's diverse application domains, including smart cities, smart homes, and e-health, have created new challenges, chief among them security threats. To accommodate the current networking model, traditional security measures such as fir...
Conference Paper
Full-text available
The continuing success of the Internet has greatly increased the number of text documents in electronic formats. The techniques for grouping these documents into meaningful collections have become mission-critical. The traditional method of compiling documents based on statistical features and grouping did use syntactic rather than semantic. This a...
Article
Full-text available
The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and respondin...
Article
Full-text available
Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, incr...
Article
Full-text available
Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types...
Article
Full-text available
Water is a basic human need in all economic operations. Farmland, renewable energy, the industrial industry, and mining are all critical economic areas. Water supplies are under severe strain. With the population increase, the requirement for water from competing economic sectors is increased. So, there is not enough water left to meet human needs...
Article
Full-text available
Many applications in the real world include optimizing specific targets, such as cost minimization, energy conservation, climate, and maximizing production, efficiency, and sustainability. The optimization problem is strongly non-linear with multifunctional landscapes under several dynamic, non-linear constraints in some instances. It is challengin...
Article
Full-text available
Many policymakers envisage using a community model and Big Data technology to achieve the sustainability demanded by intelligent city components and raise living standards. Smart cities use different technology to make their residents more successful in their health, housing, electricity, learning, and water supplies. This involves reducing prices...
Article
Full-text available
The clustered deep learning systems practice deep neural model networks with a cluster pooled resources aid. Distributed profound learning systems engineers should make multiple choices to process their diverse workloads successfully in their selected environment. Combined with the cluster bandwidth constraints, the abundance of GPU-based deep lear...
Conference Paper
Full-text available
There are relatively new approaches of Parallel Distributed Processing. Distributed cloud uses cloud computing technology from different geographic locations to interconnect data and applications served. Distributed, in the sense of information technology (IT), something is exchanged between various systems that may also be in different places. The...
Conference Paper
Full-text available
Nowadays, eye tracking and blink detection are increasingly popular among researchers and have the potential to become a more important component of future perceptual user interfaces. The real-time eye-tracking system has been a fundamental and challenging problem for machine learning problems. The main purpose of this paper is to propose a new met...
Conference Paper
Full-text available
Diabetes Mellitus is a chronic disease that spreads quickly worldwide. It results from increasing the blood glucose level and causes complications in the heart, kidney, and eyes. Diabetic Retinopathy (DR) is an eye disease that refers to the bursting of blood vessels in the retina as Diabetes exacerbates. It is considered the main reason for blindn...
Article
Full-text available
The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capacity, and network failure. Cloud computing and Fog computing carry the cloud closer to IoT computers in order to overcome these problems. Cloud and Fog provide IoT proces...
Article
Full-text available
In this study, the significance and necessities of surveillance systems have been investigated in several areas-both in the use of neural networks, street lighting systems, factories, and laboratories-for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they ca...
Article
Full-text available
Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges...
Article
Full-text available
Smartphones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is...
Article
Full-text available
Optical fibers are utilized widely for data transmission systems because of their capacity to carry extensive information and dielectric nature. Network architectures utilizing multiple wavelengths per optical fiber are used in central, metropolitan, or broad-area applications to link thousands of users with a vast range of transmission speeds and...
Article
Full-text available
The distributed energy system (DES) architecture is subject to confusion about renewable energy limits, primary energy supply and energy carriers' costs. For the grid to use unreliable electricity sources, the end-user's on-demand presence in the intelligent energy management context is essential. The participation of end-users could influence the...
Article
Full-text available
New research into human-computer interaction seeks to consider the consumer's emotional status to provide a seamless human-computer interface. This would make it possible for people to survive and be used in widespread fields, including education and medicine. Multiple techniques can be defined through human feelings, including expressions, facial...
Article
Full-text available
Cloud computing, data mining, and big online data are discussed in this paper as hybridization possibilities. The method of analyzing and visualizing vast volumes of data is known as the visualization of data mining. The effect of computing conventions and algorithms on detailed storage and data communication requirements has been studied. When res...
Article
Full-text available
The Internet of Things (IoT) is a collection of objects such as sensors, actuators, and processors, which interconnected within a specific network to perform a task collaboratively. The IoT is one of the prevalent technologies, which has developed dramatically in recent years. Its reputation derives from its relevance and role in employing things i...
Article
Full-text available
Semantic similarity is the process of identifying relevant data semantically. The traditional way of identifying document similarity is by using synonymous keywords and syntactician. In comparison, semantic similarity is to find similar data using meaning of words and semantics. Clustering is a concept of grouping objects that have the same feature...
Article
Full-text available
Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload,...
Article
Full-text available
Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of the subject because of the interrelationship between linguistic classes. In this article, semantic interpretatio...
Article
Full-text available
Skin cancer is among the primary cancer types that manifest due to various dermatological disorders, which may be further classified into several types based on morphological features, color, structure, and texture. The mortality rate of patients who have skin cancer is contingent on preliminary and rapid detection and diagnosis of malignant skin c...
Article
Full-text available
The widespread Internet of Things (IoT) utilization in almost every scope of our life made it possible to automate daily life tasks with no human intervention. This promising technology has immense potential for making life much easier and open new opportunities for newly developed applications to emerge. However, meeting the diverse Quality of Ser...
Article
Full-text available
Semantic analysis is an essential feature of the NLP approach. It indicates, in the appropriate format, the context of a sentence or paragraph. Semantics is about language significance study. The vocabulary used conveys the importance of the subject because of the interrelationship between linguistic classes. In this article, semantic interpretatio...
Article
Full-text available
The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system...
Article
Full-text available
In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. In internet traffic encryption, symmetrical block chips play an essent...
Article
Full-text available
With the exponential growth of the Industrial Internet of Things (IIoT), multiple outlets constantly produce a vast volume of data. It is unwise to locally store all the raw data in the IIoT devices since the end devices' energy, and storage spaces are strictly constrained by Self-organization and microorganisms. IoT networks enable out-sourced dat...