
ربيع رعد
السيرة الذاتية | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
اللقب العلمي | مدرس | |||||||||
المنصب | مسؤوال وحدة الحاضنة التكنولوجيا | |||||||||
القسم | هندسة تقنيات الامن السيبراني والحوسبة السحابية | |||||||||
البريد الالكتروني | rabei@ntu.edu.iq | |||||||||
الشهادات الدراسية | ||||||||||
اسم الجامعة | الشهادة | تاريخ منح الشهادة | التخصص | البلد | ||||||
جامعة الموصل | بكالوريوس | 2008 | علوم الحاسبات | العراق | ||||||
الجامعة التكنلوجيا الماليزية | ماجستير | 2012 | شبكات الحاسوب | ماليزيا | ||||||
جامعة تون عون حسين ماليزيا | دكتوراه | 2019 | تكنولوجيا المعلومات | ماليزيا | ||||||
الخبرة التدريسية | ||||||||||
الدراسات الاولية | نعم | |||||||||
الدراسات العليا | نعم | |||||||||
البحوث والنشاطات العلمية | ||||||||||
البحوث المنشورة | 44 | |||||||||
المؤتمرات والندوات | 28 | |||||||||
عضوية الجمعيات العلمية والمهنية ودور النشر المجلات | ||||||||||
روابط التدريسي في المواقع البحثية | ||||||||||
Google Scholar | ![]() |
|||||||||
Research Gate | ![]() |
|||||||||
![]() |
||||||||||
ORCID ID | ![]() |
|||||||||
Scopus | ![]() |
|||||||||
الاهتمامات البحثية والعلمية | ||||||||||
Digital Forensics (file carving), machine learning, neural networks, and image recover | ||||||||||
الجوائز و الأبتكارات | ||||||||||
|
||||||||||
البحوث الاخيرة |
عنوان البحث |
رابط البحث |
A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation |
https://ieeexplore.ieee.org/abstract/document/10272244 |
A Comparison of Multi Class Support Vector Machine vs Deep Convolutional Neural Network for Brain Tumor Classification |
https://ieeexplore.ieee.org/abstract/document/10295336 |
Intelligent Classification of JPEG files by Support Vector Machines with Content-based Feature Extraction |
https://www.americaspg.com/articleinfo/18/show/2276 |
Javanese Script Single Letters Classification using GoogLeNet Architecture and Adam Optimizer Based on Convolutional Neural Networks (CNN) |
https://ieeexplore.ieee.org/abstract/document/10295366 |
Trust Monitoring Framework for Effective Cooperation in Satellite Assisted UAVS Enabled VANETS |
https://www.researchgate.net/profile/rabei-al-jawry/publication/374782002_trust_monitoring_framework_for_effective_cooperation_in_satellite_assisted_uavs_enabled_vanets/links/652f6fab6725c324011481e7/trust-monitoring-framework-for-effective-cooperation-in-satellite-assisted-uavs-enabled-vanets.pdf |
Connectivity Aware Energy Efficient Routing Protocol for UAVs Assisted Vehicular Ad-Hoc Networks |
https://ieeexplore.ieee.org/abstract/document/10313206 |
Milkfish Freshness Classification Using Convolutional Neural Networks Based on Resnet50 Architecture |
https://journal.upgris.ac.id/index.php/asset/article/view/17017 |
Robust Content Authentication and Tampering Detection of Arabic Text Transmitted Through Internet |
https://ieeexplore.ieee.org/abstract/document/10351462 |
Symbiotic Organism Search Optimization with Deep Learning based Bite Mark Identification in Forensic Dentistry |
https://ieeexplore.ieee.org/abstract/document/10351436 |
Improved Deep Learning with Metaheuristics Driven COVID-19 Diagnosis on Chest X-Ray Images |
https://ieeexplore.ieee.org/abstract/document/10351403 |
Deep Learning Based Automated Gait Recognition for Robust Person Reidentification |
https://ieeexplore.ieee.org/abstract/document/10351474 |
Exploiting COVID-19 Tweets for Sentiment Analysis Using Chameleon Optimization with Ensemble Learning |
https://ieeexplore.ieee.org/abstract/document/10351385 |
Modified Snake Optimization Based Robust Steganography with Chaotic Encryption Scheme for Remote Sensing Imagery |
https://ieeexplore.ieee.org/abstract/document/10351456 |
High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB. |
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/02/2023083146-2.pdf |
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs. |
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/03/2023083106-2.pdf |
An Integration of Elephant Herding Optimization and Fruit Fly Optimized Algorithm for Energy Conserving in MANET |
https://ieeexplore.ieee.org/abstract/document/10201697 |
Trust based Data Dissemination and Queue Management for Vehicular Communication Networks |
https://ieeexplore.ieee.org/abstract/document/10201757 |
Improving Quality of Services of Fog Computing Through Efficient Work Flow Scheduling |
https://ieeexplore.ieee.org/abstract/document/10183104 |
Improved Chicken Swarm Optimization with Zone-Based Epidemic Routing for Vehicular Networks |
https://link.springer.com/chapter/10.1007/978-981-99-6702-5_34 |
An Application of Multilayer Perceptron for the Prediction of River Water Quality |
https://link.springer.com/chapter/10.1007/978-981-99-3010-4_42 |
Medical Image Watermarking Using Slantlet Transform and Particle Swarm Optimization |
https://link.springer.com/chapter/10.1007/978-981-99-3010-4_59 |
High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types |
https://link.springer.com/chapter/10.1007/978-981-99-3315-0_1 |
Path Scheduling and Bandwidth Utilization for Urban Vehicular Adhoc Networks |
https://www.researchgate.net/publication/374897678_Path_Scheduling_and_Bandwidth_Utilization_for_Urban_Vehicular_Adhoc_Networks |
Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication |
https://ieeexplore.ieee.org/abstract/document/9920438 |
Content-Based Feature Extraction and Extreme Learning Machine for Optimizing File Cluster Types Identification |
https://link.springer.com/chapter/10.1007/978-3-030-98015-3_21 |
A model for predicting entrepreneurship intentions based on social cognitive theory and entrepreneurship characteristics |
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://digitalcommons.aaru.edu.jo/cgi/viewcontent.cgi?article=1307&context=isl |
A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems |
https://link.springer.com/article/10.1007/s12652-020-02888-x |
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features |
https://kinetik.umm.ac.id/index.php/kinetik/article/view/1491 |
Testing Data Security Using a Vigenere Cipher Based on the QR Code |
https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734 |
Testing Data Security Using a Vigenere Cipher Based on the QR Code |
https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734 |