ربيع رعد

ربيع رعد

السيرة الذاتية


اللقب العلمي مدرس
المنصب مسؤوال وحدة الحاضنة التكنولوجيا
القسم هندسة تقنيات الامن السيبراني والحوسبة السحابية
البريد الالكتروني rabei@ntu.edu.iq
الشهادات الدراسية
اسم الجامعة الشهادة تاريخ منح الشهادة التخصص البلد
جامعة الموصل  بكالوريوس 2008 علوم الحاسبات العراق
الجامعة التكنلوجيا الماليزية  ماجستير 2012 شبكات الحاسوب ماليزيا
جامعة تون عون حسين ماليزيا دكتوراه 2019 تكنولوجيا المعلومات ماليزيا
الخبرة التدريسية
الدراسات الاولية نعم
الدراسات العليا نعم
البحوث والنشاطات العلمية
البحوث المنشورة 44
المؤتمرات والندوات 28
عضوية الجمعيات العلمية والمهنية ودور النشر المجلات  
روابط التدريسي في المواقع البحثية
Google Scholar
Research Gate
 
ORCID ID
Scopus
 الاهتمامات البحثية والعلمية
Digital Forensics (file carving), machine learning, neural networks, and image recover
 الجوائز و الأبتكارات

الجهة المانحة

عنوان الانجاز

SCDM-2020 Conference

افضل بحث

الجامعة التقنية الشمالية

الباحث الخامس للعام 2023

البحوث الاخيرة

عنوان البحث

رابط  البحث

A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation

https://ieeexplore.ieee.org/abstract/document/10272244

A Comparison of Multi Class Support Vector Machine vs Deep Convolutional Neural Network for Brain Tumor Classification

https://ieeexplore.ieee.org/abstract/document/10295336

Intelligent Classification of JPEG files by Support Vector Machines with Content-based Feature Extraction

https://www.americaspg.com/articleinfo/18/show/2276

Javanese Script Single Letters Classification using GoogLeNet Architecture and Adam Optimizer Based on Convolutional Neural Networks (CNN)

https://ieeexplore.ieee.org/abstract/document/10295366

Trust Monitoring Framework for Effective Cooperation in Satellite Assisted UAVS Enabled VANETS

https://www.researchgate.net/profile/rabei-al-jawry/publication/374782002_trust_monitoring_framework_for_effective_cooperation_in_satellite_assisted_uavs_enabled_vanets/links/652f6fab6725c324011481e7/trust-monitoring-framework-for-effective-cooperation-in-satellite-assisted-uavs-enabled-vanets.pdf

Connectivity Aware Energy Efficient Routing Protocol for UAVs Assisted Vehicular Ad-Hoc Networks

https://ieeexplore.ieee.org/abstract/document/10313206

Milkfish Freshness Classification Using Convolutional Neural Networks Based on Resnet50 Architecture

https://journal.upgris.ac.id/index.php/asset/article/view/17017

Robust Content Authentication and Tampering Detection of Arabic Text Transmitted Through Internet

https://ieeexplore.ieee.org/abstract/document/10351462

Symbiotic Organism Search Optimization with Deep Learning based Bite Mark Identification in Forensic Dentistry

https://ieeexplore.ieee.org/abstract/document/10351436

Improved Deep Learning with Metaheuristics Driven COVID-19 Diagnosis on Chest X-Ray Images

https://ieeexplore.ieee.org/abstract/document/10351403

Deep Learning Based Automated Gait Recognition for Robust Person Reidentification

https://ieeexplore.ieee.org/abstract/document/10351474

Exploiting COVID-19 Tweets for Sentiment Analysis Using Chameleon Optimization with Ensemble Learning

https://ieeexplore.ieee.org/abstract/document/10351385

Modified Snake Optimization Based Robust Steganography with Chaotic Encryption Scheme for Remote Sensing Imagery

https://ieeexplore.ieee.org/abstract/document/10351456

High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB.

chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/02/2023083146-2.pdf

Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs.

chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/03/2023083106-2.pdf

An Integration of Elephant Herding Optimization and Fruit Fly Optimized Algorithm for Energy Conserving in MANET

https://ieeexplore.ieee.org/abstract/document/10201697

Trust based Data Dissemination and Queue Management for Vehicular Communication Networks

https://ieeexplore.ieee.org/abstract/document/10201757

Improving Quality of Services of Fog Computing Through Efficient Work Flow Scheduling

https://ieeexplore.ieee.org/abstract/document/10183104

Improved Chicken Swarm Optimization with Zone-Based Epidemic Routing for Vehicular Networks

https://link.springer.com/chapter/10.1007/978-981-99-6702-5_34

An Application of Multilayer Perceptron for the Prediction of River Water Quality

https://link.springer.com/chapter/10.1007/978-981-99-3010-4_42

Medical Image Watermarking Using Slantlet Transform and Particle Swarm Optimization

https://link.springer.com/chapter/10.1007/978-981-99-3010-4_59

High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types

https://link.springer.com/chapter/10.1007/978-981-99-3315-0_1

Path Scheduling and Bandwidth Utilization for Urban Vehicular Adhoc Networks

https://www.researchgate.net/publication/374897678_Path_Scheduling_and_Bandwidth_Utilization_for_Urban_Vehicular_Adhoc_Networks

Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication

https://ieeexplore.ieee.org/abstract/document/9920438

Content-Based Feature Extraction and Extreme Learning Machine for Optimizing File Cluster Types Identification

https://link.springer.com/chapter/10.1007/978-3-030-98015-3_21

A model for predicting entrepreneurship intentions based on social cognitive theory and entrepreneurship characteristics

chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://digitalcommons.aaru.edu.jo/cgi/viewcontent.cgi?article=1307&context=isl

A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems

https://link.springer.com/article/10.1007/s12652-020-02888-x

Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features

https://kinetik.umm.ac.id/index.php/kinetik/article/view/1491

Testing Data Security Using a Vigenere Cipher Based on the QR Code

https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734

Testing Data Security Using a Vigenere Cipher Based on the QR Code

https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734