ربيع رعد 1

Rabei Raad

Personal Information


Scientific title Assistant professor
Employment position Manager of Technology Incubator
Department Cyber security and cloud computing technology engineering
Branch  
E-mail rabei@ntu.edu.iq
Academic Degrees
University Academic degree Date of the degree Specialization Country
Mosul University Bachelors 2008 Computer science and mathematic Iraq
UTeM Masters 2012 Computer science- Networking Iraq
UTHM Ph.D 2019 Computer science- Information Technology  
Teaching experience
Undergraduate Teaching YES
Graduate teaching YES
Research and scientific activities
Published researches 44
Conferences and seminars 28
Membership in scientific and professional societies and publishing houses
Profiles
Google Scholar
Research Gate
 
ORCID ID
Scopus
Scientific and research interests
Digital Forensics (file carving), machine learning, neural networks, and image recover
Honors and awards
 
Last researches

Research Title

Research Link

A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation

https://ieeexplore.ieee.org/abstract/document/10272244

A Comparison of Multi Class Support Vector Machine vs Deep Convolutional Neural Network for Brain Tumor Classification

https://ieeexplore.ieee.org/abstract/document/10295336

Intelligent Classification of JPEG files by Support Vector Machines with Content-based Feature Extraction

https://www.americaspg.com/articleinfo/18/show/2276

Javanese Script Single Letters Classification using GoogLeNet Architecture and Adam Optimizer Based on Convolutional Neural Networks (CNN)

https://ieeexplore.ieee.org/abstract/document/10295366

Trust Monitoring Framework for Effective Cooperation in Satellite Assisted UAVS Enabled VANETS

https://www.researchgate.net/profile/rabei-al-jawry/publication/374782002_trust_monitoring_framework_for_effective_cooperation_in_satellite_assisted_uavs_enabled_vanets/links/652f6fab6725c324011481e7/trust-monitoring-framework-for-effective-cooperation-in-satellite-assisted-uavs-enabled-vanets.pdf

Connectivity Aware Energy Efficient Routing Protocol for UAVs Assisted Vehicular Ad-Hoc Networks

https://ieeexplore.ieee.org/abstract/document/10313206

Milkfish Freshness Classification Using Convolutional Neural Networks Based on Resnet50 Architecture

https://journal.upgris.ac.id/index.php/asset/article/view/17017

Robust Content Authentication and Tampering Detection of Arabic Text Transmitted Through Internet

https://ieeexplore.ieee.org/abstract/document/10351462

Symbiotic Organism Search Optimization with Deep Learning based Bite Mark Identification in Forensic Dentistry

https://ieeexplore.ieee.org/abstract/document/10351436

Improved Deep Learning with Metaheuristics Driven COVID-19 Diagnosis on Chest X-Ray Images

https://ieeexplore.ieee.org/abstract/document/10351403

Deep Learning Based Automated Gait Recognition for Robust Person Reidentification

https://ieeexplore.ieee.org/abstract/document/10351474

Exploiting COVID-19 Tweets for Sentiment Analysis Using Chameleon Optimization with Ensemble Learning

https://ieeexplore.ieee.org/abstract/document/10351385

Modified Snake Optimization Based Robust Steganography with Chaotic Encryption Scheme for Remote Sensing Imagery

https://ieeexplore.ieee.org/abstract/document/10351456

High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB.

chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/02/2023083146-2.pdf

Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs.

chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/03/2023083106-2.pdf

An Integration of Elephant Herding Optimization and Fruit Fly Optimized Algorithm for Energy Conserving in MANET

https://ieeexplore.ieee.org/abstract/document/10201697

Trust based Data Dissemination and Queue Management for Vehicular Communication Networks

https://ieeexplore.ieee.org/abstract/document/10201757

Improving Quality of Services of Fog Computing Through Efficient Work Flow Scheduling

https://ieeexplore.ieee.org/abstract/document/10183104

Improved Chicken Swarm Optimization with Zone-Based Epidemic Routing for Vehicular Networks

https://link.springer.com/chapter/10.1007/978-981-99-6702-5_34

An Application of Multilayer Perceptron for the Prediction of River Water Quality

https://link.springer.com/chapter/10.1007/978-981-99-3010-4_42

Medical Image Watermarking Using Slantlet Transform and Particle Swarm Optimization

https://link.springer.com/chapter/10.1007/978-981-99-3010-4_59

High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types

https://link.springer.com/chapter/10.1007/978-981-99-3315-0_1

Path Scheduling and Bandwidth Utilization for Urban Vehicular Adhoc Networks

https://www.researchgate.net/publication/374897678_Path_Scheduling_and_Bandwidth_Utilization_for_Urban_Vehicular_Adhoc_Networks

Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication

https://ieeexplore.ieee.org/abstract/document/9920438

Content-Based Feature Extraction and Extreme Learning Machine for Optimizing File Cluster Types Identification

https://link.springer.com/chapter/10.1007/978-3-030-98015-3_21

A model for predicting entrepreneurship intentions based on social cognitive theory and entrepreneurship characteristics

chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://digitalcommons.aaru.edu.jo/cgi/viewcontent.cgi?article=1307&context=isl

A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems

https://link.springer.com/article/10.1007/s12652-020-02888-x

Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features

https://kinetik.umm.ac.id/index.php/kinetik/article/view/1491

Testing Data Security Using a Vigenere Cipher Based on the QR Code

https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734

Testing Data Security Using a Vigenere Cipher Based on the QR Code

https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734

ربيع رعد 1