Haider TH. Salim ALRikabi

ORCID: 0000-0002-5201-2084
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT-based Smart Home Systems
  • Technology-Enhanced Education Studies
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Solar Radiation and Photovoltaics
  • Internet of Things and AI
  • Photovoltaic System Optimization Techniques
  • Face recognition and analysis
  • Face and Expression Recognition
  • IoT and Edge/Fog Computing
  • Hybrid Renewable Energy Systems
  • Solar Thermal and Photovoltaic Systems
  • Online and Blended Learning
  • Currency Recognition and Detection
  • COVID-19 diagnosis using AI
  • Image Enhancement Techniques
  • Educational Practices and Challenges
  • Advanced Image Fusion Techniques
  • Organizational and Employee Performance
  • IoT and GPS-based Vehicle Safety Systems
  • Digital Media Forensic Detection
  • Water-Energy-Food Nexus Studies
  • Telecommunications and Broadcasting Technologies
  • Energy and Environment Impacts
  • Text and Document Classification Technologies

University of Wasit
2017-2024

University of Babylon
2020-2024

Northern Technical University
2020-2021

Nahrain University
2021

University of Moratuwa
2020

University of Misan
2020

Middle Technical University
2020

University of Bridgeport
2020

University of Basrah
2020

<p class="0abstract">Since the emergence of Coronavirus and its declaration as a global pandemic, world has changed all sectors radically. Covid-19 caused very strong effect on daily life adaptation to new ways learning, working, communicating. The smart city is one most important solutions that enable us go with during pandemic beyond. employs current technology serve community, improve services provided people, particularly in vital such health, education, electricity,...

10.3991/ijim.v15i13.22331 article EN International Journal of Interactive Mobile Technologies (iJIM) 2021-07-13

<h2>Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, it causes very high risks to confidential files inside the systems. Therefore, for various reasons, we use methods save as much possible on this data, regardless its different forms, texts, pictures, videos, etc. In paper, mainly rely storing basic image which should protected another after changing formal composites using DWT wavelet transform. The process zeroing...

10.3991/ijim.v15i16.24557 article EN International Journal of Interactive Mobile Technologies (iJIM) 2021-08-23

The approach of multimodal medical image fusion, which extracts complementary information from several multimodality pictures, is one the most significant and beneficial illness study tools. This work proposed an effective strategy for picture fusion based on a hybrid NSCT DTCWT. experimental study's input images included computed tomography (CT), magnetic resonance imaging (MRI), positron emission (PET). A suggested employs convolutional network to generate weight map that incorporates...

10.3991/ijoe.v18i03.28011 article EN International Journal of Online and Biomedical Engineering (iJOE) 2022-03-08

The field of Engineering is that which needs a high level analytical thinking, intuitive knowledge, and technical know-how. area communication engineering deals with different components including, wireless mobile services, radio, broadband, web satellites. There rapid decline in the quality students produced by faculties as result sufficient methods frameworks student assessment. production high-potential engineers limited utilization old traditional education methodology frameworks....

10.3991/ijet.v18i01.35987 article EN International Journal of Emerging Technologies in Learning (iJET) 2023-01-10

This research is aimed at planning the manner in which secure 5G communication can be controlled based on traffic floods. To accomplish excellent administration execution of organization observing and directing calculation inescapable, dynamic steering actual equipment isn't reasonable for practical plans action. Accordingly, to bring down functional capital consumption, we propose a strategy called versatile made do with help (Quality Service MANET (Mobile specially appointed Network). A...

10.3991/ijoe.v18i12.33817 article EN International Journal of Online and Biomedical Engineering (iJOE) 2022-09-14

<p>The research aims to know the impact of science, technology, engineering, and mathematics education on both creative thinking mathematical achievement. To achieve it, two researchers followed quasi-experimental approach with an experimental design for groups, one other a control. The sample consisted (32) female students from fourth scientific grade in Al-Intisar Preparatory School Girls / Al-Rasafa, First Directorate. was chosen intentionally divided into groups: control group...

10.3991/ijim.v15i13.24185 article EN International Journal of Interactive Mobile Technologies (iJIM) 2021-07-13

<p>The global online communication channel made possible with the internet has increased credit card fraud leading to huge loss of monetary fund in their billions annually for consumers and financial institutions. The fraudsters constantly devise new strategy perpetrate illegal transactions. As such, innovative detection systems combating are imperative curb these losses. This paper presents combination multiple classifiers through stacking ensemble technique detection. fuzzy-rough...

10.3991/ijim.v15i05.17173 article EN International Journal of Interactive Mobile Technologies (iJIM) 2021-03-16

The movement of cash flow transactions by either electronic channels or physically created openings for the influx counterfeit banknotes in financial markets. Aided global economic integration and expanding international trade, attention must be geared at robust techniques recognition detection banknotes. This paper presents ensemble learning algorithms detection. AdaBoost voting are deployed combination with machine algorithms. Improved accuracies produced methods. Simulation results...

10.22266/ijies2021.0228.31 article EN International journal of intelligent engineering and systems 2020-12-28

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal data images that were reduced size a point used every text and transported front enemy's eyes. In new age, after expansion Internet science use worldwide, we will establish security feature IOT service work more reliably effectively deal with Things ensure services customer interacts with. A secret-key stenographic scheme embeds four gray-scale secret (128*128) pixel into (512*512)...

10.3991/ijim.v15i02.19869 article EN International Journal of Interactive Mobile Technologies (iJIM) 2021-01-26

This research aims to know the essence of correlative relationship between tactical thinking and solving mathematical problems. The researchers followed descriptive method analyze relations, as all students from mathematics department in morning study were part group. sample (100) male female has been chosen based on arbitrators' views. tools for studying composed (12) items multiple-choice test its final form measure require establish-ing a (6) test-type paragraphs solve findings showed...

10.3991/ijet.v16i09.22203 article EN International Journal of Emerging Technologies in Learning (iJET) 2021-05-04

The aim of the research is to find out effect applying classroom assessment techniques (CATs) on both mathematical and logical thinking among fourth-grade scientific students. In pursuit objectives, experimental method was used, quasi-experimental design used for two equivalent groups, one control group taught in traditional way other according structural evaluation. sample consisted (44) students from fourth grade who were intentionally chosen after ensuring their equivalence several...

10.3991/ijet.v16i10.22515 article EN International Journal of Emerging Technologies in Learning (iJET) 2021-05-25

Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The content on the dark constantly updated and changed. collection classification such illegal are challenging tasks, as they time-consuming. This problem has in recent times emerged an issue requires quick attention from both industry academia. To this end, efforts have been made article crawler capable collecting pages, cleaning...

10.3991/ijim.v16i10.30209 article EN International Journal of Interactive Mobile Technologies (iJIM) 2022-05-24

— In this study, a new method has been eliciting for encoding 2D and 3D color images. The DNA strand construction was used as the basis structuring method. This consisted of two main stages, encryption decryption stages. As each stage includes several operations to reach desired goal. coding stage, special table prepared show mechanism work. It starts with bases into binary orders, then zeros are added string finally consist four bits whose size is parallel representation set hexadecimal...

10.3991/ijoe.v18i03.28021 article EN International Journal of Online and Biomedical Engineering (iJOE) 2022-03-08

One of the common types arrhythmia is Atrial Fibrillation (AF), it may cause death to patients. Correct diagnosing heart problem through examining Electrocardiogram (ECG) signal will lead prescribe right treatment for a patient. This study proposes system that distinguishes between normal and AF ECG signals. First, this work provides novel algorithm segmenting extracting single heartbeat. The utilizes low computational cost techniques segment signal. Then, useful pre-processing feature...

10.3991/ijoe.v17i02.19183 article EN International Journal of Online and Biomedical Engineering (iJOE) 2021-02-12

Abstract The cloud computing system has a significant role in the distance education field, because it is an important tributary of virtual education, especially mobile and blended education. Perhaps, only challenge that must be overawed comprehensive coverage rapid access to Internet. So, student can benefit from applications we will call now onward services. There no need establish evidence emphasize importance employing technological innovations develop educational practices for...

10.1088/1757-899x/1094/1/012024 article EN IOP Conference Series Materials Science and Engineering 2021-02-01

The past few years have witnessed a huge increase in the application of facial recognition, detection, and analysis technology. However, face recognition systems remain most popular among general public. system can detect presence when exposed to one. accuracy fairness that be derived from such necessitate their use, because humans, particularly security personnel tired target wrong person as suspect. artificial intelligence are properly trained capable efficiently identifying classifying...

10.3991/ijim.v16i08.30107 article EN International Journal of Interactive Mobile Technologies (iJIM) 2022-04-26

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms content, computational thinking involves problems, studying data patterns, deconstructing using algorithms and procedures, doing simulations, computer modeling, reasoning about abstract things. However, there a lack studies dealing with it its skills that can be developed utilized field information technology used learning teaching. The descriptive research method was used,...

10.3991/ijim.v16i10.30043 article EN International Journal of Interactive Mobile Technologies (iJIM) 2022-05-24

The education system is facing new challenges and requirements as a result of the rapid complex changes in world. It has become necessary to change improve current for online learning keep pace with these changes. E-learning increasing importance higher communities standard components many courses. Especially great development technology, which Corona pandemic had impact on its acceleration increase dealing it. So COVID-19 affected whole world also education, so no longer limited specific...

10.3991/ijes.v10i01.28995 article EN International Journal of Recent Contributions from Engineering Science & IT (iJES) 2022-03-16

With the spread of global markets for modern technical education and diversity programs requirements local market information communication technology, universities began to race among themselves earn their academic reputation. In addition, they want enhance technological development by developing IMT systems with integrated technology as security fastest response speed providing required service sure linking it The network using social networking wireless networks which in turn is a driver...

10.3991/ijet.v18i01.36001 article EN International Journal of Emerging Technologies in Learning (iJET) 2023-01-10

<p class="Abstract">This New learning educational methods, which depending on Learning Management System (LMS), have been used by universities in the top education world. However, most of Iraqi use traditional methods classroom. The purpose this study was to examine benefit using LMS higher education. This shows how implement and modern techniques Engineering College Wasit University. paper that tools class lead increase productivity student, save time with less effort for instructors...

10.3991/ijim.v14i06.11539 article EN International Journal of Interactive Mobile Technologies (iJIM) 2020-04-17

With the growth of technological devices, gadgets and utility products in routine life, there is need to escalate energy optimization with higher degree accuracy performance. Earlier 4G networks were used are quite prominent wireless scientists working ahead towards direction 5G. In 5G based next-generation projected features transmit huge amount data signals different locations whether short or distant locations. The optimization, preservation harvesting key perspectives research advance...

10.3991/ijet.v14i08.10485 article EN International Journal of Emerging Technologies in Learning (iJET) 2019-04-30

This study deals with the issue of improving educational services for schools talent and intelligence. The availability devices, equipment, sensors, Internet things applications led to a direct contribution improve level student education. In addition, students can complete tasks homework easily. talented intelligent are more efficient, skilled, active. they Deeping understand virtual reality coexist it awareness consciousness development period information, spread smart devices. Educational...

10.21533/pen.v8i4.1744.g716 article EN Periodicals of Engineering and Natural Sciences (PEN) 2020-12-06

This paper presents a methodology for enhancement of panorama images environment by calculating high dynamic range. Panorama is constructing merge several photographs that are capturing traditional cameras at different exposure times. Traditional usually have much lower range compared to the in real environment, where captured with will regions too bright or dark. A more details be visible time and dark higher time. Since both cannot preserve creating using cameras, proposed system calculate...

10.11591/eei.v10i1.2362 article EN Bulletin of Electrical Engineering and Informatics 2020-10-11

The study examined the impact of use Mozabook application for digital education in enhancing performance electronic-learning to ensure strategic educational success and urgent need E-learning increase enable scientific knowledge confront exceptional circumstances that afflict world general Iraq particular spread Corona epidemic its harm society home quarantine. Therefore, diversity software ap-plications available teachers students reflected tremendous development unique potential achieve...

10.3991/ijet.v15i20.17101 article EN International Journal of Emerging Technologies in Learning (iJET) 2020-10-19

<pre>One of the techniques used in information security is concealment technique, where to be hidden within another medium saved process messaging between two sides without detection. In this paper, an algorithm was proposed conceal and encrypt data using several means.in order ensure its preservation from detection hackers. Wavelet transformer change shape a wave (one two-dimensional data) different mathematical formulas. Two sets were used, first group process. The second considered...

10.3991/ijim.v14i09.14173 article EN International Journal of Interactive Mobile Technologies (iJIM) 2020-06-17
Coming Soon ...