البريد الالكتروني

[email protected]

رقم الهاتف

6163

العودة إلى الملف الشخصي
علي كاظم خضير

بحوث سكوبس — علي كاظم خضير

علوم حاسبات • تقنية معلومات

8 إجمالي البحوث
6 إجمالي الاستشهادات
2026 أحدث نشر
2 أنواع المنشورات
عرض 8 بحث
2026
2 بحث
Bermani A.K.; Sanjay V.; Almzori Y.M.A.; Hussian M.
Lecture Notes in Networks and Systems , Vol. 1498 LNNS, pp. 447-459
Conference paper English ISSN: 23673370
Computer Techniques Engineering Department, College of Engineering and Technologies, Al-Mustaqbal University, Babylon, Iraq; Department of Computer Science and Engineering, Nitte Meenakshi Institute of Technology, Bengaluru, India; Alnoor University, Nineveh, Mosul, Iraq; Department of Computers Techniques Engineering, College of Technical Engineering, The Islamic University, Najaf, Iraq; Department of Computers Techniques Engineering, College of Technical Engineering, The Islamic University of Al Diwaniyah, Al Diwaniyah, Iraq; Department of Computers Techniques Engineering, College of Technical Engineering, The Islamic University of Babylon, Babylon, Iraq
Structural health monitoring (SHM) is crucial for ensuring the safety and longevity of infrastructure. Traditional SHM methods rely on periodic inspections and centralized data processing, leading to delays and inefficiencies. This chapter proposes an integrated framework combining the Internet of Things (IoT), finite element analysis (FEA), and edge machine learning (ML) to enable real-time, data-driven decision-making for SHM. IoT-based sensor networks continuously collect vibration, strain, and environmental data, which are processed using FEA models for predictive analysis. Edge ML algorithms optimize operational efficiency by executing anomaly detection routines for predictive maintenance alongside real-time applications at local edge nodes to minimize processing delays and decrease cloud dependency. Recorded simulation runs and case-based validation show that the proposed method achieves better structural anomaly detection precision along with faster response times. This framework uses IoT FEA and edge ML technology to create a scalable solution for continuous SHM that enhances both safety and maintenance scheduling for critical infrastructure while maintaining cost-effectiveness. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2026.
الكلمات المفتاحية: Anomaly detection Data-driven decision-making Edge machine learning Finite element analysis Infrastructure safety IoT Predictive maintenance Real-time monitoring
Bermani A.K.; Sanjay V.; AL-Murieb S.S.A.; Obaid A.J.; Mostafa S.A.
Lecture Notes in Networks and Systems , Vol. 1495 LNNS, pp. 363-374
Conference paper English ISSN: 23673370
Computer Techniques Engineering Department, College of Engineering and Technologies, Al-Mustaqbal University, Babylon, Iraq; Department of Computer Science & Engineering, Nitte Meenakshi Institute of Technology, Bengaluru, India; Department of Computer Science, College of Information Technology, University of Babylon, Babylon, Iraq; Faculty of Computer Science and Mathematics, University of Kufa, Najaf, Iraq; Department of Artificial Intelligence Engineering Techniques, College of Technical Engineering, Alnoor University, Nineveh, Mosul, Iraq
A brain tumour is the result of the growth of abnormal brain cells, some of which have the potential to become malignant. Timely and accurate diagnosis of illness and implementation of treatment regimens improves patients’ quality of life and improves their life expectancy. Radiologists’ manual review of medical images is the conventional approach to diagnosing brain tumours, but it is laborious and error-prone. The article proposes a methodical approach to detect brain tumours. The suggested model is a near-ideal synthesis of nature-inspired and quantum-based algorithms, incorporating their more optimistic features. Using the quantum-based binary bat algorithm (q-BBA), the suggested model has been able to reduce dimensionality, or extraneous features. Machine learning classifiers such as SVM, Random Forest, Gaussian Naive Bayes and XGBoost were used to compute the optimality of features. After comparing QBBA’s performance with that of its conventional algorithms, it was found that, when applied to the same population, QBBA achieved better results. Having improved noise immunity and an average accuracy of 98.89%, QBBA emerges as a significant algorithm. Brain Tumour detection can be potential application of the suggested Quantum-based Binary Bat algorithm. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2026.
الكلمات المفتاحية: Bat algorithm Brain tumour Feature selection Nature-inspired algorithm Quantum-based binary bat algorithm
2025
5 بحث
Yousif Y.K.; Bermani A.K.; Aldulaimi M.H.; Khalaf M.; Mohammed R.B.; Almihi A.J.M.
Journal of Soft Computing and Data Mining , Vol. 6 (1), pp. 127-137
1 استشهاد Article Open Access English ISSN: 2716621X
Technical Engineering College for Computer and AI, Northern Technical University, Nineveh, Mosul, 41000, Iraq; College of Information Technology, University of Babylon, Babylon, Iraq; Department of Computer Techniques Engineering, College of Engineering, Al-Mustaqbal University, Babylon, Hillah, 51001, Iraq; Department of Computer Sciences, College of Science, University of Al Maarif, Anbar, 31001, Iraq; Department of Artificial Intelligence Technology, Engineering College of Technical Engineering, Alnoor University Mosul, Nineveh, 41012, Iraq
The continuous developments in vehicular communication technology have brought a significant interest in Vehicular Ad-Hoc Networks (VANETs). VANETs aim to enhance road safety, improve traffic management, and provide a suite of infotainment services to passengers. This type of network is characterized by high-speed, dynamically varying mobility, leading to increased Energy Consumption (EC), End-to-End (E2E) delay, and Routing Overhead (RO) during network communication. Various researchers have developed ways to overcome this drawback through the employment of clustering techniques in VANETs. However, utilizing clustering techniques in VANETs is critical as it requires maintaining robust communication links, optimizing resource allocation, and minimizing E2E delay. Subsequently, this paper proposes an improved Fuzzy-based Cluster Head Selection (FCHS) technique to enhance the overall performance of VANET. In VANET, the clustering is formed from Cluster Head (CH), Cluster Child (CC), and Backup-Cluster Head (BCH) along with the other network nodes. The FCHS optimizes the CH selection using a fuzzy logic algorithm based on various VANET parameters, including average distance, satisfaction degree, EC, Packet Delivery Ratio (PDR), and vehicle connectivity level. The performance of the proposed FCHS technique is simulated utilizing Network Simulator (NS) 2.35 with the Simulation of Urban MObility (SUMO) platform. The performance metrics that are considered for the result evaluation are PDR, EC, E2E delay, and RO. The overall results of the VANET is compared with two recent methods. The results show that the VANET performance with the aid of the proposed FCHS technique achieves the highest PDR, low EC, E2E delay, and RO. © 2025, Penerbit UTHM. All rights reserved.
الكلمات المفتاحية: cluster head selection decision-making effective communication Fuzzy logic VANET
Al-Bermani N.K.; Bermani A.K.; Raad A.; Manaa M.E.
Journal of Discrete Mathematical Sciences and Cryptography , Vol. 28 (4-B), pp. 1399-1411
1 استشهاد Article English ISSN: 09720529
Department of Ceramic and Building Materials Engineering, College of Materials Engineering, University of Babylon, Babylon, Iraq; Department of Network, College of Information Technology, University of Babylon, Babylon, Iraq; Department of Computer Techniques Engineering, College of Engineering and Technologies, Al-Mustaqbal University, Babylon, Iraq; Department of Medical Instruments, Techniques Technical Institute of Al-Mussaib Al-Furat Al-Awsat Technical University, Babylon, Iraq; Department of Intelligent Medical System, College of Sciences, Al-Mustaqbal University, Babylon, Iraq
Power systems have become more efficient, reliable, and sustainable as smart grids are increasingly integrated into them. Developing innovative security solutions is often required to counter evolving cyber threats because traditional security mechanisms lack real-time protection. The purpose of this paper is to propose a blockchain-based hybrid optimization approach for enhancing smart grid security and resilience. To improve decision-making, resource allocation, and attack mitigation, the framework incorporates artificial intelligence (AI) to detect anomalies in real-time, blockchain technology to store unrestricted data, and a hybrid optimization algorithm to make decisions in real-time. Adaptive Vulture Optimization Algorithm (AVOA) and Convolutional Neural Networks (CNN) combine to reduce computational overhead and maintain detection accuracy effectively. According to the proposed approach, which is compared to existing models, including ML-ID, HHT, and THD, it achieves superior performance, with a detection rate of 99.17%, a reduction in computation time, and enhanced scalability. These results demonstrate that AI-Blockchain hybrid frameworks are effective in protecting smart grids against emerging cyber threats, making them a reliable and scalable security solution. © 2025, Taru Publications. All rights reserved.
الكلمات المفتاحية: AI-driven cybersecurity Anomaly detection in IoT Blockchain-based security Hybrid optimization algorithm Smart grid security
Ali A.S.H.M.; Bermani A.K.; Manaa M.E.
Mathematical Modelling of Engineering Problems , Vol. 12 (7), pp. 2325-2340
Article Open Access English ISSN: 23690739
TOEFL Center, University of Babylon, Hillah, 51002, Iraq; Department of Information Networks, College of Information Technology, University of Babylon, Hillah, 51002, Iraq; Computer Techniques Engineering Department, College of Engineering and Technologies, Al-Mustaqbal University, Babylon, 51001, Iraq; Intelligent Medical System Department, College of Sciences, Al-Mustaqbal University, Babylon, 51001, Iraq
Cognitive radio sensor networks (CRSNs) are characterized by their ability to adapt to dynamic spectrum availability. Computation power in cognitive radio network (CRN) is essential for efficient spectrum utilization and seamless connectivity among nodes in a sensor-based health monitoring system. The proposed algorithm, Cognitive Adaptive Metaheuristic Optimization Algorithm (CAMOA) is a Hybrid Particle Swarm-Tabu Search Optimization (HPSTSO) technique that integrates two optimization methods: Particle Swarm Optimization (PSO) and Tabu Search (TS). It dynamically selects the best resource allocation algorithm based on the healthcare network requirements of quality of service and channel conditions, traffic load, and network topology to enhance the performance of communication, and contribute to optimal allocation, and maximize resource productivity in resource-constrained CRSNs. The evaluation metrics are recorded and exported into a newly created dataset named Cognitive Adaptive Metaheuristic Optimization Dataset (CAMOD.csv), which is used to train a machine learning model as Multilayer Perceptron (MLP) neural network—to provide the best prediction of spectrum sensing of secondary users with consideration resource utilization for each cognitive radio sensor node. Results of HPSTSO showed that the average of processing time compared to existing approaches is 30.0675 seconds, packet delivery ratio is 99.08%, channel utilization is 99.166%, probability of channel collision is 0.0508, total network utilization is 7.0604 KB and total resource utilization is 23.0871%. In addition, the MLP accuracy of RadioML2016.10B dataset compared to existing approaches is 98.7%, Precision is 99.98%, Recall is 95.76% and F1 Score is 97.82%. Furthermore, MLP accuracy, precision, recall and F1 score of the CAMOD dataset are 99.45%, 1.0, 98.38%, and 99.18% respectively. Copyright: © 2025 The authors. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).
الكلمات المفتاحية: cognitive radio sensor networks (CRSNs) Multilayer Perceptron (MLP) neural network optimization methods Particle Swarm Optimization (PSO) spectrum utilization Tabu Search (TS)
Bermani A.K.; Al-Salih A.M.; Jabir H.A.; Manaa M.E.
Journal of Discrete Mathematical Sciences and Cryptography , Vol. 28 (4-B), pp. 1413-1424
Article English ISSN: 09720529
Department of Information Networks, College of Information Technology, University of Babylon, Babylon, Iraq; Department of Computer Techniques Engineering, College of Engineering and Technologies, Al-Mustaqbal University, Babylon, Iraq; Department of Intelligent Medical System, College of Sciences, Al-Mustaqbal University, Babylon, Iraq
It tricked users into disclosing sensitive information through web page phishing. A traditional phishing detection method involves analyzing web pages and user behaviour using machine learning models, which require access to raw data, raising privacy concerns. Using homomorphic encryption and multiparty computation, this paper protects privacy in phishing detection. Security and privacy are enhanced by encrypting sensitive user data during the detection process. With this approach, Extreme Learning Machine (ELM) classification is combined with TF-IDF feature selection to detect phishing while maintaining optimal computational efficiency. According to our experimental results, this approach provides an accuracy of 93.5% and has low computational and communication costs, making it a viable solution for secure real-time phishing detection. © 2025, Taru Publications. All rights reserved.
الكلمات المفتاحية: Extreme Learning Machine (ELM) Homomorphic encryption Machine learning Phishing detection Privacy-preserving Secure multiparty computation TF-IDF
Al-Razaq F.J.A.; Bermani A.K.; Ali A.K.; Manaa M.E.
International Journal of Safety and Security Engineering , Vol. 15 (3), pp. 455-463
Article Open Access English ISSN: 20419031
Department of Software, College of Information Technology, University of Babylon, Babil, 51001, Iraq; College of Information Technology, University of Babylon, Babil, 51001, Iraq; Computer techniques Engineering Department, College of Engineering and Technologies, Al-Mustaqbal University, Babil, 51001, Iraq; Computer Center, Al Qasim Green University, Babylon, 51013, Iraq; Department of Intelligent Medical Systems, College of Sciences, Al-Mustaqbal University, Babil, 51001, Iraq; Department of Information Networks, Information Technology College, University of Babylon, Babylon, 51013, Iraq
Spam email filtering has recently become the most important task helping in maintaining secure and efficient communication systems. As spam emails lead to security leach, reduced productivity, and increased storage costs, this paper is intended to present a proactive approach to spam email classification, leveraging the advanced techniques to increase detection accuracy and efficiency. The proposed work consists of the three steps. The preprocessing step introduces MinHash which provides a small signature matrix for fast approximation based on a k-shingle technique that generates overlapping sequences of k word, effectively capturing the context and nuances of the spam email text. The second step uses the advanced techniques of machine learning (ML) Random Forest (RF), Support Vector Machine (SVM), Decision Tree (DT), Multi-Layer Perceptron (MLP), Logistic Regression, and K-Nearest Neighbors (KNN), and Long Short-Term Memory (LSTM) for deep learning (DL) to classify ham and spam emails. The outcomes illustrate that combining the k-shingle, MinHash with advanced text for feeding ML and DL results in high accuracy rate compared with the other works where the SVM classifiers achieves accuracy rate of 98.95% highlighting its effectiveness in distinguishing between ham and spam emails. Other ML shows competitive performance, With MLP 98.25%, RF 95.6%, Logistic regression 98%, DT 93.3%, and lowest accuracy with KNN 70.1%. DL satisfies a high accuracy rate up to 96.1%. This work contributes to the development of a scalable and reliable solution for spam filtering in modern communication systems. ©2025 The authors.
الكلمات المفتاحية: DDoS attacks DL min-hash spam emails SVM
2024
1 بحث
Yas R.M.; Ahmed Kadhim S.; Abdual Azize Abdual Rahman S.; Bermani A.K.; Ghazal T.M.
Journal of Soft Computing and Data Mining , Vol. 5 (2), pp. 52-61
4 استشهاد Article Open Access English ISSN: 2716621X
Information Institute for Postgraduate Student, University of Information Technology and Communications, Baghdad, 10066, Iraq; Bioinformatics, Biomedical Informatics college, University of Information Technology and Communications, Baghdad, 10066, Iraq; Department of Computer Engineering Techniques, Almamoon University Collage, Baghdad, Iraq; Computer Techniques Engineering Department, College of Engineering and Technologies, Al-Mustaqbal University, Babylon, 51001, Iraq; College of Information Technology, University of Babylon, Babylon, 51001, Iraq; Research Innovation and Entrepreneurship Unit, University of Buraimi, Buraimi, 512, Oman
Wireless sensor networks (WSNs) have had many problems up until now because they are open, adaptable, and limited in resources. These problems have included privacy, effectiveness, and consumption of energy. Sensitive information should always be transmitted over wireless networks with extreme caution because public communications on these networks are sometimes unreliable. Although hierarchical routing methods may handle many applications, there are difficult problems with cluster head (CH) selection and network overload distribution. The secure low energy adaptive clustering hierarchy (SLEACH) protocol Cryptographic n-RSA method (SLEACH-n-RSA) is introduced in this work to improve network longevity, reduce energy consumption, and guarantee high security. The initial step of the SLEACH-n-RSA protocol is to use the improved LEACH protocol, which is based on the estimated remaining energy (ERE) and depleted energy (DE) for setting the threshold function value that will decide who will be the CH and how the cluster will form. In the second step, the suggested n-RSA encryption algorithm has been used to ensure the confidentiality of the transmitted data. The performance analysis of the proposed SLEACH-n-RSA protocol shows better performance results when compared with other currently used protocols in terms of network lifetime, packet delivery ratio, energy consumption, and execution time. The experimental results show that the proposed protocol outperforms other existing protocols. © 2024, Penerbit UTHM. All rights reserved.
الكلمات المفتاحية: cryptosystem low-energy adaptive clustering hierarchy (LEACH) protocol n-RSA Wireless sensor networks (WSNs)