Education
MSc
Computer Science
University of Zakho
Technical BSc
Information Technology Management (ITM)
Technical College of Administration - Baghdad
Technical Deploma
Computer Systems
Technical Institute of Duhok
Title
Lecturer
Assistant Lecturer
Professional Experience
Director of Division
Postgraduate Division
Technical College of Administration
Works as a manager in the Postgraduate Unit.
Head of Dept.
Dept. of Information Technology Management
Technical College of Administration
Managed and Supervised an Information Technology Management Dept.
Coordinator of Dept.
Dept. of Information Technology Management
Technical College of Administration
Works as a Coordinator of Information Technology Management Dept.
Coordinator of Dept.
Dept. of Computer Systems
Technical Institute of Duhok
Works as a Coordinator of Computer Systems Dept.
Employee
Registration Unit
Technical Institute of Duhok
Worked as an employee at the beginning of my appointment in Technical Institute of Duhok after i graduated in his institute in Computer System Dept.
IT Staff
Ster Company for Computer Services
Duhok
Worked as IT Staff in company.
Skills
Applications: Microsoft Office Suite, Internet Explorer, Databases, Programming.
Managing Diversity.
Interest
Reading books in various fields
Football, Volleyball, Olympic Games, Swimming
To obtain a general cultural in various areas.
I will be designed and developed administrative systems in various fields by database and Computer Application such as MS-Excel; to enhance my specialist of knowledge and experience.
Membership
Postgraduate Committee
Member
Postgraduate Division
Postgraduate Examination Committee
Member
Postgraduate Division
Results Objections Committee of Final Examinations
Member
Technical College of Administration
Projects Discussion Commetti of ITM Dept.
Member
Technical College of Administration
Scientific Commetti of ITM Dept.
Member
Technical College of Administration
Publication Journal
Analyses the Performance of Data Warehouse Architecture Types
Journal of Soft Computing and Data Mining (JSCDM) (Issue: 1) (Volume: 3)
The concept of storing historical data for retrieving them when needed has been conceived, and the idea was primitive to build repositories for historical data to store these data, despite the use of a specific technique for recovering these data from various storage modes. Data warehouse is the most reliable and widely used technology for scheduling, forecasting, and managing corporations, also concern with the data storage facility that extensive collection of data. Data warehouses are called ancient modern techniques; since the early days of relational databases, the critical component of decision support, increasing focus for the database industry. Many commercial products and services are now available, and almost all of the primary database management system vendors provide them. When opposed to conventional online transaction processing applications, decision support puts slightly different demands on database technology. This paper analyzes the performance of the data warehouse architectures, through studding and comparing many research works in this filed. the study involves the extract, transform and load the data from deferent recourses and the imporatnt charactrestic of the architectures types, Furthermore the tools and application service techniques used to build data warehouse architecture.
Scheduling Algorithms Implementation for Real Time Operating Systems: A Review
Asian Journal of Research in Computer Science (Issue: 04) (Volume: 11)
The term "Real-Time Operating System (RTOS)" refers to systems wherein the time component is critical. For example, one or more of a computer's peripheral devices send a signal, and the computer must respond appropriately within a specified period of time. Examples include: the monitoring system in a hospital care unit, the autopilot in the aircraft, and the safety control system in the nuclear reactor. Scheduling is a method that ensures that jobs are performed at certain times. In the real-time systems, accuracy does not only rely on the outcomes of calculation, and also on the time it takes to provide the results. It must be completed within the specified time frame. The scheduling strategy is crucial in any real-time system, which is required to prevent overlapping execution in the system. The paper review classifies several previews works on many characteristics. Also, strategies utilized for scheduling in real time are examined and their features compared.
State of Art Survey for Fault Tolerance Feasibility in Distributed Systems
Asian Journal of Research in Computer Science (Issue: 04) (Volume: 11)
The use of technology has grown dramatically, and computer systems are now interconnected via various communication mediums. The use of distributed systems (DS) in our daily activities has only gotten better with data distributions. This is due to the fact that distributed systems allow nodes to arrange and share their resources across linked systems or devices, allowing humans to be integrated with geographically spread computer capacity. Due to multiple system failures at multiple failure points, distributed systems may result in a lack of service availability. to avoid multiple system failures at multiple failure points by using fault tolerance (FT) techniques in distributed systems to ensure replication, high redundancy, and high availability of distributed services. In this paper shows ease fault tolerance systems, its requirements, and explain about distributed system. Also, discuss distributed system architecture; furthermore, explain used techniques of fault tolerance, in additional that review some recent literature on fault tolerance in distributed systems and finally, discuss and compare the fault tolerance literature.
A State of Art Survey for Understanding Malware Detection Approaches in Android Operating System
Asian Journal of Research in Computer Science (Issue: 03) (Volume: 11)
Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware. Android is now the world's most popular OS. More and more malware assaults are taking place in Android applications. Many security detection techniques based on Android Apps are now available. Android applications are developing rapidly across the mobile ecosystem, but Android malware is also emerging in an endless stream. Many researchers have studied the problem of Android malware detection and have put forward theories and methods from different perspectives. Existing research suggests that machine learning is an effective and promising way to detect Android malware. Notwithstanding, there exist reviews that have surveyed different issues related to Android malware detection based on machine learning. The open environmental feature of the Android environment has given Android an extensive appeal in recent years. The growing number of mobile devices, they are incorporated in many aspects of our everyday lives. In today’s digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz. Android OS, which is the most prevalent operating system (OS), has enjoyed immense popularity for smart phones over the past few years. Seizing this opportunity, cybercrime will occur in the form of piracy and malware. Traditional detection does not suffice to combat newly created advanced malware. So, there is a need for smart malware detection systems to reduce malicious activities risk. The present paper includes a thorough comparison that summarizes and analyses the various detection techniques.
A Survey of Data Mining Activities in Distributed Systems
Asian Journal of Research in Computer Science (Issue: 04) (Volume: 11)
Distributed systems, which may be utilized to do computations, are being developed as a result of the fast growth of sharing resources. Data mining, which has a huge range of real applications, provides significant techniques for extracting meaningful and usable information from massive amounts of data. Traditional data mining methods, on the other hand, suppose that the data is gathered centrally, stored in memory, and is static. Managing massive amounts of data and processing them with limited resources is difficult. Large volumes of data, for instance, are swiftly generated and stored in many locations. This becomes increasingly costly to centralize them at a single location. Furthermore, traditional data mining methods typically have several issues and limitations, such as memory restrictions, limited processing ability, and insufficient hard drive space, among others. To overcome the following issues, distributed data mining's have emerged as a beneficial option in several applications According to several authors, this research provides a study of state-of-the-art distributed data mining methods, such as distributed common item-set mining, distributed frequent sequence mining, technical difficulties with distributed systems, distributed clustering, as well as privacy-protection distributed data mining. Furthermore, each work is evaluated and compared to the others.
A Comprehensive Survey for Hadoop Distributed File System
Asian Journal of Research in Computer Science (Issue: 02) (Volume: 11)
In the last few days, data and the internet have become increasingly growing, occurring in big data. For these problems, there are many software frameworks used to increase the performance of the distributed system. This software is used for available ample data storage. One of the most beneficial software frameworks used to utilize data in distributed systems is Hadoop. This software creates machine clustering and formatting the work between them. Hadoop consists of two major components: Hadoop Distributed File System (HDFS) and Map Reduce (MR). By Hadoop, we can process, count, and distribute each word in a large file and know the number of affecting for each of them. The HDFS is designed to effectively store and transmit colossal data sets to high-bandwidth user applications. The differences between this and other file systems provided are relevant. HDFS is intended for low-cost hardware and is exceptionally tolerant to defects. Thousands of computers in a vast cluster both have directly associated storage functions and user programmers. The resource scales with demand while being cost-effective in all sizes by distributing storage and calculation through numerous servers. Depending on the above characteristics of the HDFS, many researchers worked in this field trying to enhance the performance and efficiency of the addressed file system to be one of the most active cloud systems. This paper offers an adequate study to review the essential investigations as a trend beneficial for researchers wishing to operate in such a system. The basic ideas and features of the investigated experiments were taken into account to have a robust comparison, which simplifies the selection for future researchers in this subject. According to many authors, this paper will explain what Hadoop is and its architectures, how it works, and its performance analysis in a distributed systems. In addition, assessing each Writing and compare with each other.
Predicting Student Performance Using Knowledge Discovery Database and Data Mining for Duhok Polytechnic University Students Records as a Sample
Academic Journal of Nawroz University (Issue: 03) (Volume: 10)
This article presents the results of connecting educational data mining techniques to the academic performance of students. Three classification models (Decision Tree, Random Forest and Deep Learning) have been developed to analyze data sets and to predict the performance of students. The projected submission of the three classificatory was calculated and matched. The academic history and data of the students from the Office of the Registrar were used to train the models. Our analysis aims to evaluate the results of students using various variables including student's grade. Data from (221) students with (10) different attributes were used, the attributes were provided by the university registration office which are the basic information of each student. The results of this study are very important since they provide a better understanding of student success assessments and stress the importance of data mining in education. The main purpose of this study is to show the student successful forecast using data mining techniques to improve academic programs. The main purpose of this study is to solve the problem of student’s low academic performance by successfully predicting their academic and social information by using data mining techniques to improve future academic programs. The results of this research indicate that the Decision Tree classifier overtakes the other two classifiers as it achieves a total prediction accuracy of 97%.
A Comprehensive Study of Kernel (Issues and Concepts) in Different Operating Systems
Asian Journal of Research in Computer Science (Issue: 03) (Volume: 08)
Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types of OS to address their flaws. This paper's center of attention is the visual operating system based on the OS features and their limitations and strengths by contrasting iOS, Android, Mac, Windows, and Linux operating systems. Linux, Android, and Windows 10 are more stable, more compatible, and more reliable operating systems. Linux, Android, and Windows are popular enough to become user-friendly, unlike other OSs, and make more application programs. The firewalls in Mac OS X and Windows 10 are built-in. The most popular platforms are Android and Windows, specifically the novelist versions. It is because they are low-cost, dependable, compatible, safe, and easy to use. Furthermore, modern developments in issues resulting from the advent of emerging technology and the growth of the cell phone introduced many features such as high-speed processors, massive memory, multitasking, high-resolution displays, functional telecommunication hardware, and so on.
CREATE A NEW FUNCTION TO CONVERT NUMBERS INTO TEXT FORM BY MS-EXCEL IN THREE LANGUAGES (ENGLISH, KURDISH, AND ARABIC)
TECHNOLOGY REPORTS OF KANSAI UNIVERSITY (TRKU) (Issue: 03) (Volume: 62)
Excel actually becomes influential once you start using functions, which are mathematical formulas that assistance you rapidly and effortlessly make calculations that would be difficult to do by hand. Functions can do various things to speed up your calculations. Excel doesn’t have a default function that displays numbers as English, Kurdish or Arabic words in a worksheet, but you can add this capability by pasting the WrittenNumber function code into a VBA (Visual Basic for Applications) module. This function lets you convert numbers to words with a formula, so (22.50) would read as Twenty-Two Point Fifty. This can be very useful if you're using Excel as a template to print Student's marks/degrees. This study covers example Microsoft Visual Basic for Applications functions that you be able to usage to convert a numeric value in a MS-Excel Spreadsheet cell into its equal value in English, Kurdish or Arabic words. When you want to convert numbers in English, Kurdish or Arabic words; select a WrittenNumberEn, WrittenNumberKr, or WrittenNumberAr Function. It was expected that there would be many end-user program writers in various dissimilar fields like accounting, insurance and banking, and the numbers are not estimated to have diminished later. Therefore, technical improvements of spreadsheets are of unlimited attention to a varied number of persons from diverse experiences.
Seminar
Create a Variable Table in MS-Excel
Information Technology Management (ITM), Technical College of Administration As Presenter
MS-Word Techniques
Information Technology Management (ITM), Technical College of Administration As Presenter
MS-Excel Techniques
Information Technology Management (ITM), Technical College of Administration As Presenter
Training Course
Intermediate Level - English Language Proficiency Course
Duhok Polytechnic University, National
Requirements of Postgraduate Studies.
Pre-Intermediate Level - English Language Proficiency Course
Duhok Polytechnic University, National
Requirements of Postgraduate Studies.
IC3 - Internet and Computing Core
Hawler, National
IC3 - Internet and Computing Core training course was performed by British Institute of Development - Hawler. This course includes three terms are: Computing Fundamentals, Key Applications, and Living Online. Finally, we performed an exam of all terms and succeed with very good degrees.