Staff Portal
Abdul Karim Abdul Hamid Najm Abdullah (Assistant Professor)

PhD in Networks
Lecturer
Computer networking systems - Computer Sciences and IT
abdulkareem.alaloosy@uoanbar.edu.iq

ScopusGoogle ScholarResearch GateORCIDPublons


Biography

<div style="margin-left:112.5pt; margin-right:0in">&nbsp;</div> <p><span style="font-size:medium">Dr. Abdul Kareem&nbsp; AL ALOOSY</span></p> <p>&nbsp;<span style="font-size:medium">Asst. Prof.</span></p> <p><span style="font-size:medium">PhD Information Systems - Networks</span></p> <p>&nbsp;<span style="font-size:medium">Dean of Computer and Information Technology College&nbsp;</span></p> <p><span style="font-size:medium">University of Anbar</span></p> <p><a href="mailto:belal-alkhateeb@uoanbar.edu.iq"><span style="font-size:medium">alaloosyabdul@yahoo.com</span></a></p> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;<span style="font-size:medium"><a href="mailto:belal-alkhateeb@uoanbar.edu.iq">alaloosy@gmail.com</a></span></div> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;</div> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;</div> <div style="margin-left:112.5pt; margin-right:0in"><strong><u>EDUCATIONL BACKGROUIN</u></strong></div> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;&nbsp;</div> <div> <div><span style="font-size:medium">Ph.D. , Polytechnic of Wroctaw , Wroctaw , Poland , 1992</span></div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">M.Sc. , Polytechnic of Wroctaw , Wroctaw , Poland , 1987</span></div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">B.Sc , University of Salahaddin / College of Engineering , Electrical Engineering Department , Iraq , 1981</span></div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">Secondary School (1972 &ndash; 1977 ) Falluja , Iraq</span></div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">Primary School ( 1965 &ndash; 1971 ) Falluja , Iraq</span></div> </div> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;</div> <p>&nbsp;</p> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;<span style="font-size:medium">&nbsp;</span></div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium"><strong><u>OTHER INFORMATION</u></strong></span></div> <div style="margin-left:112.5pt; margin-right:0in">&nbsp;</div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">1. Senior Engineer of the Union of Iraqi Engineers.</span></div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">2. Member of the Iraqi Engineering Society.&nbsp;</span></div> <p>&nbsp;</p> <p>&nbsp;</p>

Publication

<p><span style="font-size:medium">&nbsp;</span></p> <p style="text-align:left"><span style="font-size:medium"><strong><u>Publications</u></strong></span></p> <p style="text-align:left">&nbsp;</p> <p style="text-align:left"><span style="font-size:medium">1. &quot;Local Area Network with analysis of ring topology by Petri Net &quot; Appl. Math and comp. sci 1987 vol 3, No. 1, 156- 162.&nbsp;</span></p> <div><span style="font-size:medium">2. &quot;A Petri Net approach to the performability estimation of a ring transport system &quot; Inst. Of Cybernetics , Technical University of Wroctaw, PREPRINTY No 49/90 poland , 1990.&nbsp;</span></div> <div>&nbsp;</div> <div><span style="font-size:medium">3. &quot; An estimation of a mean time of the slot transfer in the Cambridge Ring &quot; Inst. Of Cybernetics , Technical University of Wroctaw, PREPRINTY No 37/91 poland , 1991.</span></div> <div>&nbsp;</div> <div><span style="font-size:medium">4. &quot;Approximation of a mean time of the slot transfer in the CR &quot; Appl. Math and comp. sci 1992 vol 2, No.2, 237 &ndash; 249. Poland 1992.&nbsp;</span></div> <div>&nbsp;</div> <div><span style="font-size:medium">5. &quot; Performability Estimation of Token Ring Network &quot; The 1st Regional Conference of Eng. Sci. NUCEJ Spatial ISSUE vol.11,No.1, 2008 pp 98-106 Baghdad.&nbsp;</span></div> <div>&nbsp;</div> <div><span style="font-size:medium">6. The effects of Artificial Intelligent on online Intrusion Detection System. International Journal of Business and ICT. Vol.1, No.3-4.2014&nbsp;</span></div> <div>&nbsp;</div> <div><span style="font-size:medium">7. Human Body Measurements and Clothing Virtual for Men Adult Consumers. International Journal of Computer Applications. Volume 127 &ndash; No.9, October.2015</span></div> <p>&nbsp;</p> <ol> <li style="list-style-type:none"><span style="font-family:Arial,Helvetica,sans-serif">8.&nbsp;<span style="font-size:14pt">Signature Recognition Using Discrete Fourier Transform . .International Journal of Business and ICT. Vol.1, No.1-2.2015.</span></span></li> </ol> <div>&nbsp;</div> <p>&nbsp;<span style="font-family:Arial,Helvetica,sans-serif">9.<span style="font-size:14pt">Design and simulation of an Intelligent Emergency System Based on Routing Protocol.Asian Journal of Information Technology 16(6); 465-471 , 2017</span></span></p> <ol> <li style="list-style-type:none"><span style="font-family:Arial,Helvetica,sans-serif">10.&nbsp;<span style="font-size:14pt">&nbsp;Early Alarm for Emergency Response based on the Priority associated with the Cooperative Awareness&nbsp; Messages in Vehicular Ad-hoc Network. Accepted for the puplication in Journal of Engineering and Applied Sciences,2018 </span></span></li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none"><span style="font-family:Arial,Helvetica,sans-serif">11.&nbsp;<span style="font-size:14pt">&nbsp;Detecting Malicious Behavio</span></span></li> <li style="list-style-type:none"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14pt">ur for SANET Based on Artificial Intelligence Algorithms. ICICT2021- Basra- IRAQ</span></span></li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none"><em><span style="font-family:Arial,Helvetica,sans-serif">12.<span style="font-size:14pt">An Optimal Distribution of RSU for Improving Self-Driving Vehicle Connectivity.Computers, Materials &amp; Continua DOI:<a href="http://dx.doi.org/10.32604/cmc.2022.019773" style="color:blue; text-decoration:underline">10.32604/cmc.2022.019773</a></span></span></em></li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none"><em><span style="font-family:Arial,Helvetica,sans-serif">13.&nbsp;<span style="font-size:14pt">Design and&nbsp; Simulation of an Intelligent Emergency System Based on Routing Protocol, Asian Journal oflnformation Technology 16 (6): 465-471, 2017</span></span></em></li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none"><em><span style="font-family:Arial,Helvetica,sans-serif">14.&nbsp;<span style="font-size:14pt">Early Alarm for Emergency Response Based on the Priority Associated with the Cooperative Awareness Messages in Vehicular Ad-hoc Network. Journal of Engineering and Applied Sciences 13 (13): 5052-5059, 2018</span></span></em></li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none"><em><span style="font-family:Arial,Helvetica,sans-serif">15.&nbsp;<span style="font-size:14pt">Detecting Malicious Behaviour for SANET Based on Artificial Intelligence Algorithms, 2021 International Conference on Communication &amp; Information Technology - ICICT2021&ndash; Basra- IRAQ</span></span></em></li> <li style="list-style-type:none">&nbsp;</li> <li style="list-style-type:none"><em><span style="font-family:Arial,Helvetica,sans-serif">16.&nbsp;<span style="font-size:14pt">&nbsp;An Optimal Distribution of RSU for Improving Self-Driving Vehicle Connectivity, Computers, Materials &amp; Conti </span></span></em></li> <li style="list-style-type:none">&nbsp;</li> </ol> <p style="list-style-type:none">&nbsp;</p> <p style="list-style-type:none">&nbsp;</p> <p>&nbsp;</p>

Lectures

 
 

# المادة اسم المحاضرة المرحلة التحميل مشاهدة