Papers by Reem Jafar Ismail
Cihan University-Erbil Scientific Journal, 2019
Internet of things (IoT) aims to develop a smart world based on sensing environment. The energy m... more Internet of things (IoT) aims to develop a smart world based on sensing environment. The energy management of wireless sensor networks (WSNs) is a big challenge in IoT since sensor nodes have limited energy and they need to have long life for collecting data and information. The aim of this paper is to propose an efficient energy routing algorithm in WSN and infrastructure based on construction an adaptive energy map of sensor nodes. The results show improvement in overall system performance and lifetime of WSN compared to traditional scenario.

Cihan University-Erbil Scientific Journal, 2022
Smart cities need smart application for the citizen not just digital devices. The smart applicati... more Smart cities need smart application for the citizen not just digital devices. The smart applications will provide a decision-making to users using artificial intelligence. Many real-world services for online shopping and delivery systems were used and attract customers, especially after COVID-19 pandemics, where people prefer to keep social distance and minimize social places visiting. These services need to discover a shortest path for the delivery driver to visit multiple destination and serve the customers. The aim of this research is to develop the route discovery for multiple-destination using ant colony optimization (ACO) algorithm for multiple destination route planning. ACO Algorithm for multiple destination route planning develops the Google Map application to optimize the route when it is used for multiple destination and when the route is updated with a new destination. The results show improvement in the multiple destination route discovery when the shortest path and the sequence order of cities are found. As a conclusion, the ACO Algorithm for Multiple destination route planning simulation results could be used with Google Map application and provide an artificial decision for the citizen in Erbil city. Finally, we discuss our vision for future development.

Engineering and Technology Journal
Educational Data Mining (EDM) is the process of converting raw data from educational systems to u... more Educational Data Mining (EDM) is the process of converting raw data from educational systems to useful information that can be used by educational software developers, students, teachers, parents, and other educational researchers. One of the difficulties in the educational institutes that face the tutor is how to write a paper. This work aims to help the tutor to write a researched paper on specific subject by finding another tutor who is also inter ested in the same subject. This is done by exploring the tutor database by using the proposed educational data mining system, the tutor database is arranged in multidimensional form will include: tutor's teaching subjects, tutor's interesting areas, tutor's published researches, tutor's Msc. and Ph.D research subjects. The proposed system implements SMC and Cosine similarity measures with new proposed representation of tutor's database. A clustering K-Means techniques and associated rule generation is implemented by using WEKA data mining tool. The results obtained from that work are very useful for tutor and they give a rich analysis for developing researched papers for different tutors.
Cihan University-Erbil Scientific Journal
Payment mechanisms are migrated to mobile devices as e-commerce grows, creating e-wallets. The cu... more Payment mechanisms are migrated to mobile devices as e-commerce grows, creating e-wallets. The current e-wallet payment solutions are based on online-connected smartphones. The transaction is completed using a mobile application, which requires a GPRS and Wi-Fi connection. People around the world are becoming more interested in e-wallets. Nevertheless, in Iraq, it grows slower than in other parts of the world after survey is done to ascertain the primary elements influencing Iraqis’ adoption of electronic wallets. This paper proposes a design of e-wallet Mobile app offering online to offline (O2O) payments that aim to replace traditional e-wallet, credit cards, debit cards, and cash using offline connectivity, near-field communication (NFC), and SMS-based payment mechanisms that are independent of internet connection.

Cihan University-Erbil Scientific Journal, 2021
In the past years, the Internet of Things (IoT) used in different applications and very wide rang... more In the past years, the Internet of Things (IoT) used in different applications and very wide range of fields (e.g. cloud services, smart environments, logistics, social and personal domains, and healthcare services). The IoT included a variety of components and devices such as RFID devices, wireless sensors, actuators, and wireless networks. Also, the IoT with smart devices adopted in various companies, organizations and public services systems. For instance, some devices like Notebooks and smartphones have been used to perform different management activities and duties. These smart devices relied on data exchange and data storage resources in clouds computing services. In this context, the saved data and exchanged data required protection against hacking operations, transferred with more secure communications channels, and safe storage environment in the clouds and local storage systems. In this paper, we proposed some encryption algorithms to tackle the issue of data confidentiali...

Cihan University-Erbil Scientific Journal, 2022
Smart cities need a smart applications for the citizen, not just digital devices. Smart applicati... more Smart cities need a smart applications for the citizen, not just digital devices. Smart applications will provide a decision-making to users by using artificial intelligence. Many real-world services for online shopping and delivery systems were used and attracted customers, especially after the Covid-19 pandemics when people prefer to keep social distance and minimize social places visiting. These services need to discover the shortest path for the delivery driver to visit multiple destinations and serve the customers. The aim of this research is to develop the route discovery for multiple-destination by using ACO Algorithm for Multiple destination route planning. ACO Algorithm for Multiple destination route planning develops the Google MAP application to optimize the route when it is used for multiple destinations and when the route is updated with a new destination. The results show improvement in the multiple destination route discovery when the shortest path and the sequence or...
International Journal of Engineering and Management Research, 2018
In ad hoc routing protocols the source node may need an intermediate nodes to transmit the packet... more In ad hoc routing protocols the source node may need an intermediate nodes to transmit the packets into the destination if the destination is not within transmission range of the source. This paper studies the impact of signal strength of nodes over ad hoc routing protocols and explains an important effect of signal strength on ad hoc routing protocols in four different directions including the routes and the nodes. As a result the study give an important improvement in ad hoc routing protocols when using signal strength compared to other ad hoc routing protocols without considering signal strength.

IEEE Instrumentation & Measurement Magazine, 2009
In recent years, the number of wireless sensor network deployments for real life applications has... more In recent years, the number of wireless sensor network deployments for real life applications has rapidly increased. Still, the energy problem remains one of the major barrier somehow preventing the complete exploitation of this technology. Sensor nodes are typically powered by batteries with a limited lifetime and, even when additional energy can be harvested from the external environment (e.g., through solar cells or piezo-electric mechanisms), it remains a limited resource to be consumed judiciously. Efficient energy management is thus a key requirement for a credible design of a wireless sensor network. Most energy management strategies proposed in the literature assume that data acquisition consumes significantly less energy than their transmission. Unfortunately, this assumption does not hold in a number of practical applications where the power consumption of the sensing activity may be comparable or even greater than that of the radio. In this context, effective energy management strategies should include policies for an efficient use of energy-hungry sensors, which become one of the main components affecting the network lifetime. In this paper, we survey the main approaches for efficient energy management in sensor networks with energy-hungry sensors.
Cihan University-Erbil Scientific Journal, 2021
Wireless sensor networks aim to develop a smart city based on sensing environment. The routing pr... more Wireless sensor networks aim to develop a smart city based on sensing environment. The routing protocols of wireless sensor networks is important to transfer the data in smart cities since sensor nodes have limited power and transmission range. The aim of this research is to enhance wireless sensor networks routing protocols based on proposed cross-layer interaction between physical layer and network layer also a proposed routing table information of wireless sensor nodes is developed to consider the transmission power of neighbor’s nodes to determine the next hop. Cross-layer interaction provides a useful information and effective adaptation for WSN routing protocols. As a result, the proposed routing protocol shows an improvement in network performance when number of intermediate nodes are minimized.

a. Attackers’ Knowledge:As software security continue to gain the attention of security experts a... more a. Attackers’ Knowledge:As software security continue to gain the attention of security experts and organizations, the tools and techniques used by attackers are becoming increasingly sophisticated and invasive. b. Complexity of software:Software development is a complex process because it involves many activities and specialties. It involves different units, stages and personalities, and all these have to be integrated to achieve successful software production. The situation is even worse with the connection to Internet and the use of mobile codes. c. Security Education:Producing secure software requires a lot of security training, education and experience. Many software developers are not well grounded in computer security. To what extent of the techniques and tools of attackers do they understand? Also, many programming books do not teach how to write secure programs. Many curricular of schools offering computer science do not properly address computer security. d. Attitude of So...
2nd International Conference of Cihan University-Erbil on Communication Engineering and Computer Science, 2017

URLs can get long, unattractive, and break when sent via e-mail. To shorten an Internet address, ... more URLs can get long, unattractive, and break when sent via e-mail. To shorten an Internet address, we proposed a secure URL shortening service which will take a long Web address and create a shorter address that will not break in an e-mail posting by using the Blackboard architecture. Security is considered in the proposed service to prevent hacking because shortened links may stop working or requests can be redirected to advertising websites and/or websites containing malware. The Blackboard is updated continuously by KS and it holds all the data concerning the URL shortening by storing all the intermediate solutions until the final solution of the problem of URL shortening is found. The knowledge sources that are proposed in the Blackboard system include: (URL Validation, URL Statistics, and Secure URL shortening). As a result the proposed secure URL shortening service will give the user more trust to use the service with security, availability, and confidentiality consideration as ...

A session is a period of time linked to a user, which is initiated when he/she arrives at a web a... more A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks. Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many cases, an attacker who manages to obtain a valid ID of user’s session can use it to directly enter that session – often without arising user’s suspicion. A secure session management must be implemented in the development phase of web applications bec...

The proposed model aims to analyze the student behavior when answering e-assessment, this analysi... more The proposed model aims to analyze the student behavior when answering e-assessment, this analysis is important to the teacher to evaluate the student learning and to adjust the learning method in the way that is suitable to the student behavior. This analysis is done into two directions: the first one is done by tracking the sequence of the answered questions, this sequence is important to know how the student is thinking and understanding. A second analysis is done by giving each question a target to be assessed; like: aim of subject, general knowledge, reasoning, skills, etc. This analysis is important to the teacher to know what the concept is learned and what is not. Many calculation and statistics is done to obtain the results including: (the total score of the e-assessment, the target that is to be assessed, the questions that is not answered by the students, etc.). Real e-assessment is done to students in computer network subject. As a result the teacher can adjust the learn...

The classical approaches for software engineering that are used to design programs cannot be used... more The classical approaches for software engineering that are used to design programs cannot be used to design Web Service. With the development of the Internet technology, services can operate on single machine or it can be distrusted over many computers through networks so we called it "Web Service". One of the most important benefits of service centric approach is the ability of services to function as self-contained and reusable units that can be located and executed on demand. In this paper we present a Service Oriented Architecture (SOA) and proposed a new web service which we called it "Service Demand". The proposed "Service Demand" is bind with interface and operations to know the other web services that interact with the original web service and reuse it. We design "Service Demand" by using Unified Modeling Language (UML) and then implement it by using Windows Communication Foundation (WCF) in Visual Studio 2010. The proposed "Servi...
Uploads
Papers by Reem Jafar Ismail