Researcher Image
علياء محمدنوري عيدان البراك - Alyaa Mohammed Noori Idan Al-Barrak
PhD - lecturer
College of Science , Department of Computer
[email protected]
Summary

Alyaa Al-Barrak received her BSc degree in 2001 and her MSc degree in 2004, both from the University of Baghdad, Iraq. She earned her PhD in 2018 from the University of Northampton, England. Dr. Al-Barrak is currently a Lecturer in the Department of Computer Science at the College of Science, University of Baghdad. Her research interests encompass artificial intelligence, channel coding, coding theory, and wireless communication. Throughout her academic career, she has taught a variety of courses at both the University of Baghdad and the University of Northampton. Dr. Al-Barrak served as the Director of the Planning, Studying, and Follow-up Division at the College of Science, University of Baghdad, from 2011 to 2013 and again from 2018 to 2023. She was an Assistant Lecturer at the University of Northampton in the UK during the 2015/2016 and 2016/2017 academic years. Additionally, she was a member of the Diversiti UK Learning and Development CIC in England from 2014 to 2017.

In recognition of her groundbreaking research in wireless communication, she received the Best Paper Award at the IEEE conference hosted by the University of Essex in 2016.

In 2020, Dr. Al-Barrak co-founded the Iraqi Society for Engineering Management (ISEM) and currently serves as its Vice Chancellor. She is also a member of the Ministry of Higher Education and Scientific Research committee that developed the "Iraqi National English Language Test (INELT)." Since 2017, she has been a member of scientific and organizing committees for several national and international conferences. Moreover, she is a reviewer for various international journals (Q1 and Q2 in Scopus) such as PLOS ONE and IET Networks Journals.

Qualifications

B.Sc.

 University : The University of Baghdad (Iraq).

 College : Science/ University of Baghdad

 Department : Computer Science

 From to : 01/10/1997 to 30/06/2001

 Rank : 2 out of 72 students for the both trials

 Average and standard : 74.76%. Good.

 Date : 30/06/ 2001.

MSc

 University : The University of Baghdad (Iraq).

 College : Science/ University of Baghdad

 Department : Computer Science

 From to : 01/10/2001 to 14/03/2004

 Rank : 2 out of 72 students for the both trials

 Specialisation : Computer Security

 Average and standard : 81.92%. V. Good.

 Date : 23/05/ 2004.

PhD

 University : The University of Northampton(UK).

 School : Faculty of Art, Science and Technology.

 Department : Computing.

 Degree obtained : PhD.

 From to : 01/02/2014 to 18/05/2018.

 Specialisation : Wireless Communications.

 Date of award : 04/07/ 2018

Responsibility

 Privet work (1998 to 2006). Small office to fix, sell and buy computers devices, software, components, CDs/DVDs and accessories.

 Lecturer /Computer Science Department-College of Science - The University of Baghdad (IRQ) (2005 tell now).

 Manager of Studies, Planning and Flow-up Unit - College of Science - The University of Baghdad (2011-2013).

 Classroom assistance /The University of Northampton (UK) - Faculty of Art, Science and Technology (2014 – 2018).

 Employability Advisor/Social Media Developer in diversiti UK Learning and Development C.I.C (2014 -2017).

 Manager of Studies, Planning and Flow-up Unit - College of Science - The University of Baghdad (2019 - 2023).

Awards and Memberships
  • The Best Paper Award at the IEEE conference hosted by the University of Essex in 2016.
  • IEEE Membership.
  • Vice Chancellor of the Iraqi Society for Engineering Managment (ISEM).
Research Interests

AI, Wireless Communications, Information Theory, Networking, IoT, IoV, and Multidisciplinary research that connect Computer science with other science specialty in smart enviroment.

Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
2016 8th Computer Science And Electronic Engineering (ceec)
Utilisation of multipath phenomenon to improve the performance of BCH and RS codes
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jun 16 2017
Journal Name
Computers
Enhancing BER Performance Limit of BCH and RS Codes Using Multipath Diversity
...Show More Authors

View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 02 2024
Utilizing Deep Learning Techniques to Identify People by Palm Print
...Show More Authors

Person recognition systems have been applied for several years, as fingerprint recognition has been experimented with different image resolutions for 15 years. Fingerprint recognition and biometrics for security are becoming commonplace. Biometric systems are emerging and evolving topics seen as fertile ground for researchers to investigate more deeply and discover new approaches. Among the most prominent of these systems is the palm printing system, which identifies individuals based on the palm of their hands because of the advantages that the palm possesses that cannot be replicated among humans, as in its theory of other fingerprints. This paper proposes a biometric system to identify people by handprint, especially

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Use of learning methods for gender and age classification based on front shot face images
...Show More Authors

Publication Date
Mon Jan 02 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Diagnostic COVID-19 based on chest imaging of COVID-19: A survey
...Show More Authors

Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Business, Communication & Technology
Exploring the Adoption of Big Data Analytics in the Oil and Gas Industry: A Case Study
...Show More Authors

The oil and gas industry relies heavily on IT innovations to manage business processes, but the exponential generation of data has led to concerns about processing big data, generating valuable insights, and making timely decisions. Many companies have adopted Big Data Analytics (BDA) solutions to address these challenges. However, determining the adoption of BDA solutions requires a thorough understanding of the contextual factors influencing these decisions. This research explores these factors using a new Technology-Organisation-Environment (TOE) framework, presenting technological, organisational, and environmental factors. The study used a Delphi research method and seven heterogeneous panelists from an Oman oil and gas company

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 13 2024
Journal Name
Al-noor Journal Of Engineering Management And Computer Science
INTELLIGENT INTERNATIONAL IDENTIFICATION CARD
...Show More Authors

This study will develop and implement the International Identification Card (IIC) to multi users (M-1). The IIC can be used in several methods such as an IC card, Passport, driver’s license, Visa card, Security Information system, Business part, all information about individuals/persons. The Smart Identification Card Technology (SICT) system will be using several new technology categories/tools such as Information Technology, Management Information Technology, Database management, internet service, Bluetooth service, NFC and mobile calling service. The target of SICT is to increase the efficiency of IC card to know the details for all citizens and foreigners from any country regardless their nationalities. What this means is the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 30 2025
Prediction of COVID-19 Disease and Infection Rate Based on Dense Net
...Show More Authors

Coronavirus is an RNA (Ribonucleic acid) virus in the coronaviridian family that causes zoonotic and infectious diseases transmitted between animals and evolved between humans. This class of pathogens is responsible for respiratory diseases. Coronavirus refers to the crown-like protrusions on the outside surface of the virus. Corona is an infection that causes breathing difficulties in humans. In epidemics, symptomatic techniques based on graphic design are essential for examining the causes of influence, which leads to better results than primary radioscopy mechanisms for identifying and diagnosing COVID-19 cases. The urgent need to employ artificial intelligence in disease detection arose from this standpoint. In this paper, a system i

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
No Events Found