Heba M. Fadhil obtained her Doctorate in Computer Engineering from Universiti of Technology in 2022. She had Master of Computer Engineering from University of Baghdad with a in 2014. In 2006, she graduated from University of Al-Mustansiriyah with a Bachelor of Computer Engineering. Among her scientific interests include Parallel Processing, Encryption, Algorithms, Object-Oriented Technology, Artificial Intelligence, Image Processing, Cloud Computing and the Internet of Things. She is a member of several committees, including ACM, the International Association for the Engineers, Cisco Networking Academy, and Oracle Academy, among others. At the moment, she works as an instructor for both Cisco and Oracle. In addition to being a member of the teaching staff at the Department of Information and Communication in the Al-Khwarizmi College of Engineering at the University of Baghdad. She is a Reviewer for the IEEE Access Journal, International Journal of Computer Science, Peer-to-Peer Networking and Applications, BEEI, International Journal of New Computer Architectures and their Applications, Circulation in Computer Science Journal.
PhD in Computer Engineering
- Organizer of ICE Programmers Competition.
- Member of Association for Computing Machinery (ACM)
- Member of International Association for the Engineers.
- Member of International Computer Science and Engineering Society (ICSES).
- Cisco Networking Academy, Al-Khwarizmi Eng. Academy, Instructor.
- Oracle Academy, Al-Khwarizmi Eng. Academy, Instructor.
- EU Code Week Ambassador, Iraq Section.
- Editorial Board Member in the International Journal of Applied Science and Technology Research Excellence.
- Editorial Board Member in Al-Khwarizmi Engineering Journal.
- Editorial Board Member in Al-Salam Journal for Engineering and Technology (AJEST).
- Editorial Board Member in Journal of Cognitive Human-Computer Interaction.
- Reviewer in Peer-to-Peer Networking and Applications Journal.
- Reviewer in International Journal of Image and Graphics.
- Reviewer in ICSES Interdisciplinary Transactions on Cloud Computing, IoT, and Big Data (IITCIB).
- Reviewer in International Journal of Engineering Research and Technology (IJERT).
- Reviewer in Journal of Computer Science Journal.
- Reviewer in International Journal of Computing and Digital Systems.
- Reviewer in International Journal of Nanotechnology and Nanoscience
- (IJNN).
- Reviewer in International Journal of New Computer Architectures and Their Applications.
- Reviewer in IEEE Access.
- Reviewer in Iraqi Journal For Computer Science and Mathematics.
- CCNA level 1(2007).
- Wireless Technology (2008).
- Introduction to Cyber security course from the Cisco Networking Academy (2016)
- NDG Linux Essentials from the Linux Professional Institute (LPI).(2016)
- Packet Tracer 101 course from the Cisco Networking Academy.(2016)
- CPA: Programming Essentials in C++.(2016)
- CCNA Routing and Switching: Introduction to Networks.(2017)
- CCNA Routing and Switching: Routing and Switching Essentials.(2017)
- CCNA Routing and Switching: Scaling Networks(2018)
- Al- Khwarizmi Award of the best teacher for the academic year 2017 -2018
- Won the bronze medal in the proceedings of the 6th International Conference on Software Engineering & Computer Systems (ICSECS 2019) held at the faculty of computers, University Malaysia Pahang.
- Al- Khwarizmi Award of the best teacher for the academic year 2022 -2023.
- Al- Khwarizmi Award of the best graduation project for the academic year 2022 -2023.
-
Al- Khwarizmi Award of the best teacher for the academic year 2023 -2024.
- Al- Khwarizmi Award of the best graduation project for the academic year 2023 -2024.
Artificial Intelligence, Machine Learning , Cryptography Algorithms, Parallel Processing, Operating Systems, Cloud Computing, IoT, Object Oriented Technology and Image Processing
Digital System Design ,Data Structures, Algorithms, Object Oriented Programming , Machine Learning, Data Base Design, Operating Systems, Computer Graphics, Programming Paradigms, Technical English
MSC STUDENTS
Today’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol
... Show MoreTo ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and co
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreOptimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment
... Show MoreCryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The
... Show MoreThe employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreWith the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo
Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreTesting is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show More