بهيجة خضير شكر
الرتبة الاكاديمية : استاذ
اللغات : العربية – الأنكليزية
محل العمل : جامعة كربلاء – كلية علوم الحاسوب و تكنولوجيا المعلومات – قسم علوم الحاسوب
المؤهلات
1- بكالوريوس رياضيات ت تطبيقية الجامعة التكنولوجية
2- ماجستير علوم الحاسبات جامعة بابل
3- دكتوراه علوم الحاسبات جامعة بابل
مقررة قسم الحاسبات كلية العلوم سابقا
- الإشراف على طلبة الدراسات العليا
- المناقشات لطلبة الدراسات العليا
- التقييم العلمي لاطاريح ورسائل الدراسات العليا
- التقييم العلمي للبحوث والترقيات
- تدريس الدراسات الأولية
- امن المعلومات
- معالجة الصور
- إخفاء المعلومات
- الوسائط المتعددة
- اخفاء معلومات
- امنية شبكات متقدمة
- منهج بحث
1-B.K.AL-Shukur, “design and generate hybrid non-linear keys “, Journal of Babylon University, 2002.
2-B.K.AL-Shukur,M.A.Salman , “Design and evaluate non-linear generator using filtration method “,2002.
3- B.K.AL-Shukur, “Constructing and Generate a Hybrid Non-Linear Keys”, Journal of Babylon University, vol.10, 2005.
4- B.K.AL-Shakur, “Design and Evaluation Complex Non-Linear Generator Using Filtration “, Journal of Babylon University, vol.10, 2005.
5– B.K.AL-Shukur,”Design and characterizing key generator using statistical test to measure the random“, Journal of Babylon University, vol.6, 2006.
6- B.K.AL-Shakur, H.M.Salman,” Data compression using Berlkamp-massy algorithms”, Journal of Babylon University, 2006.
7- B.K.AL-Shakur, E.S.AL-Shamary, H.R.Mohamed, “A Time Delay Neural Network for Recognition the Stop and Nasal Approach Arabic”, Journal of Babylon University, vol.11, 2006.
8- B.K.AL-Shakur, H.M.Jaafer,” Method for Hiding Text in Color Image“, Journal of Babylon University, vol.11, 2006.
9- B.K.AL-Shukur,”Encryption of Audio File Using Block Cipher “, Journal of Babylon University, No.1, Vol.14, 2007.
10- B.K.AL-Shukur, “Hiding Text in Text by Using Multi Cryptography Algorithms”,“, Journal of Babylon University, 2008.
11-E.AL-Shamery, B.AL-Kanimy, H.AL-Mamory,”Palm Print Recognition Based on Winner Take All Neural Network“, Proceeding of ISIVC, 2008.
12- B.K.AL-Shukur,”Utilizing Hybrid Method for Edge detection “, Journal of AL-Qadisiya University, vol.1, 2008.
13-S.Zaki, B.K.Shukur,”Utilizing a FCM Algorithm and RLE for YUV image Compression”, Journal Technics, No.10, 2008.
14-A.M.AL-Bakry, B.K.AL-Shukur,”Utilizing Hybrid Methods for Video Image Compression”, AICIT, VOL.5, NO.11, November 30, ISSN: 1975-9339, 2011.
15-N.H.AL-Aaraj, A.M.AL-Bakry, B.K.AL-Shukur,”Design a Hybrid Fuzzy Clustering System for MRI Medical Images”, AICIT, 2011.
16- N.H.AL-Aaraj, A.M.AL-Bakry, B.K.AL-Shukur,”ON a Tumor Brain Image Classification “, AICIT, 2011.
17-Baheja K.Shukur,Hadab Khalid Obayes, Firas Sabah AL‐Turaihi, “Face Recognition Using Error Back propagation neural network-Based haar wavelet and moment invariants Selected Features“,Archives Des Sciences, Vol.66, No. 4;Apr 2013.
18-Baheja K.Shukur,”Employing hybrid methods for compression color images “,Journal of Karbala University, No.91, Vol .2877, 2013.
19-BahejaK.Shukur, Mahmoud Shaker, Hadab Khalid Obayes, “Web classification based features extracted and K-NN algorithm”,British Journal of Science, April 2013, Vol. 8 (2).
20- Bahijakhudaiershukur,hiba Mohammed jafaar,Anwar JaaferMoosa,”A Novel Steganography Method for a Secret True Image“,International Journal of Engineering Research and Development ,Volume 6, Issue 4 (March 2013), PP. 65-73.
21- Bahijakhudaiershukur,SuraZakiNaji ,”Evaluation Clustering Image Using Steady State Genetic and Hybrid K-Harmonic Clustering Algorithms”,Journal of technology University, No.560,Iraq journal of computer, communication ,control & system engineering ,2013.
22- Baheja Kadhiur , Asst. Prof. Dr.Baheja K.Shukur , Swasan Hadi , W. Al-Hameed,”An Efficient Approach Implementation To Image Compression And Encryption”,International Journal of Digital Content Technology and its Applications (ISSN: 1975-9339),2015.
23- Bahigah Khudair, Zainab Abdullah & Sawsan Hadi, “Design and Implementation a New Encryption System for True Image”.Research Journal of Applied Sciences, Volume 11, Issue 10,2016.
24- Baheja K.Shukur, Intissar hamid & Sawsan Hadi, ” Design and Implementation Secure System Based on mixed techniques”,COMSCET in DUABI 2018.
25- Prof. Dr. Eng. Sattar B. Sadkhan,Dr. Baheeja K. AL-Shukur,Ali k. Mattar .”Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems “, Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science andApplications (AIC-MITCSA) – IRAQ (9-10) May, 2016.
26- Dr.Baheja K.Shukur & Hussain Ali Hussian,”An Efficient Methods For Hiding SecureImage In Image”,COMSCET) in DUABI,2017.
27- Prof. Dr. Eng. Sattar B. Sadkhan ,Dr. Baheeja K. AL-Shukur, Ali k. Mattar,
” Human Voice Extracted Biometric Features: What Can be Used for”, International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani – Iraq,2017.
28- Dr.Baheja K.Shukur & Hussain Ali Hussian, “An Efficient Methods For Hiding Secure Image In Image”, COMSCET) in DUABI,2017.
29-Ali Abbas Alkhazraji,K.Baheeja,Asia Mahdi Nasser Alzubaidi,” Ancient textural restoration using deep neural networks. A literature Review “, Al- Sadiq International Conference on co mmunication and information technology, 2023.
30- Hussein A. Ismael1, Nabeel H. Al-A’araji1, Baheja Khudair Shukur,” Enhanced the prediction approach of diabetes using an autoencoder with regularization and deep neural network”,Periodicals of Engineering and Natural Sciences, Vol. 10, No. 6, December 2022, pp.156-167.
31- Hussein A. Ismael , Nabeel H. Al-A’araji , Baheja khudair shukur ,”An Enhanced Diabetic Foot Ulcer Classification Approach Using GLCM and
Deep Convolution Neural Network “,H.A. Ismael et al. / Karbala International Journal of Modern Science 8 (2022) 682e691.
32-ImanS. Razaq , BahejaK. Shukur ,” Combining wavelet transforms features and high‑level features using CNN for face morphing attack detection “,Int. j. inf. tecnol. (October 2023) 15(7):3957–3966 https://doi.org/10.1007/s41870-023-01424-2.
33- Iman Saleem, Bahja Khudair Shukr,” Techniques and Challenges for Generation and Detection Face Morphing Attacks: A Survey”,Iraqi Journal of Science, 2023, Vol. 64, No. 1, pp: 385-404
DOI: 10.24996/ijs.2023.64.1.36.
34- ImanS. Razaq , BahejaK. Shukur,” Improved Face Morphing A ace Morphing Attack Detection Method Using PCA and ttack Detection Method Using PCA and
Convolutional Neural Network “,/ Karbala International Journal of Modern Science, Volume 9 Issue 2 Article 15,2023
المؤتمرات
-Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications
2- in DUABICOMSCET
3-COMSCET in Malaysia