Back

Dr. Mustafa Tareq Eid

LECTURER

Mustafa Tareq received the B.Sc. degree in computer science from Al Turath University College, Iraq, in 2012, and the M.Sc. degree in network technology from Universiti Kebangsaan Malaysia (UKM), Malaysia, in 2016, and Ph.D. degree in computer science with the Center for Software Technology and Management, Faculty of Information Science and Technology (UKM), Malaysia, in 2021. He is currently working in the university of technology, computer science.

Education

  • M.Sc. degree in network technology from Universiti Kebangsaan Malaysia (UKM), Malaysia, 2016
  • Ph.D. in computer science with the Center for Software Technology and Management, Faculty of Information Science and Technology (UKM), Malaysia, 2021

Research Interests

  • Computer Science
  • Artificial intelligence

Teaching

  • Information Theory an coding in Al-Hikma University College
  • Computer Network in Al-Hikma University College
  • Algorithms in Al-Hikma University College
  • Computer Architecture in Al-Hikma University College
  • Voice Recognition in University of Technology

Most recent publications

  • Mobile ad hoc network energy cost algorithm based on artificial bee colony
  • Online clustering of evolving data streams using a density grid-based method
  • AA systematic review of density grid-based clustering for data streams
  • Online clustering of evolving data stream based on adaptive Chebychev distance
  • Human immune-based model for intrusion detection in mobile ad hoc networks
  • A new density-based method for clustering data stream using genetic algorithm
  • Artificial bee colony for minimizing the energy consumption in mobile ad hoc network
  • An evolving approach to data streams clustering based on Chebychev with false merging
  • Investigation of Data Representation Methods with Machine Learning Algorithms for Biomedical Named Enttity Recognition
  • A Review of Lightweight Object Detection Algorithms for Mobile Augmented Reality
  • Performance analysis of reactive routing protocols in mobile ad hoc network using NS2
  • Text Cryptography Based on Three Different Keys
  • Comparison of Data Mining Techniques in Healthcare Data
  • Women’s day award 2017 / University of Technology
  • Award in 2nd computer science conference, 2019