Profile Image
Assist. Lecturer

FIRAS TARIK JASIM

Research Interests

Cyber securtiy

IDS

Gender MALE
Place of Work Dour Technical Institute
Position Regulation of the Department of Medical Device Technologies
Qualification Master
Speciality computer science
Email firas.tj@ntu.edu.iq
Phone 07718531723
Address SLAH ALDEEN , TIKRIT, SLAHALDEEN, TIKRIT, Iraq
Professional Biography

Firas Tariq Jasem is a faculty member at the Northern Technical University, Technical Institute of Dur, holding the academic title of Assistant Lecturer. He earned his Bachelor's degree in Computer Science from the University of Tikrit and his Master's degree in Computer Science from Acharya Nagarjuna University in India. He currently serves as the Head of the Medical Device Technologies Department at the Technical Institute of Dur.

His research interests focus on cybersecurity, intrusion detection systems, and adversarial machine learning. He has participated in academic conferences and published research papers in the field of information security. He is also involved in supervising graduation projects and developing course curricula related to computer networks and system protection.

Firas possesses strong skills in computer maintenance, network management, and the use of educational platforms. He is committed to enhancing the learning experience through digital tools and contributing to the development of secure and intelligent systems.

Skills

Proficient in website design using modern technologies to ensure high performance and an excellent user experience. (60%)
Advanced skills in intrusion detection systems, with the ability to design and implement effective solutions for detecting and analyzing cyberattacks. (80%)
Extensive experience in using Excel and Word, with the ability to analyze data and create well-organized reports with high precision. (85%)
working experience

Academic Qualification

Master's degree
Jun 14, 2017 - May 15, 2019

I obtained a Master's degree in Cybersecurity from Acharya Nagarjuna University, India, in 2019.

Bachelor's degree in Computer Science
Sep 20, 2010 - Jun 25, 2014

I obtained a Bachelor's degree in Computer Science in 2014 from Tikrit University.

Working Experience

RDMDT [Regulation of the Department of Medical Device Technologies]
Mar 29, 2023 - Present

I served as the Regulation of the Department of Electronic Technologies for one year, then transitioned to the Regulation of the Department of Medical Device Technologies, where I have been serving for the past two years. I have gained solid experience in managing the academic department, making decisions, and overseeing examination committees.

Publications

Adaptive Transfer Learning for Robust Phishing Attack Detection Using Recurrent Layers: Enhancing Cybersecurity Through Dynamic Defense Mechanisms
Feb 5, 2026

Journal IGI

publisher IGI Global Scientific Publishing

DOI 10.4018/979-8-3373-0330-7.ch011

This paper proposes a robust phishing detection framework the use of adaptive switch getting to know mixed with recurrent layers, such as Recurrent Neural Networks (RNNs), Long Short-Term Memory networks (LSTMs), and Gated Recurrent Units (GRUs). Phishing assaults pose a significant chance to cybersecurity, and conventional detection techniques have struggled to maintain pace with the dynamic nature of those assaults. The proposed framework leverages the strength of switch getting to know to conform to new phishing styles with out requiring widespread retraining. By integrating recurrent layers, the model captures temporal dependencies inherent in phishing emails and verbal exchange styles, making an allowance for more accurate detection of evolving threats. The framework is designed to enhance cybersecurity by way of dynamically adjusting to new phishing approaches, supplying a scalable and effective solution for phishing detection.

Read Publication

Integrating Adversarial Training Techniques to Enhance Cybersecurity Resilience Against Machine Learning Threats
Feb 5, 2026

Journal IGI GLBAL

publisher IGI Global Scientific Publishing

DOI 10.4018/979-8-3373-0330-7.ch012

The speedy improvement of gadget mastering technology has considerably transformed the landscape of cybersecurity. However, those structures are increasingly more liable to antagonistic assaults that make the maximum their weaknesses, posing enormous dangers to their effectiveness. This look investigates the mixture of hostile training strategies into device studying models to decorate their resilience against evolving cybersecurity threats. Our findings display a remarkable decline in overall performance while models are uncovered to adverse examples, with benign detection quotes within the IDS losing from 90% to 80%. In evaluation, the phishing detection tool demonstrates an ability to evolve through retraining, with accuracy increasing from 88% to 93% after imposing non-stop learning strategies. We advise a feedback loop for non-stop gaining knowledge. The outcomes underscore the need for ongoing variation in gadget studying fashions to protect in opposition to ultra-modern cyber threats, supplying treasured insights for future studies and realistic applications in cybersecurity.

Read Publication

Solving Linear Problems: Applications in Structural, Thermal, and Fluid Analysis
Sep 2, 2024

Journal IGI Global

publisher IGI Global

DOI 10.4018/979-8-3693-3964-0.ch008

Problems associated with heat exchange between a gas and a packed bed are quite common in several branches of industry. To properly study this type of phenomenon, a good prediction of the flow dynamics through the bed is necessary. Based on this, this work presents a study of the flow in a packed bed through computer simulation. The packed bed considered in this study is cylindrical and made up of spheres. The simple cubic sphere arrangement was considered to generate the bed geometry. To make the simulation feasible, some simplifications were necessary. The first was flow periodicity in the axial direction of the bed. Another simplification was symmetry in relation to one-eighth of the bed. A very simplified case, considering a single simple cubic cell of spheres, was also simulated. The geometry and mesh of the packed bed were generated in the Gambit software and the flow simulation was carried out in the Fluent software.

Read Publication

Parallel Computing Techniques
Feb 9, 2024

Journal IGI Global

publisher IGI Global

DOI 10.4018/979-8-3693-3964-0.ch006

Meshless methods are numerical methods for solving partial differential equations. The connectivity relationships between the discretized nodes do not need to be explicitly established. Instead, a collection of nodes is distributed over the problem domain. This represents an advantage when it is necessary to generate a new mesh several times, as in the case of moving structures. However, this advantage has its price, as this class of methods consumes more computing time than methods such as finite element methods. Thus, for more complex problems that require “remesh” such a moving electrical machine models, this work aims to apply parallel programming techniques to accelerate the execution of computational codes that solve mathematical models of electromagnetism based on meshless methods. Programming with threads, in this case open multi-processing, was used to parallelize the most time-consuming parts of the code of an electromagnetic model of an induction machine based on the Element-Free Galerkin meshless method.

Read Publication

Artificial intelligence innovation and human resource recruitment
Aug 4, 2023

Journal Tamjeed Journal of Healthcare Engineering and Science Technology

publisher Tamjeed Journal of Healthcare Engineering and Science Technology

DOI https://doi.org/10.59785/fp28n371

This research aims to show the perspectives of personnel in various organizations. From senior executives to operational staff responsible for recruiting employees of private organizations in India, 22 people peruse artificial intelligence innovation in human resource recruitment which relies on collecting insights from the sample and theoretical research studies to study the possibility. Advantages and effects of artificial intelligence innovation on human resource recruitment and use it as a recommendation for organizations to apply artificial intelligence innovation to human resource recruitment.

Read Publication