مهندس في قسم هندسة الحاسوب يحصل على شهادة (Extron AV Associate)
|
|
حصل المهندس علي ماجد محمد جبار على شهادة (Extron AV Associate)
انطلقت الدورة يوم الثلاثاء الموافق 4-7-2023 وبعد مشاركة (39) من تدريسي ومهندسي الجامعة التكنولوجية انتهت هذه الرحلة بحصول (10) فقط على شهادة Extron AV Associate Certification(EAVA).
|
|
|
![]() |
نتائج قبول الطلبة في الدراسة المسائية للعام الدراسي 2023-2024 (الوجبة الاولى)
نتائج قبول الطلبة في الدراسة المسائية للعام الدراسي 2023-2024 (الوجبة الاولى)
نتائج قبول الطلبة في الدراسة المسائية للعام الدراسي 2023-2024
قسم هندسة الحاسوب يعقد اجتماعًا لرئاسة الفروع بأعضاء الهيئة التدريسية
|
|
عقد قسم هندسة الحاسوب في الجامعة التكنولوجية اجتماعًا لرئاسة الفروع بأعضاء الهيئة التدريسية بحضور رئيس فرع هندسة الشبكات م.د. أمير موسى ثويني ورئيس فرع هندسة المعلومات م. د. أحمد سعد كريم يوم الثلاثاء الموافق 2023-11-7 وعلى قاعة المؤتمرات في القسم. ناقش رؤساء الفروع أهم المحاورة التي تتعلق في إيضاح النظام الإلكتروني لمسار بولونيا ومتطلباته، وكذلك التعليمات الجديدة حول جدول المحاضرات، وآلية الامتحان النصف فصلي والتحديات والمعالجات المطلوبة في الفترة المقبلة.
|
|
![]() |
![]() |
قسم هندسة الحاسوب في الجامعة التكنولوجية يعقد جلسة انتخاب ممثل نقابة الأكاديميين
|
عقد قسم هندسة الحاسوب في الجامعة التكنولوجية جلسة انتخاب ممثل التدريسيين في نقابة الأكاديميين. وتم ترشيح كل من التدريسية أ. د. ميساء عبد علي خضر والتدريسي م. د. صدام كامل علوان والتدريسي م. سرمد عبد الحسن جميل.
|
![]() |
![]() |
Prof. Dr. Maisa'a Abid Ali Khodher AL-Dabbas
Prof. Dr. Maisa'a Abid Ali Khodher AL-Dabbas
Computer Engineering Department
عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
Prof. Dr. /Computer Security/University of Technology/computer sciences/IRAQ/2016
Security, image processing, steganography, Electronics Work Bench EWB, Matlab
1- New Approach to Partial Cryptography Using 2D Wavelet Transform. Published: Al-Rafidain Journal , 2010.
2- Modification Approach Method for RC4 Using 2D Wavelet Transform. Published: l AL-Mustansiriya Journal of Science 2011.
1- Proposed Method for Partial Audio Cryptography Using Haar Wavelet
Transform. Published: Iraqi Journal of Computer Communication and Control
Engineering IJCCCE , 2013.
2- To Modify Partial Audio Cryptography for Haar Wavelet Transform by Using
AES Algorithm. Published Journal of Eng.& Tech., 2014.
3- Modifying Randomized Transform Image Steganography Using IDWT. Published :Al-Yarmouk University College Journal ,2014.
4- A Proposal of Steganography Algorithm by random Image Transform. Published: Al-Rafidain Journal , 2015.
5- A Proposal Algorithm for Image Steganography by Hue Wavelet Transform
Using Histogram. Published: AL- Mustansiriya /Journal of College of Education
2015.
6- Arabic Language Script Steganography Based on Dynamic Random Linear
Regression. Published: AL-Mustansiriya /Journal of College of Education, 2016.
10- Arabic Language Text Steganography Based on Microsoft Word Documents,
Published: Al-Yarmouk University College Journal , 2016.
11- Steteganography in Arabic Texts using by Kashida using STRI as RNG. Published: Iraqi Journal of Science Vol.57 No. 2C, 2016.
12- Steganography Techniques for Arabic Language Texts Utilizing Single-
Double Quotation Using RNG. Published: Journal Of The College Of Basic
Education 2016.
13- Arabic Language Text Steganography Based on Singular Value
Decomposition (SVD). Published: Journal of Eng. & Tech. 13/7/2016.
14- Arabic Language Document Steganography Based On Huffman Code Using
DRLR as (RNG). Published: Journal Al-Mansour Journal 16/2/2016.
15- Steganography of Arabic Language Scripts Based On Secret Sharing Using
RNG. Published : Journal od Amam Al-Sadiq, 2017.
16- Comparison of Eight Proposed Security Methods using Linguistic
Steganography Text. International Journal of Computing & Information Sciences
Vol. 12, No. 2, December 2016.
17-Steganography Arabic Text Based on Natural Language Process Documents. Published: Waste/ Journal of Education College, 2016.
18- Proposal Cryptography Algorithm based on Bit Plane Image Slicing Using
Wavelet Transform. Published: Al-Yarmouk University College Journal, Vol. 9
-2017.
19- Modify Algorithm Cryptography by Image Detection Using Wiener Filter.
Published: Al-Yarmouk University College Journal,15/10/2019.
20- 20- Hide 20- Secret Message in Raster Image for Transmission to Satellites
Using a 2-D Wavelet Packet. Published: Iraqi Journal of Science, Vol.59, Issue
2B, May 2018, pp: 922-933.
21-A New Sort Algorithm for Multi Core Parallel Computers. Published: Associate of Information and Technology in Ministry of Higher Education Vol. 9, No.1, 2018.
22- Steganography Secret Message Using Wavelet 2D Image Fusion, Published:
Journal of Mathematics and Statistical Science, 420-432 | Science Signpost
Publishing in Vol. 4, December 2018.
23-Reduces Solution Of Fredholm Integral Equation To a System Of Linear Algebraic Equation. Published: International Journal of Mathematics Trends and Technology (IJMTT). published in – Volume 61 Issue 2, September2018.
24-Proposing an Analysis System to Monitoring Weightlifting Based on Training (Snatch and Clean and Jerk), Published: Baghdad Science Journal, Vol.15(4)2018. Scopus, score citation = 0.12
25- Steganography Secret Message based on Image Sharpening Using 2D Haar
Wavelet Transform, 4th conference college of Middle Technique management
/Baghdad- 2018, Published: proceeding in may 2019.
26- New Algorithm Conceals Secret Message Based on the Internet of Things (IoT),
Published: Journal of Engineering and Applied Sciences 14, pp.5592- 5597,
2019.
27- Proposal for a Cryptographic Image Vector based on 2D HWP Using the Secure
Force Method, Published : Associate of Information and Technology in Ministry
of Higher Education Vol.10 , No.1 , 2020.
28-Suggesting an Analysis System for Monitoring Free-hand Gymnastics for Training Youth. Published: 2nd Scientific Conference of Computer Sciences2019 EEE, IEEE explore, 2019.
29- Image plagiarism system for forgery detection in maps design. Puplished: 2nd
Scientific Conference of Computer Sciences2019 IEEE, IEEE explore, 2019.
30- Approach Based on Fragmentation of English Text Pictures to Speed Up
Recognition of Characters on a Multi-Core Computer. Published: Diyala Journal
for Pure Science, Vol.15, No.4, 2019.
31-Propose Forgery Detection Plagiarism System in Maps Design Based on the Combination of SIFT Detector and SURF Descriptor. Published: Associate of Information and Technology in Ministry of Higher Education 2019 .
32- Concealed Secret Letter Using a 2DWavelet Packet, 4 th conference in Maltepe University / Istanbule / Turkey/AIP conference Proceedings, 2 April 2019.
33- Image Steganography Using Least Significant Bit and Secret Map Techniques.
Publishing: in International Journal of Electrical and Computer Engineering
(IJECE), Vol. 10, No. 1, February 2020, pp. 35~946.
34- Novel Approach for Detection Insider Attacker Using Rule Based On Body Language. International AL Scientific Conference of The University of Babylon (ISCUB-2019). IEEE explore 2019.
35-Review Paper on Software Risks Factors. International first conference college
of Amam Al-Khadhim Published: Journal of Physics: Conference Series IOP 1530 (2020) 012007.
36-Key Generation Based on Henon Map and Lorens System. Published: Journal of Al-Mustansiriy science, Vol. 31, 2020.
37-Hide Secret Message in Image Transform Conformal Mapping Based Image 2DHWT, Journal of Physics: Conference Series, 1963 (2021) 012098, IOP.
38-Arabic command based human computer interaction, International first conference college of Amam Al-Khadhim Published: Journal of Physics: Conference Series IOP 1530 (2020) 012027. IOP.
39- Review: A comparison Steganography Between Texts and Images, International
conference six th Iraqi Al-Khawarizmi Association , Journal of Physics: Conference
Series 1591 (2020) 012024 IOP Publishing.
40- Hybrid Filter for Enhancing Input Microphone-Based Discriminative Model,
Iraqi Journal of Science, 2020, Vol. 61, No. 9, pp: 2434-2439.
41- Dual method cryptography image by two force secure and steganography secret
message in IoT, TELKOMNIKA Telecommunication, Computing, Electronics
and Control Vol. 18, No. 6, December 2020, pp. 2928~2938
42- Image steganography using least significant bit and secret map techniques,
International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 1, February 2020, pp. 935~946.
43- Suggested Video Steganography Algorithm Based on Power Low Transform
(PLT) Using IoTs, Journal of Physics: Conference Series 1897 (2021) 012025
IOP Publishing.
44- A Novel Approach for Detection Insider Attacker Using Body Language Journal of Physics: Conference Series 1804 (2021) 012129 IOP Publishing.
45- Wheelchair Movement Based on Convolution Neural Network, Engineering
and Technology Journal Vol. 39, (2021), No. 06, Pages 1019-1030.
46-An Improved Method for Combine (LSB and MSB) Based on Color Image RGB, Engineering and Technology Journal Vol. 39, Part B (2021), No. 01, Pages 231-242.
47-Data Hiding by Unsupervised Clustering Using Fuzzy C-Mean, Design Engineering, Year 2021 Issue: 7 | Pages: 14192-14210.
48- Hide Encryption Secret Message in Video Frames Based on MapReduce, Design Engineering, Year 2021 Issue: 7 | Pages: 15229-15243.
49-Hide Secret Script Encryption in Video Frames Based on Magic Square, Al-Qadisiyah Journal of Pure Science Vol. (26) Issue (Special issue num.4) , (2021) pp. 529–541.
50-Data Hiding by Unsupervised Machine Learning Using Clustering K-mean Technique, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 4, December 2021.
51- 51-Comparison of Three Proposal Methods in Steganography Encryption Secret Message using PVD and MapReduce, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 2, June 2021.
52-Concealing a Secret Message in a Colour Image Using an Electronic Workbench, Iraqi Journal of Science, 2021, Vol. 62, No. 12, pp: 4964-4977.
53-A Novel Approach for Detection Insider Attacker Using Body Language, Journal of Physics: Conference Series 1804 (2021) 012129.
54-Insider Attacker Detection Using Light Gradient Boosting Machine,TECH- WLEDGE Journal, Volume 1, Issue 1, 2021, pp:67-76.
55-Review: Secure data hiding by machine learning in cloud, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 37-43.
56-Machine Learning for Satellite Images Classification using Spectral Signature for Features Extraction, Journal of Iraqi, Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 27-36.
57-An Image Steganography By using 2 D Integer Wavelet Packet Based on Adaptive Non Maximal Suppression, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 57-68.
58-Using the principle of mapreduce for steganography to hide the encrypted message in video based on pvd method, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 44-56.
59-Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map, Iraqi Journal of Science, 2022, Vol. 63, No. 12, pp: 5534-5548.
60-A Novel Lightweight Image Encryption Scheme, Computer and material & Continua, CMC, 2023, vol.75, no.1, pp:2137-2153.
61-Satellite Images Classification Using CNN: Survey, IEEE Xplore, 2022 International Conference on Data Science and Intelligent Computing (ICDSIC).
62-Satellite Image Classification using Spectral Signature and Deep Learning, Iraqi Journal of Science, 2023, Vol. 64, No. 6, pp: 4053-4063.
63-Medical image encryption using multi chaotic maps, TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 21, No. 3, June 2023, pp. 556-565.
64- Image Encryption Based on 2DNA Encoding and Chaotic 2D Logistic Map, Journal of Engineering and Applied Science (2023) 70:60.
65- Object Detection Using Deep Learning Methods: A Review, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 23, No. 2, June 2023.
A- BSC.
1- Theoretical Fundamental of computer organization from 2006 to 2010
in the Department of Computer Science
2- Theoretical Logical design from 2006 to 2013 in the Department of
Computer Science
3- Theoretical distributed databases from 2005 to 2006 in the Department
of Computer Science.
4- Theoretical Microprocessor from 2014 to 2022 in the Computer Science Department.
5- Theoretical Microprocessor from 2014 to 2022 in the Department of
Computer Science
6- Theoretical Computer Architecture from 2014 to 2022 in the Department of Computer Science.
7 - Operating systems theory for the year 2022/2023 in the Computer
Engineering Department
8-Logical design laboratory EWB from 2008 to 2013 in the Department
of Computer Science.
9-C++ laboratory in the Computer Science Department from 2005 to
2009
10- Matlab laboratory in the Computer Science Department from 2012 to 2014.
11- Oracle Database Laboratory in the Computer Science Department.
12-Professional Access database laboratory in the Computer Science
Department.
13- Visual Basic 6 lecturer in the Computer Science Department.
14- Operating Systems, first course and second course, Computer
Engineering Department.
B- Postgraduate
1- Decision Support System from 2017 to 2019, Master’s in branch
Systems, second course.
2- Multimedia Security from 2019 to 2022, Master’s in branch Security,
first Course.
3- Parallel Processing Architecture 2020 to 2021, Master’s in branch
General, second course.
4- Cyber Security 2023 Master’s degree in Computer Engineering
Department, first course.