Items filtered by date: تشرين2/نوفمبر 2023

 

حصل المهندس علي ماجد محمد جبار على شهادة (Extron AV Associate)
في الدورة التي نظمتها شعبة ابن سينا للتعليم الإلكتروني في مركز تكنولوجيا المعلومات وبالتعاون مع شركة إكسترون الأمريكية.


نظمت شعبة ابن سينا للتعليم الإلكتروني في مركز تكنولوجيا المعلومات وبالتعاون مع شركة إكسترون الأمريكية فرصة مجانية بتوفير دورة تدريبية إلكترونية تخصصية خلال90 يوما في مجال الصوتيات والمرئيات والتوصيلات.

انطلقت الدورة يوم الثلاثاء الموافق 4-7-2023 وبعد مشاركة (39) من تدريسي ومهندسي الجامعة التكنولوجية انتهت هذه الرحلة بحصول (10) فقط على شهادة

Extron AV Associate Certification(EAVA).

 

 

 

 

 

Published in اخبار القسم

 

 

نتائج قبول الطلبة في الدراسة المسائية للعام الدراسي 2023-2024 (الوجبة الاولى)

 

 

نتائج قبول الطلبة في الدراسة المسائية للعام الدراسي 2023-2024

 

عقد قسم هندسة الحاسوب في الجامعة التكنولوجية اجتماعًا لرئاسة الفروع بأعضاء الهيئة التدريسية بحضور رئيس فرع هندسة الشبكات م.د. أمير موسى ثويني ورئيس فرع هندسة المعلومات م. د. أحمد سعد كريم يوم الثلاثاء الموافق 2023-11-7 وعلى قاعة المؤتمرات في القسم.

ناقش رؤساء الفروع أهم المحاورة التي تتعلق في إيضاح النظام الإلكتروني لمسار بولونيا ومتطلباته، وكذلك التعليمات الجديدة حول جدول المحاضرات، وآلية الامتحان النصف فصلي والتحديات والمعالجات المطلوبة في الفترة المقبلة.
وفتح باب الحوار لطرح الآراء من قبل أعضاء الهيئة التدريسية ومداولتها والاستفسار عنها بغية الخروج بأفضل الحلول والنتائج.

 

 

 

 

Published in اخبار القسم

 

 

عقد قسم هندسة الحاسوب في الجامعة التكنولوجية جلسة انتخاب ممثل التدريسيين في نقابة الأكاديميين.
وبحضور رئيس قسم هندسة الحاسوب أ. م. د. حسن جليل حسن، وممثل تدريسي الجامعة التكنولوجية في النقابة أ. د. طالب محمد نايف، والمعاون الإداري. م. د. أحمد موسى دينار، ورؤساء الفروع م. د. أمير موسى ثويني وم . د. أحمد سعد كريم وأعضاء الهيئة التدريسية في يوم الثلاثاء الموافق 2023-11-7 على قاعة المؤتمرات في القسم.

وتم ترشيح كل من التدريسية أ. د. ميساء عبد علي خضر والتدريسي م. د. صدام كامل علوان والتدريسي م. سرمد عبد الحسن جميل.
وجرت عملية الانتخاب وسط أجواء سادتها الشفافية، حيث أظهرت نتائجها بفوز الدكتور (صدام كامل علوان) بعد حصوله على ثقة السادة المصوتين، ليكون ممثلا لنقابة الأكاديميين في مجلس القسم .

 

 

 

 

 

Published in اخبار القسم
الثلاثاء, 07 تشرين2/نوفمبر 2023 05:54

Prof. Dr. Maisa'a Abid Ali Khodher AL-Dabbas

Prof. Dr. Maisa'a Abid Ali Khodher AL-Dabbas

Computer Engineering Department

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Prof. Dr. /Computer Security/University of Technology/computer sciences/IRAQ/2016

Security, image processing, steganography, Electronics Work Bench EWB, Matlab

1- New Approach to Partial Cryptography Using 2D Wavelet Transform. Published: Al-Rafidain Journal , 2010.
2- Modification Approach Method for RC4 Using 2D Wavelet Transform. Published: l AL-Mustansiriya Journal of Science 2011.
1- Proposed Method for Partial Audio Cryptography Using Haar Wavelet Transform. Published: Iraqi Journal of Computer Communication and Control Engineering IJCCCE , 2013.
2- To Modify Partial Audio Cryptography for Haar Wavelet Transform by Using AES Algorithm. Published Journal of Eng.& Tech., 2014.
3- Modifying Randomized Transform Image Steganography Using IDWT. Published :Al-Yarmouk University College Journal ,2014.
4- A Proposal of Steganography Algorithm by random Image Transform. Published: Al-Rafidain Journal , 2015.
5- A Proposal Algorithm for Image Steganography by Hue Wavelet Transform Using Histogram. Published: AL- Mustansiriya /Journal of College of Education 2015.
6- Arabic Language Script Steganography Based on Dynamic Random Linear Regression. Published: AL-Mustansiriya /Journal of College of Education, 2016.
10- Arabic Language Text Steganography Based on Microsoft Word Documents, Published: Al-Yarmouk University College Journal , 2016.
11- Steteganography in Arabic Texts using by Kashida using STRI as RNG. Published: Iraqi Journal of Science Vol.57 No. 2C, 2016.
12- Steganography Techniques for Arabic Language Texts Utilizing Single- Double Quotation Using RNG. Published: Journal Of The College Of Basic Education 2016.
13- Arabic Language Text Steganography Based on Singular Value Decomposition (SVD). Published: Journal of Eng. & Tech. 13/7/2016.
14- Arabic Language Document Steganography Based On Huffman Code Using DRLR as (RNG). Published: Journal Al-Mansour Journal 16/2/2016.
15- Steganography of Arabic Language Scripts Based On Secret Sharing Using RNG. Published : Journal od Amam Al-Sadiq, 2017.
16- Comparison of Eight Proposed Security Methods using Linguistic Steganography Text. International Journal of Computing & Information Sciences Vol. 12, No. 2, December 2016.
17-Steganography Arabic Text Based on Natural Language Process Documents. Published: Waste/ Journal of Education College, 2016.
18- Proposal Cryptography Algorithm based on Bit Plane Image Slicing Using Wavelet Transform. Published: Al-Yarmouk University College Journal, Vol. 9 -2017.
19- Modify Algorithm Cryptography by Image Detection Using Wiener Filter.
Published: Al-Yarmouk University College Journal,15/10/2019.
20- 20- Hide 20- Secret Message in Raster Image for Transmission to Satellites Using a 2-D Wavelet Packet. Published: Iraqi Journal of Science, Vol.59, Issue 2B, May 2018, pp: 922-933.
21-A New Sort Algorithm for Multi Core Parallel Computers. Published: Associate of Information and Technology in Ministry of Higher Education Vol. 9, No.1, 2018. 22- Steganography Secret Message Using Wavelet 2D Image Fusion, Published: Journal of Mathematics and Statistical Science, 420-432 | Science Signpost Publishing in Vol. 4, December 2018.
23-Reduces Solution Of Fredholm Integral Equation To a System Of Linear Algebraic Equation. Published: International Journal of Mathematics Trends and Technology (IJMTT). published in – Volume 61 Issue 2, September2018.
24-Proposing an Analysis System to Monitoring Weightlifting Based on Training (Snatch and Clean and Jerk), Published: Baghdad Science Journal, Vol.15(4)2018. Scopus, score citation = 0.12 25- Steganography Secret Message based on Image Sharpening Using 2D Haar Wavelet Transform, 4th conference college of Middle Technique management /Baghdad- 2018, Published: proceeding in may 2019.
26- New Algorithm Conceals Secret Message Based on the Internet of Things (IoT), Published: Journal of Engineering and Applied Sciences 14, pp.5592- 5597, 2019.
27- Proposal for a Cryptographic Image Vector based on 2D HWP Using the Secure Force Method, Published : Associate of Information and Technology in Ministry of Higher Education Vol.10 , No.1 , 2020.
28-Suggesting an Analysis System for Monitoring Free-hand Gymnastics for Training Youth. Published: 2nd Scientific Conference of Computer Sciences2019 EEE, IEEE explore, 2019.
29- Image plagiarism system for forgery detection in maps design. Puplished: 2nd Scientific Conference of Computer Sciences2019 IEEE, IEEE explore, 2019.
30- Approach Based on Fragmentation of English Text Pictures to Speed Up Recognition of Characters on a Multi-Core Computer. Published: Diyala Journal for Pure Science, Vol.15, No.4, 2019.
31-Propose Forgery Detection Plagiarism System in Maps Design Based on the Combination of SIFT Detector and SURF Descriptor. Published: Associate of Information and Technology in Ministry of Higher Education 2019 .
32- Concealed Secret Letter Using a 2DWavelet Packet, 4 th conference in Maltepe University / Istanbule / Turkey/AIP conference Proceedings, 2 April 2019. 33- Image Steganography Using Least Significant Bit and Secret Map Techniques.
Publishing: in International Journal of Electrical and Computer Engineering (IJECE), Vol. 10, No. 1, February 2020, pp. 35~946.
34- Novel Approach for Detection Insider Attacker Using Rule Based On Body Language. International AL Scientific Conference of The University of Babylon (ISCUB-2019). IEEE explore 2019.
35-Review Paper on Software Risks Factors. International first conference college of Amam Al-Khadhim Published: Journal of Physics: Conference Series IOP 1530 (2020) 012007.
36-Key Generation Based on Henon Map and Lorens System. Published: Journal of Al-Mustansiriy science, Vol. 31, 2020.
37-Hide Secret Message in Image Transform Conformal Mapping Based Image 2DHWT, Journal of Physics: Conference Series, 1963 (2021) 012098, IOP.
38-Arabic command based human computer interaction, International first conference college of Amam Al-Khadhim Published: Journal of Physics: Conference Series IOP 1530 (2020) 012027. IOP.
39- Review: A comparison Steganography Between Texts and Images, International conference six th Iraqi Al-Khawarizmi Association , Journal of Physics: Conference Series 1591 (2020) 012024 IOP Publishing.
40- Hybrid Filter for Enhancing Input Microphone-Based Discriminative Model, Iraqi Journal of Science, 2020, Vol. 61, No. 9, pp: 2434-2439.
41- Dual method cryptography image by two force secure and steganography secret message in IoT, TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 2928~2938
42- Image steganography using least significant bit and secret map techniques, International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 1, February 2020, pp. 935~946.
43- Suggested Video Steganography Algorithm Based on Power Low Transform (PLT) Using IoTs, Journal of Physics: Conference Series 1897 (2021) 012025 IOP Publishing.
44- A Novel Approach for Detection Insider Attacker Using Body Language Journal of Physics: Conference Series 1804 (2021) 012129 IOP Publishing.
45- Wheelchair Movement Based on Convolution Neural Network, Engineering and Technology Journal Vol. 39, (2021), No. 06, Pages 1019-1030.
46-An Improved Method for Combine (LSB and MSB) Based on Color Image RGB, Engineering and Technology Journal Vol. 39, Part B (2021), No. 01, Pages 231-242.
47-Data Hiding by Unsupervised Clustering Using Fuzzy C-Mean, Design Engineering, Year 2021 Issue: 7 | Pages: 14192-14210.
48- Hide Encryption Secret Message in Video Frames Based on MapReduce, Design Engineering, Year 2021 Issue: 7 | Pages: 15229-15243.
49-Hide Secret Script Encryption in Video Frames Based on Magic Square, Al-Qadisiyah Journal of Pure Science Vol. (26) Issue (Special issue num.4) , (2021) pp. 529–541.
50-Data Hiding by Unsupervised Machine Learning Using Clustering K-mean Technique, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 4, December 2021.
51- 51-Comparison of Three Proposal Methods in Steganography Encryption Secret Message using PVD and MapReduce, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 21, No. 2, June 2021.
52-Concealing a Secret Message in a Colour Image Using an Electronic Workbench, Iraqi Journal of Science, 2021, Vol. 62, No. 12, pp: 4964-4977.
53-A Novel Approach for Detection Insider Attacker Using Body Language, Journal of Physics: Conference Series 1804 (2021) 012129.
54-Insider Attacker Detection Using Light Gradient Boosting Machine,TECH- WLEDGE Journal, Volume 1, Issue 1, 2021, pp:67-76.
55-Review: Secure data hiding by machine learning in cloud, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 37-43.
56-Machine Learning for Satellite Images Classification using Spectral Signature for Features Extraction, Journal of Iraqi, Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 27-36.
57-An Image Steganography By using 2 D Integer Wavelet Packet Based on Adaptive Non Maximal Suppression, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 57-68.
58-Using the principle of mapreduce for steganography to hide the encrypted message in video based on pvd method, Journal of Iraqi Al-Khwarizmi (JIKh), Volume:6 Issue:2 Year: 2022, pp: 44-56.
59-Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map, Iraqi Journal of Science, 2022, Vol. 63, No. 12, pp: 5534-5548.
60-A Novel Lightweight Image Encryption Scheme, Computer and material & Continua, CMC, 2023, vol.75, no.1, pp:2137-2153.
61-Satellite Images Classification Using CNN: Survey, IEEE Xplore, 2022 International Conference on Data Science and Intelligent Computing (ICDSIC).
62-Satellite Image Classification using Spectral Signature and Deep Learning, Iraqi Journal of Science, 2023, Vol. 64, No. 6, pp: 4053-4063.
63-Medical image encryption using multi chaotic maps, TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 21, No. 3, June 2023, pp. 556-565.
64- Image Encryption Based on 2DNA Encoding and Chaotic 2D Logistic Map, Journal of Engineering and Applied Science (2023) 70:60.
65- Object Detection Using Deep Learning Methods: A Review, Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), Vol. 23, No. 2, June 2023.

A- BSC.
1- Theoretical Fundamental of computer organization from 2006 to 2010 in the Department of Computer Science
2- Theoretical Logical design from 2006 to 2013 in the Department of Computer Science
3- Theoretical distributed databases from 2005 to 2006 in the Department of Computer Science.
4- Theoretical Microprocessor from 2014 to 2022 in the Computer Science Department.
5- Theoretical Microprocessor from 2014 to 2022 in the Department of Computer Science
6- Theoretical Computer Architecture from 2014 to 2022 in the Department of Computer Science.
7 - Operating systems theory for the year 2022/2023 in the Computer Engineering Department
8-Logical design laboratory EWB from 2008 to 2013 in the Department of Computer Science.
9-C++ laboratory in the Computer Science Department from 2005 to 2009
10- Matlab laboratory in the Computer Science Department from 2012 to 2014.
11- Oracle Database Laboratory in the Computer Science Department.
12-Professional Access database laboratory in the Computer Science Department.
13- Visual Basic 6 lecturer in the Computer Science Department.
14- Operating Systems, first course and second course, Computer Engineering Department.

B- Postgraduate
1- Decision Support System from 2017 to 2019, Master’s in branch Systems, second course.
2- Multimedia Security from 2019 to 2022, Master’s in branch Security, first Course.
3- Parallel Processing Architecture 2020 to 2021, Master’s in branch General, second course.
4- Cyber Security 2023 Master’s degree in Computer Engineering Department, first course.

Published in cv
الصفحة 4 من 6
Top