Ali Makki Sagheer Saleh (Professor)
PhD in Professor in Cybersecurity
Lecturer
Information Technology -
Computer Sciences and IT
ali@uoanbar.edu.iq
<p> </p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Name:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Prof. Dr. Ali Makki Sagheer</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Place of Birth:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Iraq-Basrah</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Date and of Birth:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">1979</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Religion:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Muslim</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Martial statues:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Married</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">No. of children:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Four</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Degree</span></u></strong><strong><u><span style="font-size:16.0pt"><span style="color:#002060">:</span></span></u></strong><strong><span style="font-size:16.0pt"><span style="color:#002060"> PhD in Computer Science (2007)</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Specialization:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Cybersecurity</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Scientific Degree:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">Professor (2015)</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Position:</span></u></strong><strong> </strong><strong><span style="font-size:15.0pt"><span style="color:#002060">Professor in Cybersecurity</span></span></strong></span></span></span></p> <p style="margin-right:-20px"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Permanent Work Address:</span></u></strong><strong> </strong><strong><span style="font-size:14.0pt"><span style="color:#002060">University of Anbar/Faculty of Computer Science and Information Technology/Computer Network Systems Department</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Work Phone: </span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">+964(0)7700495820</span></span></strong></span></span></span></p> <p><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:black"><strong><u><span style="font-size:16.0pt">Mobile:</span></u></strong><strong> </strong><strong><span style="font-size:16.0pt"><span style="color:#002060">+964(0)7700073940, +964(0)7824937080,</span></span></strong></span></span></span></p> <p style="margin-left:6px; margin-right:-20px; text-align:justify"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong><u><span style="font-size:16.0pt">E-mail:</span></u></strong><strong> </strong><strong><span style="font-size:14.0pt"><a href="mailto:ali_makki@uoanbar.edu.iq" style="color:blue; text-decoration:underline">ali_makki@uoanbar.edu.iq</a>, <a href="mailto:prof.ali@alqalam.edu.iq" style="color:blue; text-decoration:underline">prof.ali@alqalam.edu.iq</a>, <a href="mailto:ali.m.sagheer@gmail.com" style="color:blue; text-decoration:underline">ali.m.sagheer@gmail.com</a></span></strong></span></span></p> <p> </p> <div style="margin-left:112.5pt; margin-right:0in"> </div> <div style="margin-left:112.5pt; margin-right:0in"><strong><u>EDUCATIONL BACKGROUIN</u></strong></div> <div style="margin-left:112.5pt; margin-right:0in"> </div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium"> Ph.D., Computer Science, </span><span style="font-size:medium">University</span><span style="font-size:medium"> of </span><span style="font-size:medium">Technology</span><span style="font-size:medium">, </span><span style="font-size:medium">Baghdad</span><span style="font-size:medium">, </span><span style="font-size:medium">Iraq</span><span style="font-size:medium">, 2007</span></div> <div style="margin-left:112.5pt; margin-right:0in"> </div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium"> M.Sc., Data Security, Computer Science Department, </span><span style="font-size:medium">University</span><span style="font-size:medium"> of </span><span style="font-size:medium">Technology</span><span style="font-size:medium">, 2004</span></div> <div style="margin-left:112.5pt; margin-right:0in"> </div> <div style="margin-left:112.5pt; margin-right:0in"> <span style="font-size:medium"> B.Sc. Information System / Computer Science Department, University of Technology (Hons), ranked the (1) out of (43) graduates, 2001. </span></div> <div> <p style="margin-left:36.0pt; margin-right:25.5pt; text-align:justify"> </p> </div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium"> </span></div> <div style="margin-left:112.5pt; margin-right:0in"> </div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium"><strong><u>OTHER INFORMATION</u></strong></span></div> <div style="margin-left:112.5pt; margin-right:0in"> </div> <div style="margin-left:112.5pt; margin-right:0in"><span style="font-size:medium">Summer 2016 – present Dean of the Department of Information System,</span></div> <div> <p style="text-align:justify"> </p> <p style="text-align:justify"><span style="font-size:medium"> College of Computer, University of Anbar.</span></p> <p style="text-align:justify"><span style="font-size:medium">Fall 2008 – Summer 2011 Dean of the Department of Information System,</span></p> <p style="text-align:justify"><span style="font-size:medium"> College of Computer, University of Anbar.</span></p> <p style="text-align:justify"><span style="font-size:medium">Fall 2004 – Summer 2008 Teacher, Department of Computer Science </span></p> <p style="text-align:justify"><span style="font-size:medium"> College of Computer, University of Anbar</span></p> <p style="text-align:justify"><span style="font-size:medium">Fall 2001 – Summer 2004 Teaching assistant, Department of Computer Science </span></p> <p style="text-align:justify"><span style="font-size:medium"> College of Computer, University of Anbar</span></p> </div> <p> </p> <p style="margin-left:0cm; margin-right:4.1pt; text-align:justify"><span style="font-size:11.0pt"> </span></p> <p> </p>
<p> <strong><em><span style="font-size:14.0pt">Refereed </span></em></strong><strong><em><span style="font-size:14.0pt">Journal Publications</span></em></strong> </p> <p> </p> <table align="center" cellspacing="0" class="Table" style="border-collapse:collapse; border:none; width:647px"> <tbody> <tr> <td style="background-color:#c4bc96; border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:2px double black; height:52px; width:62px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong><span style="font-size:16.0pt">No.</span></strong></span></span></p> </td> <td style="background-color:#c4bc96; border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:2px double black; height:52px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong><span style="font-size:16.0pt"><span style="color:black">Research Title</span></span></strong></span></span></p> </td> <td style="background-color:#c4bc96; border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:2px double black; height:52px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong><span style="font-size:16.0pt"><span style="color:black">Place of Publication</span></span></strong></span></span></p> </td> <td style="background-color:#c4bc96; border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:2px double black; height:52px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong><span style="font-size:16.0pt">Year</span></strong></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Design and implementation of the web (extract, transform, load) process in data warehouse application</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">IAES International Journal of Artificial Intelligence, 2023, 12(2), pp. 765–775. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span dir="LTR"><span style="color:#2e2e2e">2023</span></span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="2"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A New Method for Medicinal Image Compression and Encryption: Towards Remote Medicinal Diagnosis.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">AIP Conference Proceedings, 2022, 2400, 020001. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span dir="LTR"><span style="color:#2e2e2e">2022</span></span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="3"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Finger Vein and Hand-Dorsal Vein Multi-Modal Biometric System Based on Convolution Neural Network.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">AIP Conference Proceeding, 2022, 2400, 020002. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span dir="LTR"><span style="color:#2e2e2e">2022</span></span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="4"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">An Efficient Secret Sharing Scheme Based On Newton’s Divided Difference Interpolation & Magic Cube Properties.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">AIP Conference Proceeding, 2022, 2400, 020014. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span dir="LTR"><span style="color:#2e2e2e">2022</span></span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="5"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">LiNA: Lightweight Algorithm for Secure Internet of Things.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">AIP Conference Proceedings, 2022, 2400, 020008. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span dir="LTR"><span style="color:#2e2e2e">2022</span></span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="6"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Brain Tumor Segmentation from Magnetic Resonance Image using Optimized Thresholded Difference Algorithm and Rough Set</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><a href="https://www.scopus.com/authid/detail.uri?authorId=55077351200#disabled" style="color:blue; text-decoration:underline" title="Show document details"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">TEM Journal</span></span></a><span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">, 2022, 11(2), pp. 631–638. .</span></span></span> (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2022</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="7"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Breast cancer segmentation using K-means clustering and optimized region-growing technique</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e"><a href="https://www.scopus.com/authid/detail.uri?authorId=55077351200#disabled" style="color:blue; text-decoration:underline" title="Show document details"><span style="color:#2e2e2e">Bulletin of Electrical Engineering and Informatics</span></a></span></span>, 2022, 11(1), pp. 158–167. <span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">.</span></span></span> (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2022</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="8"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">International Journal of Interactive Mobile Technologies</span></span></span><span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">, 2022, 16(20), pp. 79–97. </span></span></span>(<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span dir="LTR"><span style="color:#2e2e2e">2022</span></span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="9"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A Review on E-Voting Based on Blockchain Models</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e"><a href="https://www.scopus.com/authid/detail.uri?authorId=55077351200#disabled" style="color:blue; text-decoration:underline" title="Show document details"><span style="color:#2e2e2e">Iraqi Journal of Science</span></a></span></span>, 2022, 63(3), pp. 1362–1375. <span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">.</span></span></span> (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2022</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="10"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A New Secret Sharing Scheme Based on Hermite Interpolation and Folded Magic Cube Rules</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><a href="https://www.scopus.com/authid/detail.uri?authorId=55077351200#disabled" style="color:blue; text-decoration:underline" title="Show document details"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">Communications in Computer and Information Science</span></span></a><span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">, 2022, 1548 CCIS, pp. 352–364. .</span></span></span> (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2022</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="11"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A Hybrid Lightweight Cipher Algorithm</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">International Journal of Computing and Digital Systems, 2022, 11(1), pp. 463–475. <span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">.</span></span></span> (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2022</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="12"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Improving Breast Cancer Classification Using (Smote) Technique and Pectoral Muscle Removal in Mammographic Images</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><a href="https://www.scopus.com/authid/detail.uri?authorId=55077351200#disabled" style="color:blue; text-decoration:underline" title="Show document details"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">Mendel</span></span></a><span style="font-size:10.5pt"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e"> 2021, 27(2), pp. 36–43.</span></span></span> (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2021</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="13"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Brain tumor identification with a hybrid feature extraction method based on discrete wavelet transform and principle component analysis</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Bulletin of Electrical Engineering and Informatics, 2021, 10(5), pp. 2588–2597. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2021</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="14"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Analysis of Methods and Techniques Used for Speaker Identification, Recognition, and Verification: A Study on Quarter-Century Research Outcomes</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Iraqi Journal of Science, 2021, 62(9), pp. 3255–3281. (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2021</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="15"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Design a mobile application for vehicles managing of a transportation issue</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><a href="https://www.scopus.com/authid/detail.uri?authorId=55077351200#disabled" style="color:blue; text-decoration:underline" title="Show document details"><span style="font-family:"Arial",sans-serif"><span style="color:#2e2e2e">Bulletin of Electrical Engineering and Informatics</span></span></a><span style="font-family:"Arial",sans-serif"><span style="color:#323232">, </span></span><span style="color:#2e2e2e">, 10(4), pp. 2263–2272</span>, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><span style="color:#2e2e2e">2021</span></span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="16"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Enhancement of Digital Signature Algorithm in Bitcoin Wallet</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Bulletin of Electrical Engineering and Informatics, 2021,10(1), pp. 449-457, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2021</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="17"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A comparative review on symmetric and asymmetric dna-based cryptography</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Bulletin of Electrical Engineering and Informatics. 9(6), pp. 2484–2491, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2020</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="18"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Implementing a Distributed Certificate Authority Using Elliptic Curve Cryptography for Big Data Environment</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2nd Annual International Conference on Information and Sciences, AiCIS 2020, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2020</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="19"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Design and Implementation of a Secure Mobile Banking System Based on Elliptic Curve Integrated Encryption Schema</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Communications in Computer and Information Science, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2020</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="20"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A New Medical Images Encryption algorithm Based on Gold Code: Futures Trends towards Telemedicine</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">IOP Conference Series: Materials Science and Engineering, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2020</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="21"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions </span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">International Journal of Information Security and Privacy</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">13(2), pp. 67-85, (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="22"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Design Large Symmetric Algorithm for Securing Big Data</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">11th International Conference on Developments in eSystems Engineering (DeSE), (<strong>Scopus</strong>).</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">978-1-5386-6712-5©2018 IEEE</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="23"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A Survey on Secure Safety Applications in VANET</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">The 16th IEEE Conference on Smart City, 28 June 2018 - 30 June 2018, Exeter, UK. (<strong>Scopus</strong>)</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="24"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Proceedings - 2018 1st Annual International Conference on Information and Sciences, AiCIS 2018, pp. 176-181, (<strong>Scopus</strong>).</span></span></p> <p style="text-align:left"> </p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="25"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Enhancing The Security Of The Bitcoin Wallet Master Seed</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">AUS Journal, ISSN (online) 0718-7262, ISSN (Print) 0718-204X.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="26"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Conditional Secure Reconstruction of Embedded Secret Approach in Folded Magic Cube with Six Dimensions</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">AUS Journal, ISSN (online) 0718-7262, ISSN (Print) 0718-204X.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="27"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">A Proposed Secure Cloud Environment Based on Homomorphic Encryption</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">International Advanced Research Journal in Science, Engineering and Technology,Vol. 6, Issue 5, May 2019, ISSN (Online) 2393-8021 ISSN (Print) 2394-1588.</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="28"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Using Role-based to Implement Certificate Authority Management for Big Data</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Journal of Al-Qadisiyah for computer science and mathematics (JQCM), ISSN 2521-3504 (Online), ISSN 2074-0204 (Print).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2019</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:90px; width:62px"> <ol start="29"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Public Key Fully Homomorphic Encryption</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Journal of Theoretical and Applied Information Technology, 96(7):1924-1934, March, 2018. <strong>(Scopus)</strong></span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:90px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2018</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:65px; width:62px"> <ol start="30"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:65px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Hybrid features for fingerprint recognition based on invariant moments and glcm</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:65px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Journal of Theoretical and Applied Information Technology, 97(8), pp. 2320-2333, <strong>(Scopus).</strong></span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:65px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2018</span></span></p> </td> </tr> <tr> <td style="border-bottom:2px double black; border-left:2px double black; border-right:2px double black; border-top:none; height:65px; width:62px"> <ol start="31"> <li style="text-align:center"> </li> </ol> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:65px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Design of Fully Homomorphic Encryption by Prime Modular Operation</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:65px; width:247px"> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">Telfor Journal Vol.10 No.2 (2018) , (<strong>Scopus</strong>).</span></span></p> </td> <td style="border-bottom:2px double black; border-left:none; border-right:2px double black; border-top:none; height:65px; width:93px"> <p style="text-align:center"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">2018</span></span&g
Lectures of the Fouth stage - College of Computer Science and Information Technology - Department of Information Systems
Web Application Development 1 Lectures |
Week 10 : Mid Term Exam
|
No Certificates Available
No Information Available .
<p style="text-align:center"> </p> <p><span style="font-size:medium"><u><strong>Supervisor for the following M.Sc thesises</strong></u></span></p> <div> <div> </div> <div> <table align="center" border="1" cellpadding="0" cellspacing="0" dir="rtl" style="border-collapse:collapse; border:none; margin-left:59.25pt; width:427.7pt"> <tbody> <tr> <td style="background-color:#c4bc96; border-color:black; border-style:double; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><strong><span dir="LTR" style="font-size:11.0pt">Year</span></strong></div> </td> <td style="background-color:#c4bc96; border-color:black; border-right:none; border-style:double; border-width:1.5pt; height:36.85pt; width:99.25pt"> <div style="text-align:center"><strong><span dir="LTR" style="font-size:11.0pt">Department</span></strong></div> </td> <td style="background-color:#c4bc96; border-color:black; border-right:none; border-style:double; border-width:1.5pt; height:36.85pt; width:223.5pt"> <div style="text-align:center"><strong><span dir="LTR" style="font-size:11.0pt">Thesis</span></strong><strong><span dir="LTR" style="font-size:11.0pt"> Title</span></strong></div> </td> <td style="background-color:#c4bc96; border-color:black; border-right:none; border-style:double; border-width:1.5pt; height:36.85pt; width:27.0pt"> <div style="text-align:center"><strong><span dir="LTR" style="font-size:11.0pt">No.</span></strong></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2014-2018</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <div style="text-align:center"><span style="font-size:11.0pt">PhD-LJMU-UK</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Authenticated Real-time Privacy Preservation of Drivers in the Internet of Vehicles</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">1</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2012-2015</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <div style="text-align:center"><span style="font-size:11.0pt">PhD</span></div> <div style="text-align:center"><span style="font-size:11.0pt">UALR, USA<span dir="RTL">.</span></span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Light-Weight Encryption And Dynamic Data Protection Mechanism For Resource Constrained Devices</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">2</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2014-2016</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">PhD University of Technology</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Design of Chaos Image Encryption Based on Wavelet Transforms and Discrete Cosine Transform</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">3</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2014-2018</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <div style="text-align:center"><span style="font-size:11.0pt">PhD-UNITEN Malaysia</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Diagnosis Security Problems For Hybrid Cloud Computing In Medium Organizations</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">4</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2016-2017</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Attribute Based Authentication System Using Homomorphic Encryption</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">5</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2016-2017</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Design of Secure Private Cloud using Proposed Fully Homomorphic Encryption</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">6</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2015-2016</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Analysis and development of RC4 based on Its Bias</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">7</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2015-2016</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Design of an Android Application for Secure Chatting</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">8</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2013-2014</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Design of Secure Intranet for Compressed Multimedia</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">9</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2013-2014</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Secure MMS Messaging System in </span></p> <div><span style="font-size:11.0pt">Smartphone</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">10</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2009-2010</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Proposing a Family of Advance </span></p> <p><span style="font-size:11.0pt">Encryption Standard (AES) Variants</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">11</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2010-2011</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Development of Visual Secret Sharing Techniques</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">12</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2010-2011</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Segmentation of Image Using Watershed Transform</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">13</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2013-2014</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Video Compression Scheme for Video Conferencing</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">14</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2009-2010</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Design of secure compression system</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">15</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2011-2012</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Secure Routing for Mobile Ad Hoc Networks using Identity Based Cryptography</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">16</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2011-2012</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Improved scatter search based on bees and simulated annealing algorithms</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">17</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2013-2015</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Improved Metaheuristic Scatter Search</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">18</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2013-2014</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Design of Secure Communication Protocol for Intranet Technology</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">19</span></div> </td> </tr> <tr> <td style="border-color:black; border-style:double; border-top:none; border-width:1.5pt; height:36.85pt; width:77.95pt"> <div style="text-align:center"><span style="font-size:11.0pt">2011-2012</span></div> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:99.25pt"> <p style="text-align:center"><span style="font-size:11.0pt">University of Anbar</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; width:223.5pt"> <p><span style="font-size:11.0pt">Development of DNA Based Cryptosystem</span></p> </td> <td style="border-bottom:double windowtext 1.5pt; border-left:double windowtext 1.5pt; border-right:none; border-top:none; height:36.85pt; vertical-align:top; width:27.0pt"> <div style="text-align:center"><span dir="LTR" style="font-size:11.0pt">20</span></div> </td> </tr> </tbody> </table> </div> <div> </div> </div>