Hadeel Amjad Saeed (Assistant Lecturer)
MSc in Data security
Information Technology -
Computer Sciences and IT
Hadeel.saeed@uoanbar.edu.iq
<p style="text-align:left"><span style="font-family:Arial,Helvetica,sans-serif"><samp><span style="font-size:11pt"><span dir="LTR" style="font-size:14.0pt">Hadeel A.saeed – currently works as a lecturer at the University of Anbar, Anbar, Iraq. <span style="color:black">She received B.Sc. in Computer Science from Baghdad University, Iraq, (2004-2007). She received his M.Sc. in 2011 from the Computer Science Department, Al -Anbar University. Fields of interests are data security, AI, computer vision, and image processing. <a href="https://docs.google.com/document/d/14TqRlleKzoRhkh-5mmMY4VOCa0e6_qDk/edit?usp=sharing&ouid=115516547795832351314&rtpof=true&sd=true">CV</a></span></span></span></samp></span></p>
<ol> <li style="text-align:left"><a href="http://ieeexplore.ieee.org/abstract/document/6149943"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:18.0pt"><span style="font-family:"Times New Roman","serif""> A neural network based anomaly intrusion detection system‏,STF Al-Janabi, HA Saeed‏, Developments in E-systems Engineering, 221-22,2011.</span></span></span></span></a></li> </ol> <p style="text-align:left"> </p> <ol start="2"> <li style="text-align:left"><a href="http://www.iasj.net/iasj/article/103662"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:18.0pt"><span style="font-family:"Times New Roman","serif""> HIDS with minimize property,HA Saeed‏,Journal Of AL-Turath University College, 62-82, 2014.</span></span></span></span></a></li> </ol> <p style="text-align:center"> </p> <ol start="3"> <li style="text-align:left"><a href="http://www.sciencepubco.com/index.php/ijet/article/view/23802"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:18.0pt"><span style="font-family:"Times New Roman","serif""><span style="color:#1d2228">"secure login technique for online bank",duaa yasen, balial </span></span></span><span style="font-size:18.0pt"><span style="font-family:"Times New Roman","serif"">alk</span></span><span style="font-size:18.0pt"><span style="font-family:"Times New Roman","serif"">teb, hadeel saeed, International Journal of Engineering & Technology,2018.</span></span></span></span></a></li> <li style="text-align:left"><a href="http://ijeecs.iaescore.com/index.php/IJEECS/article/view/25472"><strong>” Analysis The Digital Images By Using Morphology Operators” Indonesian Journal of Electrical Engineering and Computer Science, a Scopus indexed journal (SJR 2017: 0.182, Q3 on Electrical and Electronic Engineering</strong></a></li> </ol>
1-Bachelor’s degree in Computer Science from the University of Baghdad / College of Science for Girls / Department of Computer Science
2-Department of Computer Science from Anbar University/College of Computer and Information Sciences/Computer Science
# | المادة | اسم المحاضرة | المرحلة | التحميل | مشاهدة |
---|