م.د. وليد خالد حسن ذيب الجميلي (مدرس)
دكتوراه في Cloud Computing Security and Privacy
تكنولوجيا المعلومات -
علوم الحاسوب وتكنولوجيا المعلومات
waleed.hassan@uoanbar.edu.iq
<p style="text-align:left"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><strong>Waleed Khalid Hassan</strong> received his <strong>B.Sc.</strong> and <strong>M.Sc. </strong>degrees in Computer Science from the College of Computer Science and Information Technology, University of Anbar, Iraq, in 2002 and 2010, respectively. In 2020, he received his Ph.D. degree in Computer Science from the <strong>School of Computing</strong>, <strong>University of Buckingham</strong>, <strong>United Kingdom</strong>. Security and Privacy of Cloud computing, Identity-Based Encryption, Fuzzy Identity-Based Encryption, and OLAP are the core of his research interest<a href="https://drive.google.com/file/d/1YlGtTXZjg8vfV2kugZ6e06BIXZ3Hc-L5/view?usp=sharing"><img alt="" src="https://drive.google.com/file/d/1YlGtTXZjg8vfV2kugZ6e06BIXZ3Hc-L5/view?usp=sharing" /></a></span></span></p>
<p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><u><span style="color:black">Enhancement OLAP via Fragmentation </span></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong><span style="font-size:10.5pt">Waleed K. Hassan, </span></strong><span style="font-size:11.0pt">IFRSA International Journal of Data Warehousing & Mining |Vol1|issue 2|Nov 2011</span> </span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><u><span style="color:black"><a href="javascript:void(0)" style="color:blue; text-decoration:underline"><span style="color:black">OLAP Techniques for Approximation and Mining Query Answering</span></a></span></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">MM Hamd, <strong>WK Hassan,</strong> AL-Rafidain Journal of Computer Sciences and Mathematics 7 (3), 201-212</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><u><a href="javascript:void(0)" style="color:blue; text-decoration:underline"><span style="color:#000000">Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment</span></a></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><strong>WK Hassan,</strong> H Al-Assam, Mobile Multimedia/Image Processing, Security, and Applications 2017 102</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif"><u><span style="color:black"><a href="javascript:void(0)" style="color:blue; text-decoration:underline"><span style="color:black">Automated biometric authentication with cloud computing</span></a></span></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:"Times New Roman",serif">H Al-Assam, <strong>W Hassan,</strong> S Zeadally, Biometric-Based Physical and Cybersecurity Systems, 455-475</span></span> </p> <div> <p style="text-align:left"> </p> </div> <p style="text-align:left"> </p>
# | المادة | اسم المحاضرة | المرحلة | التحميل | مشاهدة |
---|