صديق قيس عبدالرحمن (مدرس)

ماجستير في علوم حاسبات
مدير شعبة الاعلام والعلاقات العامة
علوم حاسبات - علوم الحاسوب وتكنولوجيا المعلومات
co.sedeikaldossary@uoanbar.edu.iq

ScopusGoogle ScholarResearch GateORCIDPublonsFacebook


معلومات عامة

<p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">صديق قيس عبد الرحمن التدريسي علوم الحاسوب وتكنولوجيا المعلومات. تعين في الكلية بصفة مبرمج من 2007-2016، قام بتدريس العديد من المواد المختبرية ولغات البرمجة.</span></span></span></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">أكمل دراسة الماجستير في جامعة الأنبار في 2019 حيث كانت دراساته الجامعية في نفس الكلية. يقوم بتدريس علوم الحاسبات بشكل عام، التشفير، البرمجة المرئية والبرمجة الهيكلية. تركز مجالات اهتماماته من الخبرة على مناهج تأمين نقل البيانات وتخزينها بأساليب ذكية. كما أنه مهتم بالتعامل مع تطبيقات الهواتف الذكية</span></span></span><span dir="LTR" style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">.</span></span></span></span></span></p>

البحوث العلمية

<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><u><span style="font-size:16.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Paper in SCOPUS ONLY:</span></span></span></u></strong></span></span></p> <table cellspacing="0" class="Table" style="background:white; border-collapse:collapse; border:none; width:100.0%"> <tbody> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:1px solid black; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Al-Rahman, Seddiq Abd, Ali Sagheer, and Omar Dawood. &quot;NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things.&quot;&nbsp;<em>2018 1st Annual International Conference on Information and Sciences (AiCIS)</em>. IEEE, 2018.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:1px solid black; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://ieeexplore.ieee.org/abstract/document/8640941" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Al-Rahman, Seddiq Abd, Ali Sagheer, and Omar Dawood. &quot;&nbsp;Propose A Lightweight Block Cipher Algorithm For Securing Internet of Things.&quot;&nbsp;<em>2019 AUS journal</em>. IEEE, 2-26,P&nbsp;297-305.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="http://revistas.uach.cl/index.php/aus/article/download/5580/6599/" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Abd Al-Rahman, S. Q., Jassim, S. A., &amp; Sagheer, A. M. (2021). Design a mobile application for vehicles managing of a transportation issue.&nbsp;<em>Bulletin of Electrical Engineering and Informatics</em>,&nbsp;<em>10</em>(4), 2263-2272.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://www.beei.org/index.php/EEI/article/view/2918" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Al-Rahman, S. Q. A., Sagheer, A., &amp; A Dawood, O. (2021). A Hybrid Lightweight Cipher Algorithm.&nbsp;<em>International Journal of Computing and Digital System</em>.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://journal.uob.edu.bh/handle/123456789/4272" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Abd Al-Rahman, S. Q., Hamad, S. S., &amp; Turky, D. S. (2021, December). Implementation of Data Transportation Protocol Depending on the Lightweight Cipher Algorithms. In&nbsp;<em>2021 14th International Conference on Developments in eSystems Engineering (DeSE)</em>&nbsp;(pp. 340-345). IEEE.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://ieeexplore.ieee.org/abstract/document/9719471" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Al-Rahman, S. Q. A., Sagheer, A. M., &amp; Dawood, O. A. (2022, October). LiNA: Lightweight algorithm for secure internet of things. In&nbsp;<em>AIP Conference Proceedings</em>&nbsp;(Vol. 2400, No. 1). AIP Publishing.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://scholar.archive.org/work/643b5usgifgvdo4jx3srlglxvm/access/wayback/https:/aip.scitation.org/doi/pdf/10.1063/5.0113517" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Taher, H. M., Abd Al-Rahman, S. Q., &amp; Shawkat, S. A. (2022). Best S-box amongst differently sized S-boxes based on the avalanche effect in&lrm; the advance encryption standard algorithm.&nbsp;<em>International Journal of Electrical and Computer Engineering</em>,&nbsp;<em>12</em>(6), 6535.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://www.researchgate.net/profile/Shihab-Shawkat/publication/363693042_Best_S-box_amongst_differently_sized_S-boxes_based_on_the_avalanche_effect_in_the_advance_encryption_standard_algorithm/links/6329f3e3873eca0c00a09bb1/Best-S-box-amongst-differently-sized-S-boxes-based-on-the-avalanche-effect-in-the-advance-encryption-standard-algorithm.pdf" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Shakir, D. A. Q., Salim, A., Abd Al-Rahman, S. Q., &amp; Sagheer, A. M. (2023). Image Encryption Using Lorenz Chaotic System.&nbsp;<em>Journal of Techniques</em>,&nbsp;<em>5</em>(1), 122-128.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://www.iasj.net/iasj/download/db078fc41cd47677" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> <tr> <td style="background-color:white; border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; vertical-align:top; width:86%px"> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black">Abd Al-Rahman, S. Q., Hasan, E. H., &amp; Sagheer, A. M. (2023). Design and implementation of the web (extract, transform, load) process in data warehouse application.&nbsp;<em>IAES International Journal of Artificial Intelligence</em>,&nbsp;<em>12</em>(2), 765.&rlm;</span></span></span></span></span></p> </td> <td style="background-color:white; border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:13%px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="color:black"><a href="https://www.proquest.com/openview/6fa6f5c747250bb435bd715e3e88524a/1?pq-origsite=gscholar&amp;cbl=1686339" style="color:blue; text-decoration:underline"><span style="font-size:12.0pt"><span style="color:black">Link</span></span></a></span></span></span></span></p> </td> </tr> </tbody> </table> <p>&nbsp;</p>

المحاضرات العلمية

Course One:

  • First Stage  Department of Information Systems => structured programming 
  • Second Stage  Department of Information Systems => Data structures
  • Forth Stage  Department of Information Systems => Development of the characteristics of the Internet
  • Third Stage  Department of Computer Science => Mobile Applications Programming
  • Forth Stage  Department of Computer Science => Operating Systems




Course Two:

  • Third Stage  Department of Information Systems => Visual Programing C#.
  • First Stage  Department of Information Systems => Structure Programing C++.
  • Third Stage  Department of Computer Science => Visual Programing C#.
  • Second Stage  Department of Computer Science => Numerical Analysis.

# المادة اسم المحاضرة المرحلة التحميل مشاهدة