Back

Dr. Ali Jassim Abboud received a bachelor's degree in computer and software engineering / Mustansiriya University / Iraq in 2001 and earned a master's degree in computer engineering and information technology / software engineering from the University of Technology / Iraq in 2005 and then worked as a lecturer in the University of Diyala / College of Engineering from 2005 until the year 2007 and then he obtained a scholarship to get a doctorate degree from the UK which has been awarded in 2011 (Computers Science/ Security and Processing of Digital Signals) from the  University of Buckingham in UK. During his studies published numerous research in journals and international conferences and his research interests are focused on: security and processing of   various kinds of digital signals including images, videos, audio, multimedia and how to use them in different applications and also he has intersets in the field of biometrics, pattern recognition and artificial intelligence. You can find his research on the following links:

https://scholar.google.com/citations?user=XFTFrcUAAAAJ&hl=en&oi=ahttps://www.researchgate.net/profile/Ali_Abboud

 


 

Lectures Time Table:

 

Day

Subject

Class

Time

Sunday

Digital Signal Processing

Third/Morning

8:30 – 11:30

Sunday

Digital Signal Processing

Third/Night

2:00 – 4:00

Sunday

Information Security

Fourth/Night

4:00 – 5:00

Monday

Information Security

Fourth/Morning

8:30 – 11:30

Monday

Digital Signal Processing

Third/Night

4:00 – 5:00

Tuesday

Information Security Lab.

Fourth/Night

2:00 – 4:00

Wednesday 

Information Security

Fourth/Night

2:00 – 4:00

 

 


 

Syllabus:

 

Digital Signal Processing

Third Year

Semester

Lecture Title

First

Basics of Signals and Systems

First

Time domain Analysis

First

Convolution and Correlation

First

Fourier Transform and FFT

First

Realization of Digital Filters

Second

Analog Filter Design

Second

Digital Filter Design

Second

DSP Applications in Matlab

References

  1. J.G. Proakis and D.G. Manolakis, Digital Signal Processing, 4rd edition, Prentice-Hall, 2006.
  2. R.G Lyons, Understanding Digital Signal processing, 3rd edition, Prentice- Hall, (Amazon’s top-selling for five straight year) ,2011.
  3. Monsons Hays, Schaums Outline of Digital Signal processing, 2nd edition ,McGraw-Hill Companies, 2012.
  4. Richard, The Essential Guide to Digital Signal Processing, 1st edition Prentice-Hall, ePUB, 2014.
  5. J.G. Proakis, Digital Signal Processing Using MATLAB, 3rd edition, Cengage Learning, 2012.

 

 

 


Lectures in PDF form:

 

 PDF

SUBJECT

 

DSP

 

 


 

Useful Links

Links

  1. http://dsp.rice.edu/
  2. https://www.youtube.com/watch?v=6dFnpz_AEyA&list=PL2757898A61B21498
  3. https://www.youtube.com/watch?v=5HSn3DPHQcQ
  4. https://www.youtube.com/watch?v=W4Q22wTxJK4&list=PLaJppqXMef2ZHIKM4vpwHIAWyRmw3TtSf
  5. https://www.youtube.com/results?search_query=dsp+lecture
  6. https://www.youtube.com/watch?v=gZNm7L96pfY
  7. https://ocw.mit.edu/resources/res-6-008-digital-signal-processing-spring-2011/
  8. https://ocw.mit.edu/resources/res-6-008-digital-signal-processing-spring-2011/video-lectures/
  9. http://signal.ece.utexas.edu/~arslan/courses/dsp/
  10. http://www.slideshare.net/sandhyajois/presentation-on-digital-signal-processing
 

 


 

 

Cryptography and Information Security

Fourth Year

Semester

Lectures Title

First

Basics of Cryptography and Information Security

First

Mathematical Background

First

Classical Cryptographic Algorithms

First

Modern Cryptographic Algorithms

First

Public Key Cryptography

Second

Hash, MAC and Digital Signatures

Second

Email Security

Second

Network Security

References

  1. Applied Cryptography by Schneier, B.
  2. Security in Computing by P. Fleeger
 
 

 


 

Useful Links:

 

 

Links

  1. https://www.youtube.com/watch?v=Q-HugPvA7GQ&list=PL71FE85723FD414D7
  2. https://www.youtube.com/watch?v=BEb_AnPWPwY
  3. https://www.youtube.com/watch?v=9vxYin3iwHY
  4. https://www.youtube.com/watch?v=Z8M2BTscoD4
  5. https://www.youtube.com/watch?v=2y_tidbY-Lw
  6. https://www.youtube.com/watch?v=kPBJIhpcZgE
  7. www.cs.iit.edu/~cs549/lectures/CNS-1.pdf
  8. www.cse.psu.edu/~trj1/cse497b-s07/slides/cse497b-lecture-5-cryptography.pdf
  9. http://williamstallings.com/Extras/Security-Notes/
  10. https://www.cs.utexas.edu/~shmat/courses/cs361s/intro.ppt
 

 


 

Published Research:

 

  • A. J. Abboud, H.Sellahewa, S.A.Jassim,”Image Quality Approach for Adaptive Modelling of Biometric Intraclass Variations”, 2010, USA , Procedings of SPIE Defense, Security, and Sensing.
  • H Al-Assam, A J. Abboud, S Jassim,”Hidden Assumption of Face Evaluation under Different Quality Conditions”, 2011, UK , International Conference on Information Society (i-Society).
  • A.J..Abboud,S.A.Jassim,”Incremental Fusion of Partial Biometric Information”, 2012, USA, Proceedings of SPIE Defense, Security, and Sensing.
  • AJ.Abboud ,S.A.Jassim,”Biometric Templates Selection and Update Using Quality Measures”, ,2012, USA , Proceedings of SPIE Defense, Security, and Sensing.
  • Sabah A. Jassim, Hisham Al-Assam, Ali J. Abboud, Harin Sellahewa,”Analysis of Relative Entropy, Accuracy, and Quality of Face Biometric”, 32ndannual Symposium of the German association for Pattern Recognition,2010,Germany.

            BPublication in international scientific journals

  • Hisham Al-Assam, Ali J. Abboud, Harin Sellahewa, Sabah Jassim,”Exploting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion”,2012, Transactions on Data Hiding and Multimedia Security VIII,Springer Berlin/Heidelberg.
  • Hisham Al-Assam, Ali J. Abboud, Harin Sellahewa, Sabah Jassim,”Exploting Samples Quality in Evaluating and Improving Performance of Biometric Systems, 2011 ”,International Journal of Digital Society,Vol.2, Issue 2.
  • AJ.AbboudQuality Aware Adaptive Biometric Systems”,British Library,EthOS,2011.
  • A J Abboud “Protecting Documents Using Visual Cryptography”,2015.
 

 

Leave A Reply

Your email address will not be published. Required fields are marked *