علي جاسم عبود

حاصل على شهادة البكالوريوس في هندسة الحاسوب والبرامجيات من الجامعة المستنصرية في العام 2011 و حصل على شهادة الماجستير من الجامعة التكنولوجية في تخصص هندسة الحاسوب وتكنولوجيا المعلومات في العام 2005 وحصل على شهادة الدكتوراه من جامعة بكنكهام  في بريطانيا في تخصص علوم الحاسبات التطبيقية في مجال معالجة الصور والرؤية الحاسوبية في العام 2011 واهتمامته البحثية في مجالات معالجة الصور والاشارات الرقمية وتمييز الانماط وامن المعلومات الرقمية والذكاء الصناعي والمقاييس الحيوية ولدية عدد من البحوث المنشورة في المؤتمرات والمجلات العالمية والمحلية

 (ENCRYPTION AND DATA SECURITY (PDF 
1-2-3-4-5-6-7-8-9-10-11

 

معالجة الاشارة الرقمية

Digital Signal Processing

Third Year

الفصل الدراسي

عناوين المحاضرات

الفصل الدراسي الاول

Basics of Signals and Systems

الفصل الدراسي الاول

Time domain Analysis

الفصل الدراسي الاول

Convolution and Correlation

الفصل الدراسي الاول

Fourier Transform and FFT

الفصل الدراسي الاول

Realization of Digital Filters

الفصل الدراسي الثاني

Analog Filter Design

الفصل الدراسي الثاني

Digital Filter Design

الفصل الدراسي الثاني

DSP Applications in Matlab

المصادر

1.J.G. Proakis and D.G. Manolakis, Digital Signal Processing, 4rd edition, Prentice-Hall, 2006.

2.R.G Lyons, Understanding Digital Signal processing, 3rd edition, Prentice- Hall, (Amazon’s top-selling for five straight year) ,2011.

3.Monsons Hays, Schaums Outline of Digital Signal processing, 2nd edition ,McGraw-Hill Companies, 2012.

4.Richard, The Essential Guide to Digital Signal Processing, 1st edition Prentice-Hall, ePUB, 2014.

5.J.G. Proakis, Digital Signal Processing Using MATLAB, 3rd edition, Cengage Learning, 2012.

 

 

 

 

 


 

 

       روابط مفيدة  لمادة معالجة الاشارة الرقمية (Useful Links):

 

Links

  1. http://dsp.rice.edu/
  2. https://www.youtube.com/watch?v=6dFnpz_AEyA&list=PL2757898A61B21498
  3. https://www.youtube.com/watch?v=5HSn3DPHQcQ
  4. https://www.youtube.com/watch?v=W4Q22wTxJK4&list=PLaJppqXMef2ZHIKM4vpwHIAWyRmw3TtSf
  5. https://www.youtube.com/results?search_query=dsp+lecture
  6. https://www.youtube.com/watch?v=gZNm7L96pfY
  7. https://ocw.mit.edu/resources/res-6-008-digital-signal-processing-spring-2011/
  8. https://ocw.mit.edu/resources/res-6-008-digital-signal-processing-spring-2011/video-lectures/
  9. http://signal.ece.utexas.edu/~arslan/courses/dsp/
  10. http://www.slideshare.net/sandhyajois/presentation-on-digital-signal-processing
 

  

 


واجبات:

Home work

https://drive.google.com/drive/recent

 

 

تشفير وامنية المعلومات

Cryptography and Information Security

Fourth Year

الفصل الدراسي

عناوين المحاضرات

الفصل الدراسي الاول

Basics of Cryptography and Information Security

الفصل الدراسي الاول

Mathematical Background

الفصل الدراسي الاول

Classical Cryptographic Algorithms

الفصل الدراسي الاول

Modern Cryptographic Algorithms

الفصل الدراسي الاول

Public Key Cryptography

الفصل الدراسي الثاني

Hash, MAC and Digital Signatures

الفصل الدراسي الثاني

Email Security

الفصل الدراسي الثاني

Network Security

المصادر

  1. Applied Cryptography by Schneier, B.
  2. Security in Computing by P. Fleeger
 
 

 

 


النشر المحلي والعالمي

 

 

Title

Exploting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion

Transactions on Data Hiding and Multimedia Security VIII. Lecture Notes in Computer Science, vol. 7228. Springer, Berlin, Heidelberg,2012. Springer 1611-3349

Exploting Samples Quality in Evaluating and Improving Performance of Biometric Systems. International Journal of Digital Society (IJDS), Volume 2, Issue 2, June 2011.

infonomics-society 2040 -2570

Protecting Documents Using Visual Cryptography. International Journal of Engineering Research and General Science Volume 3, Issue 2, Part 2, March-April, 2015 Nepal Academy 2091-2730

Sustainable IT: A Realisation Survey Among Academic Institutions of Iraq International Journal of Enhanced Research in Science Technology & Engineering, Vol. 3 Issue 2, February-2014, pp: (25-31) Erpublications 2319-7463

Multifactor Authentication for Software Protection Diyala Journal of Engineering Sciences, Vol. 08, No. 04, Special Issue,2015 College of Engineering/University of Diyala

1999-8716

Balancing Compression and Encryption of Satellite Imagery International journal of electrical and computer engineering, Vol. 08, No. 05,2018 IAES 2088-8708

Ethernet Switching Mode Selection Using AHP ARPN Journal of Engineering and Applied Sciences, VOL. 13, NO. 23, DECEMBER 2018 ARPN 1819-6608

Shape Adaptable Medical Multimedia Processing The Open Electrical & Electronic

Engineering Journal,2019 BENTHAM OPEN 1874-1290

Integrity Checking of Several Program Codes Journal of Engineering and Applied Sciences,2019 Medwell Journals I 816-949X

 

Conferences 

No

Conference Name

Title

Publishing Office

1

SPIE Defense, Security, and Sensing, 2009.

Quality based approach for adaptive face recognition.

International Society for Optics and Photonics.

2

Proceedings of the Workshop on Pattern Recognition for IT, 2010.

Analysis of relative entropy, accuracy, and quality of face biometric.

DAGM 2010

Darmstadt.

3

SPIE Defense, Security, and Sensing, 2012.

Biometric templates selection and update using quality measures.

International Society for Optics and Photonics.

4

SPIE Defense, Security, and Sensing, 2012.

Incremental fusion of partial biometric information.

International Society for Optics and Photonics.

5

SPIE Defense, Security, and Sensing, 2010.

Image quality guided approach for adaptive modelling of biometric intra-class variations.

International Society for Optics and Photonics.

6

Information Society (i-Society), 2011 International Conference on, 2010.

Hidden assumption of face recognition evaluation under different quality conditions.

IEEE Organization.

 

7                                                  

 2018 1st International Scientific Conference of Engineering Sciences-3rd Scientific Conference of Engineering Science (ISCES)                                                                                      

An efficient data packet scheduling scheme for Internet of Things networks

IEEE Organization

8

 2018 1st International Scientific Conference of Engineering Sciences-3rd Scientific Conference of Engineering Science (ISCES)                                                                                      

A Data Structure Encryption Algorithm based on Circular Queue to Enhance Data Security

IEEE Organization

3:45