Researcher Image
سعد عبد الكريم عبد الامير حسن - Saad A. Abdulameer
MSc - assistant lecturer
College of Education for Women , Computer Sciences
[email protected]
Summary

Assist. lecturer of Computer Sciences in Information Security field

Qualifications

Computer Programmer, Systems Developer

Responsibility

Manager of Planning, Human Resources, and Information Technology Divisions, Responsible of The College of Education for Women Website

Awards and Memberships

Member in many scientific and administrative committees

Research Interests

Information Security

Academic Area

Master degree in Computer Sciences from the College of Science - University of Baghdad since 26 June 2020

Teaching materials
Material
College
Department
Stage
Download
تقنيات تركيب الحاسوب
كلية التربية للبنات
الحاسوب
Stage 1
Teaching

Computer materials for the Computer Sciences department and other humanity departments

Supervision

Supervisor of the 4th grade graduation projects for the last 3 years

Publication Date
Mon May 11 2020
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Learning for Scientific Culture by Using Interactive Whiteboard According to the Faculty of the University of Baghdad Viewpoint
...Show More Authors

The progress of science in all its branches and levels made great civilized changes of
our societies in the present day, it's a result of the huge amount of knowledge, the increase of
number of students, and the increase of community awareness proportion of the importance of
education in schools and universities, it became necessary for us as educators to look at
science from another point of view based on the idea of scientific development of curricula
and teaching methods and means of education, and for the studying class environment as a
whole, by computer and internet use in education to the emergence of the term education
technology, which relies on the use of modern technology to provide educational content to<

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Title
Category
Date
الأرشفة الإلكترونية
Workshops ورش العمل
2024-05-25
التسويق الرقمي
Workshops ورش العمل
2024-05-18
إدارة تطبيقات الإيميل الرسمي
Workshops ورش العمل
2023-03-07
إدارة تطبيقات الإيميل الرسمي
Workshops ورش العمل
2022-05-15