Saad ALMOMEN currently works at the Mathematics Department, University of Baghdad, College of Science. Saad does research in Applied Mathematics.
- Head of Information Technology Unit (2015-2018)
- Rapporteur of Postgraduate Studies in the Department of Mathematics (2019-2021)
- Rapporteur of Postgraduate Studies in the Department of Mathematics (2023-2025)
- Dynamic Systems
- Image Processing
- Pattern Recognition
- Texture Analysis
- Machine Learning
- Fractals
- Computer Vision
- Image Enhancement
- Cryptography
- Steganography
- Mathematics II (1st Class)
- Solution of Ordinary Differential Equations (2nd Class)
- Cipher Systems (4th Class)
- Computing 4 - C++ Programming (2nd Class)
- Mathematical Physics I (M.Sc.)
- Mathematical Physics II (M.Sc.)
- Mathematical Techniques for Image Processing (M.Sc.)
- Yahya Baher Al-Askary (M.Sc.), "Some Mathematical Techniques for Recognition of Mathematical Expressions in Digital Images", 2023.
- Mohamed Abod Husain (M.Sc.), "Some Mathematical Techniques in Image Steganography", 2023.
Segmentation is one of the most computer vision processes importance, it aims to understand the image contents by partitioning it into segments that are more meaningful and easier to analyze. However, this process comes with a set of challenges including image skew, noise, and object clipping. In this paper, a solution is proposed to address the challenges encountered when using Optical Character Recognition to recognize mathematical expressions. The proposed method involves three stages: pre-processing, segmentation, and post-processing. During pre-processing, the mathematical expression image is transformed into a binary image, noise reduction techniques are applied, image component discontinuities are resolved, and skew corre
... Show MoreA modified Leslie-Gower predator-prey model with fear effect and nonlinear harvesting is developed and investigated in this study. The predator is supposed to feed on the prey using Holling type-II functional response. The goal is to see how fear of predation and presence of harvesting affect the model's dynamics. The system's positivity and boundlessness are demonstrated. All conceivable equilibria's existence and stability requirements are established. All sorts of local bifurcation occurrence conditions are presented. Extensive numerical simulations of the proposed model are shown in form of Phase portraits and direction fields. That is to guarantee the correctness of the theoretical results of the dynamic behavior of the system and t
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreIn this paper, a Sokol-Howell prey-predator model involving strong Allee effect is proposed and analyzed. The existence, uniqueness, and boundedness are studied. All the five possible equilibria have been are obtained and their local stability conditions are established. Using Sotomayor's theorem, the conditions of local saddle-node and transcritical and pitchfork bifurcation are derived and drawn. Numerical simulations are performed to clarify the analytical results
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreThis paper presents a method to classify colored textural images of skin tissues. Since medical images havehighly heterogeneity, the development of reliable skin-cancer detection process is difficult, and a mono fractaldimension is not sufficient to classify images of this nature. A multifractal-based feature vectors are suggested hereas an alternative and more effective tool. At the same time multiple color channels are used to get more descriptivefeatures.Two multifractal based set of features are suggested here. The first set measures the local roughness property, whilethe second set measure the local contrast property.A combination of all the extracted features from the three colormodels gives a highest classification accuracy with 99.4
... Show MoreTaking into account the significance of food chains in the environment, it demonstrates the interdependence of all living things and has economic implications for people. Hunting cooperation, fear, and intraspecific competition are all included in a food chain model that has been developed and researched. The study tries to comprehend how these elements affect the behavior of species along the food chain. We first examined the suggested model's solution properties before calculating every potential equilibrium point and examining the stability and bifurcation nearby. We have identified the factors that guarantee the global stability of the positive equilibrium point using the geometric approach. Additionally, the circumstances that would gu
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show More