Sheridan College Oakville - Computer Science
English
Arabic
Doctor of Philosophy (PhD)
Medical Image Processing
University of Guelph
Queueing Theory/Data Traffic
Image Processing Algorithms
Intro to Machine Learning
Data Mining Methods
Medical Imaging
Security
Tech Comm & Res Methodology
Network Optimization
Advanced Computer Networks
Optimization Techniques
Data Analysis
Labview
Simulations
LaTeX
Mathematical Modeling
C
Solidworks
Research
Biomedical Engineering
Matlab
University Teaching
Science
Programming
Microsoft Office
Image Processing
Teaching
Machine Learning
C++
Simulink
Statistics
Adaptive Encryption Using Pseudo-Noise Sequences for Medical Images
A new algorithm based on the Gold code to permute the indexes of the pixels in a medical\nimage. The permutation process was implemented adaptively according to the output values of the correlation and the NPCR
Adaptive Encryption Using Pseudo-Noise Sequences for Medical Images
Using C++ for Data Transfer by Software Handshaking
Dr. A.I.A.Jabbar
Design a VPN switch using MATLAB simulink software. This VPN switch has the ability to support firewall
encryption
authentication
and data integrity for secure tunneling across managed IP networks and Internet. Introducing scrambling code within a VPN switch for encryption is \nsomething new. The basic advantage of this method is to eliminate long headers
\nwhich are usually dedicated for authentication and encapsulation in IPSec. \nTherefore an increase in the bandwidth efficiency of the channel is expected. \nLarger values of spreading factor show better probability of error and data \nintegrity in spite of the decrement in the bandwidth of the channel in some cases.
Analysis and Design of a Novell VPN Switch
A hybrid encryption is proposed
where AES is applied for ROI and a coding method such as Gold code (GC) is applied for the ROB after improvement. The proposed method has a shorter processing time than applying AES for the whole medical image. In addition
it has a very good security level as seen in the related entropy and correlation calculations.
Segmentation Based Encryption Method for Medical Images
The use of several encryption algorithms with variable key lengths to control the processing time required for the encryption process and the robustness quality. Encryption processing time
robustness of the encrypted image and the side information required for transmission of the decryption key are the main parameters for optimization. The trade-off among them stems from the variation in processing time with the key length of encryption algorithm
image size
number of regions and the side information to reduce processing time while maintaining a high level of robustness.
An Adaptive Encryption Based Genetic Algorithms for Medical Images
Proposing a new security method includes encryption and watermarking techniques. In encryption part a new algorithm based on number theory and uses Chinese remainder theorem as a backbone is introduced. On watermarking part
a new lossless algorithm for medical images is presented. The algorithm divides the medical image into two regions: a region of interest (ROI) and a region of background (ROB). The pixel values of the ROI contain the important information so this region must not experience any change. The proposed watermarking technique is based on dividing the\nmedical image in to blocks and inserting the watermark to the ROI by shifting the blocks. Then
an equivalent number of blocks in the ROB are removed.
Improving the Security of the Medical Images
Mahmood
PhD
EIT
Mosul Technical Institute
Sheridan College
University of Guelph
Electrical Transmission Projects
University of Guelph
Mosul
Iraq
Served as a lecturer of the courses: Electronic Circuits
and 8086 Microprocessor. \n•\tCourse preparation
lecture presentation by introducing course material and solving problems.\n•\tStudent consultation and guidance.\n•\tInvigilating exams and grading. \n•\tSupervising students’ projects.
Sessional Lecturer
Mosul Technical Institute
Oakville
ON
Edge to Core Network Foundations (TELE10025)\nIntroduction to Communication Networks (TELE 16048)\nIntroduction to Data Communications and Networking (TELE 13167)
Part-Time Faculty
Sheridan College
Baghdad
Iraq
Installing and programming Selta 500 PABX
PMX multiplexer and ESB2000 PLC.\nInstalling the supervisory control and data acquisition (SCADA) system. \nInstalling communication equipments in the grid area such as line traps
CVT
matching filter
and earth switch.\nDrawing and implementing electrical drafts of lighting
fire alarm/ fighting
telephone cabling.\nPreparing the cable lists for the connection between the multiplexer and the PABX for voice service and also for data service such as teleprotection signals that comes from the RTU. \nPreparing the cable lists to connect the pilot cable
coaxial cables
fiber optic
and control signals cables with the main distribution frame (MDF).
Senior Communications Engineer
Electrical Transmission Projects
I served as a TA for the following Courses:\n\nMedical Imaging (ENGG*4660).\nSignal Processing (ENGG*3390).\nElectrical Devices (ENGG*3450).\nElectric Circuits (ENGG*2450).\nEngineering Systems Analysis (ENGG*2400)
Graduate Teaching Assistant
Ontario
Canada
University of Guelph
Worked on improving the security performance of DICOM medical images using optimization techniques.\nSupervised by Prof. Bob Dony
PHD Candidate
Ontario
Canada
University of Guelph
Ontario
Canada
Serving as a lecturer for the courses:\nIntroduction to Machine Learning (ENGG*6500)\nAdvanced Digital Signal Processing (ENGG*6560)\nSimulation Analysis of Discrete Event Systems (ENGG*6380)\nEngineering & Design III (ENGG*3100)\nElectric Circuits (ENGG*2450) \nOccupational Health and Safety (ENGG*1070) \n• Delivery of the lectures\n• Plan
develop and implement tutorials
assignment questions and solutions
exam questions
and office hours\n• Student consultation and guidance\n• Invigilating exams and grading
Sessional Lecturer
University of Guelph
The following profiles may or may not be the same professor: