Fullname Omer Mohammed Salih Hassan
E-mail [email protected]
Birth Date 1971-08-07
Address Iraq - Duhok
Computer science is my main passion. Computers are the most powerful instruments we have. I graduated from the Siirt University with an M.Sc. in electrical and electronic engineering /Computer engineering (Turkey). I began working as an assistant lecturer at Duhok Polytechnic University after graduating The Master's degree, on the other hand, did not signal the end of my academic career. Recognizing the value and requirement of continuing to update my professional expertise in this age of rapid information technology growth, I determined that a Ph.D. in computer science would be essential for my academic and professional advancement I want to apply for a Ph.D. program in computer engineering in another country since it will allow me to fully develop my research interests. Following the completion of my studies in the Turkey, I became convinced that the Turkey and other European countries are the birthplace of contemporary computer science and technology, and that Western universities provide the advanced education and training that I want. There, I will be exposed to expert advice and scholarly concepts that will greatly widen my academic horizons. Equally important, I have access to a wide range of library materials I'm looking forward to the challenges that studying for a computer engineering degree will bring
Electrical and Electronic Engineering
Computer Technical Engineering
Presidency of Duhok Polytechnic University
Programming, Networking,Maintenance,Communication, website design and E-learning
Routing algorithm, IP protocol, E-learning
Computer Networking, Image processing, Pattren recongintion,
2021 IEEE 11th International Conference on System Engineering and Technology (ICSET 2021) (Issue: 21466992) (Volume: 45)
Digital watermarking is getting more research and industry attention. Digital multimedia data allows for robust and simple data editing and modification. However, the spread of digital media presents concerns for digital content owners. It is important to note that digital data can be copied without quality or content loss. This has a considerable impact on copyright holders' ability to safeguard their intellectual property rights. The method of transmitting information by imperceptibly embedding it into digital media is digital watermarking. There are various methods in literature, such as DWT and DCT, which take full energy, are seen and integrated. New strategies and procedures for optimization are required. The present study proposes a novel design and computation technique based on the discrete wavelet and discrete cosine transforms. Watermarking techniques have been progressing to shield media content such as text, audio, video, etc. From copyright. The proposed hybrid DWT-DCT Bacterial Foraging Optimization (BFO) technique improves the efficiency of watermarking digital images by 97%. Bacterial foraging optimization (BFO) is an innovative technique for intelligent optimization. It is a widely used optimization algorithm in a wide variety of applications. However, when compared to other optimizers, the BFO performs poorly in terms of convergence. This technique uses a high-frequency image region. A variety of techniques are compared with the (NCC) Normalized Cross Correlations, (PSNR) Peak Noise Signal Ratio and IF (Image Fidelity). The highest performance is seen in DWT-DCT-BFO watermarking.
Asian Journal of Research in Computer Science (Issue: 3) (Volume: 9)
Digital image authentication techniques have recently gained a lot of attention due to their importance to a large number of military and medical applications, banks, and institutions, which require a high level of security. Generally, digital images are transmitted over insecure media, such as the Internet and computer networks of various kinds. The Internet has become one of the basic pillars of life and a solution to many of the problems left by the coronavirus. As a result, images must be protected from attempts to alter their content that might affect important decision-making. An image authentication (IA) system is a solution to this difficult problem. In the previous literature, several methods have been proposed to protect the authenticity of an image. Digital image watermark is a strategy to ensure the reliability, resilience, intellectual property, and validity of multimedia documents. Digital media, such as images, audio, and video, can hide content. Watermarking of a digital image is a mechanism by which the watermark is embedded in multimedia and the image of the watermark is retrieved or identified in a multimedia entity. This paper reviews IA techniques, watermark embedding techniques, tamper detection methods and discusses the performance of the techniques, the pros and cons of each technique, and the proposed methods for improving the performance of watermark techniques.
Qubahan Academic Journal (Issue: 2) (Volume: 1)
Biometric authentication is one of the most quickly increasing innovations in today's world; this promising technology has seen widespread use in a variety of fields, including surveillance services, safe financial transfers, credit-card authentication. in biometric verification processes such as gender, age, ethnicity is iris recognition technology is considered the most accurate compared to other vital features such as face, hand geometry, and fingerprints. Because the irises in the same person are not similar. In this work, the study of gender classification using Artificial Neural Networks (ANN) based on iris recognition. The eye image data were collected from the IIT Delhi IRIS Database. All datasets of images were processed using various image processing techniques using the neural network. The results obtained showed high performance in training and got good results in testing. ANN's training and testing process gave a maximum performance at 96.4% and 97% respectively.
Qubahan Academic Journal (Issue: 2) (Volume: 1)
Biometric authentication is one of the most quickly increasing innovations in today's world; this promising technology has seen widespread use in a variety of fields, including surveillance services, safe financial transfers, creditcard authentication. in biometric verification processes such as gender, age, ethnicity is iris recognition technology is considered the most accurate compared to other vital features such as face, hand geometry, and fingerprints. Because the irises in the same person are not similar. In this work, the study of gender classification using Artificial Neural Networks (ANN) based on iris recognition. The eye image data were collected from the IIT Delhi IRIS Database. All datasets of images were processed using various image processing techniques using the neural network. The results obtained showed high performance in training and got good results in testing. ANN's training and testing process gave a maximum performance at 96.4% and 97% respectively.
International Journal of Science and Business (Issue: 6) (Volume: 5)
Internet use in the Kurdistan region of Iraq has grown dramatically and has become an essential element of our daily lives, with hundred ISPs on hand and constantly increasing number of users by using e-learning platforms. The need for feedback is deeply linked to student participation and peer evaluation. It is also an issue of evaluation quality; how many feedbacks is made available, how they are given to students, how they are accepted by students, and to how much they are integrated into future instruction and learning. In this paper, three instruments, documentation, interviews and questionnaires were carried out to collect the data. Documentation was used to know the experiences of the students during classroom teaching and learning. The data were collected from the system application on our website. The data were called documentation. A survey is conducted comparing the feedback received from students on e-learning courses at the Duhok Polytechnic University (DPU), with the results of analyzed 100 teachers' e-learning courses in the Covid-19 period in 2020. Eighteen questions have been asked to 7709 students in 14 technical faculties (6 colleges and 8 institutes) at DPU. The students' responses were classified to the questions related to teachers' experiences on preparing courses, students' interactions, using available e-learning tools and methods. A review has been made on (100) teachers' courses in the Moodle platform as LMS (learning management systems) to reveal their course preparation, experiences on using available technologies. Our results showed 34.92% of participant students satisfied with e-learning, this means that 65.08% of students preferred face-to face learning (in class), regarding the trustiness of feedback, reviewed courses and students’ responses which were significantly mismatched. This means that student feedback is not entirely reliable in the learning process.
TEST Engineering and Management (Issue: 1) (Volume: 83)
The goal of the paper is to provide a practical conceptual framework based on hiding of watermarks embedded within coefficients image disintegrated by contourlet transform, that is characterized by extra sustenance for the potential and actual security of the hiding methods, and strengthen distribution techniques of watermarking inside the cover image; thus this can be done through achieving a kind of merge between those techniques and others techniques of image processing. A case study approach was used to allow the algorithms of the recommended system (non-blind) through concealing the watermarking which is resulted in the possibility of altering the watermarking dimensions with the fixed cover measurements and reciprocally. Another important practical implication is that the quartet tried to divide the techniques into four sections before it has been embedded inside the cover-image then after they have been split up, they distribute them among the fragments of the watermark within the cover-image regarding the quartet try the method. The techniques of using the three suggested algorithms by employing the watermarks cover image of various dimensions displayed that, the correlation factor ratio preceding and succeeding the process of hiding of the cover-image has been exceeded 0.99%. The most striking outcome to emerge from the data is that the result of this research which is in the watermark measured before and after the process depending on the PSNR, SNR, MSE, NC.
IEEE conference paper (Issue: 29 November 2018)
This study describes a representation of gait appearance for the purpose of person identification and classification. The gait representation is based on wavelet 5/3 lifting scheme simple features such as features extracted from video silhouettes of human walking motion. Regardless of its effortlessness, this may lead us to say that, the resulting feature vector contains enough information to perform well on human identification and gender classification tasks. We found out the recognition behaviors of different methods to total features over time functions under different recognition tasks. In addition to that, we provide results of gender classification based on our gait appearance features using a (C4.5 algorithm). So, the result of classification rate for CASIA - B gait databases is 97.98% and the result of recognition rate for OU-ISIR gait Database Large Population Dataset is 97.5%, these results have been obtained from gender classification data. Gait database demonstrates that the proposed method achieves better recognition performance than the most existing methods in the literature, and particularly under certain walking variations.