الجامعة التكنولوجية
Ayad Al-Adhami is a lecturer in computer security and his role in the computer science department is as the head of the computer security branch. He earned his Ph.D. degree in computing – Computer security from Plymouth University, Plymouth- United Kingdom, 2018. His M.Sc. Degree was in Mathematics & Computer Applications, and specified in information security, from AlNahrain University Baghdad-Iraq, 2008. The Bachelor degree earned in 2003 from AlNahrain university department of Mathematics & computer applications. Ayad is a faculty staff member in the computer science department and he joined the Department of Computer Sciences in 2009 as an academic member teaching different topic. His research interests include: Computer security, RFIID security, Cryptography, Network security, Mathematics for computer science, data science & coding theory.
57191608322
5
18
59
Control and Systems Engineering
Information Systems
Computer Networks and Communications
Engineering (all)
Materials Science (all)
Computer Science (all)
Computer Science Applications
Signal Processing
Instrumentation
Computer Vision and Pattern Recognition
Computer Science (miscellaneous)
Biochemistry, Genetics and Molecular Biology (all)
Control and Optimization
Artificial Intelligence
Biotechnology
Hardware and Architecture
Geology
Management Science and Operations Research
Safety, Risk, Reliability and Quality
Physics and Astronomy (all)
Chemistry (all)
Electrical and Electronic Engineering
| عنوان البحث | تاريخ النشر | اسم المجلة | رابط |
|---|---|---|---|
| Proposal to strength image encryption using blockchain and hybrid chaotic-DNA techniques | 2025-12-01 | Egyptian Informatics Journal | عرض |
| Enhancing Biometric Authentication Security using Finger Vein Recognition based on Machine Learning | 2025-02-10 | Aip Conference Proceedings | عرض |
| A New Behavioral Tracking System Based on Modified Facial Recognition Technique | 2025-02-10 | Aip Conference Proceedings | عرض |
| A Review of Digital Forensics Using Artificial Intelligent | 2025-02-10 | Aip Conference Proceedings | عرض |
| A New Ear Recognition System Based on Moments Analysis | 2025-02-10 | Aip Conference Proceedings | عرض |
| Proposal Medical Image Protection System Based on Hybrid CNN-Transformer Model and Chaotic Maps | 2025-01-01 | IEEE Access | عرض |
| Deep neural networks techniques for finger vein authentication | 2024-11-13 | Aip Conference Proceedings | عرض |
| An improvement for CAST-128 encryption based on magic square and matrix inversion | 2024-02-01 | Bulletin of Electrical Engineering and Informatics | عرض |
| Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique | 2023-01-01 | Iraqi Journal of Science | عرض |
| A Developed Cryptographic Model Based on AES Cryptosystem | 2022-10-31 | Aip Conference Proceedings | عرض |
| A secure communication protocol for civil drones | 2022-09-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
| Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps | 2022-01-01 | Iraqi Journal of Science | عرض |
| Video mosaic watermarking using plasma key | 2021-04-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
| Video mosaic watermarking using plasma key | 2020-05-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
| An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP | 2019-03-01 | Sccs 2019 2019 2nd Scientific Conference of Computer Sciences | عرض |
| A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function | 2017-07-26 | International Conference on Ubiquitous and Future Networks Icufn | عرض |
| A Quorum System for Distributing RFID Tags | 2017-01-12 | Proceedings 13th IEEE International Conference on Ubiquitous Intelligence and Computing 13th IEEE International Conference on Advanced and Trusted Computing 16th IEEE International Conference on Scalable Computing and Communications IEEE International Conference on Cloud and Big Data Computing IEEE International Conference on Internet of People and IEEE Smart World Congress and Workshops Uic Atc Scalcom Cbdcom Iop Smartworld 2016 | عرض |
| A quorum RFID system using threshold cryptosystem | 2016-09-23 | Proceedings 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Ficloud 2016 | عرض |