Dr. Saad Najim  Alsaad
My Social Links

Dr. Saad Najim Alsaad

Professor
Al-Mustansiriya University, Iraq


Highest Degree
Ph.D. in Computer Science from Iraqi Commission for Computers and Informatics, Iraq

Share this Profile

Area of Interest:

Computer Sciences
100%
Media Processing
62%
Cipher Systems
90%
Object Oriented Programming
75%
Software Engineering
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
0
Abstracts
0

Selected Publications

  1. Subhi, R., S.N. Al Saad and N.T. Mahmood, 2019. Data encryption using zigzag and sequences of bio molecular Information. Indian J. Public Health Res. Dev., 10: 1058-1064.
    CrossRef  |  Direct Link  |  
  2. Al Saad, S.N. and N.M. Hussein, 2018. Landmark based shortest path detection in alarm system. Al-Mustansiriyah J. Sci., 29: 135-140.
    Direct Link  |  
  3. Al Saad, S.N. and A.K. Naji, 2018. Elliptic curve video encryption in mobile phone based on multi-keys and chaotic map. Al-Mustansiriyah J. Sci., 29: 106-116.
    Direct Link  |  
  4. Jabbar, I. and S.N. Al Saad, 2017. Design and implementation of secure remote e-voting system using homomorphic encryption. Int. J. Network Secur., 19: 694-703.
    Direct Link  |  
  5. Kathum, A.M. and S.N. Al-Saad, 2016. Speech steganography system using lifting wavelet transform. Information, 19: 4633-4638.
    Direct Link  |  
  6. Kadum, T.A.M. and S.N. Al-Saad, 2016. Image hiding using lifting wavelet transform. Int. J. Scient. Eng. Res., 7: 1600-1609.
    Direct Link  |  
  7. Jabbar, I. and S.N. Al Saad, 2016. Using fully homomorphic encryption to secure cloud computing. Internet Things Cloud Comput., 4: 13-18.
  8. Al Saad, S.N. and Ahlammejeedkadum, 2016. Hiding tehinique in frequency domain. Int. J. Adv. Res. Comput. Sci. Software Eng., 6: 53-60.
  9. Khaled, N. and S.N. Al Saad, 2014. Neural network based speaker identification system using features selection. J. Convergence Inform. Technol., 9: 9-18.
    Direct Link  |  
  10. Al-Saad, S.N. and J.N. Hasson, 2014. Speech hiding based on quantization of LPC parameters. Al-Mustansiriyah J. Sci., 25: 133-144.
    Direct Link  |  
  11. Al Saad, S.N. and E. Hato, 2014. A speech encryption based on chaotic maps. Int. J. Comput. Applic., 93: 19-28.
    Direct Link  |  
  12. Al Saad, S.N. and D.A. Alzybaydi, 2014. Multiple encrypted image hiding based on slantlet transform. Al-Mustansiriyah J. Sci., 24: 145-152.
    Direct Link  |  
  13. Al-Saad, S.N. and E.H. Hashim, 2013. A speech scrambler algorithm based on chaotic system. Al-Mustansiriyah J. Sci., 24: 357-374.
    Direct Link  |  
  14. Al Saad, S.N., 2013. A text steganography algorithm without changing cover image. Al-Mustansiriyah J. Sci., 24: 437-444.
    Direct Link  |  
  15. Al Saad, S.N., 2012. ABET and QQA based framework proposal for higher education in Iraq. Al-Mustansiriyah J. Sci., 23: 139-150.
    Direct Link  |