Dr. Saad Najim Alsaad

Professor
Al-Mustansiriya University, Iraq


Highest Degree
Ph.D. in Computer Science from Iraqi Commission for Computers and Informatics, Iraq

Share this Profile

Area of Interest:

Computer Sciences
Media Processing
Cipher Systems
Object Oriented Programming
Software Engineering

Selected Publications

  1. Subhi, R., S.N. Al Saad and N.T. Mahmood, 2019. Data encryption using zigzag and sequences of bio molecular Information. Indian J. Public Health Res. Dev., 10: 1058-1064.
    CrossRef  |  Direct Link  |  

  2. Al Saad, S.N. and N.M. Hussein, 2018. Landmark based shortest path detection in alarm system. Al-Mustansiriyah J. Sci., 29: 135-140.
    Direct Link  |  

  3. Al Saad, S.N. and A.K. Naji, 2018. Elliptic curve video encryption in mobile phone based on multi-keys and chaotic map. Al-Mustansiriyah J. Sci., 29: 106-116.
    Direct Link  |  

  4. Jabbar, I. and S.N. Al Saad, 2017. Design and implementation of secure remote e-voting system using homomorphic encryption. Int. J. Network Secur., 19: 694-703.
    Direct Link  |  

  5. Kathum, A.M. and S.N. Al-Saad, 2016. Speech steganography system using lifting wavelet transform. Information, 19: 4633-4638.
    Direct Link  |  

  6. Kadum, T.A.M. and S.N. Al-Saad, 2016. Image hiding using lifting wavelet transform. Int. J. Scient. Eng. Res., 7: 1600-1609.
    Direct Link  |  

  7. Jabbar, I. and S.N. Al Saad, 2016. Using fully homomorphic encryption to secure cloud computing. Internet Things Cloud Comput., 4: 13-18.

  8. Al Saad, S.N. and Ahlammejeedkadum, 2016. Hiding tehinique in frequency domain. Int. J. Adv. Res. Comput. Sci. Software Eng., 6: 53-60.

  9. Khaled, N. and S.N. Al Saad, 2014. Neural network based speaker identification system using features selection. J. Convergence Inform. Technol., 9: 9-18.
    Direct Link  |  

  10. Al-Saad, S.N. and J.N. Hasson, 2014. Speech hiding based on quantization of LPC parameters. Al-Mustansiriyah J. Sci., 25: 133-144.
    Direct Link  |  

  11. Al Saad, S.N. and E. Hato, 2014. A speech encryption based on chaotic maps. Int. J. Comput. Applic., 93: 19-28.
    Direct Link  |  

  12. Al Saad, S.N. and D.A. Alzybaydi, 2014. Multiple encrypted image hiding based on slantlet transform. Al-Mustansiriyah J. Sci., 24: 145-152.
    Direct Link  |  

  13. Al-Saad, S.N. and E.H. Hashim, 2013. A speech scrambler algorithm based on chaotic system. Al-Mustansiriyah J. Sci., 24: 357-374.
    Direct Link  |  

  14. Al Saad, S.N., 2013. A text steganography algorithm without changing cover image. Al-Mustansiriyah J. Sci., 24: 437-444.
    Direct Link  |  

  15. Al Saad, S.N., 2012. ABET and QQA based framework proposal for higher education in Iraq. Al-Mustansiriyah J. Sci., 23: 139-150.
    Direct Link  |