Ali Makki Sagheer Saleh (Professor)
PhD in Professor in Cybersecurity
Lecturer
Information Technology - Computer Sciences and IT
ali_makki@uoanbar.edu.iq
Name: Prof. Dr. Ali Makki Sagheer
Place of Birth: Iraq-Basrah
Date and of Birth: 1979
Religion: Muslim
Martial statues: Married
No. of children: Four
Degree: PhD in Computer Science (2007)
Specialization: Cybersecurity
Scientific Degree: Professor (2015)
Position: Professor in Cybersecurity
Work Phone: +964(0)7700495820
Mobile: +964(0)7700073940, +964(0)7824937080,
E-mail: ali_makki@uoanbar.edu.iq, ali.m.sagheer@gmail.com, prof.ali@alqalam.edu.iq
Permanent Work Address: University of Anbar/Faculty of Computer Science and Information Technology/Computer Network Systems Department
College of Computer, University of Anbar.
Fall 2008 – Summer 2011 Dean of the Department of Information System,
College of Computer, University of Anbar.
Fall 2004 – Summer 2008 Teacher, Department of Computer Science
College of Computer, University of Anbar
Fall 2001 – Summer 2004 Teaching assistant, Department of Computer Science
College of Computer, University of Anbar
|
No. |
Research Title |
Place of Publication |
Year |
|
|
Hybrid Cryptosystem with Computational Ghost Imaging Based on Integer Wavelet Transform and Chaotic Maps
|
Aro the Scientific Journal of Koya, Vol. 13 No. 1, 2025, (Clarivate). |
2025 |
|
|
A credit card fraud detection approach based on ensemble machine learning classifier with hybrid data sampling. |
Machine Learning with Applications, Volume 20, June 2025, 100675, (Clarivate). |
2025 |
|
|
Classification of EEG Signals Extracted Feature for Epilepsy Seizures Detection Based on Deep Learning. |
AIP Conf. Proc. 3264, 030018 (2025), (Scopus). |
2025 |
|
|
A Hybrid Encryption Model with Blockchain Integration for Secure Cloud Data Storage and Retrieval. |
Journal of Intelligent Systems and Internet of Things, Volume 16, Issue 2, PP: 236-245, 2025, (Scopus). |
2025 |
|
|
Enhancing Image Security and Privacy Using Double Random Phase Encoding Based Chaotic System and Compressed Sensing. |
2024 International Jordanian Cybersecurity Conference (IJCC), ِAmman, Jordan, 2024, pp. 28-32, doi: 10.1109/IJCC64742.2024.10847296., (Clarivate). |
2024 |
|
|
The Blockchain Technology Revolution in Secure Multimedia Content: A Review |
AIP Conference Proceedings, 2024, 3207(1), 070004, (Scopus). |
2024 |
|
|
Image Steganography Technique based on Lorenz Chaotic System and Bloom Filter |
International Journal of Computing and Digital Systems, 2024, 16(1), pp. 851–859, (Scopus). |
2024 |
|
|
Employing a Convolutional Neural Network to Classify Sleep Stages from EEG Signals Using Feature Reduction Techniques
|
Algorithms Journal , ISSN: 1999-4893, 2024, 17(6), 229, (Scopus). |
2024 |
|
|
A secure color image encryption based on 3D-hyperchaotic logistic map |
AIP Conference Proceedings, 2024, 3097(1), 050004, (Scopus). |
2024 |
|
|
Proposed Multilevel Secret Images-Sharing Scheme |
Springer, Lecture Notes in Networks and Systems, 2024, 917, pp. 539–555, (Scopus). |
2024 |
|
|
Public Key Infrastructure Approaches Based on Blockchain |
21st International Multi-Conference on Systems, Signals and Devices, SSD 2024, 2024, pp. 369–375, (Scopus). |
2024 |
|
|
Discovering Unknown Non-Consecutive Double Byte Biases in RC4 Stream Cipher Algorithm |
Journal of Cybersecurity and Information Management, 2024, 13(2), pp. 75–83, (Scopus). |
2024 |
|
|
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon |
Baghdad Science Journal, 2024, 21(1), pp. 234–251, (Scopus). |
2024 |
|
|
Hyperchaotic technology-based efficient image encryption algorithm an overview. |
Journal of university of Anbar for pure science, 17(2):234-244 DOI: 10.37652/juaps.2023.181570, December, 2023, (Scopus). |
2023 |
|
|
Proposed combination method for ensemble classification technique based on majority voting
|
AIP Conference Proceedings, 2023, 2804(1), 020013, (Scopus). |
2023 |
|
|
Design and implementation of the web (extract, transform, load) process in data warehouse application |
IAES International Journal of Artificial Intelligence, 2023, 12(2), pp. 765–775. (Scopus). |
2023 |
|
|
Security Attacks on E-Voting System Using Blockchain. |
Iraqi Journal for Computer Science and Mathematics, Vol. 4: Iss. 2, Article 16. DOI: https://doi.org/10.52866/ijcsm.2023.02.02.016. ijcsm/vol4/iss2/164(2), pp. 179-192, (Scopus). |
2023 |
|
|
An Efficient Secret Sharing Scheme Based on Newton’s Divided Difference Interpolation & Magic Cube Properties. |
AIP Conference Proceeding, 2022, 2400, 020014. (Scopus). |
2022 |
|
|
A New Method for Medicinal Image Compression and Encryption: Towards Remote Medicinal Diagnosis. |
AIP Conference Proceedings, 2022, 2400, 020001. (Scopus). |
2022 |
|
|
Finger Vein and Hand-Dorsal Vein Multi-Modal Biometric System Based on Convolution Neural Network. |
AIP Conference Proceeding, 2022, 2400, 020002. (Scopus). |
2022 |
|
|
LiNA: Lightweight Algorithm for Secure Internet of Things. |
AIP Conference Proceedings, 2022, 2400, 020008. (Scopus). |
2022 |
|
|
Brain Tumor Segmentation from Magnetic Resonance Image using Optimized Thresholded Difference Algorithm and Rough Set |
TEM Journal, 2022, 11(2), pp. 631–638. . (Scopus). |
2022 |
|
|
Breast cancer segmentation using K-means clustering and optimized region-growing technique |
Bulletin of Electrical Engineering and Informatics, 2022, 11(1), pp. 158–167. . (Scopus). |
2022 |
|
|
Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption |
International Journal of Interactive Mobile Technologies, 2022, 16(20), pp. 79–97. (Scopus). |
2022 |
|
|
A Review on E-Voting Based on Blockchain Models |
Iraqi Journal of Science, 2022, 63(3), pp. 1362–1375. . (Scopus). |
2022 |
|
|
A New Secret Sharing Scheme Based on Hermite Interpolation and Folded Magic Cube Rules |
Communications in Computer and Information Science, 2022, 1548 CCIS, pp. 352–364. . (Scopus). |
2022 |
|
|
A Hybrid Lightweight Cipher Algorithm |
International Journal of Computing and Digital Systems, 2022, 11(1), pp. 463–475. . (Scopus). |
2022 |
|
|
Improving Breast Cancer Classification Using (Smote) Technique and Pectoral Muscle Removal in Mammographic Images |
Mendel 2021, 27(2), pp. 36–43. (Scopus). |
2021 |
|
|
Brain tumor identification with a hybrid feature extraction method based on discrete wavelet transform and principle component analysis |
Bulletin of Electrical Engineering and Informatics, 2021, 10(5), pp. 2588–2597. (Scopus). |
2021 |
|
|
Analysis of Methods and Techniques Used for Speaker Identification, Recognition, and Verification: A Study on Quarter-Century Research Outcomes |
Iraqi Journal of Science, 2021, 62(9), pp. 3255–3281. (Scopus). |
2021 |
|
|
Design a Mobile Application for Vehicles Managing of a Transportation issue |
Bulletin of Electrical Engineering and Informatics, , 10(4), pp. 2263–2272, (Scopus). |
2021 |
|
Date |
Specialization |
College |
University |
Degree science |
|
2001 |
Computer Science |
Computer Science The First Student |
University of Technology |
B.Sc. |
|
2004 |
Data Security |
Computer Science |
University of Technology |
M.Sc. |
|
2007 |
Computer Science |
Computer Science |
University of Technology |
Ph.D. |
|
2024 |
Law |
Law The First Studen |
Al-Mansour University |
B.Sc. |
Conferences which you participated
Supervisor for the following M.Sc thesises
|
Year
|
Department
|
Thesis Title
|
No.
|
|
2014-2018
|
PhD-LJMU-UK
|
Authenticated Real-time Privacy Preservation of Drivers in the Internet of Vehicles |
1
|
|
2012-2015
|
PhD
UALR, USA.
|
Light-Weight Encryption And Dynamic Data Protection Mechanism For Resource Constrained Devices |
2
|
|
2014-2016
|
PhD University of Technology |
Design of Chaos Image Encryption Based on Wavelet Transforms and Discrete Cosine Transform |
3
|
|
2014-2018
|
PhD-UNITEN Malaysia
|
Diagnosis Security Problems For Hybrid Cloud Computing In Medium Organizations |
4
|
|
2016-2017
|
University of Anbar |
Attribute Based Authentication System Using Homomorphic Encryption |
5
|
|
2016-2017
|
University of Anbar |
Design of Secure Private Cloud using Proposed Fully Homomorphic Encryption |
6
|
|
2015-2016
|
University of Anbar |
Analysis and development of RC4 based on Its Bias |
7
|
|
2015-2016
|
University of Anbar |
Design of an Android Application for Secure Chatting |
8
|
|
2013-2014
|
University of Anbar |
Design of Secure Intranet for Compressed Multimedia |
9
|
|
2013-2014
|
University of Anbar |
Secure MMS Messaging System in Smartphone
|
10
|
|
2009-2010
|
University of Anbar |
Proposing a Family of Advance Encryption Standard (AES) Variants |
11
|
|
2010-2011
|
University of Anbar |
Development of Visual Secret Sharing Techniques |
12
|
|
2010-2011
|
University of Anbar |
Segmentation of Image Using Watershed Transform |
13
|
|
2013-2014
|
University of Anbar |
Video Compression Scheme for Video Conferencing |
14
|
|
2009-2010
|
University of Anbar |
Design of secure compression system |
15
|
|
2011-2012
|
University of Anbar |
Secure Routing for Mobile Ad Hoc Networks using Identity Based Cryptography |
16
|
|
2011-2012
|
University of Anbar |
Improved scatter search based on bees and simulated annealing algorithms |
17
|
|
2013-2015
|
University of Anbar |
Improved Metaheuristic Scatter Search |
18
|
|
2013-2014
|
University of Anbar |
Design of Secure Communication Protocol for Intranet Technology |
19
|
|
2011-2012
|
University of Anbar |
Development of DNA Based Cryptosystem |
20
|