
كلية العلوم | جامعة ديالى
السيرة الذاتية للسيد عميد الكلية المحترم
الاسم: طه محمد حسن علي الزيدي
المواليد: 1970
مسقط الرأس: ديالى
الحالة الاجتماعية: متزوج
اللغات التي يجيدها: العربية، الانكليزية
الديانة: مسلم
البريد الالكتروني: dr.tahamh@uodiyala.edu.iq
- حاصل على بكالوريوس في علوم الحاسوب من كلية المنصور الجامعة / العام الدراسي 1992.
- حاصل على الماجستير في علوم الحاسوب الجامعة المستنصرية / العام الدراسي 2006.
- حاصل على شهادة الدكتوراه في علوم الحاسوب و تكنلوجيا المعلومات / معهد هاربين للتكنلوجيا / الصين / كلية علوم و تكنلوجيا الحاسوب / 2013.
- حاصل على لقب استاذ
المناصب التي شغلها:
- رئيس قسم علوم الحاسوب / كلية العلوم / جامعة ديالى للفترة من 2015 ولغاية 2020.
- معاون عميد كلية العلوم للفترة من 2020 ولغاية 2023
- عميد كلية العلوم للفترة 2023- لغاية الآن.
المؤتمرات والدورات والندوات وورش العمل
| ت | اسم النشاط | المكان | التاريخ |
|---|---|---|---|
| 1 | مؤتمر المامون الاول لعلوم الحاسوب وتكنلوجيا الاتصالات وتطبيقاتها | (مشارك) سوريا | 10-11 ايلول 2007 |
| 2 | المؤتمر العلمي الاول لكلية العلوم | مشارك وعضو في اللجنة التحضيرية (جامعة ديالى -كلية العلوم) | 15-16 تشرين الثاني 2009 |
| 3 | مؤتمر التحديات المجتمعية للاسرة العراقية (مركز ابحاث الطفولة و الامومة جامعة ديالى) | مشارك | 24-25 آذار 2010 |
| 4 | 2011 International Conference on Computer Applications and Network Security (ICCANS 2011) | مشارك (Maldives) | 27-29 ايار 2011 |
| 5 | The 2014 International Conference on Wavelet Analysis and Pattern Recognition, Lanzhou | مشاركة الصين | 13-16 تموز 2014 |
| 6 | دورة التأهيل التربوي | الجامعة المستنصرية | 14-28 ايار 2006 |
| 7 | دورة قيادة الحاسوب | جامعة ديالى | 4-11 نيسان 2010 |
| 8 | دورة ضمان الجودة ومتطلبات العمل للحصول على شهادة الايزو ISO | جامعة ديالى | 24-25 تشرين الثاني 2015 |
البحوث العلمية المنشورة
| ت | عنوان البحث | جهة النشر | المجلد / التاريخ |
| 1 | Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform | Proc. of Int. Conf. on Computer Science (CSASE) | 2020 |
| 2 | Smart home as a new trend, a simplicity led to revolution | 1st Int. Scientific Conference of Engineering Sciences (ISCES) | Jan 2018 |
| 3 | A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol | Journal of King Saud University – Computer and Info. Sciences | Vol 34(7), 2022 |
| 4 | An Expanded Vision of Breast Cancer Diagnosis Approaches Based on Machine Learning Techniques | Proceedings of the 5th International Engineering Conference (IEC) | 2019 |
| 5 | DEVELOPMENT OF BREAST CANCER DIAGNOSIS SYSTEM BASED ON FUZZY LOGIC AND PROBABILISTIC NEURAL NETWORK | Eastern-European Journal of Enterprise Technologies | Vol 4(9-106), 2020 |
| 6 | Facemask Wearing Detection Based on Deep CNN to Control COVID-19 Transmission | Al-Muthanna 2nd Int. Conf. on Engineering Science (MICEST) | 2022 |
| 7 | Cryptosystems using an improving hiding technique based on latin square and magic square | Indonesian Journal of Electrical Engineering and Computer Science | Vol 20(1), 2020 |
| 8 | Abbreviated View of Deepfake Videos Detection Techniques | Proc. of 6th Int. Engineering Conference (IEC) | 2020 |
| 9 | Secure Data in LoRaWAN Network by Adaptive Method of Elliptic-curve Cryptography | IEEE Int. Conf. on Computing and Information Science (ICCISTA) | 2019 |
| 10 | Cost Prediction for Roads Construction using Machine Learning Models | International Journal of Electrical and Computer Engineering Systems | Vol 13(10), 2022 |
| 11 | A digital signature system based on real time face recognition | IEEE 9th Int. Conf. on System Engineering and Technology (ICSET) | 2019 |
| 12 | Impact of dimensionality reduction on the accuracy of data classification | 3rd Int. Conf. on Engineering Technology (IICETA) | 2020 |
| 13 | An adaptive algorithm for improving the fractal image compression (FIC) | Journal of Multimedia | Vol 6(6), 2011 |
| 14 | IMPLEMENTATION OF DRIVER’S DROWSINESS ASSISTANCE MODEL BASED ON EYE MOVEMENTS DETECTION | Eastern-European Journal of Enterprise Technologies | Vol 5(9-107), 2020 |
| 15 | Generating and validating DSA private keys from online face images for digital signatures | Int. Journal on Advanced Science Engineering and Info. Technology | Vol 9(3), 2019 |
| 16 | Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image | Annual Conf. on New Trends in Info. and Comm. Technology (NTICT) | 2017 |
| 17 | Medical Images Classification Using Hybrid Deep Learning CNN-PSO-GA | 8th Int. Conf. on Contemporary Info. Technology (ICCITM) | 2022 |
| 18 | Brain computer interface enhancement based on stones blind source separation and naive bayes classifier | Communications in Computer and Information Science | Vol 1183, 2020 |
| 19 | Digitally modulated signal recognition based on feature extraction optimization and random forest classifier | Communications in Computer and Information Science | Vol 1183, 2020 |
| 20 | Copy-Move Image Forgery Detection using Deep Learning Approaches | 1st Int. Conf. on Software Systems and Info. Technology (SSITCON) | 2024 |
| 21 | A survey on data integrity verification schemes in the cloud computing environment | AIP Conference Proceedings | Vol 2475, 2023 |
| 22 | An Effective Blind Detection Technique for Medical Images Forgery | Webology | Vol 17(2), 2020 |
| 23 | Citation networks iraqi universities case study | 3rd Int. Conf. on Engineering Technology (IICETA) | 2020 |
| 24 | Retina Random Number Generator for Security Applications | 2nd Int. Conf. on Engineering Technology (IICETA) | 2019 |
| 25 | GTA 3D-DLD: Greedy Training Approach for 3D Deep Learning Diagnosis Based COVID‑19 CT Scan | International Journal of Intelligent Engineering and Systems | Vol 16(1), 2023 |
| 26 | DIGITAL MODULATION CLASSIFICATION BASED ON CHICKEN SWARM OPTIMIZATION AND RANDOM | Journal of Engineering Science and Technology | Vol 17(3), 2022 |
| 27 | Improving Security and Sharing Management in Cloud Computing Using TPA | 1st Al-Noor Int. Conf. for Science and Technology (NICST) | 2019 |
| 28 | Relaxed collaborative representation for face recognition based low-rank matrix recovery | International Conference on Wavelet Analysis and Pattern Recognition | 2014 |
| 29 | Precious Metal Prices Forecasting Using Optimally Configured Hybrid Deep Learning Approach | Journal of Machine and Computing | Vol 5(3), 2025 |
| 30 | Real Time Classification of Retail Theft Utilizing YOLO Algorithm | Ingenierie Des Systemes D Information | Vol 30(6), 2025 |
| 31 | IoT Application in Building Construction | Lecture Notes in Networks and Systems | Vol 1301, 2025 |
| 32 | Abbreviation view of face presentation attack techniques | 1st Babylon Int. Conf. on Info. Technology and Science (BICITS) | 2021 |
| 33 | Maintaining the integrity of encrypted data by using the improving hash function based on GF (28) | TEM Journal | Vol 9(3), 2020 |
| 34 | Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol | 2nd Int. Conf. on Engineering Technology (IICETA) | 2019 |
| 35 | Authentication on smartphones based iris recognition | Journal of Engineering and Applied Sciences | Vol 14(1), 2019 |
| 36 | Mathematical transformations with spiht algorithm for steganography techniques | Journal of Theoretical and Applied Information Technology | Vol 96(10), 2018 |
| 37 | Improved approach to iris segmentation based on brightness correction for iris recognition system | Journal of Theoretical and Applied Information Technology | Vol 95(23), 2017 |
| 38 | Two suggested methods for faster fractal image compression | Research Journal of Applied Sciences Engineering and Technology | Vol 3(8), 2011 |