Skip Navigation Links Home : MemberDetails
             
Name : Hadi Hassan Al Saadi

Academic Rank: Assistant Professor

Administrative Position : Faculty Academic Member

Office 7305       Ext No 7305

Email : halsaadi@uop.edu.jo

Specialization: Computer Science

Graduate Of: Shanghai Jiao Tong University

Qualification

    Qualification

    University

    Country

    Year

    Bachelor
    University of Technology
    Iraq
    1987
    Master's
    Baghdad University
    Iraq
    1991
    Ph.D
    Shanghai Jiao Tong University
    China
    2000



  • Journal Paper





      Philippe Mulhem, Moh, " Pivot Vector Space Approach for Audio-Video Mixing " , "IEEE Multimedia",Vol.,No., Published by the IEEE Computer Society, USA, 04/14/2003 Abstract:
      An audio-mixing artist usually adds the musicalaccompaniment to video. Employing such artists isexpensive and not feasible for a home videopresentation. Our automatic audio?video mixingtechnique is suited for home videos. It uses a pivotvector space mapping method that matches video shotswith music segments based on aestheticcinematographic heuristics P. Mulhem, M.S Kankanhalli, H. Hassan and J. Yi, IEEE Multimedia, Vol. 10, No. 2, pp. 28-40, April-June 2003. [special issue on Computational Media Aesthetics




      Li WenSheng Hadi Has, " Currency Recognition by using coordinate logic filters " , "journal of Shanghai Jiao",Vol.4,No., , China, 04/05/1999 Abstract:
      In this paper, a system for currency recognition is described. The recognition is achieved by edge feature extraction and morphological operation, which is implemented by using a coordinate logic filter. The performance of this system has been established by being applied to several patterns of different currencies. The experimental results show a high recognition rate. LiWen Sheng Hadi Hassan journal of Shanghai Jiao Tong University,Vol-3, No.2. 1998




      Hadi Hassan Li Jigo, " Identification of Phase error by using MS_DTL " , "journal of Shanghai Jiao",Vol.4,No., Shanghai JiaoTong University , China, 10/12/1999 Abstract:
      Abstract:A multisampling technique was introduced to the phase error detector of Conventional Digital Tan- locked Loop(C-DTL). In this new technique a number of samples (M) were taken at nonuniform intervals within one period of the input signal. The novel system is called Multisampling-Digital Tanlocked loop (MSDTL). The simulated model on the computer shows that for M=4, the system has a faster locking speed and wider locking-in range compared with C-DTL. Hadi Hassan , Lee je Gou journal of Shanghai Jiao Tong University,Vol-4, No.1. 1999




      Qassim Nasir and Had, " High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption " , "Int. J. Communications, Network and System Sciences",Vol.5,No.9, , , 05/08/2012 Abstract:
      Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the Inter- net. The experimental results of the proposed method show advantages of low complexity, and high-level security.


  • Conference paper





      Jun Wang, Mohan S Ka, " Face Detection using DCT Coefficients in MPEG Video, J. Wang, M.S. " , "International Workshop on Advanced Image Technology IWAIT2002",Vol.,No., , Hualien, Taiwan, , 01/08/2002 Abstract:
      We present a neural network-based frontal face detection system, which is completely implemented in the compressed domain. The features used for this purpose are the DCT components of Y, Cr and Cb available from the compressed data of I-frames in MPEG videos. Since DCT coefficients captures frame information concisely, use of DCT features reduces the complexity of the neural network used in the algorithm. In addition, it increases the computational efficiency. The data is used in two stages: in the first stage, a skin color filter, based on Cr and Cb DCT information, is used to locate skin regions. In the second stage, a 4×4 blocks sized window is used to scan the skin regions in the compressed domain image to extract Y-DCT features. A neural network then is trained using these DCT features to classify patterns as faces or non-faces. The preliminary results obtained are encouraging enough to continue research in this direction. Wang, M.S. Kankanhalli, P. Mulhem and H.H. Abdulredha, Proc. Fifth international Workshop on Advanced Image Technology (IWAIT 2002), pp. 66-70, Hualien, Taiwan, January 2002




      C. Madhwacharyula*, , " An Information-integration Approach to Designing Digital Video Albums, " , "IEEE Pacific-Rim Conference On Multimedia ",Vol.,No., IEEE, Singapore, 04/06/2003 Abstract:
      In this paper we present the architecture of the DVA (Digital Video Album) system. Information-integration is the key principle utilized in this system to allow for content-based indexing, intuitive access and retrieval of digital video. Our implementation of the system has demonstrated the efficiency and efficacy of such a design approach C. Madhwacharyula, J. Wang, W, Yan, J. Yi, A. Radhakrishna, S. Bissol, J, Yu, Z, Qiuying, S.H. Srinivasan, H. Hassan, P. Mulhem and M.S. Kankanhalli, Proc. IEEE Pacific Rim Conference On Mltimedia (PCM 2003), Singapore, December 2003.




      Hadi Hassan and Amee, " Using the Curvature- Phase Descriptors for Shape – Based Image Retrieval , " , ", ICTIT 2004, Proceeding of the 1st international conference on Telecomputing & information Technology /sponsored by IEEE/ Jordan 22-24 ",Vol.,No., ASU, Amman- Jordan, 12/22/2004 Abstract:
      Using the Curvature- Phase Descriptors for Shape – Based Image Retrieval , IEEE ,International conference on Telecomputing and information Technology / ICTIT / 22-24 September 2004 , Amman – Jordan




      Hadi Hassan, " Global Measure on Image content " , "ACIT 2000, the 2000 Arab conference on information Technology Zaraka- Jordan",Vol.,No., Zarka University, Zarka-Jordan, 10/04/2000 Abstract:
      This paper investigated approaches to supporting effective and efficient retrieval of image based on principle component analysis. First, it extracted the image content, texture and color. Gabor wavelet transforms were used to extract texture feature of the image and the average color was used to extract the color features. The principle component of the feature vector of image can be constructed. Content-based image retrieval was performed by comparing the feature vector of the query image with the projection feature vector of the image database on the principle component space of the query image. By this technique, it can reduce the dimensionality of feature vector, which in turn reduce the searching time. Hadi Hassan, and Lee Jei Gou Journal of Shanghai Jiaotong University, 2000 (5)2




      Hadi H Abdulredha an, " Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map " , " Internet Technology and Secured Transactions (ICITST), 2011 International Conference for ",Vol.,No., , Computer Engineering (Sharjah Campus) Khalifa University of Science,, Abu Dhabi ,UAE, 12/14/2011 Abstract:
      Abstract—Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the Internet. The experimental results of the proposed method show advantages of low complexity, and highlevel security. Download




      Hussein Al-Bahadili,, " Simulation of Maximum Power Point Tracking for Photovoltaic Systems " , "IEEE 2013 1st International Conference & Exhibition on the Applications of Information Technology in the Development of Renewable Energy processes & System IT-DREPS 2013, Amman, Jordan May 29-31, 2013",Vol.,No., , Amman,Jordan, 04/29/2013 Abstract:
      A photovoltaic (PV) solar panels exhibit non-linear current–voltage characteristics, and according to the maximum power transform (MPT) theory, it can produce maximum power at only one particular operating point (OP), namely, when the source impedance matches with the load impedance, a match which cannot be guaranteed spontaneously. Furthermore, the maximum power point (MPP) changes with temperature and light intensity variations. Therefore, different algorithms have been developed for maximum power point tracking (MPPT) based on offline and online methods. Evaluating the performance of these algorithms for various PV systems operating under highly dynamic environments are essentials to ensure a reliable, efficient, cost-effective, and high performance systems. One possible approach for system evaluation is to use computer simulation. This paper addresses the use of MATLAB software as a simulation tool for evaluating the performance of MPPT for PV systems.
  • Event Calendar
    <March 2017>
    SunMonTueWedThuFriSat
    1234
    567891011
    12131415161718
    19202122232425
    262728293031