Items filtered by date: كانون1/ديسمبر 2023
الإثنين, 28 أيلول/سبتمبر 2020 09:49

Wisam Ali Mahmood

Head of the Profile

Wisam Ali Mahmood

Computer Sciences Department

Assistant Lecturer

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Wisam Ali Mahmood is a faculty member at the University of Technology, Department of computer science for more than 11 years, He was awarded a master degree from University of SAM India , in 2012, His research interest is in Network, Wireless network, Network security, data mining- cloud computing – distributed database.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Assistant Lecturer Computer science/ DATABASE University of Technology 2011-2012

  • Network
  • Wireless network
  • Network security
  • data mining- cloud computing – distributed database

  • A Systematic Mapping Study on Testing in SPLE
  • CHOOSING APPROPRIATE IMPUTATION METHODS FOR MISSING DATA: A DECISION ALGORITHM ON METHODS FOR MISSING DATA
  • Stock Price Prediction using Technical, Fundamental and News based Approach
  • UNLOCK PERFORMANCE LIMIT OF PARALLEL COMPUTING BY PARALLEL-R
  • Improving the administrative decision-making of organizations in Iraq using information system
  • A Comparison Between SPSO and QPSO from View Point of Optimization
  • Forecasting of Twitter Hashtahg Temporal Dynamics Using Locally Weighted Projection Regression

  • Communication University of Technology
  • Network protocol University of Technology
  • Computer network University of Technology
  • Network management University of Technology
  • Information System Analysis & Design University of Technology
  • Routing and Switching University of Technology
Published in cv
الإثنين, 28 أيلول/سبتمبر 2020 09:48

Alaa Noori Mazhar

Head of the Profile

Alaa Noori Mazher

Computer Sciences Department

Professor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

  • MS.C- COMPUTER SCIENCE- TECHNOLOGY UNIVERSITY- 2003

  • Multi media
  • Image processing
  • Data security

  • The Effect of Curvature Estimations and Lighting Factor in the Edge Detection for 3D Rendered Images.
  • Texture analysis of Brodatz Images using statistical methods.
  • The Effect of Curvature Estimations and Lighting Factor in the Edge Detection for 3D Rendered Images.
  • Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption.
  • The Security Threats and Solutions of Network Functions Virtualization.
  • Hiding the type of skin texture in mice based on fuzzy clustering technique.
  • Implementation of Modified GSO Based Magic Cube Keys Generation in Cryptography.
  • Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation.
  • Texture Analysis of smear of Leukemia Blood Cells after Exposing to Cold Plasma.
  • Classification of Breast Tissue for mammograms images using intensity histogram and statistical methods
  • Classification of brain lesion using K-nearest neighbor technique and texture analysis.
  • Studying the effect of dielectric barrier discharges on the leukemia blood cells using digital image processing [J].
  • Studying the Effect of Diabetic on Pancreas using Textural Analysis for Histopathologic Images.
  • Detection and segmentation of lung disease using Law Mask with Watershed on X-ray images.
  • Texture analysis using spatial gray level dependence matrix and the logical operators for Brodatz images.
  • Detection and Classification of Brain Lesion Depending on Statistical Features Textural Analysis.
  • The Effect of cold microwave plasma on Hormones and Living tissues of mouse females Using Digital Image Processing.
  • Intra Correlation Destruction Technique For Encryption Data.
  • Using FREAK descriptor to classify plasma influence in Mice sperm.
  • Study the Changes in Al-ahwaz Marshal using Principal Component Analysis and Classification Technique.
  • Real Time Network Files Transfer Protocol (RTFTP).

  • Logic design Technology university
  • Commotional theorem Technology university
  • Compiler design Technology university
  • Data structure Technology university
Published in cv
الإثنين, 28 أيلول/سبتمبر 2020 09:16

Hala Bahjat Abdul Wahab

Head of the Profile

Hala Bahjat Abdul Wahab

Computer Sciences Department

Professor Doctor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Name: Hala Bahjat Abdul Wahab
Date of Birth: Jun.28 . 1969, Basrah -Iraq.
Marital Status: Married, Family: 3 children's
Place of Residence: Baghdad/ Iraq
The Scientific Degree: professor since 22/12/2018
Activities:
1. Computer sciences centre-engineering collage/ Assistant Programmer / University of Basrah 1991-1995
2. Department of Computer Science/ Assistant Research / University of Technology 1995-2001
3. Department of Computer Science / Assistant Lecturer /University of Technology from 2001 - 2006
4. Head of the Security Branch / Department of Computer Science / University of Technology 2006-2009
5. Department of Computer Science/ Lecturer / University of Technology from 2009 - 2012
6. Member in the Department of Computer Science of the Scientific Committee / University of Technology 2011-2012
7. Chairman of the Scientific Promotion Department of Computer Science / University of Technology 2012-2014
8. Member of the Committee for Scientific and University Promotions at the University of Technology2012-2014
9. Member of the editorial board of the Journal of Engineering and Technology - University of Technology 2014- 2017.
10. Head of Information Systems Branch / Department of Computer Science / University of Technology 2012 - 2015
11. Head of Computer Science Department / University of Technology/2015 -2019.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • B. Sc. University of Basrah 1990 Iraq
  • M. Sc University of technology 2001 Iraq
  • Ph. D University of technology 2006 Iraq

  • Computer sciences/ computer security
  • Computer sciences/ network security
  • Computer sciences/ multimedia security
  • Computer sciences/graphics and curves security

  • Modification Approach Method for RC4 Using 2D Wavelet Transform", Vol.21. No.4.2010.Al-Mustansiriyah Journal of science.
  • "Proposed Steganography method dor data hiding in Microsoft word document structure", Al –Mansour Journal,Al-mansour University college, Vol.11. No.4.2010.
  • Proposed New Elliptic Curve Cryptography Protocol Based on Dictionary Techniques", European Journal of Scientific Research, vol77, Issue 2,2012.
  • Proposed New Algorithm to Generate Cryptography Session Keys Based on CFG and Huffman Code", European Journal of Scientific Research, vol.78, Issue 4,2012.
  • Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebraand Metaheuristic Algorithms, Eng. & Tech. Journal, University of technology, Vol32 partB.No.2.2014.
  • تضمين رساله سرية داخل نص عربي مشكل" 7-10 /5/2014 المؤتمر الدولي الثالث للغة العربي دولة الامارات دبي
  • Partial Cryptography in Digital Media Environment Based on ECC Algebra ", Iraqi Journal of Science, Vol 54.No.2.2013.Pp 455-467.
  • Moving Area Filter to Detect Objects in Video Sequences from Moving Platform" World Academy of Science, Engineering and Technology, International Journal of Computer, Information Science and Engineering ,Vol:7 No:9, 2013.
  • Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image", Iraqi Journal of Science, 2013, Vol 54, No.4, pp:955-964.
  • Partial Encryption in Digital Image Based On Plasma Encoding Techniques" مجلة الهيئة العراقية للمعلوماتية , العدد الاول
  • Improved Mean Shift Tracking Algorithm by Multi Scale Motion Information", IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p-ISSN: 2278-8719 Vol. 3, Issue 10 (October. 2013), ||V4|| PP 01-08.
  • Parallel Priority Region Approach to Detect Background", World Academy of Science, Engineering and Technology International Journal of Computer, Information Science and Engineering Vol:7 No:10, 2013.
  • Speed Image Encryption Scheme UsingDynamic Galois Field GF(P) Matrices , International Journal of Computer Applications (0975 – 8887),Volume 89 – No.7, March 2014
  • Dynamic Shuffling for Speed Image Encryption ", International Journal of Computer Applications (0975 – 8887),Volume 89 – No.7, March 2014.
  • Using Unitary Matrices in High-Speed Video Encryption" IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.8, August 2014.
  • Proposed Approach for Steganography in Arabic Text Based on B+_Tree,DNA Coding and Arabic Diacritics", International Journal of Advance Resach (IJAR),ISSN:2320-2407,2014.
  • Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks",978-1-4799-5627-2/14/$31.00 ©2014 IEEE.
  • Improvement A5/1 Encryption Algorithm Based On Sponge Techniques",978-1-4673-6636-6/15/$31.00 ©2015 IEEE.
  • Data Security Protocol for Wireless Sensor Network using Chaotic",Map",(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 8, August 2015.
  • New Watermark Technique Based on B+ Tree and Mathematical Morphology",Al-Mustansiriyah Journal of Science Vol. 26, No 1, 2015.
  • Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial", Eng. & Tech. Journal, University of technology, Vol32 partB.No.6.2016.
  • Improvement Majority Function in A5/1 stream cipher Algorithm", Eng. & Tech. Journal, University of technology, Vol34 partB.No.1.2016.
  • Variant length, Self-extracted audio watermark for verification using LWT and random selections", Diyala journal pure sciences, Vol: 13 No:2,P-ISSN: 2222-837, April 2017.
  • Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial", Eng. & Tech. Journal, University of technology, Vol34 partB.No.6.2016.
  • Speech Encryption Based on Wavelet Transformation and Chaotic Map", Eng. &Tech.Journal, Vol.34,Part (B), No.5,2016
  • Variant length, Self-extracted audio watermark for verification using LWT and random selections", Diyala journal pure sciences, Vol: 13 No:2,P-ISSN: 2222-837, April 2017.
  • Image Encryption Based on Intelligent Session Mask Keys",Iraqi Journal of Science, Vol. 58, No.1B, pp: 317-326,2017.

  • Computer Network University of Technology/ computer sciences department/ Postgraduate / Ph. D
  • Computer security University of Technology/ computer sciences department/ Postgraduate / M. Sc
  • Cryptanlaysis University of Technology/ computer sciences department/ Postgraduate / MSC- Security
  • C++, Pascal, ( 2002,2004) , programming using University of Technology/ computer sciences department/ under graduate/ stage1
  • Algorithms Complexity, Data security(2005-2009) University of Technology/ computer sciences department/ stages3,4
  • principles of networks, principles of security(2010-2013) University of Technology/ computer sciences department/stage1
  • Cryptanlaysis(2014-2019) University of Technology/ computer sciences department/stage4

  • Certificate of appreciation from Ministry of Higher Education issued on 6/4/2009.
Published in cv
الإثنين, 28 أيلول/سبتمبر 2020 09:14

Hanaa Mohsin Ahmed

Cinque Terre

Hanaa Mohsin Ahmed

Computer Sciences Department

Professor Doctor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Prof. Dr. Hanaa Mohsin Ahmed obtained her M.Sc. in Information Security and Ph.D. in Artificial Intelligent from the University of Technology Iraq in 2002 and 2006, respectively. Currently, she is a lecturer in Computer Science/ AI. Dr. Hanaa has more than 23 years of experience and has supervised graduate students in B.Sc. final year projects, MSc. and PhD. Her research interests include Robotics, Fuzzy systems, computer security, biometrics, image processing, and computer graphics.

CV  

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Professor Doctor date: 15/09/2019
  • Doctor of philosophy in computer science: University of Technology/Department of computer science: 18/10/2006
  • Master Information Security: University of Technology /Department of computer science: 30/12/2002
  • Higher diploma in information security: Higher Institute of computing and Informatics: 24/12/1998
  • Bachelor of applied mathematics: University of Baghdad/College of Science Department of Mathematics: 06/03/1990
  • Robotic, Computer Security and AI
  • A Natural Language Steganography Technique for Text Hiding Using LSB’s, University of Technology, Engineering & Technology Journal, Vol.26, No.3, 2008, P.O.Box.35010, Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • A Content-Based Authentication Using Digital Speech Data, University of Technology, Engineering & Technology Journal, Vol.25, No.10, 2007, P.O.Box.35010, Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • A Spectrum Method for Natural Language Text Watermarking Technique, Acit 2007 conference, The 26-28 November, 2007, The 8th international Arab conference on information technique
  • Fusion Face and Palmprint for Human Recognition Via Spectral Eigenvector, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Year: 2009 Volume: 27 Issue: 4 Pages: 787-798
  • Palmprint Characterization Using Multi-wavelet Transform for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010, Volume: 27, No. 3 2009,.
  • Hybrid Information Hiding Technique Using Parametric Spline and DFT, Dr. Abdul Monem S. Rahma Dr. Hala Bahjat Abdul Wahab Dr. Hana'a M. Salman عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., University of Technology, Engineering & Technology Journal, P.O.Box.35010, Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • A Use of Ridgelet Transform as a Speech Scrambling Means, Hana'a M. Salman , Layla Hattim Abood, عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Department of Control Engineering & Information System, University of Technology,
  • Spectral Eigenface Representation for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Eng. & Tech. Journal ,Vol.28, No.19,2010
  • Human Identification Using Normalized Energy Based Spectrum Eigenpalms, عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. Journal of Computer Engineering and communication and control systems (IJCCCE) , Year: 2010 Volume: 10 Issue: 1 Pages: 46-55
  • Principal Component Analysis Based Wavelet Transform, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Eng. & Tech. Journal , Year: 2012 Volume: 30 Issue: 9 Pages: 1538-1549
  • Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method and Applied in the Hiding Process of the Speech and the Image, Professor DR. Abd Al-Majeed Hamza AL-Nassir, Dr. Hana'a M. Salman, Dr. Layla Matter Nassir, Al-Ma'mon College Journal, Year: 2012 Issue: 19-A Pages: 157-193
  • Fuzzy Bio-Cryptography Key Generation, The International Arab Journal of Information Technology, Vol. 1, July 2013
  • Proposal Design: Fingerprint Random Number Generators, The International Arab Journal of Information Technology, Vol. 1, July 2013
  • A Hana'a Salman Encryption Method, Iraqi Commission for Computers ,Conference, 2013
  • INFORMATION HIDING IN EDGE LOCATION OF VIDEO USING AMALGAMATE FFT AND CUBIC SPLINE, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
  • A SURVEY OF CLOUD BASED SECURED WEB APPLICATION, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
  • A Transform Based 3D- Speech Scrambling Using Multi-Wavelet: Design and Evaluation
  • A Survey on Smartphone Honeypot, Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad,
  • A HARMONIC SECRET SHARING AND PERMUTATION BASED
  • DOCUMENT IMAGE AUTHENTICATION, Muna Ghazi, 2Dr. Hanaa M. A. Salman, International Journal of Computer Engineering and Technology (IJCET), Volume 4, Issue 5, September - October (2013), © IAEME
  • Secret Sharing Scheme Based Technique for Authentication of Documents Images, Dr. Muna Ghazi & Dr. Hanaa M. A. Salman Eng. &Tech.Journal, Vol. 32,Part (B), No.6, 2014
  • Fuzzy Gradient Based Image Reconstruction As a Means for Detection the Tampering, Sixth Computer Science and Electronic Engineering Conference 2014 (CEEC'14), 25th-26th of September 2014, Essex University, UK
  • A Method for Detect Forgery from Images Dr. Hanaa Mohsin Ahmed Computer Science Department,University of Technology /Baghdad Email:عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. Sabaa Rakan Salim Computer Science Department, University of Technology /Baghdad Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. Revised on: 1/9/2014 & Accepted on: 4/12/2015
  • Method for Detect and Extract Forgery from Images .
  • A Survey on SmartPhone Honeypot Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad
  • Design Requirements of a Smart Phone Honeypot System International Journal of Computer Application Issue 4, Volume 6 (Nov.- Dec. 2014) Available online on Assmaa A. Fahad#1, Dr.Hanaa Mohsin Ahmed#2, Dr. Nidaa Flaih Hassan#3
  • Cloud Based Secure Web Application Ahmed Hashim Mohammed, Dr. Hanaa M. A. Salman. & Dr. Saad K. Majeed
  • Detect and Prevent SQLIA by Dynamic Monitoring Ahmed Hashim Mohammed,2Dr. Hanaa M. A. Salman,3Dr. Saad K. Majeed Computer Science Department, University of Mustansiriyam,2,3.Computer Science Department, University of Technology
  • Integrate Liveness Detection with Iris Verification to Construct Support Biometric System Hanaa Mohsin Ahmad, Bushra Jabbar Abdulkareem ,Journal of Computer and Communications (JCC)
  • Arabic Language Text Steganography Besed on Microsoft Word documents Assist.prof. Dr. Hanaa M. Ahmed, PhD Students: Maisa'a A. A. Khohder, Computer Science Department Computer Science Department University of Technology University of Technology Baghdad, Iraq Baghdad, Iraq عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • Arabic Language Script Steganography Based on Dynamic Random Linear Regression Ahmed, H.M., 2016. Collage of Education, 1(1) Ahmed, H.M., 2016. Journal of College of Education, (1), pp.397-414.
  • Arabic Language text Steganography Based on Microsoft Word document DHM Ahmed, MAA Khohder, Al-Yarmouk Journal 1 (4075-2954), 15 Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG, Ahmed, H.M., 2016. Iraqi Journal of Science, 57(2C), pp.1548-1557.
  • Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG/مجله كليه التربيه الاساسيه Ahmed, A.P.D.H.M., 2016. journal of the college of basic education, 22(95/علمي), pp.129-146.
  • Steganography of Arabic Language Scripts Based On Secret Sharing Using RNG, Ahmed, H.M. and Maisa'a, A.A.الامام جعفر الصادق
  • Steganography Arabic Text Based on Natural Language Process Documents Maisa'a, A.A. and Ahmed, H.M., 2016. Journal of College of Education/Wasit, 1(25), pp.457-480.
  • Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) Ahmed, H.M. and Maisa'a, A.A., 2016. Engineering and Technology Journal, 34(5 Part (B) Scientific), pp.629-637.
  • Arabic Language Document Steganography Based On Huffman Code Using DRLR as (RNG) Ahmed, H.M., 2016. AL-MANSOUR JOURNAL, (26), pp.57-84.
  • A Comparison Between a Number of the Proposed Linguistic Steganography Texts Ahmed, H.M. and Maisa’a, A.A., 2016. Int. J. Comput. Inf. Sci, 12(2), pp.243-251.
  • A Proposed Algorithms to Design Support Multimodal biometric System, Hanaa M. Ahmed*,Ph.D (Asst. Prof.) Bushra J. Abdulkareem**, Al-Mansour Journal/ Issue( 25 ) 2016 Iris anti-spoofing: static&Dynamic Technique,
  • Physical layer security comparison between Random Linear Network (RLNC) and Rateless code, International Journal for Sciences and Technology, Volume 11. No. 1/ March 2016 / ISSN: 2305-9346 stream cipher with space time block code
  • HM Ahmed, AA Hattab, International Journal of Computing & Information Sciences 12 (2), 227 FORMAL LANGUAGE _SPACE TIME BLOCK CODE for MOBILE NETWORK HM Ahm, AA Hattab, Diyala Journal For Pure Science 13 (2-part 2), 147-166
  • Proposed Method to Encrypt Images to Mobile device based on the principles of Shannonهناء وانوار/ مجله جامعتنا Active voice detection using ridgelet transform HM Ahmed, AL-MANSOUR JOURNAL, 47-56
  • Application of FPTRNG and Logistic_Map in Cryptography HM Ahmed, International Journal of Computing & Information Sciences 12 (2), 221
  • A Simple Detection Model to Suspicious Viber Messages/هناء ونور جامعه ديالى HM Ahmed, NB Bethoon
  • Design a smart phone honeypot system, asmaa, hanaa, nidaa
  • Cybercrime-Suspicious-Viber-Messages-Detection-Model HM Ahmed, NB Bethoon
  • Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method DR. Abd Al-Majeed Hamza AL-NassirHanaa Mohsin Ahmed SalmanLayla Matter
  • Ey-gaze traking for human mobile interface, H. Mohsin and S. H. Abdullah
  • Human face detection using skin color segmentation and morphological operation, H. Mohsin and S. H. Abdullah
  • Pupil Detection Algorithm Based on Feature Extraction for Eye Gaze H. Mohsin and S. H. Abdullah, "Pupil detection algorithm based on feature extraction for eye gaze," 2017 6th International Conference on Information and Communication Technology and Accessibility (ICTA), Muscat, 2017, pp. 1-4. doi: 10.1109/ICTA.2017.8336048
  • Mobile Devices Application Alive Face Detection Using Skin Color segmentation and gabor filter, H. Mohsin and S. H. Abdullah
  • Identification-Forgery-Image-and-Image-Operation-by-FCM-Algorithm Hanaa Mohsin Ahmed*, Ph.D (Asst. Prof.)* , and
  • A High Performance Authorized Login Secure by Cubic Spline and Keystroke Technique, Asset prof Dr Hanaa Mohsin Ahmed, Ahmed Oday
  • A Survey on Human Eye Gaze Tracking, H. Mohsin and S. H. Abdullah
  • Application for Identification True Instances Messages Sender, HM Ahmed, S Fadhil, Diyala Journal For Pure Science 14 (03), 159-171
  • Hybrid Security Methods for the Physical Layer of a Mobile Network Asst. Prof. Dr. Hanaa M. Ahmed and PhD Students: Anwar Abbas Hattab Department of Computer Science, Iraq University of Technology
  • A high speed programing for detect the gender by back-propagation algorithm , HM Ahmed, S Fadhil,
  • Secure by randomly cubic spline curve and blum blum algorithms for detect user authentic, Asset prof Dr Hanaa Mohsin Ahmed Ahmed Oday
  • Convolution neural netork for detect class: learning tool for kids Hanaa ana hala Hassan/جامعة النهرين
  • Review on image stegoanalysis using inria dataset جامعة بغداد, Hanaa ana hala hassan
  • Anti-screenshot keyboard for web based application using cloaking Hanaa Mohsin , halaa bahjat
  • Mobile based telemedicine application using svd and f-xor watermarking for medical images, Hanaa Mohsin Ahmed
  • Human face detection using skin color segmentation and morphological operations Al- Nisour university collage/scientific Journal unit , vol 7, year 2018
  • A survey on Human Eye-Gaze Tracking (EGT) system “A Comparative study”
  • Mobile Devices Application: Alive face Detection using skin color segmentation and Gabor filter, Al-MANSUR journal
  • Identification Forgery image and image operating by fuzzy c mean algorithm Al-MANSUR journal
  • Secure by randomly cubic spline curve and detect right user by easy way for authentication
  • Review on image Steganalysis using INRIA Dataset, Al-Nahrain Journal of Science Vol.21 (4), December, 2018, pp.94-108, Hanaa Mohsin Ahmed and Halah H. Mahmoud . [DOI: 10.22401/ANJS.21.4.13]
  • Effect of Successive Convolution Layers to Detect Gender, Hanaa Mohsin Ahmed, halaa hasan
  • Convolutional Neural Networks for Blind Image Steganalysis: A Comprehensive Study, Hanaa Mohsin Ahmed, halaa hasan
  • Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for blind image steganalysis Hanaa Mohsin Ahmed, halaa hasan
  • Effect of Number of levels in Dual Tree Complex Wavelet Transform to obtain accurate detection when design Universal image stego-analytic Hanaa Mohsin Ahmed, halaa hasan
  • Ahmed, H.M. and Jaber, H.R., Sentiment Analysis for Movie Reviews Based on Four Machine Learning Techniques.
  • Sentiment Analysis for Some Movie Reviewer Using Naïve Bayes Hanaa Mohsin Ahmed, hanaa jaber
  • English Alphabets Recognition Using Hand Gesture Hanaa Mohsin Ahmed, Yasser theaa, Al Mansur journal
  • Cryptosystem Using the Multi-Fusion Model for Large Confidential Messages Hanaa Mohsin Ahmed Mohsin H., Bahjat H. (2020) Anti-screenshot Keyboard for Web-Based Application Using Cloaking. In: Bouhlel M., Rovetta S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer,
  • Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images Hanaa Mohsin Ahmed, BSJ
  • Eye Detection using Helmholtz Principle, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ Ahmed, H.M. and Jassim, R.W., 2020. Multi-Resolution Like Data Transmission Security Using Diffie-Hellman Protocol. Diyala Journal For Pure Science, 16(01), pp.98-115.
  • Enhance Diffie-Hellman protocol of data transmission security , Ahmed, H.M. and Jassim, R.W., 2020
  • A Raspberry PI Real Time Identification System on Face Recognition, Hanaa Mohsin Ahmed and Ranaa T. Rasheed
  • Eye diseases classification using hierarchal multi-label artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ
  • A Brief Survey on Modern Iris Feature Extraction Method, Ahmed, H.M. and Jassim, R.W., 2020
  • Smart Door for handicapped people via face recognition and voice command technique, Hanaa Mohsin Ahmed and Ranaa T. Rasheed
  • Eye diseases classification using back propagation artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ
  • Distributed Transform Encoder To Improve Diffie-Hellman Protocol for Big Message Security, Ahmed, H.M. and Jassim, R.W., 2020
  • Logic Design University of Technology-Iraq/computer Science
  • Information System University of Technology-Iraq/computer Science
  • Fuzzy Systems University of Technology-Iraq/computer Science
  • Network and Mobile Security University of Technology-Iraq/computer Science
  • Cryptanalysis
  • University of Technology-Iraq/computer Science
  • Compiler University of Technology-Iraq/computer Science
  • Number theory University of Technology-Iraq/computer Science
  • Modeling and simulation University of Technology-Iraq/computer Science
  • Coding theory University of Technology-Iraq/computer Science
  • Information Hiding University of Technology-Iraq/computer Science
  • Advanced intelligent search Algorithms University of Technology-Iraq/computer Science
  • Data Mining University of Technology-Iraq/computer Science
  • Multimedia Security University of Technology-Iraq/computer Science
  • Computer Vision University of Technology-Iraq/computer Science
  • Forensic Computing University of Technology-Iraq/computer Science
  • Computer Security University of Technology-Iraq/computer Science
  • Computer Vision and Image Processing University of Technology-Iraq/computer Science
  • Shield from the Ministry of higher education and research
  • Shield of technology University Presidents
  • Shield of technology University Presidents
  • Shield of technology University Presidents of short
  • Shield of the first professor at Department of computer science for the academic year 2015-2016
Published in cv
الإثنين, 28 أيلول/سبتمبر 2020 08:34

Hasanen S. Abdullah

Head of the Profile

Hasanen S. Abdullah

Computer Sciences Department

Assistant Professor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

I am Hasanen S. Abdullah, I was born in 1976,I had my B.Sc. from University of Technology in 2000, my M.Sc. degree in 2004 and my Ph.D. degree in 2008 in Computer Science / Artificial Intelligence. I got my scientific upgrade to assist professor in 2011. I work as a teacher in the University of Technology / Computer Science Department since 2004, I teach B.Sc., M.Sc. and Ph.D. courses. I have published many research papers. I have supervised many graduation projects, for B.Sc. students, Higher Diploma students, M.Sc. students and Ph.D. students. I was a member and chairman for several examination committees inside and outside campus.

CV  

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • B.Sc. in Computer Science / Information Systems from University of Technology – 2000.
  • M.Sc. in Computer Science / Data Security from University of Technology – 2004.
  • Ph.D. in Computer Science / Artificial Intelligence from University of Technology – 2008.

  • Intelligent Systems and Applications
  • Machine Learning
  • Pattern Recognition
  • Expert Systems
  • Swarm Intelligence
  • Data Mining
  • Business Intelligence and Big Data
  • Collective Intelligence and Big Data

    ˙ Saif Ali Abd Alradha, Ahmed T. Sadiq and Hasanen S.Abdullah, "Wisdom Extraction from English Poems Using Two-Level Feature Selection with Rough Set Theory", International Journal of Advanced Science and Technology Vol. 29, No. 4, (2020), pp. 2315 – 2329, 2020.

    ˙ Saif Ali Alsaidi, Ahmed T. Sadiq and Hasanen S. Abdullah, "English poems categorization using text mining and rough set theory", Bulletin of Electrical Engineering and Informatics Vol. 9, No. 4, August 2020, pp. 1701~1710 ISSN: 2302-9285, DOI: 10.11591/eei.v9i4.1898, 2020.

    ˙ Khudhair Jasim, Ahmed T. Sadiq and Hasanen Samir Abdullah, "A Framework for Detection and Identification the Components of Arguments in Arabic Legal Texts", Conference: 2019 First International Conference of Computer and Applied Sciences (CAS) DOI: 10.1109/CAS47993.2019.9075650, December 2019.

    ˙ Khudhair J.Kadhim, Ahmed T. Sadiq and Hasanen S. Abdulah, "Unsupervised-Based Information Extraction from Unstructured Arabic Legal Documents", Opcion, Año 35, Especial Nº 20 (2019):2899-2921 ISSN 1012-1587/ISSNe: 2477-9385, 2019.

    ˙ Zied O. Ahmed ; Ahmed T. Sadiq ; Hasanen S. Abdullah, "Solving the Traveling Salesman's Problem Using Camels Herd Algorithm", IEEE, 2nd Scientific Conference of Computer Sciences (SCCS), Baghdad, Iraq, 2019.

    ˙ Assist. Prof. Dr. Hasanen S. Abdullah and Sanaa Sh. Ahmed, "Depth Image Extraction using Adaptive K-Means Clustering Algorithm", مجلة كلية المأمون، العدد الثاني والثلاثون, 2018.

    ˙ Hassanein Samir Abdullah, Sana Ali Jabber, "Intelligent Monitoring to Detect and Recognized the Unauthorized Persons", مجلة كلية التربية للعلوم الصرفة-جامعة ذي قار المجلد 8 العدد 2 , حزيران 2018.

    ˙ Ahmed T. Sadiq Al-Obaidi, Hasanen S. Abdullah and Zied O. Ahmed, "Solving Flexible Job Shop Scheduling Problem Using Meerkat Clan Algorithm", Iraqi Journal of Science, Vol. 59, No.2A, pp: 754-761, DOI:10.24996/ijs.59.2A.13, 2018.

    ˙ Ahmed T. Sadiq Al-Obaidi, Hasanen S. Abdullah and Zied O. Ahmed, "Meerkat Clan Algorithm: A New Swarm Intelligence Algorithm", Indonesian Journal of Electrical Engineering and Computer Science Vol. 10, No. 1, pp. 354~360 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v10.i1.pp354-360, April 2018.

    ˙ Hasanen S. Abdullah, Maha A.Hamood Al-Rawi and Dalal N. Hammod, "Analysis of AES Algorithm Effects on the Diffusion Property", Al-Mansour Journal /Issue (29), 2018.

    ˙ Prof. Dr. Ahmed T. Sadiq, Ai-Obaidi, Dr. Hasanen S. Abdullah and Zaid O. Ahmed, "Camel Herds algorithm: A New Swarm Intelligent Algorithm to Solve Optimization Problems", International Journal on Perspective and Cognitive Computing (IJPCC), Vol 3, Issue 1, 2017.
    ˙ Hasanen S. Abdullah, Maha Abdulkareem Alrawi and Dalal N. Hammod, "Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)", Baghdad Science Journal, Vol.14(4), 2017.
    Hasanen S. Abdullah and Roaad A. Ali, "Knowledge Upgrade to Wisdom by Using Knowledge Broker Agent for Web Application, Based on Users’ Experiences", Journal of Al-Nahrain University Vol.20 (4), pp.130-141, December, 2017. ˙ Hasanen S. Abdullah and Sana A. Jabber, "Faces Tracking from Multi Surveillance Camera (FTMSC)", AL-Muthanna Journal of Pure Sciences (MJPS) VOL.(4), NO.(2), 2017

    ˙ Hasanen S. Abdullah and Ammar H. Jasim, "Improved Ant Colony Optimization for Document Image Segmentation", International Journal of Computer Science and Information Security, ISSN 1947 5500, USA, 2017.

    ˙ Hasanen S. Abdullah and Nesreen Waleed, "Auto Crop and Recognition for Document Detection Based on its Contents", Iraqi Journal of Science, Vol. 58, No. 1C, 2017.

    ˙ Hasanen S. Abdullah and Nesreen Waleed, "Multilevel Analysis to Recognize Original Voucher from Faked Voucher", Iraqi Journal of Science, Vol. 58, No. 2A, 2017.

    ˙ Hasanen S. Abdullah and Ammar H. Jasim, "Improved Fuzzy C-mean for Document Image Segmentation", British Journal of Science, Vol. 14 (2), December 2016.

    ˙ Hasanen S. Abdullah, Maha A. Hamood Al-Rawi, Dalal N. Hammod, "Message Authentication Using New Hash Function", Journal of Al Nahrain University – Science, Vol 19, No. 3, 2016.

    ˙ Dr. Hasanen S. Abdullah, Dr. Maha A. Hamood Al-Rawi, Dalal N. Hammod, "An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm ", Eng. & Tech. journal vol.34, part(B), No.6, 2016.

    ˙ Hasanen S. Abdullah and Ammar H. Jasim, "A New Approach for Detection and Extraction Tables in Scanned Document Image using Improved Hough Transform", Eng. & Tech. journal vol.34, part(B), No.5, 2016.

    ˙ Dr. Hasanen S. Abdullah and Saif Bashar Neama "Proposed Business Intelligence System Through Big Data", Eng. & Tech. journal vol.34, part(B), No.4, 2016.
    Hasanen S. Abdullah and Ammar H. Jasim, "Document Image Segmentation using Multi ANT Colonies Algorithm (MAC) on a Multi-Core Processor", International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 5, Issue. 2, February 2016. ˙ Dr. Alia K. Abdul Hassan, Dr. Hasanen S. Abdullah and Akbas E. Ali, "Proposed Image Similarity Metric with Multi Block Histogram used in Video Tracking", Eng. & Tech. journal vol.34, part(B), No.4, 2016.

    ˙ Dr.Hasanen s. Abdullah and Hajer Mazin Salih"Texture Recognition Using Multiwavelet Transformation and Decision Tree""Eng. & Tech. journal, vol.34, part(B), No.1,2015.

    ˙ Akbas E. Ali, Dr. Alia K. Abdul Hassan, Dr. Hasanen S. Abdullah, "Object tracking using Proposed framework of Kalman Guided Harmony Search Filter",مجلة كلية اليرموك الجامعة, المجلد 0, العدد 1, 2015.

    ˙ Dr. Hasanen S. Abdullah and Mustafa J. Hadi, "Artificial Bee Colony base Approach for Web Information Retrieval", Eng. & Tech. journal, Vol 32, Part (B), No.(5), 2014.

    ˙ Dr. Hasanen S. Abdullah, "Comparative Study of Swarm Intelligence Behavior to Solve Optimization Problems", Eng. & Tech. journal, Vol. 29, No. 14, 2011.

    ˙ Dr. Alaa Kadim, Dr. Hasanen S. Abdullah and Ameen Adnan, "Proposed System for HTC phone Data Management", Eng. & Tech. journal, Vol. 29, No. 12, 2011.

    ˙ Dr. Alaa Kadim, Dr. Hasanen S. Abdullah and M.Sc Mohammad Natiq, "Proposal of Hybrid Public Key Cryptography Methods Base on IFP and DLP", Iraqi Association of Information Technology, 2011.

    ˙ Dr. Ahmed Tariq Sadiq, Dr. Hasanen Samir Abdullah and Mr. Mohammed Natiq Fadhil, “Proposal of Tabu DNA Computing Algorithm to Solve N-Queen Problem”, the First Computer Sciences Conference Proceedings (University of Technology-Baghdad-Iraq), 2010.

    ˙ Dr. Ahmed Tariq Sadiq and Hasanen Samir Abdullah, "HDNA : Heuristic DNA Computing Algorithm", Eng. & Tech. journal, Vol. 27, No. 6, 2009.

  • Artificial Intelligence / B.Sc. University of technology
  • Intelligent Systems / B.Sc. University of technology
  • Intelligent Applications / B.Sc. University of technology
  • Expert Systems / B.Sc. University of technology
  • Search strategies / B.Sc. University of technology
  • Heuristic Search Methods / B.Sc. University of technology
  • Intelligent Search Methods / B.Sc. University of technology
  • Principles of Security / B.Sc. University of technology
  • Intelligent Systems Design / B.Sc. Al-Rafidain University College
  • Artificial Intelligence and Prolog Language / B.Sc. Al-Rafidain University College
  • Software Development Techniques and Quality Assurance / B.Sc. Al-Rafidain University College
  • Computer Principles / B.Sc. Imam Jaafar AI- Sadiq University
  • Artificial Intelligence / M.Sc. University of technology
  • A.I. Techniques/ M.Sc. University of technology
  • Intelligence Database/ M.Sc. University of technology
  • Machine Learning / M.Sc. University of technology
  • Bio Medical Systems / M.Sc. University of technology
  • Data warehouse and Data Mining / M.Sc. University of technology
  • Bio Information Systems / M.Sc. Al-Mustansirya University
  • Decision Support Systems / M.Sc. Middle Technical University / Technical College of Management
  • Advance database / M.Sc. Middle Technical University / Technical College of Management
  • Software Engineering (Comprehensive) / Ph.D. University of technology
  • Search strategies (Comprehensive) / Ph.D. University of technology

  • Many acknowledgment letters from Universities Heads
  • Many acknowledgment letters from Colleges Deans
  • University of technology Shields (2014 & 2016)
  • Certification from (KOICA) a Korean Organization 2004.
  • Certification from Official Research and Development Department of the Ministry of Higher Education and Scientific Research 2012.
  • Certifications from International conferences.
  • Many certifications from Iraqi's conferences.
  • Certifications from Iraqi's Journals.
Published in cv
Top