Items filtered by date: December 2023
Monday, 28 September 2020 10:15

Ali Adel Saeid

Head of the Profile

Ali Adel Saeid

Computer Sciences Department

Dr. Lecturer

This email address is being protected from spambots. You need JavaScript enabled to view it.

Dr. Ali A. Saied has been a faculty member at the Department of Computer Science since 2018. Ail graduated from Baghdad University of, Iraq. He got his Master Degree in Computer Science in 2001. His MSc. thesis was in Image Processing and computer graphic fields. In 2002, Ali received his Doctorate Degree in the Philosophy of Computer Science. The Ph.D. Dissertation was in the fields of image processing and Artifice intelligent it deals with Assyrian character recognition .. Dr. Ali has many researches in Computer graphic , pattern recognition , document security, image processing and Artificial Intelligence.

CV  

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Ph.D. - Multimedia- University of Technology- 2018


    ˙ Pattern Recognition
    ˙ Image Processing
    ˙ Computer Vision
    ˙ Computer graphic -curve fitting interpolation .
    ˙ Computer network
    ˙ Database management system
    ˙ Geographic information system

  • Cuneiform Tablets Image Preprocessing Proposed Algorithms Techniques for Pattern Recognition, raqi Journal of Science, 2018, Vol. 59, No.3A, pp: 1326-1338, Ali Adel Saeid*, Abdual Munim S. Rahma, Muhsen J. Abdul Hussienssien
  • Cuneiform symbols recognition by support vector machine (SVM), Journal of AL-Qadisiyah for computer science and mathematics Vol.10 No.3 Year 2018, Ali Adel Saeid*, Abdual Munim S. Rahma, Muhsen J. Abdul Hussienssien
  • Mathematical Technique for Controlling Time of Designs of cubic Bezier Surface of Three-Dimensional, Vol.20 No.1 Year 2012, A. M. J. Abdul-Hussen Ali. Adel Saeid , Ali Hassan Hammadie
  • Modified Method for Controlling, and Generating Design by Using Cubic Bezier Surface in 3D, Vol.20 No.1 Year 2012, A. M. J. Abdul-Hussen Ali. Adel Saeid , Ali Hassan Hammadie
  • Using Fractal Model in Documents' Security, Eng. & Tech. Journal ,Vol.29, No.16, 2011 ,Ali Adel Saeid
  • A Modified BEZIER Algorithm For Controlling and Generating A Third Degree Curves, Dr. A.M.S. Rahma, Dr. A. M. Jaber & Ali Adil Saeid,, Eng. & Tech. Journal. Vol.28, No.21, 2010
  • Recognize Assyrian cuneiform characters by virtual dataset, Published in: 2017 6th International Conference on Information and Communication Technology and Accessibility (ICTA), Abdul Monem S. Rahma , Ali Adel Saeid, Muhsen J. Abdul Hussien

  • Structured Programming with C++ (2011 till now) Department of Computer Sciences at the University of Technology.
  • Object Oriented Programming (2012 -2014) Department of Computer Sciences at the University of Technology
Published in cv
Monday, 28 September 2020 09:49

Wisam Ali Mahmood

Head of the Profile

Wisam Ali Mahmood

Computer Sciences Department

Assistant Lecturer

This email address is being protected from spambots. You need JavaScript enabled to view it.

Wisam Ali Mahmood is a faculty member at the University of Technology, Department of computer science for more than 11 years, He was awarded a master degree from University of SAM India , in 2012, His research interest is in Network, Wireless network, Network security, data mining- cloud computing – distributed database.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Assistant Lecturer Computer science/ DATABASE University of Technology 2011-2012

  • Network
  • Wireless network
  • Network security
  • data mining- cloud computing – distributed database

  • A Systematic Mapping Study on Testing in SPLE
  • CHOOSING APPROPRIATE IMPUTATION METHODS FOR MISSING DATA: A DECISION ALGORITHM ON METHODS FOR MISSING DATA
  • Stock Price Prediction using Technical, Fundamental and News based Approach
  • UNLOCK PERFORMANCE LIMIT OF PARALLEL COMPUTING BY PARALLEL-R
  • Improving the administrative decision-making of organizations in Iraq using information system
  • A Comparison Between SPSO and QPSO from View Point of Optimization
  • Forecasting of Twitter Hashtahg Temporal Dynamics Using Locally Weighted Projection Regression

  • Communication University of Technology
  • Network protocol University of Technology
  • Computer network University of Technology
  • Network management University of Technology
  • Information System Analysis & Design University of Technology
  • Routing and Switching University of Technology
Published in cv
Monday, 28 September 2020 09:48

Alaa Noori Mazhar

Head of the Profile

Alaa Noori Mazher

Computer Sciences Department

Professor

This email address is being protected from spambots. You need JavaScript enabled to view it.

  • MS.C- COMPUTER SCIENCE- TECHNOLOGY UNIVERSITY- 2003

  • Multi media
  • Image processing
  • Data security

  • The Effect of Curvature Estimations and Lighting Factor in the Edge Detection for 3D Rendered Images.
  • Texture analysis of Brodatz Images using statistical methods.
  • The Effect of Curvature Estimations and Lighting Factor in the Edge Detection for 3D Rendered Images.
  • Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption.
  • The Security Threats and Solutions of Network Functions Virtualization.
  • Hiding the type of skin texture in mice based on fuzzy clustering technique.
  • Implementation of Modified GSO Based Magic Cube Keys Generation in Cryptography.
  • Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation.
  • Texture Analysis of smear of Leukemia Blood Cells after Exposing to Cold Plasma.
  • Classification of Breast Tissue for mammograms images using intensity histogram and statistical methods
  • Classification of brain lesion using K-nearest neighbor technique and texture analysis.
  • Studying the effect of dielectric barrier discharges on the leukemia blood cells using digital image processing [J].
  • Studying the Effect of Diabetic on Pancreas using Textural Analysis for Histopathologic Images.
  • Detection and segmentation of lung disease using Law Mask with Watershed on X-ray images.
  • Texture analysis using spatial gray level dependence matrix and the logical operators for Brodatz images.
  • Detection and Classification of Brain Lesion Depending on Statistical Features Textural Analysis.
  • The Effect of cold microwave plasma on Hormones and Living tissues of mouse females Using Digital Image Processing.
  • Intra Correlation Destruction Technique For Encryption Data.
  • Using FREAK descriptor to classify plasma influence in Mice sperm.
  • Study the Changes in Al-ahwaz Marshal using Principal Component Analysis and Classification Technique.
  • Real Time Network Files Transfer Protocol (RTFTP).

  • Logic design Technology university
  • Commotional theorem Technology university
  • Compiler design Technology university
  • Data structure Technology university
Published in cv
Monday, 28 September 2020 09:16

Hala Bahjat Abdul Wahab

Head of the Profile

Hala Bahjat Abdul Wahab

Computer Sciences Department

Professor Doctor

This email address is being protected from spambots. You need JavaScript enabled to view it.

Name: Hala Bahjat Abdul Wahab
Date of Birth: Jun.28 . 1969, Basrah -Iraq.
Marital Status: Married, Family: 3 children's
Place of Residence: Baghdad/ Iraq
The Scientific Degree: professor since 22/12/2018
Activities:
1. Computer sciences centre-engineering collage/ Assistant Programmer / University of Basrah 1991-1995
2. Department of Computer Science/ Assistant Research / University of Technology 1995-2001
3. Department of Computer Science / Assistant Lecturer /University of Technology from 2001 - 2006
4. Head of the Security Branch / Department of Computer Science / University of Technology 2006-2009
5. Department of Computer Science/ Lecturer / University of Technology from 2009 - 2012
6. Member in the Department of Computer Science of the Scientific Committee / University of Technology 2011-2012
7. Chairman of the Scientific Promotion Department of Computer Science / University of Technology 2012-2014
8. Member of the Committee for Scientific and University Promotions at the University of Technology2012-2014
9. Member of the editorial board of the Journal of Engineering and Technology - University of Technology 2014- 2017.
10. Head of Information Systems Branch / Department of Computer Science / University of Technology 2012 - 2015
11. Head of Computer Science Department / University of Technology/2015 -2019.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • B. Sc. University of Basrah 1990 Iraq
  • M. Sc University of technology 2001 Iraq
  • Ph. D University of technology 2006 Iraq

  • Computer sciences/ computer security
  • Computer sciences/ network security
  • Computer sciences/ multimedia security
  • Computer sciences/graphics and curves security

  • Modification Approach Method for RC4 Using 2D Wavelet Transform", Vol.21. No.4.2010.Al-Mustansiriyah Journal of science.
  • "Proposed Steganography method dor data hiding in Microsoft word document structure", Al –Mansour Journal,Al-mansour University college, Vol.11. No.4.2010.
  • Proposed New Elliptic Curve Cryptography Protocol Based on Dictionary Techniques", European Journal of Scientific Research, vol77, Issue 2,2012.
  • Proposed New Algorithm to Generate Cryptography Session Keys Based on CFG and Huffman Code", European Journal of Scientific Research, vol.78, Issue 4,2012.
  • Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebraand Metaheuristic Algorithms, Eng. & Tech. Journal, University of technology, Vol32 partB.No.2.2014.
  • تضمين رساله سرية داخل نص عربي مشكل" 7-10 /5/2014 المؤتمر الدولي الثالث للغة العربي دولة الامارات دبي
  • Partial Cryptography in Digital Media Environment Based on ECC Algebra ", Iraqi Journal of Science, Vol 54.No.2.2013.Pp 455-467.
  • Moving Area Filter to Detect Objects in Video Sequences from Moving Platform" World Academy of Science, Engineering and Technology, International Journal of Computer, Information Science and Engineering ,Vol:7 No:9, 2013.
  • Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image", Iraqi Journal of Science, 2013, Vol 54, No.4, pp:955-964.
  • Partial Encryption in Digital Image Based On Plasma Encoding Techniques" مجلة الهيئة العراقية للمعلوماتية , العدد الاول
  • Improved Mean Shift Tracking Algorithm by Multi Scale Motion Information", IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p-ISSN: 2278-8719 Vol. 3, Issue 10 (October. 2013), ||V4|| PP 01-08.
  • Parallel Priority Region Approach to Detect Background", World Academy of Science, Engineering and Technology International Journal of Computer, Information Science and Engineering Vol:7 No:10, 2013.
  • Speed Image Encryption Scheme UsingDynamic Galois Field GF(P) Matrices , International Journal of Computer Applications (0975 – 8887),Volume 89 – No.7, March 2014
  • Dynamic Shuffling for Speed Image Encryption ", International Journal of Computer Applications (0975 – 8887),Volume 89 – No.7, March 2014.
  • Using Unitary Matrices in High-Speed Video Encryption" IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.8, August 2014.
  • Proposed Approach for Steganography in Arabic Text Based on B+_Tree,DNA Coding and Arabic Diacritics", International Journal of Advance Resach (IJAR),ISSN:2320-2407,2014.
  • Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks",978-1-4799-5627-2/14/$31.00 ©2014 IEEE.
  • Improvement A5/1 Encryption Algorithm Based On Sponge Techniques",978-1-4673-6636-6/15/$31.00 ©2015 IEEE.
  • Data Security Protocol for Wireless Sensor Network using Chaotic",Map",(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 8, August 2015.
  • New Watermark Technique Based on B+ Tree and Mathematical Morphology",Al-Mustansiriyah Journal of Science Vol. 26, No 1, 2015.
  • Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial", Eng. & Tech. Journal, University of technology, Vol32 partB.No.6.2016.
  • Improvement Majority Function in A5/1 stream cipher Algorithm", Eng. & Tech. Journal, University of technology, Vol34 partB.No.1.2016.
  • Variant length, Self-extracted audio watermark for verification using LWT and random selections", Diyala journal pure sciences, Vol: 13 No:2,P-ISSN: 2222-837, April 2017.
  • Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial", Eng. & Tech. Journal, University of technology, Vol34 partB.No.6.2016.
  • Speech Encryption Based on Wavelet Transformation and Chaotic Map", Eng. &Tech.Journal, Vol.34,Part (B), No.5,2016
  • Variant length, Self-extracted audio watermark for verification using LWT and random selections", Diyala journal pure sciences, Vol: 13 No:2,P-ISSN: 2222-837, April 2017.
  • Image Encryption Based on Intelligent Session Mask Keys",Iraqi Journal of Science, Vol. 58, No.1B, pp: 317-326,2017.

  • Computer Network University of Technology/ computer sciences department/ Postgraduate / Ph. D
  • Computer security University of Technology/ computer sciences department/ Postgraduate / M. Sc
  • Cryptanlaysis University of Technology/ computer sciences department/ Postgraduate / MSC- Security
  • C++, Pascal, ( 2002,2004) , programming using University of Technology/ computer sciences department/ under graduate/ stage1
  • Algorithms Complexity, Data security(2005-2009) University of Technology/ computer sciences department/ stages3,4
  • principles of networks, principles of security(2010-2013) University of Technology/ computer sciences department/stage1
  • Cryptanlaysis(2014-2019) University of Technology/ computer sciences department/stage4

  • Certificate of appreciation from Ministry of Higher Education issued on 6/4/2009.
Published in cv
Monday, 28 September 2020 09:14

Hanaa Mohsin Ahmed

Cinque Terre

Hanaa Mohsin Ahmed

Computer Sciences Department

Professor Doctor

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prof. Dr. Hanaa Mohsin Ahmed obtained her M.Sc. in Information Security and Ph.D. in Artificial Intelligent from the University of Technology Iraq in 2002 and 2006, respectively. Currently, she is a lecturer in Computer Science/ AI. Dr. Hanaa has more than 23 years of experience and has supervised graduate students in B.Sc. final year projects, MSc. and PhD. Her research interests include Robotics, Fuzzy systems, computer security, biometrics, image processing, and computer graphics.

CV  

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Professor Doctor date: 15/09/2019
  • Doctor of philosophy in computer science: University of Technology/Department of computer science: 18/10/2006
  • Master Information Security: University of Technology /Department of computer science: 30/12/2002
  • Higher diploma in information security: Higher Institute of computing and Informatics: 24/12/1998
  • Bachelor of applied mathematics: University of Baghdad/College of Science Department of Mathematics: 06/03/1990
  • Robotic, Computer Security and AI
  • A Natural Language Steganography Technique for Text Hiding Using LSB’s, University of Technology, Engineering & Technology Journal, Vol.26, No.3, 2008, P.O.Box.35010, Baghdad-Iraq., Email: This email address is being protected from spambots. You need JavaScript enabled to view it.
  • A Content-Based Authentication Using Digital Speech Data, University of Technology, Engineering & Technology Journal, Vol.25, No.10, 2007, P.O.Box.35010, Baghdad-Iraq., Email: This email address is being protected from spambots. You need JavaScript enabled to view it.
  • A Spectrum Method for Natural Language Text Watermarking Technique, Acit 2007 conference, The 26-28 November, 2007, The 8th international Arab conference on information technique
  • Fusion Face and Palmprint for Human Recognition Via Spectral Eigenvector, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: This email address is being protected from spambots. You need JavaScript enabled to view it., Year: 2009 Volume: 27 Issue: 4 Pages: 787-798
  • Palmprint Characterization Using Multi-wavelet Transform for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010, Volume: 27, No. 3 2009,.
  • Hybrid Information Hiding Technique Using Parametric Spline and DFT, Dr. Abdul Monem S. Rahma Dr. Hala Bahjat Abdul Wahab Dr. Hana'a M. Salman This email address is being protected from spambots. You need JavaScript enabled to view it. This email address is being protected from spambots. You need JavaScript enabled to view it. This email address is being protected from spambots. You need JavaScript enabled to view it., University of Technology, Engineering & Technology Journal, P.O.Box.35010, Baghdad-Iraq., Email: This email address is being protected from spambots. You need JavaScript enabled to view it.
  • A Use of Ridgelet Transform as a Speech Scrambling Means, Hana'a M. Salman , Layla Hattim Abood, This email address is being protected from spambots. You need JavaScript enabled to view it. This email address is being protected from spambots. You need JavaScript enabled to view it., Department of Control Engineering & Information System, University of Technology,
  • Spectral Eigenface Representation for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: This email address is being protected from spambots. You need JavaScript enabled to view it., Eng. & Tech. Journal ,Vol.28, No.19,2010
  • Human Identification Using Normalized Energy Based Spectrum Eigenpalms, This email address is being protected from spambots. You need JavaScript enabled to view it. Journal of Computer Engineering and communication and control systems (IJCCCE) , Year: 2010 Volume: 10 Issue: 1 Pages: 46-55
  • Principal Component Analysis Based Wavelet Transform, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: This email address is being protected from spambots. You need JavaScript enabled to view it., Eng. & Tech. Journal , Year: 2012 Volume: 30 Issue: 9 Pages: 1538-1549
  • Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method and Applied in the Hiding Process of the Speech and the Image, Professor DR. Abd Al-Majeed Hamza AL-Nassir, Dr. Hana'a M. Salman, Dr. Layla Matter Nassir, Al-Ma'mon College Journal, Year: 2012 Issue: 19-A Pages: 157-193
  • Fuzzy Bio-Cryptography Key Generation, The International Arab Journal of Information Technology, Vol. 1, July 2013
  • Proposal Design: Fingerprint Random Number Generators, The International Arab Journal of Information Technology, Vol. 1, July 2013
  • A Hana'a Salman Encryption Method, Iraqi Commission for Computers ,Conference, 2013
  • INFORMATION HIDING IN EDGE LOCATION OF VIDEO USING AMALGAMATE FFT AND CUBIC SPLINE, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
  • A SURVEY OF CLOUD BASED SECURED WEB APPLICATION, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
  • A Transform Based 3D- Speech Scrambling Using Multi-Wavelet: Design and Evaluation
  • A Survey on Smartphone Honeypot, Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad,
  • A HARMONIC SECRET SHARING AND PERMUTATION BASED
  • DOCUMENT IMAGE AUTHENTICATION, Muna Ghazi, 2Dr. Hanaa M. A. Salman, International Journal of Computer Engineering and Technology (IJCET), Volume 4, Issue 5, September - October (2013), © IAEME
  • Secret Sharing Scheme Based Technique for Authentication of Documents Images, Dr. Muna Ghazi & Dr. Hanaa M. A. Salman Eng. &Tech.Journal, Vol. 32,Part (B), No.6, 2014
  • Fuzzy Gradient Based Image Reconstruction As a Means for Detection the Tampering, Sixth Computer Science and Electronic Engineering Conference 2014 (CEEC'14), 25th-26th of September 2014, Essex University, UK
  • A Method for Detect Forgery from Images Dr. Hanaa Mohsin Ahmed Computer Science Department,University of Technology /Baghdad Email:This email address is being protected from spambots. You need JavaScript enabled to view it. Sabaa Rakan Salim Computer Science Department, University of Technology /Baghdad Email: This email address is being protected from spambots. You need JavaScript enabled to view it. Revised on: 1/9/2014 & Accepted on: 4/12/2015
  • Method for Detect and Extract Forgery from Images .
  • A Survey on SmartPhone Honeypot Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad
  • Design Requirements of a Smart Phone Honeypot System International Journal of Computer Application Issue 4, Volume 6 (Nov.- Dec. 2014) Available online on Assmaa A. Fahad#1, Dr.Hanaa Mohsin Ahmed#2, Dr. Nidaa Flaih Hassan#3
  • Cloud Based Secure Web Application Ahmed Hashim Mohammed, Dr. Hanaa M. A. Salman. & Dr. Saad K. Majeed
  • Detect and Prevent SQLIA by Dynamic Monitoring Ahmed Hashim Mohammed,2Dr. Hanaa M. A. Salman,3Dr. Saad K. Majeed Computer Science Department, University of Mustansiriyam,2,3.Computer Science Department, University of Technology
  • Integrate Liveness Detection with Iris Verification to Construct Support Biometric System Hanaa Mohsin Ahmad, Bushra Jabbar Abdulkareem ,Journal of Computer and Communications (JCC)
  • Arabic Language Text Steganography Besed on Microsoft Word documents Assist.prof. Dr. Hanaa M. Ahmed, PhD Students: Maisa'a A. A. Khohder, Computer Science Department Computer Science Department University of Technology University of Technology Baghdad, Iraq Baghdad, Iraq This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Arabic Language Script Steganography Based on Dynamic Random Linear Regression Ahmed, H.M., 2016. Collage of Education, 1(1) Ahmed, H.M., 2016. Journal of College of Education, (1), pp.397-414.
  • Arabic Language text Steganography Based on Microsoft Word document DHM Ahmed, MAA Khohder, Al-Yarmouk Journal 1 (4075-2954), 15 Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG, Ahmed, H.M., 2016. Iraqi Journal of Science, 57(2C), pp.1548-1557.
  • Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG/مجله كليه التربيه الاساسيه Ahmed, A.P.D.H.M., 2016. journal of the college of basic education, 22(95/علمي), pp.129-146.
  • Steganography of Arabic Language Scripts Based On Secret Sharing Using RNG, Ahmed, H.M. and Maisa'a, A.A.الامام جعفر الصادق
  • Steganography Arabic Text Based on Natural Language Process Documents Maisa'a, A.A. and Ahmed, H.M., 2016. Journal of College of Education/Wasit, 1(25), pp.457-480.
  • Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) Ahmed, H.M. and Maisa'a, A.A., 2016. Engineering and Technology Journal, 34(5 Part (B) Scientific), pp.629-637.
  • Arabic Language Document Steganography Based On Huffman Code Using DRLR as (RNG) Ahmed, H.M., 2016. AL-MANSOUR JOURNAL, (26), pp.57-84.
  • A Comparison Between a Number of the Proposed Linguistic Steganography Texts Ahmed, H.M. and Maisa’a, A.A., 2016. Int. J. Comput. Inf. Sci, 12(2), pp.243-251.
  • A Proposed Algorithms to Design Support Multimodal biometric System, Hanaa M. Ahmed*,Ph.D (Asst. Prof.) Bushra J. Abdulkareem**, Al-Mansour Journal/ Issue( 25 ) 2016 Iris anti-spoofing: static&Dynamic Technique,
  • Physical layer security comparison between Random Linear Network (RLNC) and Rateless code, International Journal for Sciences and Technology, Volume 11. No. 1/ March 2016 / ISSN: 2305-9346 stream cipher with space time block code
  • HM Ahmed, AA Hattab, International Journal of Computing & Information Sciences 12 (2), 227 FORMAL LANGUAGE _SPACE TIME BLOCK CODE for MOBILE NETWORK HM Ahm, AA Hattab, Diyala Journal For Pure Science 13 (2-part 2), 147-166
  • Proposed Method to Encrypt Images to Mobile device based on the principles of Shannonهناء وانوار/ مجله جامعتنا Active voice detection using ridgelet transform HM Ahmed, AL-MANSOUR JOURNAL, 47-56
  • Application of FPTRNG and Logistic_Map in Cryptography HM Ahmed, International Journal of Computing & Information Sciences 12 (2), 221
  • A Simple Detection Model to Suspicious Viber Messages/هناء ونور جامعه ديالى HM Ahmed, NB Bethoon
  • Design a smart phone honeypot system, asmaa, hanaa, nidaa
  • Cybercrime-Suspicious-Viber-Messages-Detection-Model HM Ahmed, NB Bethoon
  • Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method DR. Abd Al-Majeed Hamza AL-NassirHanaa Mohsin Ahmed SalmanLayla Matter
  • Ey-gaze traking for human mobile interface, H. Mohsin and S. H. Abdullah
  • Human face detection using skin color segmentation and morphological operation, H. Mohsin and S. H. Abdullah
  • Pupil Detection Algorithm Based on Feature Extraction for Eye Gaze H. Mohsin and S. H. Abdullah, "Pupil detection algorithm based on feature extraction for eye gaze," 2017 6th International Conference on Information and Communication Technology and Accessibility (ICTA), Muscat, 2017, pp. 1-4. doi: 10.1109/ICTA.2017.8336048
  • Mobile Devices Application Alive Face Detection Using Skin Color segmentation and gabor filter, H. Mohsin and S. H. Abdullah
  • Identification-Forgery-Image-and-Image-Operation-by-FCM-Algorithm Hanaa Mohsin Ahmed*, Ph.D (Asst. Prof.)* , and
  • A High Performance Authorized Login Secure by Cubic Spline and Keystroke Technique, Asset prof Dr Hanaa Mohsin Ahmed, Ahmed Oday
  • A Survey on Human Eye Gaze Tracking, H. Mohsin and S. H. Abdullah
  • Application for Identification True Instances Messages Sender, HM Ahmed, S Fadhil, Diyala Journal For Pure Science 14 (03), 159-171
  • Hybrid Security Methods for the Physical Layer of a Mobile Network Asst. Prof. Dr. Hanaa M. Ahmed and PhD Students: Anwar Abbas Hattab Department of Computer Science, Iraq University of Technology
  • A high speed programing for detect the gender by back-propagation algorithm , HM Ahmed, S Fadhil,
  • Secure by randomly cubic spline curve and blum blum algorithms for detect user authentic, Asset prof Dr Hanaa Mohsin Ahmed Ahmed Oday
  • Convolution neural netork for detect class: learning tool for kids Hanaa ana hala Hassan/جامعة النهرين
  • Review on image stegoanalysis using inria dataset جامعة بغداد, Hanaa ana hala hassan
  • Anti-screenshot keyboard for web based application using cloaking Hanaa Mohsin , halaa bahjat
  • Mobile based telemedicine application using svd and f-xor watermarking for medical images, Hanaa Mohsin Ahmed
  • Human face detection using skin color segmentation and morphological operations Al- Nisour university collage/scientific Journal unit , vol 7, year 2018
  • A survey on Human Eye-Gaze Tracking (EGT) system “A Comparative study”
  • Mobile Devices Application: Alive face Detection using skin color segmentation and Gabor filter, Al-MANSUR journal
  • Identification Forgery image and image operating by fuzzy c mean algorithm Al-MANSUR journal
  • Secure by randomly cubic spline curve and detect right user by easy way for authentication
  • Review on image Steganalysis using INRIA Dataset, Al-Nahrain Journal of Science Vol.21 (4), December, 2018, pp.94-108, Hanaa Mohsin Ahmed and Halah H. Mahmoud . [DOI: 10.22401/ANJS.21.4.13]
  • Effect of Successive Convolution Layers to Detect Gender, Hanaa Mohsin Ahmed, halaa hasan
  • Convolutional Neural Networks for Blind Image Steganalysis: A Comprehensive Study, Hanaa Mohsin Ahmed, halaa hasan
  • Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for blind image steganalysis Hanaa Mohsin Ahmed, halaa hasan
  • Effect of Number of levels in Dual Tree Complex Wavelet Transform to obtain accurate detection when design Universal image stego-analytic Hanaa Mohsin Ahmed, halaa hasan
  • Ahmed, H.M. and Jaber, H.R., Sentiment Analysis for Movie Reviews Based on Four Machine Learning Techniques.
  • Sentiment Analysis for Some Movie Reviewer Using Naïve Bayes Hanaa Mohsin Ahmed, hanaa jaber
  • English Alphabets Recognition Using Hand Gesture Hanaa Mohsin Ahmed, Yasser theaa, Al Mansur journal
  • Cryptosystem Using the Multi-Fusion Model for Large Confidential Messages Hanaa Mohsin Ahmed Mohsin H., Bahjat H. (2020) Anti-screenshot Keyboard for Web-Based Application Using Cloaking. In: Bouhlel M., Rovetta S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer,
  • Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images Hanaa Mohsin Ahmed, BSJ
  • Eye Detection using Helmholtz Principle, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ Ahmed, H.M. and Jassim, R.W., 2020. Multi-Resolution Like Data Transmission Security Using Diffie-Hellman Protocol. Diyala Journal For Pure Science, 16(01), pp.98-115.
  • Enhance Diffie-Hellman protocol of data transmission security , Ahmed, H.M. and Jassim, R.W., 2020
  • A Raspberry PI Real Time Identification System on Face Recognition, Hanaa Mohsin Ahmed and Ranaa T. Rasheed
  • Eye diseases classification using hierarchal multi-label artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ
  • A Brief Survey on Modern Iris Feature Extraction Method, Ahmed, H.M. and Jassim, R.W., 2020
  • Smart Door for handicapped people via face recognition and voice command technique, Hanaa Mohsin Ahmed and Ranaa T. Rasheed
  • Eye diseases classification using back propagation artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ
  • Distributed Transform Encoder To Improve Diffie-Hellman Protocol for Big Message Security, Ahmed, H.M. and Jassim, R.W., 2020
  • Logic Design University of Technology-Iraq/computer Science
  • Information System University of Technology-Iraq/computer Science
  • Fuzzy Systems University of Technology-Iraq/computer Science
  • Network and Mobile Security University of Technology-Iraq/computer Science
  • Cryptanalysis
  • University of Technology-Iraq/computer Science
  • Compiler University of Technology-Iraq/computer Science
  • Number theory University of Technology-Iraq/computer Science
  • Modeling and simulation University of Technology-Iraq/computer Science
  • Coding theory University of Technology-Iraq/computer Science
  • Information Hiding University of Technology-Iraq/computer Science
  • Advanced intelligent search Algorithms University of Technology-Iraq/computer Science
  • Data Mining University of Technology-Iraq/computer Science
  • Multimedia Security University of Technology-Iraq/computer Science
  • Computer Vision University of Technology-Iraq/computer Science
  • Forensic Computing University of Technology-Iraq/computer Science
  • Computer Security University of Technology-Iraq/computer Science
  • Computer Vision and Image Processing University of Technology-Iraq/computer Science
  • Shield from the Ministry of higher education and research
  • Shield of technology University Presidents
  • Shield of technology University Presidents
  • Shield of technology University Presidents of short
  • Shield of the first professor at Department of computer science for the academic year 2015-2016
Published in cv

    Developers              Dept. Media         

Top