Head of the Profile

Hala Bahjat Abdul Wahab

Computer Sciences Department

Professor Doctor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Name: Hala Bahjat Abdul Wahab
Date of Birth: Jun.28 . 1969, Basrah -Iraq.
Marital Status: Married, Family: 3 children's
Place of Residence: Baghdad/ Iraq
The Scientific Degree: professor since 22/12/2018
Activities:
1. Computer sciences centre-engineering collage/ Assistant Programmer / University of Basrah 1991-1995
2. Department of Computer Science/ Assistant Research / University of Technology 1995-2001
3. Department of Computer Science / Assistant Lecturer /University of Technology from 2001 - 2006
4. Head of the Security Branch / Department of Computer Science / University of Technology 2006-2009
5. Department of Computer Science/ Lecturer / University of Technology from 2009 - 2012
6. Member in the Department of Computer Science of the Scientific Committee / University of Technology 2011-2012
7. Chairman of the Scientific Promotion Department of Computer Science / University of Technology 2012-2014
8. Member of the Committee for Scientific and University Promotions at the University of Technology2012-2014
9. Member of the editorial board of the Journal of Engineering and Technology - University of Technology 2014- 2017.
10. Head of Information Systems Branch / Department of Computer Science / University of Technology 2012 - 2015
11. Head of Computer Science Department / University of Technology/2015 -2019.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • B. Sc. University of Basrah 1990 Iraq
  • M. Sc University of technology 2001 Iraq
  • Ph. D University of technology 2006 Iraq

  • Computer sciences/ computer security
  • Computer sciences/ network security
  • Computer sciences/ multimedia security
  • Computer sciences/graphics and curves security

  • Modification Approach Method for RC4 Using 2D Wavelet Transform", Vol.21. No.4.2010.Al-Mustansiriyah Journal of science.
  • "Proposed Steganography method dor data hiding in Microsoft word document structure", Al –Mansour Journal,Al-mansour University college, Vol.11. No.4.2010.
  • Proposed New Elliptic Curve Cryptography Protocol Based on Dictionary Techniques", European Journal of Scientific Research, vol77, Issue 2,2012.
  • Proposed New Algorithm to Generate Cryptography Session Keys Based on CFG and Huffman Code", European Journal of Scientific Research, vol.78, Issue 4,2012.
  • Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebraand Metaheuristic Algorithms, Eng. & Tech. Journal, University of technology, Vol32 partB.No.2.2014.
  • تضمين رساله سرية داخل نص عربي مشكل" 7-10 /5/2014 المؤتمر الدولي الثالث للغة العربي دولة الامارات دبي
  • Partial Cryptography in Digital Media Environment Based on ECC Algebra ", Iraqi Journal of Science, Vol 54.No.2.2013.Pp 455-467.
  • Moving Area Filter to Detect Objects in Video Sequences from Moving Platform" World Academy of Science, Engineering and Technology, International Journal of Computer, Information Science and Engineering ,Vol:7 No:9, 2013.
  • Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image", Iraqi Journal of Science, 2013, Vol 54, No.4, pp:955-964.
  • Partial Encryption in Digital Image Based On Plasma Encoding Techniques" مجلة الهيئة العراقية للمعلوماتية , العدد الاول
  • Improved Mean Shift Tracking Algorithm by Multi Scale Motion Information", IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p-ISSN: 2278-8719 Vol. 3, Issue 10 (October. 2013), ||V4|| PP 01-08.
  • Parallel Priority Region Approach to Detect Background", World Academy of Science, Engineering and Technology International Journal of Computer, Information Science and Engineering Vol:7 No:10, 2013.
  • Speed Image Encryption Scheme UsingDynamic Galois Field GF(P) Matrices , International Journal of Computer Applications (0975 – 8887),Volume 89 – No.7, March 2014
  • Dynamic Shuffling for Speed Image Encryption ", International Journal of Computer Applications (0975 – 8887),Volume 89 – No.7, March 2014.
  • Using Unitary Matrices in High-Speed Video Encryption" IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.8, August 2014.
  • Proposed Approach for Steganography in Arabic Text Based on B+_Tree,DNA Coding and Arabic Diacritics", International Journal of Advance Resach (IJAR),ISSN:2320-2407,2014.
  • Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks",978-1-4799-5627-2/14/$31.00 ©2014 IEEE.
  • Improvement A5/1 Encryption Algorithm Based On Sponge Techniques",978-1-4673-6636-6/15/$31.00 ©2015 IEEE.
  • Data Security Protocol for Wireless Sensor Network using Chaotic",Map",(IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 8, August 2015.
  • New Watermark Technique Based on B+ Tree and Mathematical Morphology",Al-Mustansiriyah Journal of Science Vol. 26, No 1, 2015.
  • Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial", Eng. & Tech. Journal, University of technology, Vol32 partB.No.6.2016.
  • Improvement Majority Function in A5/1 stream cipher Algorithm", Eng. & Tech. Journal, University of technology, Vol34 partB.No.1.2016.
  • Variant length, Self-extracted audio watermark for verification using LWT and random selections", Diyala journal pure sciences, Vol: 13 No:2,P-ISSN: 2222-837, April 2017.
  • Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial", Eng. & Tech. Journal, University of technology, Vol34 partB.No.6.2016.
  • Speech Encryption Based on Wavelet Transformation and Chaotic Map", Eng. &Tech.Journal, Vol.34,Part (B), No.5,2016
  • Variant length, Self-extracted audio watermark for verification using LWT and random selections", Diyala journal pure sciences, Vol: 13 No:2,P-ISSN: 2222-837, April 2017.
  • Image Encryption Based on Intelligent Session Mask Keys",Iraqi Journal of Science, Vol. 58, No.1B, pp: 317-326,2017.

  • Computer Network University of Technology/ computer sciences department/ Postgraduate / Ph. D
  • Computer security University of Technology/ computer sciences department/ Postgraduate / M. Sc
  • Cryptanlaysis University of Technology/ computer sciences department/ Postgraduate / MSC- Security
  • C++, Pascal, ( 2002,2004) , programming using University of Technology/ computer sciences department/ under graduate/ stage1
  • Algorithms Complexity, Data security(2005-2009) University of Technology/ computer sciences department/ stages3,4
  • principles of networks, principles of security(2010-2013) University of Technology/ computer sciences department/stage1
  • Cryptanlaysis(2014-2019) University of Technology/ computer sciences department/stage4

  • Certificate of appreciation from Ministry of Higher Education issued on 6/4/2009.
Top