Cinque Terre

Hanaa Mohsin Ahmed

Computer Sciences Department

Professor Doctor

عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

Prof. Dr. Hanaa Mohsin Ahmed obtained her M.Sc. in Information Security and Ph.D. in Artificial Intelligent from the University of Technology Iraq in 2002 and 2006, respectively. Currently, she is a lecturer in Computer Science/ AI. Dr. Hanaa has more than 23 years of experience and has supervised graduate students in B.Sc. final year projects, MSc. and PhD. Her research interests include Robotics, Fuzzy systems, computer security, biometrics, image processing, and computer graphics.

CV

Google Scholar Profile

ResearchGate Profile

Publons Profile

ORCID iD

Scopus

  • Professor Doctor date: 15/09/2019
  • Doctor of philosophy in computer science: University of Technology/Department of computer science: 18/10/2006
  • Master Information Security: University of Technology /Department of computer science: 30/12/2002
  • Higher diploma in information security: Higher Institute of computing and Informatics: 24/12/1998
  • Bachelor of applied mathematics: University of Baghdad/College of Science Department of Mathematics: 06/03/1990
  • Robotic, Computer Security and AI
  • A Natural Language Steganography Technique for Text Hiding Using LSB’s, University of Technology, Engineering & Technology Journal, Vol.26, No.3, 2008, P.O.Box.35010, Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • A Content-Based Authentication Using Digital Speech Data, University of Technology, Engineering & Technology Journal, Vol.25, No.10, 2007, P.O.Box.35010, Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • A Spectrum Method for Natural Language Text Watermarking Technique, Acit 2007 conference, The 26-28 November, 2007, The 8th international Arab conference on information technique
  • Fusion Face and Palmprint for Human Recognition Via Spectral Eigenvector, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Year: 2009 Volume: 27 Issue: 4 Pages: 787-798
  • Palmprint Characterization Using Multi-wavelet Transform for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010, Volume: 27, No. 3 2009,.
  • Hybrid Information Hiding Technique Using Parametric Spline and DFT, Dr. Abdul Monem S. Rahma Dr. Hala Bahjat Abdul Wahab Dr. Hana'a M. Salman عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., University of Technology, Engineering & Technology Journal, P.O.Box.35010, Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • A Use of Ridgelet Transform as a Speech Scrambling Means, Hana'a M. Salman , Layla Hattim Abood, عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Department of Control Engineering & Information System, University of Technology,
  • Spectral Eigenface Representation for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Eng. & Tech. Journal ,Vol.28, No.19,2010
  • Human Identification Using Normalized Energy Based Spectrum Eigenpalms, عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. Journal of Computer Engineering and communication and control systems (IJCCCE) , Year: 2010 Volume: 10 Issue: 1 Pages: 46-55
  • Principal Component Analysis Based Wavelet Transform, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., Eng. & Tech. Journal , Year: 2012 Volume: 30 Issue: 9 Pages: 1538-1549
  • Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method and Applied in the Hiding Process of the Speech and the Image, Professor DR. Abd Al-Majeed Hamza AL-Nassir, Dr. Hana'a M. Salman, Dr. Layla Matter Nassir, Al-Ma'mon College Journal, Year: 2012 Issue: 19-A Pages: 157-193
  • Fuzzy Bio-Cryptography Key Generation, The International Arab Journal of Information Technology, Vol. 1, July 2013
  • Proposal Design: Fingerprint Random Number Generators, The International Arab Journal of Information Technology, Vol. 1, July 2013
  • A Hana'a Salman Encryption Method, Iraqi Commission for Computers ,Conference, 2013
  • INFORMATION HIDING IN EDGE LOCATION OF VIDEO USING AMALGAMATE FFT AND CUBIC SPLINE, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
  • A SURVEY OF CLOUD BASED SECURED WEB APPLICATION, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
  • A Transform Based 3D- Speech Scrambling Using Multi-Wavelet: Design and Evaluation
  • A Survey on Smartphone Honeypot, Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad,
  • A HARMONIC SECRET SHARING AND PERMUTATION BASED
  • DOCUMENT IMAGE AUTHENTICATION, Muna Ghazi, 2Dr. Hanaa M. A. Salman, International Journal of Computer Engineering and Technology (IJCET), Volume 4, Issue 5, September - October (2013), © IAEME
  • Secret Sharing Scheme Based Technique for Authentication of Documents Images, Dr. Muna Ghazi & Dr. Hanaa M. A. Salman Eng. &Tech.Journal, Vol. 32,Part (B), No.6, 2014
  • Fuzzy Gradient Based Image Reconstruction As a Means for Detection the Tampering, Sixth Computer Science and Electronic Engineering Conference 2014 (CEEC'14), 25th-26th of September 2014, Essex University, UK
  • A Method for Detect Forgery from Images Dr. Hanaa Mohsin Ahmed Computer Science Department,University of Technology /Baghdad Email:عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. Sabaa Rakan Salim Computer Science Department, University of Technology /Baghdad Email: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته. Revised on: 1/9/2014 & Accepted on: 4/12/2015
  • Method for Detect and Extract Forgery from Images .
  • A Survey on SmartPhone Honeypot Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad
  • Design Requirements of a Smart Phone Honeypot System International Journal of Computer Application Issue 4, Volume 6 (Nov.- Dec. 2014) Available online on Assmaa A. Fahad#1, Dr.Hanaa Mohsin Ahmed#2, Dr. Nidaa Flaih Hassan#3
  • Cloud Based Secure Web Application Ahmed Hashim Mohammed, Dr. Hanaa M. A. Salman. & Dr. Saad K. Majeed
  • Detect and Prevent SQLIA by Dynamic Monitoring Ahmed Hashim Mohammed,2Dr. Hanaa M. A. Salman,3Dr. Saad K. Majeed Computer Science Department, University of Mustansiriyam,2,3.Computer Science Department, University of Technology
  • Integrate Liveness Detection with Iris Verification to Construct Support Biometric System Hanaa Mohsin Ahmad, Bushra Jabbar Abdulkareem ,Journal of Computer and Communications (JCC)
  • Arabic Language Text Steganography Besed on Microsoft Word documents Assist.prof. Dr. Hanaa M. Ahmed, PhD Students: Maisa'a A. A. Khohder, Computer Science Department Computer Science Department University of Technology University of Technology Baghdad, Iraq Baghdad, Iraq عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.
  • Arabic Language Script Steganography Based on Dynamic Random Linear Regression Ahmed, H.M., 2016. Collage of Education, 1(1) Ahmed, H.M., 2016. Journal of College of Education, (1), pp.397-414.
  • Arabic Language text Steganography Based on Microsoft Word document DHM Ahmed, MAA Khohder, Al-Yarmouk Journal 1 (4075-2954), 15 Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG, Ahmed, H.M., 2016. Iraqi Journal of Science, 57(2C), pp.1548-1557.
  • Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG/مجله كليه التربيه الاساسيه Ahmed, A.P.D.H.M., 2016. journal of the college of basic education, 22(95/علمي), pp.129-146.
  • Steganography of Arabic Language Scripts Based On Secret Sharing Using RNG, Ahmed, H.M. and Maisa'a, A.A.الامام جعفر الصادق
  • Steganography Arabic Text Based on Natural Language Process Documents Maisa'a, A.A. and Ahmed, H.M., 2016. Journal of College of Education/Wasit, 1(25), pp.457-480.
  • Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) Ahmed, H.M. and Maisa'a, A.A., 2016. Engineering and Technology Journal, 34(5 Part (B) Scientific), pp.629-637.
  • Arabic Language Document Steganography Based On Huffman Code Using DRLR as (RNG) Ahmed, H.M., 2016. AL-MANSOUR JOURNAL, (26), pp.57-84.
  • A Comparison Between a Number of the Proposed Linguistic Steganography Texts Ahmed, H.M. and Maisa’a, A.A., 2016. Int. J. Comput. Inf. Sci, 12(2), pp.243-251.
  • A Proposed Algorithms to Design Support Multimodal biometric System, Hanaa M. Ahmed*,Ph.D (Asst. Prof.) Bushra J. Abdulkareem**, Al-Mansour Journal/ Issue( 25 ) 2016 Iris anti-spoofing: static&Dynamic Technique,
  • Physical layer security comparison between Random Linear Network (RLNC) and Rateless code, International Journal for Sciences and Technology, Volume 11. No. 1/ March 2016 / ISSN: 2305-9346 stream cipher with space time block code
  • HM Ahmed, AA Hattab, International Journal of Computing & Information Sciences 12 (2), 227 FORMAL LANGUAGE _SPACE TIME BLOCK CODE for MOBILE NETWORK HM Ahm, AA Hattab, Diyala Journal For Pure Science 13 (2-part 2), 147-166
  • Proposed Method to Encrypt Images to Mobile device based on the principles of Shannonهناء وانوار/ مجله جامعتنا Active voice detection using ridgelet transform HM Ahmed, AL-MANSOUR JOURNAL, 47-56
  • Application of FPTRNG and Logistic_Map in Cryptography HM Ahmed, International Journal of Computing & Information Sciences 12 (2), 221
  • A Simple Detection Model to Suspicious Viber Messages/هناء ونور جامعه ديالى HM Ahmed, NB Bethoon
  • Design a smart phone honeypot system, asmaa, hanaa, nidaa
  • Cybercrime-Suspicious-Viber-Messages-Detection-Model HM Ahmed, NB Bethoon
  • Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method DR. Abd Al-Majeed Hamza AL-NassirHanaa Mohsin Ahmed SalmanLayla Matter
  • Ey-gaze traking for human mobile interface, H. Mohsin and S. H. Abdullah
  • Human face detection using skin color segmentation and morphological operation, H. Mohsin and S. H. Abdullah
  • Pupil Detection Algorithm Based on Feature Extraction for Eye Gaze H. Mohsin and S. H. Abdullah, "Pupil detection algorithm based on feature extraction for eye gaze," 2017 6th International Conference on Information and Communication Technology and Accessibility (ICTA), Muscat, 2017, pp. 1-4. doi: 10.1109/ICTA.2017.8336048
  • Mobile Devices Application Alive Face Detection Using Skin Color segmentation and gabor filter, H. Mohsin and S. H. Abdullah
  • Identification-Forgery-Image-and-Image-Operation-by-FCM-Algorithm Hanaa Mohsin Ahmed*, Ph.D (Asst. Prof.)* , and
  • A High Performance Authorized Login Secure by Cubic Spline and Keystroke Technique, Asset prof Dr Hanaa Mohsin Ahmed, Ahmed Oday
  • A Survey on Human Eye Gaze Tracking, H. Mohsin and S. H. Abdullah
  • Application for Identification True Instances Messages Sender, HM Ahmed, S Fadhil, Diyala Journal For Pure Science 14 (03), 159-171
  • Hybrid Security Methods for the Physical Layer of a Mobile Network Asst. Prof. Dr. Hanaa M. Ahmed and PhD Students: Anwar Abbas Hattab Department of Computer Science, Iraq University of Technology
  • A high speed programing for detect the gender by back-propagation algorithm , HM Ahmed, S Fadhil,
  • Secure by randomly cubic spline curve and blum blum algorithms for detect user authentic, Asset prof Dr Hanaa Mohsin Ahmed Ahmed Oday
  • Convolution neural netork for detect class: learning tool for kids Hanaa ana hala Hassan/جامعة النهرين
  • Review on image stegoanalysis using inria dataset جامعة بغداد, Hanaa ana hala hassan
  • Anti-screenshot keyboard for web based application using cloaking Hanaa Mohsin , halaa bahjat
  • Mobile based telemedicine application using svd and f-xor watermarking for medical images, Hanaa Mohsin Ahmed
  • Human face detection using skin color segmentation and morphological operations Al- Nisour university collage/scientific Journal unit , vol 7, year 2018
  • A survey on Human Eye-Gaze Tracking (EGT) system “A Comparative study”
  • Mobile Devices Application: Alive face Detection using skin color segmentation and Gabor filter, Al-MANSUR journal
  • Identification Forgery image and image operating by fuzzy c mean algorithm Al-MANSUR journal
  • Secure by randomly cubic spline curve and detect right user by easy way for authentication
  • Review on image Steganalysis using INRIA Dataset, Al-Nahrain Journal of Science Vol.21 (4), December, 2018, pp.94-108, Hanaa Mohsin Ahmed and Halah H. Mahmoud . [DOI: 10.22401/ANJS.21.4.13]
  • Effect of Successive Convolution Layers to Detect Gender, Hanaa Mohsin Ahmed, halaa hasan
  • Convolutional Neural Networks for Blind Image Steganalysis: A Comprehensive Study, Hanaa Mohsin Ahmed, halaa hasan
  • Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for blind image steganalysis Hanaa Mohsin Ahmed, halaa hasan
  • Effect of Number of levels in Dual Tree Complex Wavelet Transform to obtain accurate detection when design Universal image stego-analytic Hanaa Mohsin Ahmed, halaa hasan
  • Ahmed, H.M. and Jaber, H.R., Sentiment Analysis for Movie Reviews Based on Four Machine Learning Techniques.
  • Sentiment Analysis for Some Movie Reviewer Using Naïve Bayes Hanaa Mohsin Ahmed, hanaa jaber
  • English Alphabets Recognition Using Hand Gesture Hanaa Mohsin Ahmed, Yasser theaa, Al Mansur journal
  • Cryptosystem Using the Multi-Fusion Model for Large Confidential Messages Hanaa Mohsin Ahmed Mohsin H., Bahjat H. (2020) Anti-screenshot Keyboard for Web-Based Application Using Cloaking. In: Bouhlel M., Rovetta S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer,
  • Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images Hanaa Mohsin Ahmed, BSJ
  • Eye Detection using Helmholtz Principle, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ Ahmed, H.M. and Jassim, R.W., 2020. Multi-Resolution Like Data Transmission Security Using Diffie-Hellman Protocol. Diyala Journal For Pure Science, 16(01), pp.98-115.
  • Enhance Diffie-Hellman protocol of data transmission security , Ahmed, H.M. and Jassim, R.W., 2020
  • A Raspberry PI Real Time Identification System on Face Recognition, Hanaa Mohsin Ahmed and Ranaa T. Rasheed
  • Eye diseases classification using hierarchal multi-label artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ
  • A Brief Survey on Modern Iris Feature Extraction Method, Ahmed, H.M. and Jassim, R.W., 2020
  • Smart Door for handicapped people via face recognition and voice command technique, Hanaa Mohsin Ahmed and Ranaa T. Rasheed
  • Eye diseases classification using back propagation artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ
  • Distributed Transform Encoder To Improve Diffie-Hellman Protocol for Big Message Security, Ahmed, H.M. and Jassim, R.W., 2020
  • Logic Design University of Technology-Iraq/computer Science
  • Information System University of Technology-Iraq/computer Science
  • Fuzzy Systems University of Technology-Iraq/computer Science
  • Network and Mobile Security University of Technology-Iraq/computer Science
  • Cryptanalysis
  • University of Technology-Iraq/computer Science
  • Compiler University of Technology-Iraq/computer Science
  • Number theory University of Technology-Iraq/computer Science
  • Modeling and simulation University of Technology-Iraq/computer Science
  • Coding theory University of Technology-Iraq/computer Science
  • Information Hiding University of Technology-Iraq/computer Science
  • Advanced intelligent search Algorithms University of Technology-Iraq/computer Science
  • Data Mining University of Technology-Iraq/computer Science
  • Multimedia Security University of Technology-Iraq/computer Science
  • Computer Vision University of Technology-Iraq/computer Science
  • Forensic Computing University of Technology-Iraq/computer Science
  • Computer Security University of Technology-Iraq/computer Science
  • Computer Vision and Image Processing University of Technology-Iraq/computer Science
  • Shield from the Ministry of higher education and research
  • Shield of technology University Presidents
  • Shield of technology University Presidents
  • Shield of technology University Presidents of short
  • Shield of the first professor at Department of computer science for the academic year 2015-2016
Top