Back

قسم علوم الحاسوب

الكادر الأكاديمي

د. هناء محسن أحمد

أستاذ

الأستاذة الدكتورة هناء محسن أحمد حاصلة على ماجستير في أمن المعلومات ودكتوراه في الذكاء الاصطناعي من الجامعة التكنولوجية العراقية في عامي 2002 و2006 على التوالي. وتعمل حاليًا محاضرة في علوم الحاسوب/الذكاء الاصطناعي. تتمتع الدكتورة هناء بخبرة تزيد عن 23 عامًا، وقد أشرفت على طلاب الدراسات العليا في مشاريع السنة النهائية في البكالوريوس والماجستير والدكتوراه. تشمل اهتماماتها البحثية علم الروبوتات، والأنظمة الضبابية، وأمن الحاسوب، والقياسات الحيوية، ومعالجة الصور، ورسومات الحاسوب.

التعليم

أستاذ دكتور تاريخ: 15/09/2019
دكتوراه الفلسفة في علوم الحاسب الآلي: جامعة التكنولوجيا/قسم علوم الحاسب الآلي: 18/10/2006
ماجستير أمن المعلومات: جامعة التكنولوجيا / قسم علوم الحاسب الآلي: 30/12/2002
الدبلوم العالي في أمن المعلومات: المعهد العالي للحوسبة والمعلوماتية: 24/12/1998
بكالوريوس في الرياضيات التطبيقية: جامعة بغداد/كلية العلوم قسم الرياضيات: 06/03/1990

الاهتمامات البحثية

الروبوتات
أمن الحاسوب
الذكاء الاصطناعي


التدريس

التصميم المنطقي جامعة التكنولوجيا-العراق/علوم الحاسوب
نظم المعلومات جامعة التكنولوجيا – العراق/علوم الحاسوب
الأنظمة الضبابية جامعة التكنولوجيا-العراق/علوم الحاسوب
أمن الشبكات والأجهزة المحمولة جامعة التكنولوجيا-العراق/علوم الحاسوب
تحليل الشفرات
جامعة التكنولوجيا-العراق/علوم الحاسب الآلي
المحول البرمجي جامعة التكنولوجيا-العراق/علوم الحاسب الآلي
نظرية الأعداد جامعة التكنولوجيا-العراق/علوم الحاسوب
النمذجة والمحاكاة جامعة التكنولوجيا-العراق/علوم الحاسب الآلي
نظرية الترميز جامعة التكنولوجيا-العراق/علوم الحاسب الآلي
إخفاء المعلومات جامعة التكنولوجيا-العراق/علوم الحاسوب
خوارزميات البحث الذكي المتقدم خوارزميات البحث الذكي المتقدم جامعة التكنولوجيا-العراق/علوم الحاسوب
التنقيب عن البيانات جامعة التكنولوجيا-العراق/علوم الحاسوب
أمن الوسائط المتعددة جامعة التكنولوجيا-العراق/علوم الحاسوب
الرؤية الحاسوبية جامعة التكنولوجيا-العراق/علوم الحاسوب
الحوسبة الجنائية جامعة التكنولوجيا-العراق/علوم الحاسوب
أمن الحاسوب جامعة التكنولوجيا – العراق/علوم الحاسوب
الرؤية الحاسوبية ومعالجة الصور الحاسوبية جامعة التكنولوجيا-العراق/علوم الحاسوب

آخر البحوث المنشورة

A Natural Language Steganography Technique for Text Hiding Using LSB’s, University of Technology, Engineering & Technology Journal, Vol.26, No.3, 2008, P.O.Box.35010, Baghdad-Iraq., Email: uot_techmagaz@yahoo.com

A Content-Based Authentication Using Digital Speech Data, University of Technology, Engineering & Technology Journal, Vol.25, No.10, 2007, P.O.Box.35010, Baghdad-Iraq., Email: uot_techmagaz@yahoo.com

A Spectrum Method for Natural Language Text Watermarking Technique, Acit 2007 conference, The 26-28 November, 2007, The 8th international Arab conference on information technique

Fusion Face and Palmprint for Human Recognition Via Spectral Eigenvector, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: uot_techmagaz@yahoo.com, Year: 2009 Volume: 27 Issue: 4 Pages: 787-798

Palmprint Characterization Using Multi-wavelet Transform for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010, Volume: 27, No. 3 2009,.

Hybrid Information Hiding Technique Using Parametric Spline and DFT, Dr. Abdul Monem S. Rahma Dr. Hala Bahjat Abdul Wahab Dr. Hana’a M. Salman monemrahma@yahoo.com hala_bahjat@yahoo.com salmanhana2007@yahoo.com, University of Technology, Engineering & Technology Journal, P.O.Box.35010, Baghdad-Iraq., Email: uot_techmagaz@yahoo.com

A Use of Ridgelet Transform as a Speech Scrambling Means, Hana’a M. Salman , Layla Hattim Abood, salmanhana2007@yahoo.com Layhatim_2000@yahoo.com, Department of Control Engineering & Information System, University of Technology,

Spectral Eigenface Representation for Human Identification, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: uot_techmagaz@yahoo.com, Eng. & Tech. Journal ,Vol.28, No.19,2010

Human Identification Using Normalized Energy Based Spectrum Eigenpalms, ijccce_uot@yahoo.com Journal of Computer Engineering and communication and control systems (IJCCCE) , Year: 2010 Volume: 10 Issue: 1 Pages: 46-55

Principal Component Analysis Based Wavelet Transform, University of Technology, Engineering & Technology Journal, P.O.Box.35010 , Baghdad-Iraq., Email: uot_techmagaz@yahoo.com, Eng. & Tech. Journal , Year: 2012 Volume: 30 Issue: 9 Pages: 1538-1549

Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method and Applied in the Hiding Process of the Speech and the Image, Professor DR. Abd Al-Majeed Hamza AL-Nassir, Dr. Hana’a M. Salman, Dr. Layla Matter Nassir, Al-Ma’mon College Journal, Year: 2012 Issue: 19-A Pages: 157-193

Fuzzy Bio-Cryptography Key Generation, The International Arab Journal of Information Technology, Vol. 1, July 2013

Proposal Design: Fingerprint Random Number Generators, The International Arab Journal of Information Technology, Vol. 1, July 2013

A Hana’a Salman Encryption Method, Iraqi Commission for Computers ,Conference, 2013

INFORMATION HIDING IN EDGE LOCATION OF VIDEO USING AMALGAMATE FFT AND CUBIC SPLINE, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME

A SURVEY OF CLOUD BASED SECURED WEB APPLICATION, International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME

A Transform Based 3D- Speech Scrambling Using Multi-Wavelet: Design and Evaluation

A Survey on Smartphone Honeypot, Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad,

A HARMONIC SECRET SHARING AND PERMUTATION BASED

DOCUMENT IMAGE AUTHENTICATION, Muna Ghazi, 2Dr. Hanaa M. A. Salman, International Journal of Computer Engineering and Technology (IJCET), Volume 4, Issue 5, September – October (2013), © IAEME

Secret Sharing Scheme Based Technique for Authentication of Documents Images, Dr. Muna Ghazi & Dr. Hanaa M. A. Salman Eng. &Tech.Journal, Vol. 32,Part (B), No.6, 2014

Fuzzy Gradient Based Image Reconstruction As a Means for Detection the Tampering, Sixth Computer Science and Electronic Engineering Conference 2014 (CEEC’14), 25th-26th of September 2014, Essex University, UK

A Method for Detect Forgery from Images Dr. Hanaa Mohsin Ahmed Computer Science Department,University of Technology /Baghdad Email:salmanhanna2007@yahoo.com Sabaa Rakan Salim Computer Science Department, University of Technology /Baghdad Email: sabaaalhamdany@gmail.com Revised on: 1/9/2014 & Accepted on: 4/12/2015

Method for Detect and Extract Forgery from Images .

A Survey on SmartPhone Honeypot Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad

Design Requirements of a Smart Phone Honeypot System International Journal of Computer Application Issue 4, Volume 6 (Nov.- Dec. 2014) Available online on Assmaa A. Fahad#1, Dr.Hanaa Mohsin Ahmed#2, Dr. Nidaa Flaih Hassan#3

Cloud Based Secure Web Application Ahmed Hashim Mohammed, Dr. Hanaa M. A. Salman. & Dr. Saad K. Majeed

Detect and Prevent SQLIA by Dynamic Monitoring Ahmed Hashim Mohammed,2Dr. Hanaa M. A. Salman,3Dr. Saad K. Majeed Computer Science Department, University of Mustansiriyam,2,3.Computer Science Department, University of Technology

Integrate Liveness Detection with Iris Verification to Construct Support Biometric System Hanaa Mohsin Ahmad, Bushra Jabbar Abdulkareem ,Journal of Computer and Communications (JCC)

Arabic Language Text Steganography Besed on Microsoft Word documents Assist.prof. Dr. Hanaa M. Ahmed, PhD Students: Maisa’a A. A. Khohder, Computer Science Department Computer Science Department University of Technology University of Technology Baghdad, Iraq Baghdad, Iraq salmanhanna2007@yahoo.commaisaa.ali2007@yahoo.com

Arabic Language Script Steganography Based on Dynamic Random Linear Regression Ahmed, H.M., 2016. Collage of Education, 1(1) Ahmed, H.M., 2016. Journal of College of Education, (1), pp.397-414.

Arabic Language text Steganography Based on Microsoft Word document DHM Ahmed, MAA Khohder, Al-Yarmouk Journal 1 (4075-2954), 15 Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG, Ahmed, H.M., 2016. Iraqi Journal of Science, 57(2C), pp.1548-1557.

Steganography Techniques for Arabic Language Texts Utilizing Single-Double Quotation Using RNG/مجله كليه التربيه الاساسيه Ahmed, A.P.D.H.M., 2016. journal of the college of basic education, 22(95/علمي), pp.129-146.

Steganography of Arabic Language Scripts Based On Secret Sharing Using RNG, Ahmed, H.M. and Maisa’a, A.A.الامام جعفر الصادق

Steganography Arabic Text Based on Natural Language Process Documents Maisa’a, A.A. and Ahmed, H.M., 2016. Journal of College of Education/Wasit, 1(25), pp.457-480.

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) Ahmed, H.M. and Maisa’a, A.A., 2016. Engineering and Technology Journal, 34(5 Part (B) Scientific), pp.629-637.

Arabic Language Document Steganography Based On Huffman Code Using DRLR as (RNG) Ahmed, H.M., 2016. AL-MANSOUR JOURNAL, (26), pp.57-84.

A Comparison Between a Number of the Proposed Linguistic Steganography Texts Ahmed, H.M. and Maisa’a, A.A., 2016. Int. J. Comput. Inf. Sci, 12(2), pp.243-251.

A Proposed Algorithms to Design Support Multimodal biometric System, Hanaa M. Ahmed*,Ph.D (Asst. Prof.) Bushra J. Abdulkareem**, Al-Mansour Journal/ Issue( 25 ) 2016 Iris anti-spoofing: static&Dynamic Technique,

Physical layer security comparison between Random Linear Network (RLNC) and Rateless code, International Journal for Sciences and Technology, Volume 11. No. 1/ March 2016 / ISSN: 2305-9346 stream cipher with space time block code

HM Ahmed, AA Hattab, International Journal of Computing & Information Sciences 12 (2), 227 FORMAL LANGUAGE _SPACE TIME BLOCK CODE for MOBILE NETWORK HM Ahm, AA Hattab, Diyala Journal For Pure Science 13 (2-part 2), 147-166

Proposed Method to Encrypt Images to Mobile device based on the principles of Shannonهناء وانوار/ مجله جامعتنا Active voice detection using ridgelet transform HM Ahmed, AL-MANSOUR JOURNAL, 47-56

Application of FPTRNG and Logistic_Map in Cryptography HM Ahmed, International Journal of Computing & Information Sciences 12 (2), 221

A Simple Detection Model to Suspicious Viber Messages/هناء ونور جامعه ديالى HM Ahmed, NB Bethoon

Design a smart phone honeypot system, asmaa, hanaa, nidaa

Cybercrime-Suspicious-Viber-Messages-Detection-Model HM Ahmed, NB Bethoon

Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method DR. Abd Al-Majeed Hamza AL-NassirHanaa Mohsin Ahmed SalmanLayla Matter

Ey-gaze traking for human mobile interface, H. Mohsin and S. H. Abdullah

Human face detection using skin color segmentation and morphological operation, H. Mohsin and S. H. Abdullah

Pupil Detection Algorithm Based on Feature Extraction for Eye Gaze H. Mohsin and S. H. Abdullah, “Pupil detection algorithm based on feature extraction for eye gaze,” 2017 6th International Conference on Information and Communication Technology and Accessibility (ICTA), Muscat, 2017, pp. 1-4. doi: 10.1109/ICTA.2017.8336048

Mobile Devices Application Alive Face Detection Using Skin Color segmentation and gabor filter, H. Mohsin and S. H. Abdullah

Identification-Forgery-Image-and-Image-Operation-by-FCM-Algorithm Hanaa Mohsin Ahmed*, Ph.D (Asst. Prof.)* , and

A High Performance Authorized Login Secure by Cubic Spline and Keystroke Technique, Asset prof Dr Hanaa Mohsin Ahmed, Ahmed Oday

A Survey on Human Eye Gaze Tracking, H. Mohsin and S. H. Abdullah

Application for Identification True Instances Messages Sender, HM Ahmed, S Fadhil, Diyala Journal For Pure Science 14 (03), 159-171

Hybrid Security Methods for the Physical Layer of a Mobile Network Asst. Prof. Dr. Hanaa M. Ahmed and PhD Students: Anwar Abbas Hattab Department of Computer Science, Iraq University of Technology

A high speed programing for detect the gender by back-propagation algorithm , HM Ahmed, S Fadhil,

Secure by randomly cubic spline curve and blum blum algorithms for detect user authentic, Asset prof Dr Hanaa Mohsin Ahmed Ahmed Oday

Convolution neural netork for detect class: learning tool for kids Hanaa ana hala Hassan/جامعة النهرين

Review on image stegoanalysis using inria dataset جامعة بغداد, Hanaa ana hala hassan

Anti-screenshot keyboard for web based application using cloaking Hanaa Mohsin , halaa bahjat

Mobile based telemedicine application using svd and f-xor watermarking for medical images, Hanaa Mohsin Ahmed

Human face detection using skin color segmentation and morphological operations Al- Nisour university collage/scientific Journal unit , vol 7, year 2018

A survey on Human Eye-Gaze Tracking (EGT) system “A Comparative study”

Mobile Devices Application: Alive face Detection using skin color segmentation and Gabor filter, Al-MANSUR journal

Identification Forgery image and image operating by fuzzy c mean algorithm Al-MANSUR journal

Secure by randomly cubic spline curve and detect right user by easy way for authentication

Review on image Steganalysis using INRIA Dataset, Al-Nahrain Journal of Science Vol.21 (4), December, 2018, pp.94-108, Hanaa Mohsin Ahmed and Halah H. Mahmoud . [DOI: 10.22401/ANJS.21.4.13]

Effect of Successive Convolution Layers to Detect Gender, Hanaa Mohsin Ahmed, halaa hasan

Convolutional Neural Networks for Blind Image Steganalysis: A Comprehensive Study, Hanaa Mohsin Ahmed, halaa hasan

Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for blind image steganalysis Hanaa Mohsin Ahmed, halaa hasan

Effect of Number of levels in Dual Tree Complex Wavelet Transform to obtain accurate detection when design Universal image stego-analytic Hanaa Mohsin Ahmed, halaa hasan

Ahmed, H.M. and Jaber, H.R., Sentiment Analysis for Movie Reviews Based on Four Machine Learning Techniques.

Sentiment Analysis for Some Movie Reviewer Using Naïve Bayes Hanaa Mohsin Ahmed, hanaa jaber

English Alphabets Recognition Using Hand Gesture Hanaa Mohsin Ahmed, Yasser theaa, Al Mansur journal

Cryptosystem Using the Multi-Fusion Model for Large Confidential Messages Hanaa Mohsin Ahmed Mohsin H., Bahjat H. (2020) Anti-screenshot Keyboard for Web-Based Application Using Cloaking. In: Bouhlel M., Rovetta S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer,

Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images Hanaa Mohsin Ahmed, BSJ

Eye Detection using Helmholtz Principle, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ Ahmed, H.M. and Jassim, R.W., 2020. Multi-Resolution Like Data Transmission Security Using Diffie-Hellman Protocol. Diyala Journal For Pure Science, 16(01), pp.98-115.

Enhance Diffie-Hellman protocol of data transmission security , Ahmed, H.M. and Jassim, R.W., 2020

A Raspberry PI Real Time Identification System on Face Recognition, Hanaa Mohsin Ahmed and Ranaa T. Rasheed

Eye diseases classification using hierarchal multi-label artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ

A Brief Survey on Modern Iris Feature Extraction Method, Ahmed, H.M. and Jassim, R.W., 2020

Smart Door for handicapped people via face recognition and voice command technique, Hanaa Mohsin Ahmed and Ranaa T. Rasheed

Eye diseases classification using back propagation artificial neural network, Hanaa Mohsin Ahmed, shrook Rasheed, BSJ

Distributed Transform Encoder To Improve Diffie-Hellman Protocol for Big Message Security, Ahmed, H.M. and Jassim, R.W., 2020

درع وزارة التعليم العالي والبحث العلمي
درع رؤساء الجامعات التكنولوجية
درع رؤساء الجامعات التكنولوجية لرؤساء الجامعات التكنولوجية
درع رؤساء الجامعات التكنولوجية باختصار
درع الأستاذ الأول في قسم علوم الحاسب الآلي للعام الجامعي 2015-2016