Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques. H Yousif, KH Al-saedi, MD Al-Hassani International Journal of Interactive Mobile Technologies 13 (10), 205-213, 2019 | 8 | 2019 |
Fingerprint Identification Technique Based On Wavelet-Bands Selection Features (WBSF) DMD Al-Hassani, DAA Kadhim, DVW Samawi International Journal of Computer Engineering & Technology (IJCET) 4 (3 …, 2013 | 8 | 2013 |
Design a text-prompt speaker recognition system using LPC-derived features MD Al-Hassani, AA Kadhim Proceedings of the 13th International Arab Conference on Information …, 2012 | 7 | 2012 |
Survey: audio reading system for blind persons MA Mohammed, KQ Hussein, MD Al-Hassani Iraqi Journal for Computers and Informatics 48 (1), 1-5, 2022 | 5 | 2022 |
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation MD Al-Hassani 1/8/2022 19 (4), 905-913, 2022 | 5 | 2022 |
Real Time Mobile Cloud Audio Reading System for Blind Persons MA Mohammed, KQ Hussein, MD Al-Hassani Webology 19 (1), 311-323, 2022 | 4 | 2022 |
Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution QZ Abdulla, MD Al-Hassani Iraqi Journal of Science 63 (8), 3662-3670, 2022 | 4 | 2022 |
Optical Character Recognition (OCR) System for Multi-Font English Texts using Dct & Wavelet Transform DMD Al-Hassani International Journal of Computer Engineering & Technology (IJCET) 4 (6), 48-61, 2013 | 4 | 2013 |
Robust Password Encryption Technique with an Extra Security Layer QZ Abdulla, MD Al-Hassani Iraqi Journal of Science 64 (3), 1477-1486, 2023 | 3 | 2023 |
Underwater image copyright protection using robust watermarking technique MT Gaata, MD Al-Hassani Indonesian Journal of Electrical Engineering and Computer Science 29 (2 …, 2023 | 3 | 2023 |
An innovative data encryption technique through keys distributed over websites using linked-lists MD Al-Hassani, BZ Jaafar 2018 International Conference on Advance of Sustainable Engineering and its …, 2018 | 3 | 2018 |
Multi-Levels Image Encryption Technique based on Multiple Chaotic Maps and Dynamic Matrix BF AL-Saraji, MD AL-Hassani International Journal of Computer Applications 975, 8887, 2016 | 3 | 2016 |
Hide Encrypted Secret Image into Audio File using Multi-Logistic Chaotic Map and Wavelet Transform MD Al-Hassani International Journal of Modern Trends in Engineering and Research (IJMTER …, 2015 | 3 | 2015 |
“Identification Techniques using Speech Signals and Fingerprints” MD Al-Hassani Ph. D. Thesis, Department of Computer Science, Al-Nahrain University …, 2006 | 3 | 2006 |
Book recommendation and meaning systems for blind persons MA Mohammed, KQ Hussein, MD Al-Hassani International Journal of Nonlinear Analysis and Applications 12 (Special …, 2021 | 1 | 2021 |
Fingerprint Recognition Technique using Wavelet Transform DAAKDVWS Dr. Mustafa Dhiaa Al-Hassani ACIT 2002, 2002 | 1* | 2002 |
Audio reading system for blind persons, testing and evaluation MA Mohammed, KQ Hussein, MD Al-Hassani AIP Conference Proceedings 2977 (1), 2023 | | 2023 |
Development of playfair cryptosystem based on generation a multi-dimensional key matrix MD Al-Hassani, MT Gaata Bulletin of Electrical Engineering and Informatics 12 (3), 1849~1856, 2023 | | 2023 |
A Modern Cryptography Approach for Securing Multimedia Data DMDAHBZ Jaafar المجلة العراقية لتكنولوجيا المعلومات, 2018 | | 2018 |
Roaming in Windows Environment Based on Speech Commands System TKA Assist. Prof. Dr. Mustafa Dhiaa Al-Hassani Iraqi Journal for Information Technology, 2018 | | 2018 |