Published Papers and Scientific Researches
(1) "Operation Analysis", I.A.F, Magazine, Baghdad, Iraq, 1988.
(2) "Command, Control, Communication and Intelligence System, C3I", Military Magazine, Baghdad, Iraq, 1989.
(3) "Data Base Machine", Military Selections, Baghdad, Iraq, 1989.
(4) "C3I in the Field ", Military Selections, Baghdad, Iraq, 1989.
(5) "Cryptography in Communications", Science Magazine, Baghdad, Iraq, 1999.
(6) "New data Base Machine", Science Magazine, Baghdad, Iraq, 1999.
(7) "Expert System in C3I", Science Magazine, Baghdad, Iraq, 1994.
(8) "The Impact of Command, Control, Communications and Intelligence System on the field ", Al-Bakr University for High Military Studies, 1992.
(9) "Solving Incomplete Information in data Base", Second National Conference on Computers, National Computer Centre, 1986, Baghdad, Iraq.
(10) "Data Protection and Control against Unauthorized users", Sixth National Conference on Computers, National Computer Centre, Baghdad, Iraq, 1991.
(11) "Design and Implementation of A Distributed Database Security system", Iraqi Society for Computer Science, Vol. 1, No. 4, Baghdad, Iraq, 1992.
(12) "The effect of Command, Control, Communications, and Intelligence in the Battle field", Al-Bakr University for High Military Studies, Baghdad, Iraq, 1992.
(13) "Construct Weather Database for Ground Surface", First National Conference on Computers, The Iraqi Society for Computer Science, Baghdad, Iraq, 1992.
(14) “Storage and Retrieval of Incomplete Information when the Key contains Null value", Second National Conference on Computers, Basra, Iraq, 1993.
(15) "The effect of using Communications in Computer Systems", The Seventh Scientific Conference, Al-Mustenseria University Baghdad, Iraq, 1994.
(16) “A model Manager Package for initialization of a Secure System", The Statistical Conference, Mousil, Iraq, 1994.
(17) “Design and Implementation of an Integrity System for data stored in a Database", First Scientific Conference, Al Rafidain University College, 1995, Baghdad, Iraq.
YEAR 1996:
(18) “Virus Detection using Cryptography Algorithm", Computer Magazine, No. 27, 1996, National Computer Centre, Iraq.
(19) "Security System for Authorized Users", Eighth Scientific Conference, The Iraqi Society for Statistical Science, 1996, Baghdad, Iraq.
(20) "Design and Implementation an Expert database System", Eighth Scientific Conference, The Iraqi Society for Statistical Sciences, 1996, Baghdad, Iraq.
(21) "Digital Signature is a method of Authentication", The Fourth National Conference on Computers, The Iraqi Society For Computers, 1996, Baghdad, Iraq.
(22) “Authentication by using Simmons Subliminal channel", Philadelphia University Scientific Conference, Jordan, 1996.
YEAR 1997-1999:
(23) “Using Handshaking in User Mutual Authentication", Third Scientific Conference, Al-Rafidain University College, 1997, Baghdad, Iraq.
(24) “Design and Implementation of a security system for a Relational Database", Computer Magazine, No. 34, 1999, National Computer Centre, Baghdad, Iraq.
(25) "A new Authentication method by Using three simple Encryption Methods", Computer Magazine, No. 31, 1998, National Computer Centre, Baghdad, Iraq.
(26) “An approach for breaking RSA public key cipher systems", Computer Magazine, No. 32, 1998, National Computer Centre Baghdad, Iraq.
(27) “A general View and Discussion on the Cipher Algorithm Complexity”, Al-Rafidain Magazine, No.2, 1999, Al-Rafidain University College, Baghdad, Iraq.
(28) “A new development for the Digital Signature Arbiter", Computer Magazine, No. 34, 1999, National Computer Centre, Baghdad, Iraq.
(29) “Applying Authentication by using a new method for the Multi-Digital Signature on one Document", Computer Magazine, No. 34, 1999, National Computer Centre, Baghdad, Iraq.
(30) “The Standard Specifications to design a security system", Al-Rafidain University College Magazine, No. 2, 1999,PP:1-7,Baghdad, Iraq.
YEAR 2000-2001:
(31) “Black box attack using bi-directional associative memory (BAM)", Second Conference on Data Security, 2000, Baghdad, Iraq.
(32) "Using Genetic algorithm for Hand Written Numeral Recognition", Sixth Scientific Conference, Al-Rafidain University College, 2000, Baghdad, Iraq.
(33) “The new Approaches in Authentication”, Al-Rafidain Magazine, No. 5, 2000, Al-Rafidain University College, Baghdad, Iraq.
(34) “Attacking Classes of stream cipher using GA", Third Scientific Conference on Data Security, National Computer Centre, 2001, Baghdad, Iraq.
(35) “Agent Communication Languages", Third Scientific Conference, Baghdad University College, 2001, Iraq.
(36) “PC Based Telephone Exchange", Seventh Scientific Conference, Al-Rafidain University College, 2001, Iraq.
(37) “Utilizing LSB of Digital Images Steganography", Seventh Scientific Conference, Al-Rafidain University College, 2001, Baghdad, Iraq.
(38) “Implementing Semantic Integrity Constraints in Distributed Data Base”, Seventh Scientific Conference, Al-Rafidain University College, 2001, Baghdad, Iraq.
(39) “Speech Cryptography using Open-code", Second National Conference on Computers, Communications, Control, and Systems Engineering, University of Technology, 2001, Baghdad, Iraq.
YEAR 2002:
(40) “A new approach to Mine Negative Association Rules", Al-Rafidain Magazine, No. 9, 2002, al – Rafidain University College, Baghdad, Iraq.
(41) “Audio Steganography using Masking Effect", Information Hiding Conference, April 2002, Al-Rafidain University College , N0. 9, PP: 23-33, Baghdad, Iraq.
(42) “Using Genetic Algorithm in the Analysis of the RSA Public key System", Fourth Conference on Data Security, 2002, Baghdad, Iraq.
(43) “Designing Stream cipher Algorithm using a New Approach”, Computer Researches Magazine, No. 2, 2002, Arab Federation for the Research Councils, Baghdad, Iraq.
(44) “Expert Database System for Query Optimization", First Conference on the Internet, General Company for the International Information Network, October, 2002, Iraq.
(45) “A proposed Agent system for an open Network Environment”, First Conference on the Internet, General Company for the International Information Network, October 2002, Baghdad, Iraq.
(46) “A new Technique in Text Information Hiding", Information Hiding Conference, Al-Rafidain Magazine, No. 9, 2002, PP: 126-137, Iraq.
(47) “Using Wavelet transform as an audio Steganography ", Selected Researches Magazine, No. 2, 2002, Arab Federation For Research Councils, Baghdad, Iraq.
(48) “Hiding Secret audio message inside smaller size audio cover", Fourth Conference on Data Security, 2002, Iraq.
(49) “Implementing an Expert Database System to Design a Security System”, Computer Researches Magazine, No. 1 Vol. 6, 2002, Arab Federation for the research Councils, Iraq.
(50) "Cover Optimization for Image Steganography”, Information Hiding Conference, Al-Rafidain Magazine, No. 9, PP: 68-88, 2002, Al-Rafidain University College, Baghdad, Iraq.
(51) “The Secret Messages in the Internet Age”, Information Hiding Conference, Al-Rafidain Magazine, No. 9, PP: 1- 8, 2002, Al-Rafidain University College, Baghdad, Iraq.
(52) “Design and Implementation of a generator of large, Dense, or Sparse Database to test Association Rules Miners", Selected Researches Magazine, No. 1, Vol. 6, 2002, Arab Federation for research Councils, Baghdad, Iraq.
(53) “Data Warehouse in E-Commerce services”, Computer Researches Magazine, No. 1, Vol. 6, 2002, Arab Federation For Research Councils, Baghdad, Iraq.
(54) “Image Classification using Multi Wavelet Transformation", al-Trbia College Magazine, Al-Mustenseria University, No.7, 2002, Baghdad, Iraq.
(55) “Information Hiding in Image by using Sobel Operator with Edge Detection”, Al-Rafidain Magazine, No. 10, 2002, Al-Rafidain University College, Baghdad, Iraq.
(56) “Implementation of Multi Wavelet and Neural Network for Image Classification”, Eighth Scientific Conference, Al-Rafidain University College, 2002, Baghdad, Iraq.
(57) “Water Marking JPEG Bit stream Images", First Conference on Information Hiding, Al-Rafidain Magazine, No. 9, 2002, Al-Rafidain University College, Baghdad, Iraq.
(58) “Arabic writing Recognition”, Computer Research Magazine, No. 2, Vol. 6, 2002, Arab federation for research Councils, Baghdad, Iraq.
(59) “Null values treatment in Distributed Database", Computer Magazine, No. 40, 2002, National Computer Centre, Iraq.
YEAR 2003:
(60) Al-Hamami,A.H & Mazin,A Al-Hakeem, “A proposed for Extending Web Page Services and Capabilities.” Second National Conference on Computers March, 2003, Iraqi Committee for Computer and Information, Baghdad, Iraq.
(61) Al-Hamami, A.H “Attacking Hadmard Generator Using Genetic Algorithm ", Al-Rafidain Magazine, No. 13, 2003, Al-Rafidain University College, Baghdad, Iraq.
(62) Al-Hamami,A.H & Mazin Al-Hakeem, “A proposed method to hide Text inside HTML Web Page File.", Computer Research Magazine, No. 2, Vol. 7, P: 5- 15, 2003 Arab Federation for Research Councils, Baghdad, Iraq.
(63) Al-Hamami,A.H & Dr Hussain, M.K, “Design and Implementation of Horizontal – to – vertical Converter of Association – Rules – Mining Database.",Second National Conference on Computers and Information March, 2003, Baghdad, Iraq.
(64) Al-Hamami, A.H & Raghad Abdul-Aali, “Using natural features of letters in Text Information Hiding”Second Conference on Information Hiding, Al-Rafidain Magazine, No.10, 2003, Baghdad, Iraq.
(65) “An algorithm for Water Marking Digital Images in the wavelet Transform Domain.”Second Conference on Information Hiding, Al-Rafidain Magazine, No. 12, 2003, Baghdad, Iraq.
(66) “Evaluation of Wavelet Transform Audio Hiding.", Computer Magazine, No. 40, 2003, National Computer Centre, Baghdad, Iraq.
(67) “Data Cleansing Technique in Data warehouse.", Al-Rafidain Magazine, No. 13, 2003, Al-Rafidain University College, Baghdad, Iraq.
(68) “New Scanning and attacking approach for new generation of Viruses.”Al-Rafidain Magazine, No. 13, p: 13-38, 2003, Al-Rafidain University College, Baghdad, Iraq.
(69) Al-Hamami, A.H, Hilal M Yousif & Jamal M Abdul-Jabbar, "A new approach for Error – Correcting codes Related to Water Mark Robustness.”Second Conference on Information Hiding, Al-Rafidain Magazine, No. 12, 2003, Baghdad, Iraq.
(70) Al-Hamami, A H, & Musaad Al-ANzy, "Implementation of three levels Security System for a Distributed database.", Computers Magazine, No. 41, 2003 Iraqi Commissioner for Computers and Information , Iraq.
(71) Al-Hamami,A.H & Murtda K, "A study and Suggestions for Data Ware house Topologies”Second National Conference on Computers, March, 2003,Iraqi Commissioner for Computers and Information, Iraq.
(72) Al-Hamami,A.H & Soukaena, H.H, “Selecting Controllers for Networking Environment.",Al-Rafidain Magazine, No. 14, P: 47-69, 2003, Al-Rafidain University College, Baghdad, Iraq.
(73) Al-Hamami,A.H & Soukaena,H.H, “A proposed configuration for the Screened Subnet Firewall Architecture.", Second National Conference on Computers, March, 2003, Iraqi Commissioner for Computers and Information, Baghdad, Iraq.
(74) Al-Hamami,A.H & Soukaena,H.H, “A proposed Firewall Security methods against different types of attacks.” Computer Magazine, No. 12, University of Technology, 2003, Baghdad, Iraq.
(75) Al-Hamami,A.H & Soukaena,H.H, "A Proposed Framework for choosing asswords", Computer Research Magazine, Vol. 7, No.2, P:52-72, 2003.
(76) Al-Hamami,A.H, Mazin Al-Hakeem & Mohammad,A. Al- Hamami, "A suggested Methods for Information Hiding in E- Mail Written in HTML.”Computer Research Magazine, No. 1, Vol. 7, Arab Federation for Research Councils, 2003, Iraq.
(77) “An approach to use Steganography as an Invisible WaterMark.", Second conference on Information Hiding, 2003, Al-Rafidain Magazine, No. 12, Baghdad, Iraq.
(78) Al-Hamami,A.H & Soukaena,H.H, “A suggested Framework to choose Password.", Computer Researches Magazine, No. 2, Vol. 7, Arab Federation for Research Councils, 2003, Baghdad, Iraq.
(79) Al-Hamami,A.H, & Mazin Al-Hakeem “The Standard Specifications for Designing a Web Sites.", Computer Research Magazine, No. 1, Vol. 7, 2003, Arab Federation for research Councils, Baghdad, Iraq.
YEAR 2004:
(80) Al-Hamami,A.H & Soukaena,H.H, “Strategies and Policy for Firewalls protection systems.", Ninth Scientific Conference, Al-Rafidain University College, Baghdad, Iraq.Journal of Al- Rafidain University College for Science, No. 15, P: 22-31, 2004, Baghdad, Iraq.
(81) “A proposed method for handling Collisions produced by Hashing Functions.", Al-Rafidain University College, No. 14, P: 102-122, 2004, Baghdad, Iraq.
(82) Al-Hamami,A.H , Mohammad, A.Al-Hamami, & Aseel Khalid, “Information Hiding in ICMP Messages.", Tenth Scientific Conference, 2004, Al-Rafidain University College, Iraq. Journal of Al-Rafidain University College for Science, No. 15, P: 145-160, 2004, Baghdad, Iraq.
(83) Al-Hamami,A.H & Dr Ziad Tariq, “Audio in Image Steganography Using same weak point in HAS and HVS.", International Conference on Information And Communications Technology (ICICT2004), Cairo, Egypt, P: 181-188, December, 2004.
(84) “Concealment of Information in Digital Image.”The International Arab Conference on Information Technology (ACIT2004), Algeria, December 12-15, 2004.
(85) Al-Hamami,A.H & Soukaena, H.H, "Escaping Information Using unused Bits in the Internet Packets by secure sign.", International Conference on Information and Communications Technology (ICICT2004) Cairo, Egypt, P: 167-180, December 2004.
YEAR 2005:
(86) Al-Hamami,A.H & Hussain, M.K, “Mining of Maximal Item Sets by using Machine Learning.", Journal of Al-Rafidain University College for Science, No. 16, P: 39-57, 2005, Baghdad, Iraq.
(87) Al-Hamami, A.H & Al-Anni, S.A, “A new approach for Authentication Technique ", Journal of Computer Science, Vol.1, No.1. P: 103-106, 2005, New York, USA.
(88) Al-Hamami, A H & Maisaa Hamed, “Proving Poverty of Steganography System", Information Technology Journal, Asian Network for Scientific Information, Vol. 4, No.3 , p:284-288, 2005, Pakistan.
(89) Al-Hamami,A.H, Suhail Ali, & Zuhair H.Ali, “Information Hiding Using Image Quantization", Journal of Al-Rafidain University College for Science, No. 17, P: 25-33, 2005, Baghdad, Iraq.
(90) Al-Hamami, A.H & Al-Anni, S.A, "A proposal for a Comprehensive Solution to the Problems of Passport's Authentication.", Information Technology Journal, Asian Network for Scientific Information, Vol. 4, No. 2, P: 146-150, 2005, Pakistan.
(91) Al-Hamami, A.H & Al-Anni, S.A, “A suggestion for protecting E-Mail in e-Government applications",International Arab Conference on Information Technology (ACIT'2005), Al-Isra Private University, 6-8 Dec. P: 195-200,2005, Amman, Jordan.
(92) Al-Hamami,A.H & Soukaena,H.H, “A proposed Multi-Agent System for Intrusion Detection System in a Complex Network", 3rd International Conference on Information and Communication Technology (ICIT2005), 5-6-Dec.-2005, Cairo, Egypt.
YEAR 2006:
(93) Al-Hamami, A.H, Mohammad, A.Al-Hamami, & Soukaena, H.Hashem, "Applying Data Mining Techniques in Intrusion Detection System on Web and Analysis of Web Usage.", Information Technology Journal, Asian Network for Scientific Information, Vol. 5, No. 1, p: 57-63, 2006, Pakistan.
(94) Al-Hamami, A.H, & Raghad A. Al-Shamkhy. "Using Natural Features of Letters in Text Information Hiding.", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb. 2006.
(95) Al-Hamami, A.H, Mohammad, A.Al-Hamami, & Soukaena, H.Hashem, "A Proposed Modifications to Improve the Performance of Blowfish Cryptography Algorithm", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb. 2006.
(96) Al-Hamami, A.H & Al-Anni, S.A, “Authentication Sharing is a new method for protecting E-mail in e-Government applications", First National
Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh,
Kingdom of Saudi Arabia, 5-7 Feb. 2006.
(97) Al-Hamami, A.H, Hilal,H, & Soukaena, H.H, “Using e-mobile proxy for Improvement of E-Commerce on the Web", with Soukaena Hassan, First
National Information Technology Symposium (NITS 2006) Bridging the Digital Divide:Challenge and Solutions, King Saud University, Riyadh,
Kingdom of Saudi Arabia, 5-7 Feb. 2006.
(98) Al-Hamami,A.H , Mohammad A Al-Hamami, & Soukaena,H.H, “Adding New Level in KDD to Make the Web Usage Mining More Efficient", Soukaena H, Hashem, First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University,Riyadh, Kingdom of Saudi Arabia, 5-7 Feb. 2006.
(99) "A proposal for Efficient Information's Extracting from the Web Site.” Computer Research Magazine, No. 1, Vol. 8, PP: 105-126, 2006 Arab Federation for Research Councils, Al-Khartoom, Sudan.
(100) Al-Hamami,A.H, Mazin Al-Hakeem, “SS2-WSD: A proposal of Evolutionary Standard Specifications for Web Site Design", Computer Research Magazine, No. 1, Vol. 8, PP: 94-104 , 2006 Arab Federation for Research Councils, Al-Khartoom, Sudan.
(101) "Security Problems in E-Government Applications: Thoughts and Solutions, Computer Research Magazine, No. 1, Vol. 8, PP: 5-13 , 2006 Arab Federation for Research Councils, Al-Khartoom, Sudan.
(102) “Enabling Remote Administration on Mobile Phone", The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP'06, June 26- 29, 2006, Las Vegas, USA.
(103) Al-Hamami, A.H, Hilal, H, & Soukaena, H.H, “Suggestions for Improving the M-Commerce Security", The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP'06, June 26-29, 2006, Las Vegas, USA.
(104) Al-Hamami, A.H, & Mazin Al-Hakeem, "A new Approach for Web Content's Universal Access", 2nd Jordan International Conference on Computer Science and Engineering, 5-7 December,2006, P: 158-163, AL-BalQ'a Applied University, Jordan.
(105) Al-Hamami, A.H, Mohammad, A.Al-Hamami, & Soukaena, H.Hashem,”Extending the Ability of Mobile Devices to use Wavelet-based Watermarking and Steganography Applications.", 2nd Jordan International Conference on Computer Science and Engineering, 5-7 December, 2006, PP: 153-157, AL-BalQ'a Applied University, Jordan.
YEAR 2007:
(106) Al-Hamami .A.H, and Al-Hakeem.M.S, "Using Data Mining for the Improvement of the ' Adaptive Website Agents' Process ", The International Conference on Information Technology (ICIT'2007), Al-Zaytoonah University, Jordan, May 9-11, 2007.
(107) Al-Hamami, A.H, Hilal, H, & Soukaena, H.Hashem, “Improve the E-Commerce for Mobile Communication", The 2007 World Congress in Computer Science, Computer Engineering, & Applied Computing , Las Vegas, Nevada, USA, June 25-28, 2007.
(108) Al-Hamami, A.H, & Ghossoon M.W, Al-Sadoon, “A Technique for protecting Simple Object Access Protocol (SOAP) Message. First Conference on Computer Science and Communication Technology, Mamoun Private University for Science and Technology, 10- 11/9/2007, Syria.
(109) Al-Hamami, A.H, & Mazin S. Al-Hakeem, “Improve the apriori Algorithm for Web Recommender Engine", WORLD '07, The 2007 World Congress in
Computer Science, Computer Engineering, & Applied Computing , Las Vegas, Nevada, USA, June 25-28, 2007.
(110) Al-Hamami, A.H, & Soukaena hassan Hashem, "Privacy Preserving for data Mining Applications", WORLD '07, The 2007 World Congress in Computer Science, Computer Engineering, & Applied Computing , Las Vegas, Nevada, USA, June 25-28, 2007. University of Technology, Eng. and Technology Journal, Baghdad, Iraq.
(111) Al-Hamami, A.H and Mohammad A Al-Hamami, "Enhance Traditional Search for Efficient Image searching", International Arab Conference on
Information Technology (ACIT2007), 26-28/11/2007, Syria.
YEAR 2008:
(112) Al-Hamami, A.H, Hilal, Hadi Saleh, and Mazin S Al- Hakeem, "A new Policy to Enhance the Web Recommendation System Privacy", IADIS International Association for Development of the Information Society. IADIS International Conference Applied Computing 2008. 11-13 April 2008,
Algarve, Portugal.
(113) Al-Hamami, A.H and Soukaena Hassan Hashem, "An Optimized Approach for Retrieving and Mining of Video Clips", IADIS International Association for Development of the Information Society. IADIS International Conference Applied Computing 2008. 11-13 April 2008, Algarve, Portugal.
(114) Al-Hamami, A.H, and Soukaena H Hashem, " A Novel Approach for Mining Spatial Data Types database", IADIS International Association for
Development of the Information Society. IADIS International Conference Applied Computing 2008. 11-13 April 2008, Algarve, Portugal.
(115) Al-Hamami, A.H, and Soukaena H Hashem, " A Methodology for Facilitating Knowledge data Warehouse", WORLD '08, The 2008 World Congress in
Computer Science, Computer Engineering, & Applied Computing , Las Vegas, Nevada, USA, July 14-17, 2008.
(116) Al-hamami, A H and Khaled S Maabreh, "Increasing database Concurrency Control Based on Attribute Level Locking", 2008 International Conference
on Electronic Design (ICED 2008), Penang, Malaysia, December 1-3, 2008.
(117) Al-Hamami A H and Khaled S Maabrah, "Applying Attribute level Locking to Decrease the Deadlock on Distributed database", Al-Manarah for Research and Studies, Al al-Bayt University, Jordan, 2008.
Year 2009
(118) Al-hamami A H, Mohammad A Al-Hamami, and Soukaena H Hashem, "A Proposed Technique for Medical Diagnosis Using Data Mining", International Conference on intelligent computing and Information systems, CICIS, March 19-22, 2009, cairo, Egypt. http://icicis.edu.eg
(119) Al-Hamami A H, Mohammad A Al-Hamami, and Soukaena H Hashem, "An Approach for Facilitating Knowledge Data Warehouse", International Journal of Softcomputing Applications (IJSCA), Vol. 4, January, 2009. www.eurojournals.com
(120) Al-Hamami , A H and Hisham, H Al-Rashdan, "Improving the Effectiveness of the Color Coherence Vector (CCV)", The International Arab Journal of Information Technology (IAJIT), 2009. www.iajit.org, Vol. 7, No. 3, 2010, pp:325-332.
(121) Al-Hamami A H and Khaled S Maabreh, "A Proposed Method for Solving deadlock problems in a Centralized database", The International Arab Conference on Information Technology (ACIT2009), University of Science and Technology, Yemen, December 15-17, 2009.
(122) Al-Hamami A H and Mohammad A Mohammad, "A Novel Strategy to provide Secure Channel over Wireless to Wire Communication", Ubicc journal, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, Published date 8/15/2009, ISSN Online 1992-8424, ISSN Print 1994-4608, UBICC.ORG.
(123) Saad Al-Ani and Al-Hamami, A H, "A new Approach for personal Identification by Using Hand Geometry Biometric Authentication", Al-Manarah Journal for Research and Studies, Al al-Bayt University, Jordan, 2009. [email protected].
(124) Al-Hamami A H, Mohammad A Al-Hamami, and Soukaena H Hashem, "Using data Mining Confidence and Support for privacy Preserving secure database, Arab Institute For Training & Research in Statistics Journal, No. 1, 2009.
(125) Al-Hamami A H, Mohammad A Al-Hamami, and Soukaena H Hashem, "Applying Packets Meta data for Web Usage Mining", Third International Symbosium on Innovation in Information & Communication Technology (ISIICT 2009), 15-17 December, 2009, Philadelphia University, Amman, Jordan, http://www.philadelphia.edu.jo/isiict2009.
(126)Khaled Al-qwasmi, Adnan Al-Smadi, and Alaa Al-Hamami, "A New Algorithm for the ARMA Model Order Via Pivot-Neighbors Comparisons", 17th mediterrance Conference on Control and Automation, June 24-26, 2009, Pages: 1005-1008, Makedonia Palace, Thessaloniki, Greece. http://controls.papercept.net/. http://ieeexplore.ieee.org/search/freesearchresult.jsp?history=yes&queryText=%28al-qawasmi%
(127)Khaled M. Alallayah, Waeil F. Abd Elwahed, Mohammad A. Abd Elwahed and Al-Hamami H. Alaa, "Attack and construction of simulator for some of Cipher Systems by Using Neuro-Identifier", The International Arab Journal of Information Technology (IAJIT), Vol. 7, No. 4, October 2010. www.iajit.org.
Year 2010
(128) Khaled Al-qwasmi, Adnan Al-Smadi, and Alaa Al-Hamami, " A Robust ARX and ARMA Model Order Estimation via Pivot-Neighbors Comparisons", Recent Patents on Computer Science, Bentham Science Publisher Ltd, Vol. 3, 000-000, 2010.
(129) Khaled M. Alalayah, Al-Hamami H. Alaa, and Mohammad A. Abd Elwahed " Attack of Against Simplified Data Encryption Standard (SDES) Cipher System Using Artificial Neural Network", Journal of Computer Science (JCS), Vol. 6, No. 1, 2010, USA.
(130) Al-Hamami Alaa H & Imad Hasan Saleh, "Implementing Mobile Agent to Improve Structured Query Language (SQL) Performance", Arab Institute for Training & Research in Statistics, Journal of Statistics Science, No. 2, 2010.
(131) Khaled M. Alallayah, Al-Hamami H. Alaa, and Mohammad A. Abd Elwahed, " Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier ", The International Arab Journal of Information Technology (IAJIT), Vol. 7, No. 4, October 2010. www.iajit.org.
(132) Khaled Al-qwasmi, Adnan Al-Smadi, and Alaa Al-Hamami, "Artificial Neural Network-Based Algorithm for ARMA Model Order Estimation", The Second International Conference on "Networked Digital Technologies" (NDT2010), Charles University in Prague, Czech Republic, July 7-9, 2010, Springer.
(133) Al-Hamami A H, Hilal Hadi Saleh, and Mohammad Alaa Al-Hamami, "A Proposed Strategy to Improve Relevant Information Retrieval on the Web", European, Mediterrean & Middle Eastern Conference on Information System 2010 (SMCIS2010), April 12-13 2010, Abu Dhabi, UAE.
(134) Suha Afaneh, Dr. Raed Abu Zitar, and Dr. Alaa Al-Hamami, “Virus Detection Using Clonal Selection Algorithm (VDC Algorithm), 2011 3rd International Conference on Modeling and Simulation (ICCMS 2011), January 7-9, 2011, Mumbai, India. http://www.iccms.org.
(135) Al-Hamami A H and Khaled S Maabreh, "Applying Attribute level Locking to Decrease the Deadlock on Distributed Database", The International Arab conference on Information Technology (ACIT 2010), Banghazi, Libya, Dec. 14-16, 2010. http://www.acit2k.org/acit.
Year 2011
(136) Maher Abdel-qader, Ahmed Al-Jaber, and Alaa Al-Hamami, “Using Short Message Service (SMS) to Support Business Continuity”, World of Computer Science and Information Technology Journal (WSCIT), ISSN:2221-0741, Vol. 1, No. 2, pp: 34-38, 2011. www.wcsit.org.
(137) Khaled M. Alallayah and Al-hamami A H, "Applying Neuro-Identifier for some of Cipher system Cipher Systems Cryptanalysis", 8th International Conference on Information technology: New Generation ITNG 2011, April 11-13, 2011, Las Vegas, Nevada, USA. www.itng.info.
(138) Khaled M. Alallayah, Al-Hamami H. Alaa, and Mohammad A. Abd Elwahed, "Applying Neuro-Identifier for some of Cipher Systems Cryptanalysis", 2011 International Conference on Network Computing and Information Security (NCIS'11), 14-15 May, 2011, Guilin, China.
(139) Al-Hamami A H, Mohammad A Al-Hamami, and Soukaena H Hashem, "A Proposed Modified Data Encryption Standard Algorithm by Using Fusing Data Technique", World of Computer Science and Information Technology Journal (WSCIT), ISSN: 221-0741, Vol. 1, No. 3, PP: 88-91, 2011, www.wcsit.org .
(140) Al-Hamami Alaa H & Sukaena H Hashem, "Optimal Cell Towers Distribution by Using Spatial Mining and Geographic Information System", World of Computer Science and Information Technology Journal (WSCIT), ISSN:2221-0741, Vol. 1, No. 2, pp. 44-48, 2011. www.wcsit.org
(141) Al-Hamami A H, Soukaena H Hashem, and Mohammad A Al-Hamami, "Developing a Block-Key Generator Using Philosophy of Data Fusion Technique", the Journal of Emerging Trends in Computing and Information Sciences (http://cisjournal.org/). Vol. 2, No. 5, PP: 222-227, May 2011. http:llwww.cisjournal.org.
(142) Al-Hamami A H, Soukaena H Hashem, and Mohammad A Al-Hamami, “A Strategy To Compromise Handwritten Documents Processing and Retrieving Using Association Rules Mining”, Ubicc Journal, Vol. 6, Issue 3, PP: 901-906, 2011. [email protected], www.Ubicc.org.
(143) Al-Hamami Alaa H & Bilal S O Al-Kubaysee, “A Fast Approach for Breaking RSA Cryptosystem”, World of Computer Science and Information Technology Journal (WCSIT), Vol. 1, No. 6, pp: 260-263, 2011. http://www.wcsit.org.
Year 2012:
(144) Khaled M. Alallayah, Al-Hamami H. Alaa, and Mohammad A. Abd Elwahed, "Applying Neural Networks for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis", The International Arab Journal of Information Technology (IAJIT), Vol. 9, No. 2, March 2012. www.iajit.org.
(145) Al-Hamami Alaa H, Chapter 17, “The state of the Art and Future Prospective of the Network Security”, in “Simulation in Computer Network Design and Modeling: Use and Analysis”, Edited by: Hussein Al-Bahadili, Published in the United State of America by Information Science Reference (an imprint of IGI Global), ISBN: 978-1-4666-0191-8, 2012, Web-site: http://www.igi-global.com
(146) Ghadeer Ali Shaheen, Prof. Dr. Ahmed Al Jaber, and Prof. Dr. Alaa Al Hamami, “The Effect of Weight Factors Characters on Password selection”, World of Computer Science and Information Technology Journal (WSCIT), Vol. 2, No. 1, 2012.
(147) Dr. Suha Afanah, Prof. Dr. Raed Abu Zitar, Prof. Dr. Alaa Al-Hamami, “Virus Detection using Clonal Selection Algorithm with Genetic Algorithm (VDC Algorithm)”, Applied Soft Computing Journal Vol.13, Issue 1, January 2013, PP: 239-246.
(148) Al-Hamami Alaa H, Soukaena Hasan, and Mazin Al-Hakeem, “Approach for Spatial Mining”, Baghdad College of Economic Sciences University, Issue: 31, PP: 407-420, 2012.
(149) Al-Hamami Alaa H, Soukaena Hasan, and Mazin Al-Hakeem, “Approach for Retrieving and Mining Video Clips”, Eng. & Tech. Journal, Vol. 30, No. 11, PP: 2000-2009, Iraq, 2012.
(150) Al-Hamami Alaa H and Aldariseh Ibrahim A, “Enhanced Method for RSA Cryptosystem Algorithm”, International Conference on Advanced Computer Science Applications and Technologies – ACSAT2012, Malaysia, 2012.
(151) Al-Hamami Alaa H and Alawnah Tahani, “Developing a Host Intrusion Prevention System by Using Data Mining”, International Conference on Advanced Computer Science Applications and Technologies – ACSAT2012, Malaysia, 2012.
Year 2013
(152) Al-Hamami Alaa H and Abu Shehab Suhad, “An Approach for preserving privacy and Knowledge in Data Mining Applications”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 1, Jan. 2013, http://www.cisjournal.org
(153) Khaled Maabreh & Al-Hamami Alaa, “Implementing New approach for Enhancing Performance and Throughput in a Distributed Database”, International Arab Journal of Information Technology (IAJIT), Vol. 10, No. 3, May 2013.
(154) Anmar Aljanabi, Al-Hamami H Alaa, and Basim Alhadidi, “Query Dispatching Tool Supporting Fast Access to Data Warehouse”, The International Arab Journal of Information Technology (IAJIT), Vol. 10 , No. 3 , May 2013. www.iajit.org.
(155) Muslih Ossama K & Al-Hamami Alaa H, “Design and Implementation of Parameter Tunning on Oracle DBMS”, International Journal of Computing Science and Information Technology (IJCSIT), Vol. 1, No. 2, pp:09-12, 2013. http://ijcsit.org
(156) Al-Hamami Alaa H & Al-Saadoon Ghossoon M. Waleed, “Development of a Network-based Intrusion Prevention System using a Data-mining Approach”, Science and Information Conference 2013 (SAI), October 7-9, 2013, London, UK. http://thesai.org/SAIConference2013/register.
(157) Al-Hamami Alaa H & Sarah Al-Samadi, “Enhancement of missing Values Prediction and Estimation Using Data Mining Algorithms”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 10, October 2013. http://cisjournal.org/journalofcomputing/Archive_Oct_2013.aspx.
Year 2014
(158) Al-Hamami Alaa H & Rafal Adeeb Al-Khashab, “Providing Availability, Performance, and Scalability By Using Cloud Database”, International Jornal of Advanced Computer Technology, Vol. 3, No. 8, August-2014.
(159) Al-Hamami Alaa H & Ghossoon M W Al-Saadoon, “Security Concepts, Developments and Future Trends”, in A.H.Al-Hamami & G.M.W.Al-Saadoon (Eds), “Threat Detection and Countermeasures in network Security”, Hershey, PA: Information Science Reference, IGI, October 2014.
(160) Al-Hamami Alaa H, “Proposals to Win the Battle against Cyber Crime”, in A.H.Al-Hamami & G.M.W.Al-Saadoon (Eds), “Threat Detection and Countermeasures in network Security”, Hershey, PA: Information Science Reference, IGI, October 2014.
(161) Al-Hamami Alaa H & Al-Khashab R.A, “A New Approach in Cloud Computing User Authentication”, in A.H.Al-Hamami & G.M.W.Al-Saadoon (Eds), “Threat Detection and Countermeasures in network Security”, Hershey, PA: Information Science Reference, IGI, October 2014.
(162) Al-Hamami Alaa H & Al-Khashab R.A, “Cloud Authentication Method Based on Multiple Passwords Technique”, Journal of Advanced Computer Science and Technology Research, Vol.4, No.2, June 2014, 33-39. E-ISSN:2231-8852.
(163) Al-Hamami Alaa H & Fidaa Mahmoud Shuaib, “A new Technique to Improve the Watermarking Performance”, Journal of Advanced Computer Science and Technology Research, Vol.4, No.3, September 2014, 76-90. E-ISSN:2231-8852.
Year 2015
(164) Zaid S Nunef & Al-Hamami Alaa H, “Securing VoIP in SIP Mobile Network”, World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221-0741, Vol. 5, No. 1, 6-10, 2015.
(165) Al-Hamami Alaa H & Jalal Yousef AL-Juneidi, “Secure Mobile Cloud Computing Based-On Fingerprint”, World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221-0741, Vol. 5, No. 2, 2015.
(166) Al-Hamami Alaa & Avan Sabah Hamdi, "Mobile Secure Transmission method based on Audio Steganography", World of Computer Sciences and Information Technology Journal (WCSIT), Vol. 5, No. 5, pp: 87-91, 2015.
(167) Ghazi I Raho, Jazia Moftah Ahmed & Al-Hamami Alaa H, "Solving the Delay Problem in Voice over Internet Protocol (VOIP) Over Wireless LAN", International Journal of Management Sciences and Business Research, Vol. 4, Issues. 4, 2015.
(168) Mazin S. Al-Hakeem & Al-Hamami Alaa H, "Proposed Flip Teaching Framework Based on Multi-Tier Architecture", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue. 6, 2015.
(169) Ghazi I Raho, Abrar Al-Khaiat and Al-hamami Alaa H, "Cash Currencies Recognition using K-Nearest Neighbor Classifier", International Journal of Web & Semantic Technology (IJWesT), Vol. 6, No. 4, 2015.
(170) Al-Hamami Alaa H & Suzan H Shahrour, "Development of an Opinion Blog Mining System", The International Conference on Advanced computer Science Applications and Technologies - ACSAT 2015 on the 8th-10th December, 2015, Palace of Golden Horses, Kuala Lumpur, Malaysia.
(171) Ghazi Ibrahem Raho, Muzhir Shaban Al-Ani, Alaa Hussein Al-Hamami, Raed Kanaan, “Universal Developing of Persons Identification Based on RFID”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 6, No. 10, October 2015.
Year 2016
(172) Al-Hamami Alaa H & Saad Saleh Hassan Al-Dahiry, "Evaluation of Complexity, Processing Time and Security in Steganography Techniques", The Arab Union of Statistics, Cairo, Egypt, 2016.
(173) Al-Hamami Alaa H & Noor Hamadi, "Face Recognition Technique Based on Artificial Neural Network and Principal Component Analysis", International Computer Sciences and Informatics Conference (ICSIC 2016), January 12-13, 2016, Amman, Jordan.
(174) Mohammed Alaa Al-Hamami, Al-Hamami Alaa H & Salwa Alsharif, "Enhance Mobile Phones privacy Based on Steganography", International Computer Sciences and Informatics Conference (ICSIC 2016), January 12-13, 2016, Amman, Jordan.
(175) Abed Alhaleem Hashem AlRialat, Al-Hamami Alaa H & Hussam Nawwaf Fakhouri, "The Impact of Trust Factors on Website Reliability, Jordan-case Study", Jouranl of Arab Union Statistics, Vol. 3, No. 3, 2016.
(176) Al-Hamami Alaa H & Fidaa Mahmoud Shuaib, "Choosing The Right Technique for the Robust Watermark", International Computer Sciences and Informatics Conference (ICSIC 2016), January 12-13, 2016, Amman, Jordan.
(177) Al-Hamami Alaa H & Ali Mohammad saab, "Cloud Computing Access Authentication through Mobile Device Based on Face recognition", International Computer Sciences and Informatics Conference (ICSIC 2016), January 12-13, 2016, Amman, Jordan.
(178) Alaa H Al-Hamami and soukaena H Hashim, " Sustainable Development: Proposing Cloud Computing Framework for Higher Education Ministry (HEM) in Iraq", accepted in International Computer Sciences and Informatics Conference (ICSIC 2016) January 12-13, 2016, Amman, Jordan.
(179) Dr. Mazin S. Al-Hakeem & Alaa H. Al-Hamami, “Implementation of Common Secure Framework for IoT based Arduino Platform”, International Journal of Computer Trends and Technology (IJCTT) – Volume 32 Number 1 - February 2016.
Year 2017
(180) Safia I. Bani Baker & Prof. Alaa Hussein Al-Hamami, “Novel Algorithm in Symmetric Encryption (NASE) Based on Feistal Cipher”, 2017 International Conference on New Trends in Computing Sciences, 11-13 October 2017, Amman, Jordan.
(181) Subhi AlMuhtasib & Alaa H Al-Hamami, "Securing Data Communication for Data Driven Applications Using End to End Encryption", 5th International Conference on Advanced Computer Science Applications and Technologies – ACSAT2017, 2017, Malaysia.
(182) Alaa H Al-Hamami & Ali A Al-Ali, "Enhancing Big Data Analysis by using Map-Reduce Technique", 5th International Conference on Advanced Computer Science Applications and Technologies – ACSAT2017, 2017, Malaysia.
(183) Ahmed Tarawneh & Alaa H Al-Hamami, "SOCIAL ENIGNEERING ATTACK USING SETOOLKIT PACKGES IN KALI LINUX - IP ADRESS APROACH", Science. International .(Lahore),29(6),1173-1179,2017 . ISSN 1013-5316; CODEN: SINTE 8 1173 November-December.
Year 2019
(184) Mohammed Alaa Al-Hamami, Omar Nofal and Prof. Alaa H Al-Hamami, " Real-time Website Security", Proceeding of International Conference on Innovation, Technology, Enterprise and Entrepreneurship. ICITEE 2019, Kingdom of Bahrain.
YEAR 2020
(185) Esraa Alshammari, Alaa H. Alhamami, Ali Hadi, “Botnet Fingerprint Using Bro-IDS”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 18, No. 9, September 2020.
(186) M. Almawlani, K. Alalawi, A. H. Al-Hamami, A. AlSoufi, “IOT Theft Capture System”, the 3rd Smart Cities Symposium 2020, Kingdom of Bahrain.
(187) Ahmed Mubarak, Khalifa Showaiter, Alaa Al-Hamami, Ali AlSoufi, “Enhanced Features of Smart Parking System”, the 3rd Smart Cities Symposium 2020, Kingdom of Bahrain.
Year 2022
(188) Alaa Hussein Al-Hamami, Zeki Saaed Tawfiq, and Fatima Yasein. " A new Method for Ensuring the Integrity in Wireless LAN (WiFi)", 2022 International Conference for Natural and Applied Sciences (ICNAS), AL-Hikma University College, Baghdad, Iraq.
(189) Zeki Saaed, Alaa Hussein Al-Hamami, Mustafa Tariq. "Comparison of Data Mining Techniques in Healthcare Data", 2022 International Conference for Natural and Applied Sciences (ICNAS), AL-Hikma University College, Baghdad, Iraq.
Year 2023
(190)