Dr. Alaa Hussein Mohammed Salih Al-Hamami
ProfessorDepartment of Computer Engineering Techniques, Al-Hikma University College, Baghdad, Al Yarmook, Iraq
Highest Degree
Ph.D. in Computer Database from East Anglia University, England
Share this Profile
Biography
Dr. Ala’a Hussein Mohammed Salih Al-Hamami holds a position of Professor and Dean of College of Computer Sciences and Informatics British University of Bahrain. He has completed his PhD in Computer Database from University of East Anglia, England and M.Phil in Computer from University of Loughborough Technology, England. Dr. Alaa Hussein is also serving as Lecturer at different Universities such as University of Baghdad, University of Technology, Saddam University, Al-Mustanseria University, Higher Studies Institute for Computer and Information, and Al-Rafidain University College. He also performed his duties as member of Informatics Branch in the Iraqi Scientific Council, Assistance Professor at University of Technology, Associate Professor at Al-Rafidain University College, member of the Board of Iraqi National computer centre, and so on. He successfully supervised 33 MSc, 19 PhD thesis, and 50 Diploma thesis. He also participated in many conferences in the field of communications, and chairing several conference activities. He is editor in chief for the Computer researches magazine, Arab federation for the scientific research councils, and serves as Consultant in Computer and Information field for several Companies in Iraq. He has published 21 books, 2 thesis, and more than 179 research articles in journals contributed as author/co-author.
Area of Interest:
Selected Publications
- Al-Hamami, A.H. and R.A. AlKhashab, 2019. Cloud Computing: The New Competitive Advantage. Dar Al-Raya for Publication & Distribution, Amman, Jordan.
- Al-Tarawneh, A.M. and A.H. Al-Hamami, 2017. Social enigneering attack using setoolkit packges in kali Linux-IP adress aproach. Sci. Int. (Lahore), 29: 1173-1179.
Direct Link | - Al-Hamami, A.H. and M.S. Al-Hakeem, 2017. Everything about Internet of Things and Smart Cities Applications. Dar Al-Raya for Publication & Distribution, Amman, Jordan.
- Al-Hamami, A.H., S.H. Hashim and M.A. Al-Hamami, 2016. Wireless Networks and Mobile Communications Technology and Applications. Dar Wael for Publication and Distribution, Amman, Jordan.
- Al-Hamami, A.H., S.H. Hashim and M.A. Al-Hamami, 2016. Data Mining in Security Applications. Dar Wael for Publication and Distribution, Amman, Jordan.
- Al-Hamami, A.H. and M.A.A. Alhafez, 2016. Enhancing security to protect e-passport against photo forgery. Global J. Comput. Sci. Technol., 16: 15-18.
- Al-Hamami, A.H. and G.M. Al-Sadoon, 2016. Information Technology Applications in Developed Electronic Business. Dar Wael for Publication and Distribution, Amman, Jordan.
- Al-Hakeem, M.S. and A.H. Al-Hamami, 2016. Implementation of common secure framework for IoT based arduino platform. Int. J. Comput. Trends Technol., 32: 49-53.
- Raho, G.I., M.S. Al-Ani, A.H. Al-Hamami and R. Kanaan, 2015. Universal developing of persons identification based on RFID. J. Emerging Trends Comput. Inf. Sci., 6: 592-597.
Direct Link | - Raho, G.I., J.M. Ahmed and A.H. Al-Hamami, 2015. Solving the delay problem in Voice over Internet Protocol (VoIP) over wireless LAN. Int. J. Manage. Sci. Bus. Res., 4: 20-25.
Direct Link | - Raho, G.I., A. Al-Khiat and A.H. Al-Hamami, 2015. Cash currencies recognition using k-nearest neighbor classifier. Int. J. Web Semant. Technol., 6: 11-21.
CrossRef | Direct Link | - Munef, Z.S. and A.H. Al-Hamami, 2015. Securing VoIP in SIP mobile network. World Comput. Sci. Inf. Technol. J., 5: 6-10.
Direct Link | - Alhamami, A. and A.S. Hamdi, 2015. Mobile secure transmission method based on audio steganography. World Comput. Sci. Inf. Technol. J., 5: 87-91.
Direct Link | - Al-Hamami, A.H. and J.Y. Al-Juneidi, 2015. Secure mobile cloud computing based-on fingerprint. World Comput. Sci. Inf. Technol. J., 5: 23-27.
Direct Link | - Al-Hamami, A.H. and A.J. Al-Radhi, 2015. Internet Protocol Version Six: The Internet Skeleton of Future Generations. Dar Al Raya for Publications & Distribution, Amman, Jordan.
- Al-Hamami, A.H. ad M.A. Al-Hamami, 2015. Concepts and Applications of Modern Security Approaches in Electronic Authentication. Dar Ai Raya for Publications & Distribution, Amman, Jordan.
- Al-Hakeem, M.S. and A.H. Al-Hamami, 2015. Proposed flip teaching framework based on multi-tier architecture. Int. J. Adv. Res. Comput. Sci. Software Eng., 5: 118-123.
Direct Link | - Al-Hamami, A.H., 2014. Proposals to Win the Battle against Cyber Crime. In: Handbook of Research on Threat Detection and Countermeasures in Network Security, Al-Hamami, A.H. and G.M.W. Al-Saadoon (Eds.). Chapter 8, IGI Global, Harshey, PA., USA., ISBN-13: 9781466665835, pp: 139-153.
- Al-Hamami, A.H. and R.A. Al-Khashab. 2014. A New Approach in Cloud Computing User Authentication. In: Threat Detection and Countermeasures in network Security. Al-Hamami, A.H. and G.M.W. Al-Saadoon (Ed.). Information Science Reference, Hershey, USA., ISBN: 978-1-4666-6853-5, pp: 314-329..
CrossRef | Direct Link | - Al-Hamami, A.H. and R.A. Al-Khashab, 2014. Providing availability, performance, and scalability by using cloud database. Compusoft, 3: 1070-1074.
Direct Link | - Al-Hamami, A.H. and G.M.W. Al-Saadoon, 2014. Security Concepts, Developments and Future Trends. In: Threat Detection and Countermeasures in network Security. Al-Hamami, A.H. and G.M.W. Al-Saadoon (Ed.). Information Science Reference, Hershey, USA., ISBN: 978-1-4666-6583-5, pp: 1-16..
CrossRef | Direct Link | - Al-Hamami, A.H. and G.M.W. Al-Saadoon, 2014. Handbook of Research on Threat Detection and Countermeasures in Network Security. IGI Global, Harshey, PA., USA., ISBN-13: 9781466665835, Pages: 426.
- Al-Hamami, A.H. and G.M.W. Al-Saadoon, 2014. Data Mining Approach in Host and Network-Based Intrusion Prevention System. In: Intelligent Systems for Science and Information (Studies in Computational Intelligence, Volume 542), Chen, L., S. Kapoor and R. Bhatia (Eds.). Springer International Publishing, Cham, Switzerland, ISBN: 978-3-319-04701-0, pp: 213-231.
- Al-Hamami, A.H. and F.M. Shuaib, 2014. A new technique to improve the watermarking performance. J. Adv. Comput. Sci. Technol. Res., 4: 76-90.
- Al-Hamami A.H. and R.A. Al-Khashab, 2014. Cloud authentication method based on multiple passwords technique. J. Adv. Comput. Sci. Technol. Res., 4: 33-39.
- Shaheen, G.A., A. Al Jaber and A. Al Hamami, 2013. The effect of weight factors characters on password selection. World Comput. Sci. Inf. Technol. J., 3: 110-113.
Direct Link | - Ossama, K.M. and A.H. Al-Hamami, 2013. Design and implementation of parameter tunning on oracle DBMS. Int. J. Comput. Sci. Inf. Technol., 1: 9-12.
- Muslih, O.K. and A.H. Al-Hamamy, 2013. Design and implementation of parameter tuning on oracle DBMS. Int. J. Comput. Sci. Inform. Technol., 1: 9-12.
- Maabreh, K. and A. Al-Hamami, 2013. Implementing new approach for enhancing performance and throughput in a distributed database. Int. Arab J. Inform. Technol., 10: 290-296.
Direct Link | - Aljanabi, A., A.H. Alhamami and B. Alhadidi, 2013. Query dispatching tool supporting fast access to data warehouse. Int. Arab J. Inf. Technol., 10: 269-275.
Direct Link | - Al-Hamami, A.H. and S.A. Shehab, 2013. An approach for preserving privacy and knowledge in data mining applications. J. Emerging Trends Comput. Inf. Sci., 4: 53-56.
Direct Link | - Al-Hamami, A.H. and S. Al-Samadi, 2013. Enhancement of missing values prediction and estimation using data mining algorithms 1. J. Emerging Trends Comput. Inf. Sci., 4: 738-741.
Direct Link | - Afaneh, S., R.A. Zitar and A. Al-Hamami, 2013. Virus detection using clonal selection algorithm with genetic algorithm (VDC algorithm). Appl. Soft Comput., 13: 239-246.
CrossRef | Direct Link | - Alallayah, K.M., A.H. Alhamami, W. AbdElwahed and M. Amin, 2012. Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. Int. Arab J. Inf. Technol., 9: 163-169.
Direct Link | - Al-Hamami, A.H., S. Hasan and M. Al-Hakeem, 2012. Approach for spatial mining. Baghdad Coll. Econ. Sci. Univ., 31: 407-420.
- Al-Hamami, A.H., S. Hasan and M. Al-Hakeem, 2012. Approach for retrieving and mining video clips. Eng. Technol. J., 30: 2000-2009.
Direct Link | - Al-Hamami, A.H., 2012. The State of the Art and Future Prospective of the Network Security. In: Simulation in Computer Network Design and Modeling: Use and Analysis. Al-Bahadili, H. (Ed.). Information Science Reference, USA., ISBN: 978-1-4666-0191-8, pp: 358-376..
CrossRef | Direct Link | - Hashem, S.H., M.A. Al-Hamami and A.H. Al-Hamami, 2011. Developing a block-cipher-key generator using philosophy of data fusion technique. J. Emerging Trends Comput. Inf. Sci., 2: 222-227.
Direct Link | - Al-Hamami, A.H., M.A. Al-Hamami and S.H. Hashem, 2011. A strategy to compromise handwritten documents processing and retrieving using association rules mining. Ubiquitous Comput. Commun. J., 6: 901-906.
Direct Link | - Al-Hamami, A.H. and S.H. Hashem, 2011. Optimal cell towers distribution by using spatial mining and geographic information system. World Comput. Sci. Inf. Technol. J., 1: 44-48.
Direct Link | - Al-Hamami, A.H. and B.S.O. Al-Kubaysee, 2011. A fast approach for breaking rsa cryptosystem. World Comput. Sci. Inf. Technol. J., 1: 260-263.
- Al-Hamami, A., M. Al-Hamami and S. Hashem, 2011. A proposed modified data encryption standard algorithm by using fusing data technique. World Comput. Sci. Inf. Technol. J., 1: 88-91.
Direct Link | - Abdel-qader, M., A. Al-Jaber and A. Al-Hamami, 2011. Using short message service (SMS) to support business continuity. World Comput. Sci. Inf. Technol. J., 1: 34-38.
- Alallayah, K.M., W.F.A. El-Wahed, M. Amin and A.H. Alhamami, 2010. Attack of against simplified data encryption standard cipher system using neural networks. J. Comput. Sci., 6: 29-35.
CrossRef | Direct Link | - Alallayah, K., M. Amin, W.F. Abd El-Wahed and A.H. Alhamami, 2010. Attack and construction of simulator for some cipher systems using neuro-identifier. Int. Arab J. Inform. Technol., 7: 365-372.
Direct Link | - Alallayah, K., M. Amin, W.A. Al-Wahed and A. Alhamami, 2010. Attack and construction of simulator for some of cipher systems using neuro-identifier. Int. Arab J. Inform. Technol., 7: 365-372.
Direct Link | - Al-Hamami, A. and H. Al-Rashdan, 2010. Improving the effectiveness of the color coherence vector. Int. Arab J. Inf. Technol., 7: 324-332.
Direct Link | - Al-Hamami, A.H. and M.A. Al-Hamami, 2009. A novel strategy to provide secure channel over wireless to wire communication. Ubiquitous Comput. Commun. J., 4: 770-774.
Direct Link | - Al-Hamami, A.H., M.A. Al-Hamami and S.H. Hasheem, 2006. Applying data mining techniques in intrusion detection system on web and analysis of web usage. Inform. Technol. J., 5: 57-63.
CrossRef | Direct Link | - Al-Hamami, A.H., 2006. Security problems in E-government applications: Thoughts and solutions. Comput. Res. Mag., 8: 5-13.
- Al-Hamami, A.H., 2006. A proposal for efficient information's extracting from the web site. Comput. Res. Mag., 8: 105-126.
- Al-Hamami, A.H. and M. Al-Hakeem, 2006. SS2-WSD: A proposal of evolutionary standard specifications for web site design. Comput. Res. Mag., 8: 94-104.
- Al-Hamammi, A. and M.H. Al-Hamadani, 2005. Proving poverty of steganography system. Inform. Technol. J., 4: 284-288.
CrossRef | Direct Link | - Al-Hamami, H., S. Ali and Z.H. Ali, 2005. Information hiding using image quantization. J. Al-Rafidain Univ. Coll. Sci., 17: 25-33.
- Al-Hamami, A.H. and S.A. Al-Anni, 2005. A proposal for comprehensive solution to the problems of passport`s authentication. Inform. Technol. J., 4: 146-150.
CrossRef | Direct Link | - Al-Hamami, A.H. and M.K. Hussain, 2005. Mining of maximal item sets by using machine learning. J. Al-Rafidain Univ. Coll. Sci., 16: 39-57.
- Al-Hamami, A. and S. Al-Ani, 2005. A new approach for authentication technique. J. Comp. Sci., 1: 103-106.
CrossRef | Direct Link | - Al-Hamami, A.H. and M. Al-Hakeem, 2003. A proposed method to hide text inside HTML web page file. Comput. Res. Mag., 7: 5-15.
- Al-Hamami, A.H. and H.H. Soukaena, 2003. A proposed framework for choosing passwords. Comput. Res. Mag., 7: 52-72.