New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm A Ako,Muhammad, RHH Aziz International Journal of Computer Applications 143 (4), 11-17, 2016 | 55 | 2016 |
Crop Yield Maximization Using an IoT-Based Smart Decision IU Amna IkramWaqar Aslam , Roza Hikmat Hama Aziz, Fazal Noor , Ghulam Ali ... Journal of Sensors 2022, 15, 2022 | 23* | 2022 |
SentiXGboost: enhanced sentiment analysis in social media posts with ensemble XGBoost classifier RH Hama Aziz, N Dimililer Journal of the Chinese Institute of Engineers 44 (6), 562-572, 2021 | 21 | 2021 |
Twitter sentiment analysis using an ensemble weighted majority vote classifier RHH Aziz, N Dimililer 2020 International Conference on Advanced Science and Engineering (ICOASE …, 2020 | 18 | 2020 |
The Impact of Reactive Routing Protocols for Transferring Multimedia Data over MANET Ako Muhammad Abdullah, Roza Hikmat Hama Aziz Journal of Zankoy Sulaimani – Part A 16 (4), 9-24, 2014 | 12 | 2014 |
Evaluating the Use of Quick Response (QR) Code at Sulaimani University Libraries Ako Muhammad Abdullah, Roza Hikmat Hama Aziz International Journal of Advanced Research in Computer Science and Software …, 2014 | 11 | 2014 |
Improving Courier Service Reservation System: Reliability and Performance RHH Aziz, R Hikmat Asia Journal of Natural & Applied Sceinces 4 (4), 20-36, 2015 | 8 | 2015 |
A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification Ako Muhammad Abdullah, Miran Hikmat, Roza Hikmat Hama Aziz International Journal of Computer Trends and Technology (IJCTT) – volume 15 …, 2014 | 3* | 2014 |
New Security Techniques for Encrypting IP Address and Data Transfer over Wide Area Network through Three Levels Ako Muhammad Abdullah, Miran Hikmat Mohammed and Roza Hikmat Hama Aziz International Journal of Computer Science and Software Engineering (IJCSSE …, 2015 | 1 | 2015 |
Research Article Crop Yield Maximization Using an IoT-Based Smart Decision A Ikram, W Aslam, RHH Aziz, F Noor, GA Mallah, S Ikram, MS Ahmad, ... | | 2022 |
An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah International Journal of Computer Science & Security (IJCSS) 9 (2), 85-95, 2015 | | 2015 |