Hilal Mohammed Yousif Al-Bayatti

Hilal Mohammed Yousif Al-Bayatti
Applied Science University · Computer Scince

Ph.D

About

16
Publications
10,210
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
46
Citations
Citations since 2016
3 Research Items
34 Citations
2016201720182019202020212022024681012
2016201720182019202020212022024681012
2016201720182019202020212022024681012
2016201720182019202020212022024681012

Publications

Publications (16)
Article
Full-text available
In this work, we present a solution to a major problem that most researchers meet, which is the solution of differential equations of different dimensional by presenting a new structure to n-dimensional for the Extended cubic B-spline collocation algorithm. The Extended cubic B-spline collocation forms are displayed in one, two and three dimensiona...
Article
An advection-driven interspecific competition model is constructed, which we believe is more physically realistic as the movements of competing species are usually aimed at a target. Standard analysis using the travelling wave approach was employed, and the results show that the equilibrium points are independent of the advection velocities and the...
Article
This chapter provides a detailed description of a framework for designing, analyzing, deploying, and enforcing high level security management for Mobile Ad Hoc Networks (MANETs). The framework, which can be used by researchers, academics, security administrators, network designers, and post-graduate students, is designed and simulated using the obj...
Article
Full-text available
Trojan virus attacks pose one of the most serious threats to computer security. A Trojan horse is typically separated into two parts - a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection...
Chapter
This chapter provides a detailed description of a framework for designing, analyzing, deploying, and enforcing high level security management for Mobile Ad Hoc Networks (MANETs). The framework, which can be used by researchers, academics, security administrators, network designers, and post-graduate students, is designed and simulated using the obj...
Article
In this study the method is presented for face image recognition identification and labeling. The method is based on using the combination of the Discrete Multi-Wavelet Transform (DMWT) and the Inverse Discrete Wavelet Transform (IDWT) followed by a Neural Network (NN). In this method the resulting coefficients were computed by the proposed multi-w...
Conference Paper
Full-text available
This paper adopts the security problem of distributed agent system by providing a Secure Distributed Agents System Framework (SDASF). SDASF satisfy security by decorating the agent with an authorization certificate called Simple Public Key Infrastructure (SPKI). Remote Method Invocation (RMI) mechanism is used as a communication mechanism between a...
Article
Full-text available
The cuneiform symbol recognition is a vital step in automated reading and understanding the contents of tens of thousands cuneiform tablets available all over the world. Reading cuneiform records depends largely on hand written copies of cuneiform tablets for their data. A suggested method for cuneiform symbol recognition from a hand written images...
Article
Full-text available
Information hiding techniques become more complex and strong way to hide the secret messages, especially in digital images. Thus, it becomes a good tool to exchange information. The two aspects of steganography attacks are the detection and destruction of the embedded messages. In this research we propose and implement a system that can destroying...
Article
Full-text available
A goal of steganography is to avoid drawing suspected to the transmission of a hidden message. If suspected is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert message. Aim of the Research The aim of the research is to design a new method to detect the hidden information in images, we name...
Article
Full-text available
Hidden secret messages in images are used widely in these days, in this research we will try to extract the hidden information from images by using two tools, the first one is the standard tools which includes Hide In Picture, Hide and Seek, and Hide 4PGP. While the second tools which is called the developed tools which includes Butterfly Chess Too...

Network

Cited By