Hameed Abdul-Kareem Younis's research while affiliated with University of Basrah and other places

Publications (10)

Article
In recent years, the chess game has begun to develop successful programming solutions. Computers were programmed to play chess in the middle of the twentieth century. Computer skills have become better and higher than the skills of chess players in the world, and from here this study has made it possible to find the optimal solution for the four sq...
Article
The purpose of this study is to identify the use of the Internet by Iraqi university students for preliminary studies، as well as the nature of the relationship between the students and their use of the Internet. Achieving the objectives of the study A questionnaire was designed to study the field of the study problem for testing and finding optima...
Chapter
Full-text available
This paper which entitles “Electronic Open Dissemination Framework in Electronic Government” may be a web based on online application expecting for citizen. The most destinations of this application are to create it intuitively and makes facilities to the client for tackling every day issues. Citizens can utilize this framework to rummage around fo...
Conference Paper
The strength of the encryption system depends on the power of the key generator that produces a pseudorandom stream. The generator generates a pseudorandom sequence so passes several tests. The non-linear flow coding system that relies on the Adder function has several unwanted vulnerabilities. It leads to failure to face randomness tests and relat...
Article
In this paper, implementation of stream cipher algorithm based on nonlinear combination generator for any given sequences is introduced. The main contribution of this work is to enhance the security of this generator and level of complexity is added using logic functions. The proposed scheme was measured through a series of randomness tests.
Article
In order to insert the data through the text, image or audio, the data hiding process can be used. Where the audio and text will be embedded into the color image. Third Least-Significant-Bit (LSB 3) will be used here, rather than utilizing Least-Significant-Bit (LSB 1) of the cover for embedding the information which help to improve the reliability...
Article
Full-text available
The aim of the research is to improve the distorted digital images using one of the methods of frequency domain. Where The Transform Cosine Discrete (DCT) function was used as one methods of frequency domain. Good results have been obtained using this method. standard gray scale images, which have distortions, have been improved and get improved im...

Citations

... Solve the parents, the second approach by Top-down approach in this technique divide a problem into Sub-problems then solve parents and store it and then solve the children, in this problem we will use this technique (A. Bakhthemmat & M. Izadi, 2020, H.A. Younis et al., 2020& A. Ozolins, 2020. ...
... According to the method of embedding a secret message into the cover image, steganographic methods can be divided into two basic groups [21][22][23][24]: ...