Preferred Language
Articles
/
7hYg5IsBVTCNdQwCH-Mp
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the improved algorithm can detect this type of anomaly. Thus, our approach is effective in finding abnormalities.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Investigating the quality of open street map roads data inside Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
New and Existing Approaches Reviewing of Big Data Analysis with Hadoop Tools
...Show More Authors

Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Inventive Engineering And Science,
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors

Publication Date
Thu Feb 16 2017
Journal Name
Signal, Image And Video Processing
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
The Factors influencing to the cognition operation & its Data: وفاء جاسم محمد
...Show More Authors

The present research deals with the influencing factors which depends on the way perceptual of the graphic designer which enters in the design logos of the loco European health, where the search include four chapters, the researcher reviewed in the chapter 0ne the methodical frame of the research ,as reviewed in the second chapter the theoretical frame, and the previous studies which included three sections, the first section included the perceptual understandable and types of it, and the second section included the influencing factors in the designer perceptual ways and its division . While the third section included the perceptual in graphic designer through the percepted shapes and the relation with ground and colors for express the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Next Generation Information Technology
Face detection and the effect of contrast and brightness
...Show More Authors

We propose a system to detect human faces in color images type BMP by using two methods RGB and YCbCr to determine which is the best one to be used, also determine the effect of applying Low pass filter, Contrast and Brightness on the image. In face detection we try to find the forehead from the binary image by scanning of the image that starts in the middle of the image then precedes by finding the continuous white pixel after continuous black pixel and the maximum width of the white pixel by scanning left and right vertically(sampled w) if the new width is half the previous one the scanning stops.

Scopus (1)
Scopus