Ahmed Adeeb Jalal
Al-Iraqia University

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

Data loss prevention (DLP) by using MRSH-v2 algorithm Basheer Husham Ali; Ahmed Adeeb Jalal; Wasseem N. Ibrahem Al-Obaydy Al-Obaydy
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (362.378 KB) | DOI: 10.11591/ijece.v10i4.pp3615-3622

Abstract

Sensitive data may be stored in different forms. Not only legal owners but also malicious people are interesting of getting sensitive data. Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. In general, data may be categorized based into three kinds: data in use, data at rest, and data in motion. Data Loss Prevention (DLP) are good tools to identify important data. DLP can do analysis for data content and send feedback to administrators to make decision such as filtering, deleting, or encryption. Data Loss Prevention (DLP) tools are not a final solution for data breaches, but they consider good security tools to eliminate malicious activities and protect sensitive information. There are many kinds of DLP techniques, and approximation matching is one of them. Mrsh-v2 is one type of approximation matching. It is implemented and evaluated by using TS dataset and confusion matrix. Finally, Mrsh-v2 has high score of true positive and sensitivity, and it has low score of false negative.
Text documents clustering using data mining techniques Ahmed Adeeb Jalal; Basheer Husham Ali
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i1.pp664-670

Abstract

Increasing progress in numerous research fields and information technologies, led to an increase in the publication of research papers. Therefore, researchers take a lot of time to find interesting research papers that are close to their field of specialization. Consequently, in this paper we have proposed documents classification approach that can cluster the text documents of research papers into the meaningful categories in which contain a similar scientific field. Our presented approach based on essential focus and scopes of the target categories, where each of these categories includes many topics. Accordingly, we extract word tokens from these topics that relate to a specific category, separately. The frequency of word tokens in documents impacts on weight of document that calculated by using a numerical statistic of term frequency-inverse document frequency (TF-IDF). The proposed approach uses title, abstract, and keywords of the paper, in addition to the categories topics to perform the classification process. Subsequently, documents are classified and clustered into the primary categories based on the highest measure of cosine similarity between category weight and documents weights.
Effectiveness evaluation of machine learning algorithms for breast cancer prediction Abdulrahman Ahmed Jasim; Ahmed Adeeb Jalal; Nabaa Mohammad Abdulateef; Noor Ali Talib
Bulletin of Electrical Engineering and Informatics Vol 11, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i3.3621

Abstract

Breast cancer is becoming a global epidemic, affecting predominantly women. As a result, the number of people diagnosed with breast cancer is increasing every day. As a result, it is critical to have certain early detection methods in place that can assist patients in recognizing this condition at an early stage. Therefore, they might begin taking their medication to prevent the sickness from killing them. Different prediction approaches for early diagnosis of such diseases have been created in the machine learning fields. Those algorithms employ a variety of computational classifiers and claim to achieve satisfactory results in a few areas. However, no research was reached to determine which computationally sophisticated approach is more effective in detecting breast cancer. As a result, it is necessary to select the most effective strategy from the available options. This paper makes a contribution to the performance evaluation of 12 alternative classification strategies on datasets of breast cancer. The right explanations for the classifiers' dominance were investigated.
Document classification using term frequency-inverse document frequency and K-means clustering Wasseem N. Ibrahem Al-Obaydy; Hala A. Hashim; Yassen AbdelKhaleq Najm; Ahmed Adeeb Jalal
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1517-1524

Abstract

Increased advancement in a variety of study subjects and information technologies, has increased the number of published research articles. However, researchers are facing difficulties and devote a significant time amount in locating scientific research publications relevant to their domain of expertise. In this article, an approach of document classification is presented to cluster the text documents of research articles into expressive groups that encompass a similar scientific field. The main focus and scopes of target groups were adopted in designing the proposed method, each group include several topics. The word tokens were separately extracted from topics related to a single group. The repeated appearance of word tokens in a document has an impact on the document's weight, which is computed using the term frequency-inverse document frequency (TF-IDF) numerical statistic. To perform the categorization process, the proposed approach employs the paper's title, abstract, and keywords, as well as the categories' topics. We exploited the K-means clustering algorithm for classifying and clustering the documents into primary categories. The K-means algorithm uses category weights to initialize the cluster centers (or centroids). Experimental results have shown that the suggested technique outperforms the k-nearest neighbors algorithm in terms of accuracy in retrieving information.
Cloud computing security for e-learning during COVID-19 pandemic Yassen AbdelKhaleq Najm; Suray Alsamaraee; Ahmed Adeeb Jalal
Indonesian Journal of Electrical Engineering and Computer Science Vol 27, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v27.i3.pp1610-1618

Abstract

The demand for e-learning services increased during the developments of the COVID-19 virus and its rapid spread, and the recommendations of the World Health Organization (WHO) that social distancing should be required. The rapid transition to the e-learning environment quickly led to the neglect of some security aspects, which led to an increase in cyber attacks targeting computer accounts, which is one of the most important pillars of e-learning. In these papers, the attacks that target the cloud computer used in the most important e-learning have been studied and classified according to the victim using an inductive methodology based on global statistics related to cyber attacks and recent research. And suggest appropriate solutions to avoid its occurrence in the near future and raise the level of protection for those computer clouds.
A web content mining application for detecting relevant pages using Jaccard similarity Ahmed Adeeb Jalal; Abdulrahman Ahmed Jasim; Amar A. Mahawish
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6461-6471

Abstract

The tremendous growth in the availability of enormous text data from a variety of sources creates a slew of concerns and obstacles to discovering meaningful information. This advancement of technology in the digital realm has resulted in the dispersion of texts over millions of web sites. Unstructured texts are densely packed with textual information. The discovery of valuable and intriguing relationships in unstructured texts demands more computer processing. So, text mining has developed into an attractive area of study for obtaining organized and useful data. One of the purposes of this research is to discuss text pre-processing of automobile marketing domains in order to create a structured database. Regular expressions were used to extract data from unstructured vehicle advertisements, resulting in a well-organized database. We manually develop unique rule-based ways of extracting structured data from unstructured web pages. As a result of the information retrieved from these advertisements, a systematic search for certain noteworthy qualities is performed. There are numerous approaches for query recommendation, and it is vital to understand which one should be employed. Additionally, this research attempts to determine the optimal value similarity for query suggestions based on user-supplied parameters by comparing MySQL pattern matching and Jaccard similarity.