ملف المستخدم
صورة الملف الشخصي

لبنى عماد كاظم

إرسال رسالة

التخصص: علوم الحاسوب

الجامعة: كليه الامام الكاظم عليه السلام

النقاط:

15.5
معامل الإنتاج البحثي

الخبرات العلمية

  • تدريسي

الأبحاث المنشورة

K-means clustering algorithm applications in data mining and pattern recognition

المجلة: International Journal of Science and Research (IJSR) e

سنة النشر: 2017

تاريخ النشر: 2024-07-21

Clustering is a process of partitioning a set of data (or objects) into a set of meaningful sub-classes, called clusters, help users understand the natural grouping or structure in adata set. Clustering has wide applications, inEconomic Science (especially market research), Document classification, Pattern Recognition, Spatial Data Analysis and Image Processing. This paper focuses on clustering in data mining and image processing. K-means algorithm is the chosen clustering algorithm to study in this work. The paper include: the algorithm and its implementation, how to use it in data mining application and also in pattern recognition.

https://www.researchgate.net/profile/Abbas-Nawar/publication/369829880_Hiding_Information_in_Digital_Images_Using_LSB_Steganography_Technique/links/642ec008ad9b6d17dc3d18ab/Hiding-Information-in-Digital-Images-Using-LSB-Steganography-Technique.pdf

المجلة: International Journal of Interactive Mobile Technologies

سنة النشر: 2023

تاريخ النشر: 2023-04-01

Description The highest way to protect data from intruder and unauthorized persons has become a major issue. This matter led to the development of many techniques for data security, such as Steganography, Cryptography, and Watermarking to disguise data. This paper proposes an image steganography method using the Least Significant Bits (LSB) technique and XOR operator and a secret key, through which the secret key is transformed into a one-dimensional bit stream array, then these bits are XORed with the bits of the secret image. Multiple experiments have been performed to embed color and grayscale images inside cover media. In this work, the LSB technique is ideal in two ways: firstly, only the least significant one-bit (1bit) of each byte will store the embedded data, this method is named (1-LSB). Secondly, the four least significant bits of the right half-byte (4 bits) of each byte will store the embedded data, this method is named (4-LSB). Subjective and objective analyzes were performed for each LSB process. The subjective analysis is responsible for both HVS and histogram, whereas the objective analysis involved both PSNR and MSE metrics.

K-means clustering algorithm applications in data mining and pattern recognition

المجلة: Journal of Discrete Mathematical Sciences and Cryptography

سنة النشر: 2021

تاريخ النشر: 2021-10-03

The great revolution in computer and communications networks expansion has a significant impact on the advancement of big data technology which causes various industries evolution. The use of this technology achieved impressive success and great results. Information security is closely related to the impact of big data application on a computer network. However, the security of information and big data on a computer network is affected by various external factors, which lead to information leakage and thus leads to large economic losses. To solve the above-mentioned problems, one of the most important things is to increase people’s consciousness of protecting the security of computer network information from all angles and to develop preventive plans based on the real situation, mainly to assure the security and accuracy of the network information.

https://iopscience.iop.org/article/10.1088/1742-6596/1530/1/012034/meta

المجلة: Journal of Physics: Conference Series

سنة النشر: 2020

تاريخ النشر: 2020-05-01

Description With the speedy development of big data technology and applications, the need to promote data sharing across departments and industries has become very instant. But Yes, security issues are key issues affecting the development of data sharing. Countries around the world are paying more and more attention to the security of data sharing, including the United States. Many countries, including the EU and China, are developing data security-related laws and regulations to support the legal use and security of data sharing protection. Summarize and analyze the security management and control of data sharing at home and abroad, design the data-sharing model and related party roles, and analyze the numbers. Based on the shared security risks and problems, the data sharing security framework is proposed, and finally, the data sharing security governance is strengthened suggestions.

Optimum placement of nodes in networks of wireless sensors

المجلة: AIP Conference Proceedings

سنة النشر: 2023

تاريخ النشر: 2023-03-29

Description Our goal is to include a brief overview of the WSN system and its potential to smooth the path to link the real and virtual environment to a global network centered on the Internet. Thus, in these modern technologies, sensor nodes play a significant role in transmitting information from a connection node to another defined node within its full scope. According to the ideal condition of WSN, the issue of radiofrequency network localization is of considerable significance in many technological applications such as military hardware for the identification of local points of attack or protection, environmental science besides, in general, sensor nodes. The most advanced equipment for acquiring a direct Global Positioning System location. We look at the primary structure of WSNs for kernel functions and methods to identify the most suitable and great access value based on the localization action after a brief history

Prediction system for network security state

المجلة: AIP Conference Proceedings

سنة النشر: 2023

تاريخ النشر: 2023-03-29

System discloses a network security state prediction, it belongs to the network security technology field, including security detection subsystems. The safety prediction subsystem passes through the collecting of information’s flows in the network and extracts intrusion attack flags and security matters. the system match files to detect whether the network situation is safe. The prediction subsystem is used to make predictions safely. Real-time collection through the safety detection subsystem network information data, and detect data according to the current data situation whether there are attack flags in the system to assess the security situation and predict the security. The subsystem is then based on the security situation assessed by the security detection subsystem to predict the future state of network security so that the prediction is more accurate, and the security detection subsystem will filter out redundant data …

General Awareness and Knowledge about Glaucoma Cataracts for Diabetic

المجلة: International Journal of Engineering & Technology

سنة النشر: 2018

تاريخ النشر: 2018-12-31

Horizontals and verticals cups to discs percentages are the most crucial limitations used clinically to find glaucoma or observer its growth and are physically calculated from pictures of retinal fundus of the optic nerves heads. Appointed to the rarity of the glaucoma specialists as well as the rising of glaucoma’s population, an automatically analyzed horizontal and vertical cup to disc ratios (HCDRs and VCDRs, resp.) may be valuable for glaucoma monitoring. We description one algorithm to determine the HCDRs and VCDRs. This algorithms, amount and pictures techniques were technologically advanced for segmenting the disc, though thresholding operating Type-II fuzzy method was progressed for slices of the cup. The outcomes from the algorithms were confirmed using the guide of images markings from a dataset of glaucomatous images (retinal fundus images for glaucoma analysis (RIGA dataset)) by five ophthalmologists. The algorithm’s accuracy for HCDRs and VCDRs merged was 65.3%. Simply the accuracy of guide markings by one ophthalmologist was higher than the algorithm’s accuracy. The algorithm’s best understanding was with markings by ophthalmologist number 1 in 130 images (32.7%) of the whole examined images. Flow chart for images analyzed were add in this paper as reference.