Alaa Ahmed Abbood
University of Information Technology and Communications

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

The Improved Hybrid Algorithm for the Atheer and Berry-Ravindran Algorithms Atheer Akram Abdul Razzaq; Nur’Aini Abdul Rashid; Alaa Ahmed Abbood; Zurinahni Zainol
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.397 KB) | DOI: 10.11591/ijece.v8i6.pp4321-4333

Abstract

Exact String matching considers is one of the important ways in solving the basic problems in computer science. This research proposed a hybrid exact string matching algorithm called E-Atheer. This algorithm depended on good features; searching and shifting techniques in the Atheer and Berry-Ravindran algorithms, respectively. The proposed algorithm showed better performance in number of attempts and character comparisons compared to the original and recent and standard algorithms. E-Atheer algorithm used several types of databases, which are DNA, Protein, XML, Pitch, English, and Source. The best performancein the number of attempts is when the algorithm is executed using the pitch dataset. The worst performance is when it is used with DNA dataset. The best and worst databases in the number of character comparisons with the E-Atheer algorithm are the Source and DNA databases, respectively.
Method to implement K-NN machine learning to classify data privacy in IoT environment Qahtan Makki Shallal; Zaid Alaa Hussien; Alaa Ahmed Abbood
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i2.pp985-990

Abstract

Internet of Things technology allows many devices to connect with each other. The interaction could be between humans and devices or between devices itself. In fact, the data are traveling between the devices through the media within the boundary, and it could be traveling outside the boundary when it required to be analyzed or stored in the cloud through the internet. Due the transmission media and internet, the data are vulnerable to attacks. Thus, the data need to be encrypted strongly for the purpose of protection. Usually, most of the encryption techniques will consume computer resources. In this work, we divide the data that are used in the IoT environment into three levels of sensitivity which are low, medium and high sensitive data to leverage the computer resources such as time of encryption and decryption, battery usage and so on. A framework is proposed in this work to encrypt the data depends on the level of sensitivity using the machine learning K nearest neighbors (K-NN).
Internet of things (IoT): a technology review, security issues, threats, and open challenges Alaa Ahmed Abbood; Qahtan Makki Shallal; Mohammed A. Fadhel
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1685-1692

Abstract

Internet of things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.