Abdullah, Omar Muayad
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

A Hybrid Internet of Behavior Algorithm for Predicting IoT Data of Plant Growing using LSTM and NB Models Ahmad, Khansaa Yaseen; Abdullah, Omar Muayad
Sistemasi: Jurnal Sistem Informasi Vol 14, No 5 (2025): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i5.5354

Abstract

The researches that compare the accuracy between classical statistical prediction procedures and deep learning algorithms represent an important and modern field. The prediction accuracy of the plant growing is considered as an important factor in the field of smart agricultural technologies. This research proposes a hybrid Internet of Behaviors (IoB) technique that linking between time-series predicting and the classification models to estimate the plant growing behaviors using real environmental data. The proposed algorithm includes ML algorithms, especially Recurrents Neural Networks (RNN) and Long Short-Term Memory (LSTM), used for predicting the plant growing depending on sensor data. To improve the prediction accuracy, the outputs of the LSTM system were used as inputs to the Naïve Bayes algorithm. The dataset is collected from the Kaggle website using Internet of Things (IoT) sensor readings depending on the factors that affecting the plant growing. The obtained results stated that the proposed hybrid algorithm enhanced the prediction accuracy compared to using LSTM alone. Additionally, the using of Naïve Bayes algorithm added more reliable to the process of examining the growing behavior, making the proposed system more practical and provide the rapidity in task performing.
Digital Image Confidentiality using New Encryption Method Ismaiel, Yaseen Hikmat; Abdullah, Omar Muayad; Mahmood, Yasir Ali
Sistemasi: Jurnal Sistem Informasi Vol 15, No 3 (2026): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v15i3.6057

Abstract

The significant development in mobile phone cameras, in terms of the clarity and high-resolution images captured, the wide utilizing of mobile phones and other communication devices among all segments of society, and the increasing use of social networking sites and the exchange of millions of digital photos daily, all have been pointed with a great importance of digital images and the need to provide adequate security and protection for these images. Digital images contain a large amount of information and recently they have an effective and easy tools of communication without the need for a determined text.Given that digital images contain important, personal, and sensitive information, there is a great need to protect these images and prevent unauthorized persons from applying any changes to the image's contents. There is a great deal of work in this field, most of which uses encryption methods to achieve this protection. As is well known, there are two types of encryption systems (symmetric and asymmetric). Symmetric encryption systems are fast but require a secret key distribution process, while asymmetric encryption systems are relatively slow, involving complex processes. Therefore, they are not suitable for use in social networking applications that require rapid performance and interaction. In this research, a proposed method for digital image encryption is proposed, which includes the use of logical XOR operation to encrypt the digital image based on two proposed levels with scrambling operation to provide a high degree of diffusion and confusion for the resulting encrypted image. The proposed method was evaluated through a set of efficiency measurement metrics (NPCR, UACI, MSE, PSNR, SSIM, Entropy, and Correlation) and it gave results showed a difference between the original image and the image resulting from the first level of encryption. We also noted that the image resulting from the second level had a higher percentage of difference and randomness compared to the original image. Therefore, the proposed encryption method is suitable in terms of speed and confidentiality for use in encrypting digital images and thus maintaining their privacy.