Mahmood, Yasir Ali
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

A Web Scraper for Data Mining Purposes Mahmood, Yasir Ali; Mahmood, Bassim
Sistemasi: Jurnal Sistem Informasi Vol 13, No 3 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i3.4107

Abstract

The current revolution in technology makes data a crucial part of real-life applications due to its importance in making decisions. In the era of big data and the massive expansion of data streams on Internet networks and platforms, the process of data collection, mining, and analysis has become a not easy matter. Therefore, the presence of auxiliary applications for data mining and gathering has become a necessary need. Usually, companies offer special APIs to collect data from particular destinations, which needs a high cost. Generally, there is a severe lack in the literature in providing approaches that offer flexible, low, or free of cost tools for web scraping. Hence, this article provides a free tool that can be used for data mining and data collection purposes from the web. Specifically, an efficient Google Scholar web scraper is introduced. The extracted data can be used for analysis purposes and making decisions about an issue of interest. The proposed scraper can also be modified for crawling web links and retrieving specific data from a particular website. It can also formalize the collected data as a ready dataset to be used in the analysis phase. The efficiency of the proposed scraper is tested in terms of the time consumption, accuracy, and quality of the data collected. The findings showed that the proposed approach is highly feasible for data collection and can be adopted by data analysts.
Digital Image Confidentiality using New Encryption Method Ismaiel, Yaseen Hikmat; Abdullah, Omar Muayad; Mahmood, Yasir Ali
Sistemasi: Jurnal Sistem Informasi Vol 15, No 3 (2026): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v15i3.6057

Abstract

The significant development in mobile phone cameras, in terms of the clarity and high-resolution images captured, the wide utilizing of mobile phones and other communication devices among all segments of society, and the increasing use of social networking sites and the exchange of millions of digital photos daily, all have been pointed with a great importance of digital images and the need to provide adequate security and protection for these images. Digital images contain a large amount of information and recently they have an effective and easy tools of communication without the need for a determined text.Given that digital images contain important, personal, and sensitive information, there is a great need to protect these images and prevent unauthorized persons from applying any changes to the image's contents. There is a great deal of work in this field, most of which uses encryption methods to achieve this protection. As is well known, there are two types of encryption systems (symmetric and asymmetric). Symmetric encryption systems are fast but require a secret key distribution process, while asymmetric encryption systems are relatively slow, involving complex processes. Therefore, they are not suitable for use in social networking applications that require rapid performance and interaction. In this research, a proposed method for digital image encryption is proposed, which includes the use of logical XOR operation to encrypt the digital image based on two proposed levels with scrambling operation to provide a high degree of diffusion and confusion for the resulting encrypted image. The proposed method was evaluated through a set of efficiency measurement metrics (NPCR, UACI, MSE, PSNR, SSIM, Entropy, and Correlation) and it gave results showed a difference between the original image and the image resulting from the first level of encryption. We also noted that the image resulting from the second level had a higher percentage of difference and randomness compared to the original image. Therefore, the proposed encryption method is suitable in terms of speed and confidentiality for use in encrypting digital images and thus maintaining their privacy.