Thesis

Thesis

Clustering Approach for Unsupervised Image Classification using Genetic Algorithm

Clustering is a discipline devoted to find and describe cohesive or homogeneous chunks in data, the clusters. An example of clustering problem is the automatic revealing of meaningful parts in a digitalized image. The motivation for the focus on data clustering is the fact that data clustering is an important process in pattern recognition and machine learning. Clustering algorithms are used in many applications such as image segmentation, vector and color image quantization, compression, etc.

إنجليزية

Security in Voice over Internet Protocol (VoIP)

In today’s environment nearly all end-to-end telephone connections are set up via circuit-switching using Public Switched Telephone Network (PSTN),whereby node-to-node links in an origin/destination connection are set up via interconnects, and the connection is maintained exclusively for exchanges of information between the origin and destination until it is torn down.

إنجليزية

Hand Palm Recognition Using Wavelet Transform

Biometric identification is an emerging technology that can solve security problems in our networked society. Biometrics traits such as fingerprints, hand geometry, face and voice verification provide a reliable alternative for identity verification / identification and are gaining commercial and high user acceptability rate. In this research, a hand palm identification system has been introduced. The work flow of the introduced system consists of two stages. The first stage is called the preprocessing stage and the second stage is called matching stage.

إنجليزية

Color Image Compression Using Hybrid Wavelet Transform and Vector Quantization Method

Color images have the potential to convey more information than a monochrome or black and white images. Each pixel for a true color image is stored as values of red, green, and blue. However, the RGB color model is not an efficient representation for compression task because there is significant correlation between RGB color components. Therefore, for compression, luminance-chrominance representations (such as YIQ) is implemented.

إنجليزية

computer aided learning for network security

The expansion of computer networks and the use of Internet in every side of our life, and the importance of Computer and Network security, , computer aided learning Security System is utilized to make many security attacks and services easier to be applied and understood by students and other people.The proposed system will mainly be divided into two parts, Application mode and Documentation mode. In the two modes, the system will be in two parts: Attack and Defense. In the Attack and Defense, the well known security tools will be covered.

إنجليزية

Web-Based Implementation of Digital Library for Iraqi Universities

The work presented here describes a web-based digital library system for Iraqi universities. This system is capable of executing the search function of digital libraries. Library information is present in centralized database which is collected from different library systems of Iraqi universities and it provides their access through website.The system utilizes MySQL database to store the collected data from library systems in Iraqi universities. Web technology is used for accessing library data by using HTML & PHP. Apache server is also used.

إنجليزية

Low Rate Hiding in Audio Data Using Phase Domain

Steganography is considered one of the widely used methods for hiding information; it hides secret data in digital cover without clear suspicion.This work focus on studying two methods for hiding any secret data type in the audio signal. First, the audio signal is transformed to frequency domain by using quick Fourier transform that depended on the reduction of time and number of mathematical operations.        Two hiding methods are designed to embed secret data bits in the phase domain coefficients of audio signal.

إنجليزية

An Authentication Scheme For Instant Messaging System

 Instant messaging system is considered to be one of the widely used application area, it is rapidly growing as a primary communications technology among corporate, educational and home users.  Users of instant messaging systems need to authenticate each other before communicating, so the need for login authentication becomes an important issue.This research deals with the design and implementation of instant messaging system (IMS) supported with a suggested method to authenticate users.

إنجليزية