College of Science

Security in Voice over Internet Protocol (VoIP)

In today’s environment nearly all end-to-end telephone connections are set up via circuit-switching using Public Switched Telephone Network (PSTN),whereby node-to-node links in an origin/destination connection are set up via interconnects, and the connection is maintained exclusively for exchanges of information between the origin and destination until it is torn down.

English

Hand Palm Recognition Using Wavelet Transform

Biometric identification is an emerging technology that can solve security problems in our networked society. Biometrics traits such as fingerprints, hand geometry, face and voice verification provide a reliable alternative for identity verification / identification and are gaining commercial and high user acceptability rate. In this research, a hand palm identification system has been introduced. The work flow of the introduced system consists of two stages. The first stage is called the preprocessing stage and the second stage is called matching stage.

English