Matematik ve Bilgisayar Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/222
Browse
Browsing Matematik ve Bilgisayar Bölümü Tezleri by Department "Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Bölümü"
Now showing 1 - 20 of 28
- Results Per Page
- Sort Options
Master Thesis Binary image watermarking on audio signal using wavelet transform(Çankaya Üniversitesi, 2014) Rashid, Rakan SaadallahDigital watermarking approaches have recently become an important field of study in a number of practical applications. Generally, digital watermarking is the process of embedding particular information data into other signal data in such a way that the quality of the original information data is maintained. Watermarking can be performed on images, video, text, or audio to protect them from copyright violation. Among all of these types of watermarking, audio watermarking is difficult since the quality of such signals is highly affected by the watermark code. This thesis introduces some approaches that have features and may be applicable for audio watermarking. Generally, the digital audio watermarking approaches may be performed in either the special domain or the transform domain. The approaches that are based on the transform domain are gaining more attention due to their robustness or resistance to attackers. The most commonly used transforms for achieving digital audio watermarking are discrete cosine transform (DCT), short-term Fourier transform (STFT), and digital wavelet transform (DWT). In this research work, the main attention is paid toward digital wavelet transforms such as Haar and Daubechies-4. In addition, this thesis investigates the process of embedding a binary image into various audio signals such as speech and music signals. The values of the pixels in the binary images are either 1 or 0. These pixels are inserted into samples of the speech signal in such a way that the quality of the speech signal is preserved. One main reason to consider the audio watermarking approaches in the wavelet domain is that many modern multimedia standards such as JPEG2000 and MPEG-4 are based on the discrete wavelet transform. These common standards have brought new requirements such as low bit-rate transmission, coding, and many other advantages. Finally, experimental results are presented to validate the performance of the proposed watermarking approach and to compare its performance with other related watermarking approaches. The results show that the performance, in terms of signal-to-noise ratio (SNR) and normalized correlation (NC), of the proposed watermarking approach outperforms other approaches based on DCT. In addition, the results show that the extraction process of the hidden code becomes complex when considering any signal processing operations such as MP3 compression and high pass filtering. The worst case is when using a high pass filter where the recovered binary image is not satisfactoryMaster Thesis Effects of e-government and GIS technology for developing services in education sector case study: Schools in Kirkuk City center(Çankaya Üniversitesi, 2014) Abdulrahman, Bashar AdnanThe field of e-government has become an important subject around the globe because it refers to the delivery of government services by means of technology to save resources and bring governments closer to their citizens and to the private sector. This study underlines how most e-government projects require spatial datasets to improve public services. Pertinent examples already found/extant in the literature are examined, and investigating schools locations in Kirkuk city are selected for the case study. In parallel to the literature review, a study of the geographical distribution of schools is shown to be necessary such that land use for educational facilities occupies an unobjectionable part of the Kirkuk urban area, which in turn makes decision makers take this (land) use into account when the government is to establish city master plans. This thesis presents how establishing a working GIS in the education services would improve e-government applications due to the fact that GIS tools and facilities improve flexibility and accuracy in the management of both spatial and non-spatial datasets. As the measurements recognized by the EU and UN show, e-government initiatives need to be prepared above accurate, clean, timely and controlled shared datasets. Therefore, establishing strong databases and making legislative changes to enable data sharing among government agencies are found to be the primary targets of both central and local governments. The thesis shows that establishing a working GIS to provide services to students, teachers, citizens and decision makers in the education sector is technically feasible. However, the starting point ought to be collecting raw data from the field and ensuring that the data is updated in a timely manner, and not acquiring hardware and software. In so doing, Iraq can rank higher in international e-government measurement reportsMaster Thesis Variational iteration method for fractional Davey-Stewartson equations(2012) Yılmaz, TuğbaThe Variational iteration method is a new and powerful method to solve both linear and nonlinear differential equations. The Variational iteration method was applied to the fractional Davey-Stewartson equations within the Caputo sense and approximate analytical solutions were obtainedMaster Thesis Mathematical aspects of superintgrable systems(2004) Defterli, ÖzlemSuperintegrallenebilir SistemlerMaster Thesis Cyber security in the national protection of Turkey(2012) Aydın, FarukCyber attacks supported by individuals and states are increased by the prevalence of information technologies and usage of these technologies at the critical infrastructure of the states. In this study, these cyber attacks and associated impacts are researched. In connection with this issue, evolution of cyber threats from malware such as viruses to weapons is studied by examples. In addition, within this thesis, precautions against these threats are mentioned. Usage of anti-malware applications as prevalent precautions is assessed within this context. National and international standards of information security, information security strategies of EU, USA and some other countries and precautions for cyber security of Turkey are studied. In the 9th Development Plan of Turkey, building information society is targeted. In this thesis, requirements to reach this target securely are researched. Under this information, it is considered that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that government should play an affective role to protect, educate, and guide governmental and private companies and citizens about cyber security. Accordingly, this thesis advises that cyber security should be put into the next development planMaster Thesis An investigation of electronic government transition case study in health: Hospitals in Erbil(2013) Jamel, Ahmed Abdulrahman M.Electronic government initiatives and public participation to them are among the indicators of today's development criteria of the countries. After consequent two wars, Iraq's current position in, for example, UN's e-government ranking is quite concerning and did not improve in recent years, either. In the preparation of this work, we are motivated with the fact that handling geographic data of the public facilities and resources are needed in most of the e-government projects; such examples are reported to the literature. Geographical information systems (GIS) provide most common tools not only to manage spatial data but also to integrate such type of data with nonspatial attributes of the features. With this background, this thesis proposes that establishing a working GIS in the health sector of Iraq would improve e-government applications. As the case study, investigating hospital locations in Erbil is chosen. The results show that setting up a GIS in Erbil does not require extreme technical knowledge; however, a strong limitation that obtaining clean and up-to-date data is an important concern. Although it is possible to establish a GIS in this sector, the starting point should not be acquiring hardware and software but to collect clean data from the field and to ensure that the data gets updated timely. Keywords: e-government, Iraq, Erbil, GIS, spatial data, hospital locationsMaster Thesis The benefits and potential implementation problems of GIS in the water distribution services of municipalities case study: The Kirkuk Water Directorate(2012) Ali, Suha AzizA potential implementation of geographic information systems (GIS) in Kirkuk Water Directorate is evaluated at a preliminary level. Selected literature has been surveyed and it is perceived that there are municipalities of smaller, bigger and same sizes which have successfully setup GIS in their water distribution departments for asset management, real time monitoring and hydraulic modeling in there services . Such works report success stories in managing their network as well as pinpointing malfunctioning segments due to problems such as leak, blowout or broken pumps. This research targeted to reveal potential problems that Kirkuk Water Directorate can face while transforming paper based records into digital environment for a prospective GIS. While the literature survey has provided reports of successful applications, any potential problem that Kirkuk Water Directorate can face could be only inferred from them. Hence, to experience GIS software and data preparation, a GIS course has been followed by the researcher. The researcher has also contacted key informants who have actively worked in Ankara?s water distribution department during the rehabilitation of its GIS. By this way, potential problems could be identified. Investigations have been done over sample files of map sheets shared by the Kirkuk Water Directorate and it is seen that potential problems can be solved by a data operator who has attended a basic GIS course. Both the literature and investigation results show that preparing spatial and non-spatial databases of assets is the start of a productive GIS. Before increasing data quality, building a hydraulic model is almost impossible and setting up a real time monitoring system is quite difficult. It is also found that organizational changes such as in business rules could be necessary as frequent field trips will be needed with the GIS staff to check assets in use. It is expected that this research will be beneficial for the municipality of Kirkuk to manage resources in implementing GIS for it is anticipated to start financial feasibility works under this topicMaster Thesis Audio watermarking using DWT of second level decomposition of low frequency and using RMS on approximation coefficients(Çankaya Üniversitesi, 2014) Maraha, Heyam Essam JibraelDigital media are distributed through the internet system in a magnificent manner due to the efficiency and inexpensiveness of such a system. Audio clips and other digital signals are transmitted, shared and used easily. This causes a real security problem. Solving this problem leads to finding authentication techniques to provide security for these digital media. Digital watermarking is a suggested solution technique to offer such security for these distributed digital signals. Digital watermarking is the art of embedding information (a watermark) in the original signal, taking into consideration preserving the quality of the host digital signal. There are different types of watermarking media such as image, video and audio; our thesis focuses on audio watermarking techniques. Also, there are a variety of techniques using the watermarking algorithm that depends on the type of algorithm that is used to embed the watermark in the original signal. In our thesis, we have used DWT (Discrete Wavelet Transform) of second level decomposition of the approximation coefficients of each frame. These frames are resulted from segmenting the original audio clips into frames, each one equal to 10 seconds. Also, we have applied the RMS (Root Mean Square) to these approximation coefficients which represent the low frequency of each frame. The aim of using the RMS is to find the higher magnitude approximation coefficients among the segmented frames; then to embed the watermark in a quarter of the selected frames according to the magnitude order. A watermark of 256 x 256 pixels was embedded in two tested audio clips (Pop and Classic) according to the former algorithm. We have applied 17 attacks that try to remove or modify the watermark that is hidden in the original audio clips. Also variety of models such as subjective and objective models were applied to evaluate the efficiency of the proposed algorithm results. The results of the proposed watermarking technique show an effective robustness against most of the applied attacks, especially in MP3 Compression, Quantization, Additive Noise, Resample and Low Pass Filter; however, it shows fragile robustness in Time Stretch and Pitch Shift attacksMaster Thesis Management of electronic commerce and website application in electronic products marketing in Iraq(Çankaya Üniversitesi, 2014) Ibrahem, AhmedThe consumer -to- consumer is one of electronic commerce (e- commerce) types. The primary aim of an e- commerce site is to buy and sell goods and services online. The purpose of this study is to design a web based interface for online shopping in Iraq. It is an open market between consumers to consumer shows us how to market electronic products. This system designed by using PHP language and MySQL server for database. The finding of this research is the application enables consumers to sell their product online. Also, the website facilitates buying and selling on the Internet, saving time, search for a product, saving the cost of transportation, as well as the possibility of adding a product by the customer. Further, in this website can post buying and selling through social media and sharing information with (Facebook and Twitter). Also, shopping cart is important for every online shopping, it facilitates to add and delete a product with shopping. Finally, customer should participate in the website as a member registering by username and password number for each customer to be able shoppingMaster Thesis On caputo modification of the hadamard fractional derivative(Çankaya Üniversitesi, 2014) Gambo, Yusuf Ya'uIn this thesis, more properties of the Caputo modification of the Hadamard fractional derivatives are studied. The fundamental theorem of fractional calculus (FTFC) in the Caputo-Hadamard setting is presented. The theorem is then used in formulating several original resultsMaster Thesis The discrete laplace transform(Çankaya Üniversitesi, 2014) Ameen, Raad AliIntegral transforms have not only been effective methods to solve ordinary and partial differential equations, but helped in the development to the theory of these equations as well. The Laplace transform method is considered one of the strongest among them. The question arises here whether there is a discrete analogue of the Laplace transform which can be used to solve difference equations. In this thesis, using the definition of the Laplace Transform on an arbitrary time scale, the Discrete Laplace Transform is introduced. The main theorems related to this transform are mentioned. The Discrete Laplace Transform of elementary discrete functions are developed and some applications are givenMaster Thesis Fractional differential equations and their applications(2004) Avkar, TanselThe Laplace transform method for solving fractional differential equations is pre sented. The fractional diffusion and fractional Schrödinger equations together with their properties are investigated. The Lagrangians linear in velocities are analyzed using the fractional calculus, and the fractional Euler-Lagrange equations are derivedMaster Thesis On discrete fractional calculus with applications(Çankaya Üniversitesi, 2015) Hammood, HayderIn this thesis, we present the discrete fractional calculus in the frame of the Delta difference operator and discuss the most important properties and theorems. In order to solve delta fractional difference initial value problems, we discuss the Laplace transform related to this calculus and give the main formulas that are needed to solve such problems. The discrete fractional calculus in the frame of the Nabla difference operators and the related Laplace transforms are discussed and some Nabla fractional difference initial value problems are solved as well.Master Thesis On fixed point theorems occurring on metric and D-metric spaces(2004) Palta, HasanIn this thesis, we first give some basic knowledge about "the fixed point" based mainly on the Banach Contraction Principle. Later, we give explanations about the development of this concept. At last, we discuss a new terminology called "the D- metric space" and relate the previous contributions to the latterMaster Thesis Numerical computation of integrals in higher dimensions(2006) Baydar, HakanQuadrature refers to any method for numerically approximating the value of definite integral a f (x)dx. The goal is to attain a given level of precision with the fewest function evaluations. The factors that control the diffi culty of a numerical integration problem are the dimension of the integral and the smoothness of the integrand f . Any quadrature method relies on evaluating the integrand f on a ï¬ nite set of points (called the abscissas or quadrature points), and after processing these evaluations to produce an approximation to the integral. Usually this involves taking a weighted average. The goal is to determine which points to evaluate and what weight to use so as to maximize performance over a broad class of integrands. This study reviews Monte Carlo and Newton-Cotes methods of numerical approximation of integrals on both rectangular and non rectangular regions and contains new routines that can evaluate integrals up to 7 dimensions over arbitrary regions in MATLAB. The work aims to compare the methods and give some approximation results using our self-written codeMaster Thesis Developing an efficient stream control transmission protocol (SCTP) multi-streaming using pluggable priority algorithm for network optimization(Çankaya Üniversitesi, 2014) Al-Hadeethi, Abdulbaqi KhasheaThis thesis introduces a pluggable priorities algorithm for the SCTP protocol(PP-SCTP) as a method of reducing delay in the transmission of main data during periods of low bandwidth access. The SCTP protocol in the transport layer uses a Round-Robin or First-Come, First-Served method to transfer the data. These methods do not provide efficient and flexible choices. We set the priority of the streams in accordance with client demand. The PP-SCTP is useful for applications that send different types of data, such as still images, video, text, and documents. The goal of this thesis is to obtain a more flexible and more efficient choice for the end user or customer. The problem germane to this thesis lies in the transport layer, examples of which include the SCTP protocol with multi-streaming. Coding was written to test the various combinations and permutations of algorithms and protocols. In Chapter 5, we discuss the results of our work with the PP-SCTP priority algorithm, most notably its greater efficiency and the reduction of average latency in comparison to other algorithms and protocols in various combinations and permutations, including the First-Come, First-Serve data transfer methodMaster Thesis Principles of designing adaptable smart computerized system(Çankaya Üniversitesi, 2014) Wareed, Musaab AmerThe aim of this thesis is to design and implement a smart system that used for controlling a number of electronic devices and sensors remotely and to receive alerts when fire, movement and abnormal temperature and humidity are detected by sensors. The controlling operation on devices will be by using a mobile phone through sending SMS to the smart system. Also the alerts will be received as SMS form from the system. Originally, the smart system contains two main parts which are Arduino microcontroller and GSM modem. The Arduino is responsible for controlling electronic devices and sensors which are interfaced with it. The main function of second main part that called GSM is to deliver SMS which exchanged between the mobile phone and microcontroller. The Arduino microcontroller reads the data of sensors, when it detects abnormal values it will inform the GSM which in its turn will send SMS to the mobile phone to inform the user of system about the situation. The smart system can be controlled from any mobile phone model and can be putted in any place. All in all, a security and easier life can be provided by this smart systemMaster Thesis A modified securtiy approach for web application used for the registration of the student at Çankaya University(Çankaya Üniversitesi, 2014) Sosa, Ali SamiThis thesis goal is to design and implement a modified security approach for web-based system for student's registration in Natural and Applied Science Institute of Çankaya University Web application that help students to register by using the Internet..The employee can also use this application to track follow student status by monitoring the student information and give a report for each user, this proposed application can reduce time and effort for the users.The proposed application system can also be applied on smart devices (Iphone and Ipad)Master Thesis Numerical solutions of ordinary differential equations(2003) Çevik, SibelDiferensiyel denklemler, birçok fiziksel olayı modellemede kullanıldıgmdan, bu denklemlerin çözüm metotları fizik ve mühendislik gibi alanlarda çalışan lar için büyük önem taşımaktadır. Bilinen analitik tekniklerle birçok denklem çözülebilmesine rağmen, önemli sayıda fiziksel uygulamalar için bu metotlar yetersiz kalmaktadır. Böyle denklemler ancak nümerik metotlarla çözülebilir ler. Diferensiyel denklemlerde yaklaşık sonuç bulan birçok metot bulunmaktadır. Bu tezde, tüm bu nümerik metotlar ele alınmıştır. Birinci bölümde, tezde kul lanılacak temel kavramlar, ikinci bölümde ise; denklemlerin kesin sonuçlarını değil, ancak yaklaşık sonuçlarınıveren nümerik metotlar verilmiştir. Son bölümde ise Runge-Kutta metot baz alınarak geliştirilmiş başlangıç değer problemlerini çözen yeni bir metot incelenmiştir. Bu metot, Runge-Kutta metoduna, işlem sayısını arttırmadan, yüksek mertebeden türevler eklenerek elde edilmiştirMaster Thesis A prototype for assessment of information security awareness and implementation level(2013) Kocamustafaoğulları, MeltemInformation is one of the most valuable assets for any organization and it should always be appropriately protected. Information security is the protection of information against threats to ensure the business continuity. Relying only on the technology is not sufficient and the human factor is the weakest cycle which needs to be strengthened for effective and sustainable information security management. Information security is not only related with technology but it is rather harmonization of people processes and technology. Organizations have the tendency to take action after security incident occurs instead of proactively. There is lack of awareness concerning the information security concepts and its necessity. Awareness and understanding at management level is utmost important to establish and maintain security culture in the organization. Organizations should be aware of information security aspects, understand their own security requirements and implement countermeasures accordingly. There are good practices and internationally accepted security standards such as ISO/IEC 27001 and ISO/IEC 27002 that can be taken as reference point and guidance. Organizations should establish and implement, sustain and improve information security management taking into account the proven good practices tailored for their own requirements. In this thesis it has been aimed; i. To provide a prototype model and tool for self assessment of information security awareness and implementation level of organizations, ii. To provide a tool to utilize as reference point for organization in building own security requirements and objectives as well as monitoring own overall progress, iii. To facilitate a self explanatory web-based tool addressing wide range of users without the need for prior training or in-depth technical knowledge on information security based on ISO/IEC 27001 and ISO/IEC 27002 international security standards and covering essential and common practice security topics, iv. To provide comparable values with other organizations who have similar information security requirements, v. To prepare tool in Turkish for contributing to improvement of information security awareness and implementation among organizations. The model is designed in eight sections for assessment of; IS Corporate Approach, Information Assets Security, Human Resources Security, Physical and Environmental Security, Communications and Information Systems Operations, Information Systems Access Control, Development and Maintenance Management, IS Incident Management and Business Continuity, IS Compliance and Monitoring Management. The tool is implemented in line with the designed model and tested by experts having solid professional background on information security as well as selective users in Turkey from various sectors such as finance, public authorities, consulting companies and education. The feedback and results verified that the objectives of the thesis are achieved and the tool can serve to improve information security awareness and implementation level of the target users with its web based, self explanatory and user friendly tool environment
