Matematik ve Bilgisayar Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/222
Browse
Browsing Matematik ve Bilgisayar Bölümü Tezleri by browse.metadata.publisher "Çankaya Üniversitesi"
Now showing 1 - 20 of 24
- Results Per Page
- Sort Options
Master Thesis A comprehensive comparison of NOSQL and relational database management systems(Çankaya Üniversitesi, 2017) Taha, İhsan AhmedIn the last four 'decades, relational database management systems have been used widely to manage structured data in different disciplines. Nowadays, data resources increase rapidly in different forms (including structured, semi-structured and even unstructured data), requiring us to find another way to manage data. NoSQL database management systems previously were exhibited a few years ago, to meet the requirements of a variety of data forms. Many papers, and blogs have claimed that there is a trade-off between using relational database systems and non-relational database systems (NoSQL). In this study, we propose a novel investigation of the performance of relational and non-relational database systems in terms of the main operations that every database performs, such as insertion, reading, updating, and deleting by using the recent version of Yahoo Cloud Serving Benchmark (YCSB-0.9.0) in order to evaluate the performance of MySQL (RDBM) versus Mongo DB and Apache Cassandra (NoSQL). A testing environment is set up for each workload and the responses for each database management system used in the study are examined for each workload. It is worth mentioning that, although we use the latest version of Yahoo Cloud Serving Benchmark, it does not support the latest release of most database management systems, be they relational or non-relational. The results of this study show that the performance of each system differs due to the differences in their respective data storing mechanisms. In addition, the results of this study present the weaknesses and strengths of each database system used in the study.Master Thesis A GIS-based decision support system for locating new train stations in Iraq(Çankaya Üniversitesi, 2017) Naji, Hayder FarisRailway networks are one of the most necessary infrastructures all around the world. Today, to manage these networks, Geographic Information System (GIS) techniques should be used in order to study and analyze the railway network and its stations. It is very difficult to deal with railway systems by using traditional methods and the results may become inaccurate because of the huge amount of data related to them. In addition, by using GIS techniques in the development of the rail networks, the decision-making process will be improved and supported. Moreover, the results will be accurate because they result from using specific criteria to achieve a defined aim. In this study, the train stations in all of Iraq's provinces were studied and analyzed by using network analysis, which is one of the most powerful techniques within GIS. A GIS-based system was built by using the free trial copy of ArcGIS® software, PYTHON™ programming language, and ASP.Net (C#) programming language in order to develop a full decision-making environment to manage and locate train stations in the country of Iraq. The main methodology for this study is divided into two parts. v The first part identifies the problems in the current stations through the analysis of those stations by using network analysis. The second part determines the best candidate locations for new train stations depending on the number of people around those locations and the distance between those people and the new candidate locations according to the existing road network. In addition, the new locations should be accessible by people who are within a walking time of 20 minutes from the new locations as an accessibility value. The results will be presented as spatial maps, which portray the best locations for new train stations, and tabular data of the areas and the number of people to be served by the new stations.Master Thesis A modified securtiy approach for web application used for the registration of the student at Çankaya University(Çankaya Üniversitesi, 2014) Sosa, Ali SamiThis thesis goal is to design and implement a modified security approach for web-based system for student's registration in Natural and Applied Science Institute of Çankaya University Web application that help students to register by using the Internet..The employee can also use this application to track follow student status by monitoring the student information and give a report for each user, this proposed application can reduce time and effort for the users.The proposed application system can also be applied on smart devices (Iphone and Ipad)Master Thesis A systematic review of interactive information retrieval evaluation studies, 2007-2016(Çankaya Üniversitesi, 2017) Alyaseen, Haider Ali HasanSince the last mid-century researchers start investigate in the performance of IIR (interactive information retrieval). Many methods and measures were innovated and used in this field studies. To ensure the replication of maturation researches there are several factors that effect on the maturation of researches such as introducing standards for measurement and analysis, and understand past endeavors. In this study, we analyzed a vast range of papers within the period (2007-2016), where 1110 papers were examined manually and only 78 articles were included. Based on the achieved results in our study, we found that the researchers increased their concentration on IIR evaluation. Due this expansion of researching in this topic, we noticed that researches used some new techniques and datasets for evaluation of IIR systems. Most of the included papers were conducted based on the help of participants and questionnaires.Master Thesis An evaluation of three search engines (google, yahoo, bing) based on arabic user perception(Çankaya Üniversitesi, 2017) Azeez, Suad ShattiWith the rapid increase of Arabic users around the world, a need of understanding the preferences of this wide Stratum of society is important. To do so we designed a questionnaire to evaluate three search engines (Google, Yahoo, and Bing) to reveal the Arabic user's perception of these three search engines. Each engine has its own features and it is own search methods to achieve the main purpose of search engines which is retrieving relevant results. This study exposes the pros and cons of the three tested search engines which give the opportunities to search engine developers to enhance their products. The results showed that Google performs very well comparing with Yahoo and Bing in some kind of data (text and video search) whereas image and advertisements Yahoo seems to be more accurate, Bing captivated many participants with its attractive homepage and useful features except supporting Arabic language in Bing map. Our results will help engineers and designers to improve their search engines in term of the design of homepages and result, improving their search engines algorithms for Arabic queries.Master Thesis Analysis of hybrid dynamical systems with an application in biological systems(Çankaya Üniversitesi, 2017) Tahar, Noura A. AbdulrazaqThere are many complex dynamics appearing in nature science and technology one of the most useful approaches to model these phenomena is hybrid dynamical systems hybrid dynamic systems describe the interactions of continuous and discrete variables regulating each other ın this work we have looked at different types of hybrid systems that have been used in the modeling of biological systems we have also looked at the stability analysis of these systemsandhave given an example of a subclass of hybrid piecewise linear systems and checked the stability of these systems through an exampleMaster Thesis Audio watermarking using DWT of second level decomposition of low frequency and using RMS on approximation coefficients(Çankaya Üniversitesi, 2014) Maraha, Heyam Essam JibraelDigital media are distributed through the internet system in a magnificent manner due to the efficiency and inexpensiveness of such a system. Audio clips and other digital signals are transmitted, shared and used easily. This causes a real security problem. Solving this problem leads to finding authentication techniques to provide security for these digital media. Digital watermarking is a suggested solution technique to offer such security for these distributed digital signals. Digital watermarking is the art of embedding information (a watermark) in the original signal, taking into consideration preserving the quality of the host digital signal. There are different types of watermarking media such as image, video and audio; our thesis focuses on audio watermarking techniques. Also, there are a variety of techniques using the watermarking algorithm that depends on the type of algorithm that is used to embed the watermark in the original signal. In our thesis, we have used DWT (Discrete Wavelet Transform) of second level decomposition of the approximation coefficients of each frame. These frames are resulted from segmenting the original audio clips into frames, each one equal to 10 seconds. Also, we have applied the RMS (Root Mean Square) to these approximation coefficients which represent the low frequency of each frame. The aim of using the RMS is to find the higher magnitude approximation coefficients among the segmented frames; then to embed the watermark in a quarter of the selected frames according to the magnitude order. A watermark of 256 x 256 pixels was embedded in two tested audio clips (Pop and Classic) according to the former algorithm. We have applied 17 attacks that try to remove or modify the watermark that is hidden in the original audio clips. Also variety of models such as subjective and objective models were applied to evaluate the efficiency of the proposed algorithm results. The results of the proposed watermarking technique show an effective robustness against most of the applied attacks, especially in MP3 Compression, Quantization, Additive Noise, Resample and Low Pass Filter; however, it shows fragile robustness in Time Stretch and Pitch Shift attacksMaster Thesis Binary image watermarking on audio signal using wavelet transform(Çankaya Üniversitesi, 2014) Rashid, Rakan SaadallahDigital watermarking approaches have recently become an important field of study in a number of practical applications. Generally, digital watermarking is the process of embedding particular information data into other signal data in such a way that the quality of the original information data is maintained. Watermarking can be performed on images, video, text, or audio to protect them from copyright violation. Among all of these types of watermarking, audio watermarking is difficult since the quality of such signals is highly affected by the watermark code. This thesis introduces some approaches that have features and may be applicable for audio watermarking. Generally, the digital audio watermarking approaches may be performed in either the special domain or the transform domain. The approaches that are based on the transform domain are gaining more attention due to their robustness or resistance to attackers. The most commonly used transforms for achieving digital audio watermarking are discrete cosine transform (DCT), short-term Fourier transform (STFT), and digital wavelet transform (DWT). In this research work, the main attention is paid toward digital wavelet transforms such as Haar and Daubechies-4. In addition, this thesis investigates the process of embedding a binary image into various audio signals such as speech and music signals. The values of the pixels in the binary images are either 1 or 0. These pixels are inserted into samples of the speech signal in such a way that the quality of the speech signal is preserved. One main reason to consider the audio watermarking approaches in the wavelet domain is that many modern multimedia standards such as JPEG2000 and MPEG-4 are based on the discrete wavelet transform. These common standards have brought new requirements such as low bit-rate transmission, coding, and many other advantages. Finally, experimental results are presented to validate the performance of the proposed watermarking approach and to compare its performance with other related watermarking approaches. The results show that the performance, in terms of signal-to-noise ratio (SNR) and normalized correlation (NC), of the proposed watermarking approach outperforms other approaches based on DCT. In addition, the results show that the extraction process of the hidden code becomes complex when considering any signal processing operations such as MP3 compression and high pass filtering. The worst case is when using a high pass filter where the recovered binary image is not satisfactoryMaster Thesis Crawling the web using Apache Nutch and Lucene(Çankaya Üniversitesi, 2014) Abdulwahid, NibrasThe availability of information in large quantities on the Web makes it difficult for user selects resources about their information needs. The good link between the internet users and this information is Search engine. Search engine is kind of Information Retrieval (IR). It works on data collection from the Web by software program is called crawler, bot or spider. Most of Search Engines users don't know the mechanism of action the Search Engine, like how Search Engine works and how it catch information in the Web and how it rank the results to users. For this reason in this thesis used the open-source Search Engine is researched in detail. In this study, we used each of (Apache Nutch and Lucene) to clarify work of Web crawling open source. They are released under the Apache Software Foundation. Nutch is a web Search Engine working to search and index Web Pages from the World Wide Web (WWW). Nutch is based or built on top of Lucene. It uses in the information retrieval technology. It has more software libraries to indexing of large-size data. Lucene doesn't care about information existing in the Web, like PDF, TEXT, and MS Word. It is working to indexing these documents and convert them to the data can be utilized. The benefit of using both Nutch and Lucene in this study, they are free and we can their development. The Nutch and Lucene are written by Java language, it is a computer programming language. Furthermore, we used Tag Cloud Technology to analysis and view the Lucene content or its indexMaster Thesis Developing an efficient stream control transmission protocol (SCTP) multi-streaming using pluggable priority algorithm for network optimization(Çankaya Üniversitesi, 2014) Al-Hadeethi, Abdulbaqi KhasheaThis thesis introduces a pluggable priorities algorithm for the SCTP protocol(PP-SCTP) as a method of reducing delay in the transmission of main data during periods of low bandwidth access. The SCTP protocol in the transport layer uses a Round-Robin or First-Come, First-Served method to transfer the data. These methods do not provide efficient and flexible choices. We set the priority of the streams in accordance with client demand. The PP-SCTP is useful for applications that send different types of data, such as still images, video, text, and documents. The goal of this thesis is to obtain a more flexible and more efficient choice for the end user or customer. The problem germane to this thesis lies in the transport layer, examples of which include the SCTP protocol with multi-streaming. Coding was written to test the various combinations and permutations of algorithms and protocols. In Chapter 5, we discuss the results of our work with the PP-SCTP priority algorithm, most notably its greater efficiency and the reduction of average latency in comparison to other algorithms and protocols in various combinations and permutations, including the First-Come, First-Serve data transfer methodMaster Thesis Effects of e-government and GIS technology for developing services in education sector case study: Schools in Kirkuk City center(Çankaya Üniversitesi, 2014) Abdulrahman, Bashar AdnanThe field of e-government has become an important subject around the globe because it refers to the delivery of government services by means of technology to save resources and bring governments closer to their citizens and to the private sector. This study underlines how most e-government projects require spatial datasets to improve public services. Pertinent examples already found/extant in the literature are examined, and investigating schools locations in Kirkuk city are selected for the case study. In parallel to the literature review, a study of the geographical distribution of schools is shown to be necessary such that land use for educational facilities occupies an unobjectionable part of the Kirkuk urban area, which in turn makes decision makers take this (land) use into account when the government is to establish city master plans. This thesis presents how establishing a working GIS in the education services would improve e-government applications due to the fact that GIS tools and facilities improve flexibility and accuracy in the management of both spatial and non-spatial datasets. As the measurements recognized by the EU and UN show, e-government initiatives need to be prepared above accurate, clean, timely and controlled shared datasets. Therefore, establishing strong databases and making legislative changes to enable data sharing among government agencies are found to be the primary targets of both central and local governments. The thesis shows that establishing a working GIS to provide services to students, teachers, citizens and decision makers in the education sector is technically feasible. However, the starting point ought to be collecting raw data from the field and ensuring that the data is updated in a timely manner, and not acquiring hardware and software. In so doing, Iraq can rank higher in international e-government measurement reportsMaster Thesis Investigation of resource usage and video quality with different formats in video broadcasting(Çankaya Üniversitesi, 2014) Shamaya, Hazar Jalal YaqoTransfer of video through an Internet network is one of the greatest challenges faced by the users, especially when dealing with broadcasting e.g. online broadcasting, and large video sizes. Video codecs make this operation easier. In this thesis, we submit the video compression issue to bring us closer to a better outcome/solution by asking the question: "Does compressing videos before sending to the client have considerable benefit?" The experiment methodology we follow is to capture video from multiple web cameras, encoding this video in one server in order to transfer it to another server, and from the second server we can transfer this video to all users wirelessly. Moreover, we can apply this operation to send more than one video to multiple users. The literature surveyed has helped the researcher to view ideas such as using the MVC (Multi-View Video Coding) and UDMVT (User Dependent Multi-View Video Transmission) codecs to compress video, and how to carry out multi-video, in addition to see the effectiveness of wired and wireless modes of video transfer. The researcher used the MVC codec to transfer video, and we can see the effectiveness of transferring video via wired and the effectiveness is reduced in the wireless mode. UDMVT was not used due to the fact that a number of algorithms required for this codec and they could not be obtained. However, the UDMVT codec may be an avenue of exploration in future studiesMaster Thesis Management of electronic commerce and website application in electronic products marketing in Iraq(Çankaya Üniversitesi, 2014) Ibrahem, AhmedThe consumer -to- consumer is one of electronic commerce (e- commerce) types. The primary aim of an e- commerce site is to buy and sell goods and services online. The purpose of this study is to design a web based interface for online shopping in Iraq. It is an open market between consumers to consumer shows us how to market electronic products. This system designed by using PHP language and MySQL server for database. The finding of this research is the application enables consumers to sell their product online. Also, the website facilitates buying and selling on the Internet, saving time, search for a product, saving the cost of transportation, as well as the possibility of adding a product by the customer. Further, in this website can post buying and selling through social media and sharing information with (Facebook and Twitter). Also, shopping cart is important for every online shopping, it facilitates to add and delete a product with shopping. Finally, customer should participate in the website as a member registering by username and password number for each customer to be able shoppingMaster Thesis Mathematical models and heuristic algorithms for a multi-product lot streaming problem in a two-machine flowshop(Çankaya Üniversitesi, 2017) Akdoğan, ŞahikaIn this study, we consider a multi-product lot streaming problem to minimize the makespan on a two-machine flowshop environment in which all product lots are processed by Machine 1 and then by Machine 2. Most of the current studies in the literature of the multi-product lot streaming problem assume that the number of sublots for each product is known in advance, and determines the size for each sublot of every product and the sequence of sublots of all products. However, in our study we assume that the total number of sublots for all products is known advance, although the number of sublots for each product is not known in advance. Our problem is to determine the number of sublots for each product, the size of each sublot and the sequence of sublots that gives the minimum makespan. We investigate this multi-product lot streaming problem for two cases in which sublots of each product are equal sized in the first case while sublots of each product are unequal sized in the second case. We develop mixed integer linear mathematical models and heuristic algorithms for solving each case. We compare these solutions of mathematical models and heuristic algorithm. We design computational experiments to evaluate the performance of our solutions approaches in terms of makespan time. The results show that the mixed integer programming models do not seem to be a useful alternative, especially for large scale problem instances. However, our proposed heuristic algorithms find optimal or near-optimal solutions in very short timeMaster Thesis Obstacles to activating e-learning at Iraqi universities(Çankaya Üniversitesi, 2016) Shahoodh, GailanThis study adopts a quantitative research approach to evaluate the research problem using collected data from a survey questionnaire administered to 124 respondents (professors, instructors, employee and students) from different Iraqi universities. Using both online and hardcopy questionnaires that were based on the TAM framework, it included questions related to the demographics of the respondents and any obstacles in activating e-learning. The reliability of the questionnaire was tested and a high degree of internal consistency was found. Our study provides an analysis of each variable using descriptive statistics. Using factor analysis, we extracted four factors (Perceived Ease of Use (PEU), Perceived Usefulness (PU), Attitude toward Using and Actual System Use (ATU), and Behavioral Intention to Use (BIU) which were used in the correlation and regression analysis. Per the results of the regression test, the impact of PEU and PU were shown to be statistically significant in predicting and explaining both ATU and BIU. The results revealed that the impact of Perceived Ease of Use and Perceived Usefulness is significantly positive in affecting the attitude and behavioral intention of Iraqi universities' users towards LMS/e-learning, which is consistent with the TAM theory. Moreover, it shows that the two factors play a significant role in the acceptance of the new technology; i.e. the LMS at Iraqi universities can help to reduce any obstacles to e-learning implementation. In addition, conclusions and suggestions for future work are highlightedMaster Thesis On caputo modification of the hadamard fractional derivative(Çankaya Üniversitesi, 2014) Gambo, Yusuf Ya'uIn this thesis, more properties of the Caputo modification of the Hadamard fractional derivatives are studied. The fundamental theorem of fractional calculus (FTFC) in the Caputo-Hadamard setting is presented. The theorem is then used in formulating several original resultsMaster Thesis On discrete fractional calculus with applications(Çankaya Üniversitesi, 2015) Hammood, HayderIn this thesis, we present the discrete fractional calculus in the frame of the Delta difference operator and discuss the most important properties and theorems. In order to solve delta fractional difference initial value problems, we discuss the Laplace transform related to this calculus and give the main formulas that are needed to solve such problems. The discrete fractional calculus in the frame of the Nabla difference operators and the related Laplace transforms are discussed and some Nabla fractional difference initial value problems are solved as well.Master Thesis On left-definite sturm-liouville equations(Çankaya Üniversitesi, 2017) Aras, AtillaSturm-Liouville equations are very important to understand the nature of the real-world problems and have been investigated by many authors. To investigate the spectral properties of these problems it is convenient to construct the Hilbert space. Such a construction is done with the help of the weight function. In 1992, A.M. Krall studied on the second order equation -(pg′)′ + qg =λwg, where p, q, w are real-valued functions with 1/p, q, w > 0 on the given interval [c,d] subject to some boundary conditions in the Sobolev space. Such equations are called left-definite equations. He also investigated the left definite fourth order equations and Hamiltonian systems on the finite intervals. Moreover, Race and Krall studied on the Weyl theory for a left-definite second order equation. Using these obtained results second-order, fourth-order equations and Hamiltonian systems are studied on finite and infinite intervals in this thesis.Master Thesis Performance indicators to consider while selecting cloud database service provider(Çankaya Üniversitesi, 2014) Ali, Abbas HusseinCloud computing is a new technology that provides software and hardware resources depending on customer specifications. A cloud database is one of the services that a cloud provider may offer. Many service providers are available on the market; however, selecting a qualified provider is an issue for customers. Performance indicators can be used to represent, measure, and compare the quality of service providers, which leads to creating a broad understanding among cloud service providers. This thesis proposes performance indicators to evaluate cloud database service providers. The first general attributes mostly related to software as service depending on the Service Measurement Index (SMI), then cloud database attributes are introduced. As a limitation of the scope of this thesis, the performance indicators have not been tested in an organization using cloud database service. The performance indicators are suggested to help customers while selecting suitable service provider to their requirementsMaster Thesis Principles of designing adaptable smart computerized system(Çankaya Üniversitesi, 2014) Wareed, Musaab AmerThe aim of this thesis is to design and implement a smart system that used for controlling a number of electronic devices and sensors remotely and to receive alerts when fire, movement and abnormal temperature and humidity are detected by sensors. The controlling operation on devices will be by using a mobile phone through sending SMS to the smart system. Also the alerts will be received as SMS form from the system. Originally, the smart system contains two main parts which are Arduino microcontroller and GSM modem. The Arduino is responsible for controlling electronic devices and sensors which are interfaced with it. The main function of second main part that called GSM is to deliver SMS which exchanged between the mobile phone and microcontroller. The Arduino microcontroller reads the data of sensors, when it detects abnormal values it will inform the GSM which in its turn will send SMS to the mobile phone to inform the user of system about the situation. The smart system can be controlled from any mobile phone model and can be putted in any place. All in all, a security and easier life can be provided by this smart system
