Matematik ve Bilgisayar Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/222
Browse
Browsing Matematik ve Bilgisayar Bölümü Tezleri by Title
Now showing 1 - 20 of 100
- Results Per Page
- Sort Options
Master Thesis Binary image watermarking on audio signal using wavelet transform(Çankaya Üniversitesi, 2014) Rashid, Rakan SaadallahDigital watermarking approaches have recently become an important field of study in a number of practical applications. Generally, digital watermarking is the process of embedding particular information data into other signal data in such a way that the quality of the original information data is maintained. Watermarking can be performed on images, video, text, or audio to protect them from copyright violation. Among all of these types of watermarking, audio watermarking is difficult since the quality of such signals is highly affected by the watermark code. This thesis introduces some approaches that have features and may be applicable for audio watermarking. Generally, the digital audio watermarking approaches may be performed in either the special domain or the transform domain. The approaches that are based on the transform domain are gaining more attention due to their robustness or resistance to attackers. The most commonly used transforms for achieving digital audio watermarking are discrete cosine transform (DCT), short-term Fourier transform (STFT), and digital wavelet transform (DWT). In this research work, the main attention is paid toward digital wavelet transforms such as Haar and Daubechies-4. In addition, this thesis investigates the process of embedding a binary image into various audio signals such as speech and music signals. The values of the pixels in the binary images are either 1 or 0. These pixels are inserted into samples of the speech signal in such a way that the quality of the speech signal is preserved. One main reason to consider the audio watermarking approaches in the wavelet domain is that many modern multimedia standards such as JPEG2000 and MPEG-4 are based on the discrete wavelet transform. These common standards have brought new requirements such as low bit-rate transmission, coding, and many other advantages. Finally, experimental results are presented to validate the performance of the proposed watermarking approach and to compare its performance with other related watermarking approaches. The results show that the performance, in terms of signal-to-noise ratio (SNR) and normalized correlation (NC), of the proposed watermarking approach outperforms other approaches based on DCT. In addition, the results show that the extraction process of the hidden code becomes complex when considering any signal processing operations such as MP3 compression and high pass filtering. The worst case is when using a high pass filter where the recovered binary image is not satisfactoryMaster Thesis Effects of e-government and GIS technology for developing services in education sector case study: Schools in Kirkuk City center(Çankaya Üniversitesi, 2014) Abdulrahman, Bashar AdnanThe field of e-government has become an important subject around the globe because it refers to the delivery of government services by means of technology to save resources and bring governments closer to their citizens and to the private sector. This study underlines how most e-government projects require spatial datasets to improve public services. Pertinent examples already found/extant in the literature are examined, and investigating schools locations in Kirkuk city are selected for the case study. In parallel to the literature review, a study of the geographical distribution of schools is shown to be necessary such that land use for educational facilities occupies an unobjectionable part of the Kirkuk urban area, which in turn makes decision makers take this (land) use into account when the government is to establish city master plans. This thesis presents how establishing a working GIS in the education services would improve e-government applications due to the fact that GIS tools and facilities improve flexibility and accuracy in the management of both spatial and non-spatial datasets. As the measurements recognized by the EU and UN show, e-government initiatives need to be prepared above accurate, clean, timely and controlled shared datasets. Therefore, establishing strong databases and making legislative changes to enable data sharing among government agencies are found to be the primary targets of both central and local governments. The thesis shows that establishing a working GIS to provide services to students, teachers, citizens and decision makers in the education sector is technically feasible. However, the starting point ought to be collecting raw data from the field and ensuring that the data is updated in a timely manner, and not acquiring hardware and software. In so doing, Iraq can rank higher in international e-government measurement reportsMaster Thesis Orthogonality of sturm-liouville problems and some asymptotic behaviours(2015) Aljumaili, AhmedIn this thesis, we discussed some important aspects of Sturm-Liouville theory such as orthogonality, Fourier series and asymptotic formulas for eigenvalues and eigenfunctions. After giving an introduction about the history of Sturm-Liouville Theory. We gave the way to convert any problem into regular Sturm-Liouville problem by finding suitable weight function. We included a method of finding asymptotic formulas for eigenvalues and eigenfunctions of Sturm-Liouville Problems. We also obtain an important formula about the solutions of a specific SLproblem and obtain formulas of eigenvalues and eigenfunctions of this problem.Master Thesis A node authentication mechanism on wireless sensor networks(2015) Ameen, Kameran AliA wireless sensor network (WSNs) is a network that consists of a large number of ultra-small autonomous devices which are resource-constrained called sensor nodes. Sensor networks may be deployed for a wide range of applications, including military sensing, environment monitoring and patient monitoring, etc. Sensors can collect, process and transmit data in a distributed and cooperative manner. They are usually deployed in an unattended environment (open area) and communicate with each other through wireless channels. Therefore, security is necessary to protect data from various types of attacks. The authentication process is one of the important ways to achieve security in WSNs. In this thesis, the pros of both symmetric and asymmetric key cryptography are used to achieve security. The proposed scheme secures communication by distributing the public key securely to both the base station and cluster head; as a result, this yields security of the message. The proposed scheme is efficient due to the application of data sequence over ECC, which in turn depends on the ECDLP. Therefore, it provides far more security and resistance against a number of attacks when compared with other existing schemes.Master Thesis Discrete mittag–leffler functions in fractional calculus(2011) Benli, BetülA speci c type of Caputo q{fractional di erential equations has been solved. The solutions have been expressed via the generalized q- Mittag Le er functions which were comprised a while ago. The method of successive approximation has been used to reach the solutions. Mittag-Le er function makes q-analog, which was proposed by Kilbas and Saigo before, generalized. In addition to this, discrete Mittag-Le er functions and q-analog Mittag- Le er functions, concluded by T. Abdeljawad and D.Baleanu recently, have been discussed in the content of this thesis. Keywords: Fractional Sums, Fractional Di erences, Mittag{Le er Function, Q{Mittag-Le er Function, Discrete Mittag{Le er Function, Caputo Q{Fractional Integral, Caputo Q{Fractional Derivatives, Time Scale, Euler Lagrange Equation.Master Thesis An evaluation of three search engines (google, yahoo, bing) based on arabic user perception(Çankaya Üniversitesi, 2017) Azeez, Suad ShattiWith the rapid increase of Arabic users around the world, a need of understanding the preferences of this wide Stratum of society is important. To do so we designed a questionnaire to evaluate three search engines (Google, Yahoo, and Bing) to reveal the Arabic user's perception of these three search engines. Each engine has its own features and it is own search methods to achieve the main purpose of search engines which is retrieving relevant results. This study exposes the pros and cons of the three tested search engines which give the opportunities to search engine developers to enhance their products. The results showed that Google performs very well comparing with Yahoo and Bing in some kind of data (text and video search) whereas image and advertisements Yahoo seems to be more accurate, Bing captivated many participants with its attractive homepage and useful features except supporting Arabic language in Bing map. Our results will help engineers and designers to improve their search engines in term of the design of homepages and result, improving their search engines algorithms for Arabic queries.Master Thesis Variational iteration method for fractional Davey-Stewartson equations(2012) Yılmaz, TuğbaThe Variational iteration method is a new and powerful method to solve both linear and nonlinear differential equations. The Variational iteration method was applied to the fractional Davey-Stewartson equations within the Caputo sense and approximate analytical solutions were obtainedMaster Thesis Mathematical aspects of superintgrable systems(2004) Defterli, ÖzlemSuperintegrallenebilir SistemlerMaster Thesis Hybrid System Modeling and Simulation with Tumor-Immune System Application(2016) Al-Windawi, Hannadi NozadCancer dynamics exhibits complex behavior due to different factors. Immune system interaction is one of those factors. There exist mathematical models that investigate these interactions. In this thesis, we have used hybrid system modeling that offers several improvements. One of the main advantages of this modeling is that we can investigate through sensitivity analysis the effect of changing the threshold values, which means a point or level at which range changes in model behavior. Hybrid systems provide a promising area in mathematical modeling of many biological and physiological systems. From this point of view, to test the capability of hybrid systems in the sense of simulation is a strong motivation. In this work, we have observed the capability of hybrid system modeling in terms of analysis and computation. We have verified that when we substitute the solvable one, we reduce the complexity in the sense of reasonable computational resourcesMaster Thesis Cyber security in the national protection of Turkey(2012) Aydın, FarukCyber attacks supported by individuals and states are increased by the prevalence of information technologies and usage of these technologies at the critical infrastructure of the states. In this study, these cyber attacks and associated impacts are researched. In connection with this issue, evolution of cyber threats from malware such as viruses to weapons is studied by examples. In addition, within this thesis, precautions against these threats are mentioned. Usage of anti-malware applications as prevalent precautions is assessed within this context. National and international standards of information security, information security strategies of EU, USA and some other countries and precautions for cyber security of Turkey are studied. In the 9th Development Plan of Turkey, building information society is targeted. In this thesis, requirements to reach this target securely are researched. Under this information, it is considered that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that government should play an affective role to protect, educate, and guide governmental and private companies and citizens about cyber security. Accordingly, this thesis advises that cyber security should be put into the next development planMaster Thesis On generating functions(2014) Gatea, KhuloodThe Generating Functions play very important role in many areas of Mathematics for they lead as to explore the properties of functions that they generate. In this thesis, definitions of generating functions and their kinds and properties are presented. Their relations to some special functions are discussed. Moreover, and applications of generating functions in several areas of Mathematics are discussed.Master Thesis An investigation of electronic government transition case study in health: Hospitals in Erbil(2013) Jamel, Ahmed Abdulrahman M.Electronic government initiatives and public participation to them are among the indicators of today's development criteria of the countries. After consequent two wars, Iraq's current position in, for example, UN's e-government ranking is quite concerning and did not improve in recent years, either. In the preparation of this work, we are motivated with the fact that handling geographic data of the public facilities and resources are needed in most of the e-government projects; such examples are reported to the literature. Geographical information systems (GIS) provide most common tools not only to manage spatial data but also to integrate such type of data with nonspatial attributes of the features. With this background, this thesis proposes that establishing a working GIS in the health sector of Iraq would improve e-government applications. As the case study, investigating hospital locations in Erbil is chosen. The results show that setting up a GIS in Erbil does not require extreme technical knowledge; however, a strong limitation that obtaining clean and up-to-date data is an important concern. Although it is possible to establish a GIS in this sector, the starting point should not be acquiring hardware and software but to collect clean data from the field and to ensure that the data gets updated timely. Keywords: e-government, Iraq, Erbil, GIS, spatial data, hospital locationsMaster Thesis Investigation in MYSQL database and NEO4J database(2015) Al-Ani, Zahraa Mustafa AbdulrahmanCurrently, there are two major of database management systems which are used to deal with data, the first one called Relational Database Management System (RDBMS) which is the traditional relational databases, it deals with structured data and have been popular since decades from 1970, while the second one called Not only Structure Query Language databases (NoSQL), they have been dealing with semi-structured and unstructured data; the NoSQL term was introduced for the first time in 1998 by Carlo Strozzi and Eric Evans reintroduced the term NoSQL in early 2009, and now the NoSQL types are gaining their popularity with the development of the internet and the social media. NoSQL are intending to override the cons of RDBMS, such as fixed schemas, JOIN operations and handling the scalability problems. With the appearance of Big Data, there was clearly a need for more flexible databases. In this study, a theoretical study of investigating in two types of databases MySQL one of the traditional relational databases, and Neo4j one of the graph databases. First of all, choosing these two types of the databases according to their features,both of them depending on the replication and sharding in their systems. Secondly, a brief background with literature review will introduce the opinions for some researchers with some concepts. Thirdly, mentioning relational database and NoSQL in generally and MySQL and Neo4j in specifically, then try to make a comparison between the features for both of them. Moreover, all the websites, the researches, and the journals are the resources for this study. In addition, this study is like mentioned before is a theoretical study so there was no implementation work. However, the comparison presented the result in this study. All in all, we try to provide an understanding for MySQL and Neo4j, that leads us to find both of MySQL and Neo4j have their features, pros and cons that differ from each other.Master Thesis Mining association rules from clustering models(2015) Al-Jibouri, AliAssociation rules used to discover the interested relationships between variables (items) in large database. These relationships have been hidden in large database. Symbolic models consider the most common to extract association rules. Unfortunately, these models suffered of very serious limitations. Association rule generation is a process that take long time to generate a huge number of rules, including large amount of redundant rules. This problem appears obviously specially when dealing with high dimensional description space. To cope with these problems unsupervised approach has been made. This approach has been proposed to extract numerical association rules by establishing interesting links between numerical and symbolic models. Numerical models keep only the important relations between data, so it can extract the most potential and important association rules. This numerical approach can extract only simple association rules that mean each rule has two items, one item in each part of the rule. So it generates a lot of simple rules. Therefore, the aim of this thesis is to develop this approach to be able to extract complex and important association rules in order to discover relationships between itemsets of different sizes instead of only two items. This approach increases the possibility of numeric methods to extract important association rules. Neural network model with multiple topographic considers the main model in this thesis. One of the strongest features from this model is generalization mechanism that allows association rule extraction from only one database to be performed. The extraction of association rules is itself based on quality measures which evaluate to what extent a numerical classification model behaves as a natural symbolic classifier.Master Thesis The role of information systems in application of human resources management system in presidency of Diyala University(2015) Alazzawi, Ahmed Adnan MohammedHuman Resources Management Systems (HRMS) plays an important role for any organisation to effectively manage its human resources. In university domain, HRMS is particularly crucial as the organisation comprises a large number of personnel and administrative units.In Iraq, some universities are still using the manual administration in management of human resources which has disadvantages including: spending a large amount of papers, stores need for archive save and using paper records for save institution data as well. The main purpose of this study is designing an electronic system to managehuman resources in presidency of Diyala University. A HRMS at an abstract level has been designed to address the problems of traditional management. Methodology of the study is based on building database by using (Microsoft SQL Server 2008) and designing interfaces for database by using (Microsoft Visual Studio 2010). The finding of this study is the application enables to presidency of Diyala university facilitate administrative procedures in HRM through collecting the employees information in one place is database and conducting different processesn it such as, insert, update, delete and print according to the need of the end user, hence saving of time in the search process and reducing administrative effort. It is also used to recover damaged data and information and converting the traditional management to an electronic one. In addition, university support in speed of decision making.Master Thesis The benefits and potential implementation problems of GIS in the water distribution services of municipalities case study: The Kirkuk Water Directorate(2012) Ali, Suha AzizA potential implementation of geographic information systems (GIS) in Kirkuk Water Directorate is evaluated at a preliminary level. Selected literature has been surveyed and it is perceived that there are municipalities of smaller, bigger and same sizes which have successfully setup GIS in their water distribution departments for asset management, real time monitoring and hydraulic modeling in there services . Such works report success stories in managing their network as well as pinpointing malfunctioning segments due to problems such as leak, blowout or broken pumps. This research targeted to reveal potential problems that Kirkuk Water Directorate can face while transforming paper based records into digital environment for a prospective GIS. While the literature survey has provided reports of successful applications, any potential problem that Kirkuk Water Directorate can face could be only inferred from them. Hence, to experience GIS software and data preparation, a GIS course has been followed by the researcher. The researcher has also contacted key informants who have actively worked in Ankara?s water distribution department during the rehabilitation of its GIS. By this way, potential problems could be identified. Investigations have been done over sample files of map sheets shared by the Kirkuk Water Directorate and it is seen that potential problems can be solved by a data operator who has attended a basic GIS course. Both the literature and investigation results show that preparing spatial and non-spatial databases of assets is the start of a productive GIS. Before increasing data quality, building a hydraulic model is almost impossible and setting up a real time monitoring system is quite difficult. It is also found that organizational changes such as in business rules could be necessary as frequent field trips will be needed with the GIS staff to check assets in use. It is expected that this research will be beneficial for the municipality of Kirkuk to manage resources in implementing GIS for it is anticipated to start financial feasibility works under this topicMaster Thesis Fractional derivatives with mittag-leffler kernel and their applications(2018) Can, Halil SezginBu tez çalışmasında Mittag-Leffler çekirdeği kullanılarak yeni bir kesirli türevin özellikleri üzerinde durulmakta ve bunun ayrık versiyonu sunulmaktadır. Bunun ardından mühendislik alanlarından gerçek dünya olgularıyla eşleştirecek şekilde bu yeni kesirli operatörlerin bazı uygulamaları gösterilmektedir. Bu uygulamalarda, mevcut kesirli türevlerin sonuçları ele alınan yeni kesirli türevin performansını vurgulamak için korunmuştur.Master Thesis A systematic review of interactive information retrieval evaluation studies, 2007-2016(Çankaya Üniversitesi, 2017) Alyaseen, Haider Ali HasanSince the last mid-century researchers start investigate in the performance of IIR (interactive information retrieval). Many methods and measures were innovated and used in this field studies. To ensure the replication of maturation researches there are several factors that effect on the maturation of researches such as introducing standards for measurement and analysis, and understand past endeavors. In this study, we analyzed a vast range of papers within the period (2007-2016), where 1110 papers were examined manually and only 78 articles were included. Based on the achieved results in our study, we found that the researchers increased their concentration on IIR evaluation. Due this expansion of researching in this topic, we noticed that researches used some new techniques and datasets for evaluation of IIR systems. Most of the included papers were conducted based on the help of participants and questionnaires.Master Thesis Audio watermarking using DWT of second level decomposition of low frequency and using RMS on approximation coefficients(Çankaya Üniversitesi, 2014) Maraha, Heyam Essam JibraelDigital media are distributed through the internet system in a magnificent manner due to the efficiency and inexpensiveness of such a system. Audio clips and other digital signals are transmitted, shared and used easily. This causes a real security problem. Solving this problem leads to finding authentication techniques to provide security for these digital media. Digital watermarking is a suggested solution technique to offer such security for these distributed digital signals. Digital watermarking is the art of embedding information (a watermark) in the original signal, taking into consideration preserving the quality of the host digital signal. There are different types of watermarking media such as image, video and audio; our thesis focuses on audio watermarking techniques. Also, there are a variety of techniques using the watermarking algorithm that depends on the type of algorithm that is used to embed the watermark in the original signal. In our thesis, we have used DWT (Discrete Wavelet Transform) of second level decomposition of the approximation coefficients of each frame. These frames are resulted from segmenting the original audio clips into frames, each one equal to 10 seconds. Also, we have applied the RMS (Root Mean Square) to these approximation coefficients which represent the low frequency of each frame. The aim of using the RMS is to find the higher magnitude approximation coefficients among the segmented frames; then to embed the watermark in a quarter of the selected frames according to the magnitude order. A watermark of 256 x 256 pixels was embedded in two tested audio clips (Pop and Classic) according to the former algorithm. We have applied 17 attacks that try to remove or modify the watermark that is hidden in the original audio clips. Also variety of models such as subjective and objective models were applied to evaluate the efficiency of the proposed algorithm results. The results of the proposed watermarking technique show an effective robustness against most of the applied attacks, especially in MP3 Compression, Quantization, Additive Noise, Resample and Low Pass Filter; however, it shows fragile robustness in Time Stretch and Pitch Shift attacksMaster Thesis Numerical solutions of non-linear volterra integral equations of the second kind(2015) Saleh, MerewanBu tezde lineer-olmayan ikinci çeşit Volterra integral denklemlerinin nümerik integrasyon (Ikizkenar kuralı and Simpson kuralı), Runge-Kutta metodu (klasik üçüncü-derece, optimal üçüncü-derece, Bu methotlar varlığı ve diferensiyel denklemler ile integral problemlerinin çözülmesinde kolaylıkla kullanılmakta olduğu bilinmektedir, ancak özellikle lineer-olmayan integral denklemlere uygulamasında çeşitli zorluklar ortaya çıkmaktadır, çünkü lineer olmayan terimler integralin çekirdeğinde mevcuttur. Bu nedenle söz konusu methotların ve teknikler üzerinde, lineer-olmayan integral denklemlere de uygulanabilecek biçimde, bazı düzenlemeler yapılma ihtiyacı olduğu görülmüştür.
