البحث يهدف الى بناء حزمة برمجيات قادرة على التراسل البريدي الألكتروني بصورة أمينة ضمن شبكة محلية أو من خلال شبكة الأنترنيت.
2
ا.د زياد طارق مصطفى
زينب عماد
نورس مظهر راشد
Image Steganography using swarm Intelligence Algorithm
Abstract
يهدف البحث الى بناء نظام برمجي لأخفاء الصورة داخل صورة أخرى بأستخدام خوارزمية ذكاء السرب (ذكاء السرب الجزيئي).
3
د.جمال مصطفى
علي فاضل شلال
حيدر وليد حامد
Text In Image Steganography System
Abstract
A hiding algorithm conceal a text data in image of BMP type by using Serial embedding Process method, which has a good feature. The project has been devoted to make the adopted hiding cipher text data in image of BMP type with little or no visible in the perceived appear image
4
د.جمال مصطفى
زينب انور
زينب حسن
زينب اياد
Image In Image Steganography System
Abstract
The project use of cipher and hiding algorithm to cipher the image of type BMP and then hid it in the cover image. The project uses the one-time pad (OTP) which is the superior to normal encryption. The (LSB) technique is used to hidden on bit of the cover image. An efficient method has been used for hiding an image in image after encrypt the hidden image. There is no need for sending the original covers to the receiver side and excellent results have been obtained
5
د.طه محمد
مروة جاسم
علياء رفعت
Wavelet Image Compression
Abstract
The project uses the wavelet transform technique to compress two-dimensional images and compare it with other wavelet families such as Haar transform and Daubechie 4-tap. Entropy encoder is used to compress the image in an efficient way where a large reduction of image size occurs.
6
د.طه محمد
هدى لؤي عبدالكريم
علياء ماجد
Fractal Image Compression
Abstract
In this project a Fractal Image Compression (FIC) algorithm is proposed and tested. In FIC the time of encoding process is considerably long. In this work, the FIC with different encoding parameters is tested on different tested images then the result are analyzed. The analyzed results show that the encoding time can be reduced by using different values of the FIC parameters. Also the results show that the decoding time is very fast and the quality of the reconstructed image is differ from one image to another depending on the self similarity of the compressed image.
7
أ.د. ظاهر عبدالهادي عبدالله
مروة فؤاد
زينب موفق
Optimal solution by using cut algorithm
Abstract
We study the different system oh queen (M/M/1,M/M/C , with one waiting line , and simulation of M/M/C) ,and find the result and compare.
8
أ.د. ظاهر عبدالهادي عبدالله
مروة سالم
مودة علي
Queuing theory M/M/C
Abstract
We study the different system oh queen (M/M/C) with multi waiting line ,by using simulation and find the result and compare.
9
أ.د. ظاهر عبدالهادي عبدالله
مروة فخري
سارة حسان
Queuing theory M/M/C/M
Abstract
Use the cut algorithm to find the optimal solution ,simulation the result and compare with swarm result
10
د.جمال مصطفى عباس
اسراء جاسم محمد
زينب كريم
System Steganography
Abstract
The project uses the wavelet transform technique to compress two-dimensional images and compare it with other wavelet families such as Haar transform and Daubechie 4-tap. Entropy encoder is used to compress the image in an efficient way where a large reduction of image size occurs.
11
أ. د زياد طارق
محمد حميد
محمد عدنان
Audio Steganography
Abstract
يهدف البحث الى بناء نظام برمجي لأخفاء الصوت داخل صوت أخر بأستخدام خوارزمية البت الأقل الأهمية ودراسة تأثير أستغلال بت واحد أو أثنين على الغطاء الصوتي.
12
أ.م ناجي مطر سحيب
محمد خلف كاظم
حوراء عبدالله
An Image Encryption Algorithm Based DNA
Abstract
This project propose a method of image encryption based on DNA computation technology , the original image is encrypted using DNA computation and DNA complementary rule ,the algorithm has achieved the satisfactory computing security level in the encryption security estimating system
13
أ.م ناجي مطر سحيب
نور سعيد حميد
نور ثائر جميل
C++ Implementation of Neural cryptography for public key Exchange
Abstract
This project is the software implementation of the concept of neural cryptography ,which is acuminatation of two tree parity machines for agreement on a common key over a public channel.
14
م.م ذياب سلمان ابراهيم
حيدر عداي منهل
محمد جاسم
Evaluation of Various LSB (1-bit, 2-bit ,3-bit) of Image Steganography.
Abstract
In this project ,we evaluated 3 type of LSB method 1-bit ,2- bit ,3-bit, by build hiding system (steganography) ,the result from this evaluate quality of cover is higher in 1-bit than 2-bit &3-bit, sothat the capacity factor is effect on security factor .
15
م.م ذياب سلمان ابراهيم
عباس فاضل
مصطفى منصور
Data Hiding Using Cryptography and Steganography : An overview.
Abstract
تم بناء نظام برمجي يقوم بتشفير رسالة نصية ثم اخفاء الرسالة المشفرة داخل صورة. اثبت البحث بان استخدام التشفير والاخفاء معا يعطي امنية عالية.
16
م.م رجاء احمد
سعاد عباس
منى قيس
Edge Detection using ABC Algorithm
Abstract
Swarm intelligent is type of AI and has many algorithms to apply in many applications. ABC lgorithm is one of those algorithms; it used to find best position in search space.Edge detection is process of image processing and can be using many filters to detect edges. In this search we using prewitt operator filter to detect edges and then apply ABC algorithm to find best position, then can be hiding information in those position or using as key for cryptography.
17
م.م رجاء احمد
نور ثائر عبد الستار
هند ليث نعمان
Compare Between GA and ABC Algorithms
Abstract
This work presents a performance comparison between Genetic Algorithms (GA) and Artificial Bee Colony (ABC) by apply both algorithms on the same search space to test which of them is better in terms of performance and speed for finding best positions
18
م.م يحيى محمد
انسام خالد
شهد احمد
Simulation of Communication protocols in Data Network
Abstract
The study contain design and implementation wireless local network (WLAN), this network consist of two scenario , the first scenario is small WLAN netwok contains server and switch and two routers and ten workstations , the second scenario contains the same componetnts but the number of routers and workstation is larger. Networks design were built and simulated of ONET modeler 14.5 software, this simulator differ other simulator provide areal picture about network through area of network such as world ,office …etc This program has to design the network on four stages , first stage design the network by adding the devices(computers and other devices), the choose statistic such as delay, load ,media access ,….etc ,then run simulation ,and after we view the results and analysis it
19
م.م يحيى محمد
محمد صالح احمد
محمد محمود محمد
Design and Implementation Star LAN
Abstract
The study contain design and implementation wireless local network (Network protocol), this network consist of two scenario , the first scenario is small Network protocol contains server and switch and two routers and ten workstations , the second scenario contains the same componetnts but the number of routers and workstation is larger. Networks design were built and simulated of ONET modeler 14.5 software, this simulator differ other simulator provide areal picture about network through area of network such as world ,office …etc This program has to design the network on four stages , first stage design the network by adding the devices(computers and other devices), the choose statistic such as delay, load ,media access ,….etc ,then run simulation ,and after we view the results and analysis it
20
م.م حازم نومان
ريم موفق
شيماء متعب
Online Registration System of the College of Science
Abstract
In the 21st century, with the latest technology, the world is gearing towards multi-directional strength in order to seek the best solutions for people within a short period of time. Modern technology has been saved a lot of the efforts and time in all areas in our live. For example, using paper-based system for student's registration when compared with using the modern technology, We will find that there is the loss of a lot of time and effort without providing the required services.
In addition, it is important for clarifying the advantages of electronic registration and save data for a long time, maintains the integrity of the data from damage, speed of search for the required information in the database and flexible and easy for the user to update the information stored in the database. So the idea of develop online registration in College of Science, University of Diyala came to provide comfortable services to students.
System in this project has been designed using Microsoft Visual Studio.net 2010 and Microsoft SQL Server 2008. The source of information in this system divided into two parts. First part regard to the basic information of the student and provided by registration department such as (Student Exam number, Student Name, ٍStudent Department, Student Average)..etc. While second part of the information are the general information of student and provided by student such as (Gender, Email, Phone No., Address, photo, all documents in PDF form…etc). All these information are saved in Database belong to the student department. In the end, the database will include all the information of students that provided by two sources
21
م.م حازم نومان
هند طلال احمد
غفران عدنان سليمان
Lectures Evaluation System
Abstract
The world is living now in a new world revolution, information revolution which Is connecting with technology information age and the center of the world moved from revolution in to knowledge. Today , The human societies base on knowledge on ton wealth, then the knowledge became the center of progress and extensive information dos not mean anything if society cannot used these information wisely.Lecturers evaluation system is a system designed using ASP.NET with C # language and has been linked to the SQL database to store the results of the evaluation. The system contains several pages are indicated as follows consists, Home page and contain: (a) Login for evaluation, (b) Login for supervisors. Process of login students for evaluation start by selecting the stage and the name of lecturer that we are going to evaluate. The access number must be enter in order to obtain an entry permit to the evaluation window. While login of supervisors contains the window to entry the supervisors responsible for the display the results of the evaluation and consists of three parts, namely: Evaluation control panel: is used to show off the results of the evaluation for each lecturer with possibility to delete and print the evaluation. Lecturers staff control panel: is used to add the lecturers staff that we are going to evaluate, as well as the possibility of deletion and amendment to the lecturers staff. Random access number generation control panel: Used to generate random numbers according to academic stages which will be used later as a password distributed to students in order to start the evaluation process, with the ability to display, search and delete these numbers.
22
م.م ذياب سلمان ابراهيم
زمن كاظم فالح
ايلاف صفاء
Implementation of LSB steganography and its Evaluation for various image file formats (LSB in BMP,LSB in PNG, LSB in GIF)
Abstract
البحث يهدف الى بناء نظام برمجي لأخفاء نص في صورة باستخدام تقنية البت الاقل اهمية . تم استخدام ثلاث انواع من الصور(ثلاث هيئات للصور) كغطاء للاخفاء وتقييم قوة او متانة عملية الاخفاء(ستيكانوكرافي).
23
م.م علي عبدالرحمن
محمد احمد كريم حيدر رياض
Study the Effect of the Malicious Node on the Performance of the MANET: Using NS-2 and AODV Routing Protocol
Abstract
An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. Designing a foolproof security protocol for ad hoc network is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid node mobility, shared radio channel and limited availability of resources. There are a lot of routing protocol for Ad-hoc network such as OLSR,AODV and ZRP; AODV (Ad Hoc On-Demand Distance Vector) is one of such protocols that helps to create and maintain routes in spite of the dynamic network topology. This protocol is vulnerable to a number of security threats that come from internal malicious nodes which have authorization credentials to participate in the network. Malicious nodes deliberately drop data packets and disrupt the correct operation of the routing protocol. This project aim to study the effect of the malicious node on the AODV routing protocol.
24
م.م علي حسين فاضل
بسمة اسماعيل اسماء هاشم دعاء هاشم
Captcha graphic pages in website based on the Arabic language
Abstract
يهدف البحث الى استخدام اللغة العربية في امنية الصفحة الانترنيت ولمنع الشخص الغير المخول في الدخول الى الصفحة
25
م.م علي حسين فاضل
نور عادل جواد وعد شاكر محمود
Diagnosis of Diseases using the Association Rule
Abstract
يهدف البحث على تشخيص الامراض بالاعتماد على تنفيذ البيانات والخوارزمية المقترحة في التشخيص للمرض وهي قواعد الارتباط والتي من خلالها يتم اكتشاف المرض وتشخيصه
26
م.م علي حسين فاضل
اسراء عبدالرزاق
ميساء حميد
Designing IC3 Exam to Diyala University
Abstract
يهدف البحث الى تصميم برنامج يتم من خلاله اجراء اختبارات الطلاب لقسم علوم الحاسوب على مبداءIC3 العالمي.