Masters theses : Computer Science
Permanent URI for this collectionhttps://repository.neelain.edu.sd/handle/123456789/12168
Browse
76 results
Search Results
Item Verification of the individual by palm veins using the nearest neighbour algorithm (KNN)(ALNEELAIN UNIVERSITY, 2020-12) Entssar Abd Elbagi Elhussain Mohammedالمستخلص تعرف القياسات الحيوية على أنها تحديد الأشخاص حسب خصائصهم الفسيولوجية ، مثل نمط القزحية وبصمات الأصابع والوجه وهندسة اليد ، أو من خلال بعض جوانب سلوكهم ، مثل الصوت والتوقيع والإيماءات ،كروت الإئتمان حيث تواجه هذه الوسائل بالضياع والتزييف والنسيان لذلك كان التوجه نحو تطوير نظم قائمة على القياسات الحيوية للإنسان خلال العقود القليلة الماضية وكانت قد مثلت نجاحا منقطع النظير. في الآونة الأخيرة إتجه الباحثين نحو احد تقنيات القياسات الحيوية وهو نمط أوردة الكف. نمط أوردة الكف هو هيكل التوزيع المادي للأوعية الدموية تحت جلد الشخص، حيث ان أوعية الكف تبقى في نفس الموقع طوال الحياة ونمطه فريد لا يتكرر حتى عند التوأم. مشكلة ابحث تكمن فى الاستخدام الواسع للشبكات والتعامل مع البينات والخوف من وصول من لا حق لهم فى الوصول التوصل الى بيانات شخص اخر كان لابد من ظهور تقنيات تعمل على حماية الكم الهائل هذه البينات. الهدف من البحث تطوير نظام للتحقق من الفرد باستخدام تقنية أوردة الكف و خوارزمية الجار الاقرب فى عملية التعرف على نمط الأوردة وكواحدة من خوارزميات التصنيف والتعرف على تقنية أوردة الكف كواحدة من تقنيات القياسات الحيوية . المنهجية البحث عبارة عن الاوراق العملية والمراجع والانترنت كما تم استخدام الماتلاب لتصميم النظام. ) قاعدة البيانات التى تحتوى على مجموعة من صور أوردة الكف التى تم اخدها عن طريق كاميرا CIE( حساسة تعمل تحت الاشعة الحمراء التى تعمل على اظهار الأوردة . ويشمل النظام المطور المعالجة الأولية التي تحتوي على خطوات لتوضوح الصورة الوريدية ، تحضير البيانات وتحديد نسب بيانات التدريب حيث تمت عمليات التدريب بنسب (%50-60%-%70-80%) ، عملية التصنيف والتى تم فيها استخدام خوارزمية الجار الاقرب والتى اسفرت عن نتائج مختلفة بإختلاف نسب بيانات التدريب،حيث أوضحت ان اقل قبول خاطئ مع اكبر نسبة تدريب للبينات والتى كانت فى حالة نسبة التدريب 80% من قاعدة البيانات حيث كانت النتيجة % 10.6عبارة عن قبول خاطئ ( FRR)و89.6% قبول صحيح (TAR) . بعد الوقوف على نتائج البحث يمكن القول ان تقنية أوردة الكف من التقنيات التى تساعد على زيادة امن المعلومات لما لها من سمات لا تتوفر فى التقنيات الاخرى ،يمكن استخدامها فى مداخل المؤسسات واجهزة الصراف الالى. Abstract Biometrics are defined as identifying people according to their physiological characteristics, such as the pattern of the iris, fingerprints, face and hand geometry, or through some aspects of their behavior, such as voice, signature and gestures, credit cards where these means are faced with loss, forgery, and forgetfulness, so the trend has been to develop systems based on measurements Vital to man during the past few decades and it has been an unparalleled success. Recently, researchers have moved towards one of the biometrics techniques, the palm vein pattern. The palm vein pattern is the structure of the physical distribution of blood vessels under a person's skin, as the palm vessels remain in the same location throughout life and their unique pattern is not repeated even when the twins. With the widespread use of networks, dealing with data, and fear of access by those who have no right to access, access to data of another person, it was necessary to develop technologies that protect the vast amount of these data. The aim of the research is to develop a system to verify the individual using the technique of palm veins and the closest neighbor algorithm in the process of identifying the pattern of veins and as one of the classification algorithms and identify the technique of palm veins as one of the biometrics techniques. he information was obtained from the working papers, references and the internet, and the matlab was used to design the system. The database (CIE) contains a set of vein images that were taken by a sensitive camera that works under the infrared to show the vein. The developed system includes the initial treatment that contains steps to clarify the venous image, prepare the data and specify the proportions of the training data where the training operations were carried out at rates (50-60% - 70-80%), the classification process in which the nearest neighbor algorithm was used which resulted in Different results, according to the different training data ratios, where they showed that the lowest False Rejection Rate (FRR) with the largest training rate for the data, which was in the case of training 80% of the database so the result was 10.6% FRR and 89.6 of CRR or TAR. After examining the results of the research, we can say that the technique of palm veins is one of the techniques that help to increase information security because of its features that are not available in other technologies, it can be used at the entrances to institutions and ATMs.Item Arabist com portal content management system Using three tier architect ure(AlNEElAN UNVERSLTY, 2003) Mohammed Eiadeh DaghbooshehItem Implementation and evolution of 0nline Pharmacy System using Asp.net(ALNEELAIN UNIVERSITY, 2020) lnsai Fuad Hussein MohamedAbtract Online pharmacies, Intemet pharmacies, or Mail Order Phannacies are pharmacies that operate over the Intemet and send the orders to customers. Online or intemet pharmacies might include: Conventional stationary pharmacies usually have controlled distribution systems from the manufacturer. Validation (drug manufacture) and Good distribution practices are followed. Home delivery of pharmaceuticals can be a desirable convenience but sometimes there can be problems. The shipment of drugs through the mail and parcel post is sometimes a concem for temperature-sensitive pharmaceuticals. Uncontrolled shipping conditions can include high and low temperatures outside of the listed storage conditions for a drug. For example, the US FDA found the temperature in a mail box in the sun could reach l36°F (58°C) while the ambient air temperature was 10l°F (38°C). Shipment by express mail and couriers reduces transit time and ofien involves delivery to the door, rather than a mail box. The use of insulated shipping containers also helps control drug temperatures, reducing risks to drug safety and efficacy. Phannacy benefit manager - A large administrator of corporate prescription drug plans legitimate internet pharmacy in the same country as the person ordering. Legitimate internet pharmacy in a different country than the person ordering. This pharmacy usually is licensed by its home country and follows those regulations, not those of the intemational orders. Illegal or unethical internet pharmacy. The web page for an illegal pharmacy may contain lies about its home country, procedures, or certifications. The "pharmacy" may send outdated (expired shelf life) or counterfeit medications and may not follow normal procedural safeguards.Item Comparison of Sorting Algorithms(ALNEELAIN UNIVERSITY, 2014) hiba Mohamed sulieman saliemAbstract There are many methods have been developed to arrange the array values in various ways for a database cold the sorting algorithms. The classification of sorting algorithms base on System complexity of computational, terms of number of swaps, Memory usage Stability of sorting algorithms . In this researsh we seek to detemiine the efficiency of the various sorting algorithms according to the time and number of swaps by using randomized trails. The build environment using the Java language. We represents these sorting algorithms bubble sort, selection sort, insertion, sort quick sort and merge sort as a way to sort an array or integers and run random trails of length. I created a package called “sorting” to execute a sort, it provided module of sorting list(Non decreased &decreased) uses different method of sorting ,the amount of swaps of each sorting algorithm and the runtime (in millisecond) and I found a quick sort is the fastest algorithm compare to Bubble sort, Insertion sort, Selection sort, and merge sort.Item Continuous Inductive Learning Algorithm (CILA) at(ALNEELAIN UNIVERSITY, 2003-01) Ali Mohammad Hussien IbrahmiABSTRACT Continuous Inductive Learning Algorithm (CILA) By: Ali Mohammad Hussien Ibrahim M.Sc. in Information Technology Al-Neelain University Faculty of Computer science & Information Technology Supervised by: Associate professor Dr. walid Salameh Inductive leaming systems can be effectively used to acquire classification knowledge from examples, many existing symbolic learning algorithms can be applied in domains with continuous attributes when integrated with adiscretization algorithm to transform the continuous attributes into ordered discretization. In this theses we discuss machine leaming, specially inductive learning and all it’s algorithms, and anew information theoretic discretization method optimized for supervised, and unsupervised learning method's proposed and described, so we proposed improvement of ILA which called Continuous Inductive Learning Algorithm(CILA), and tested in inductive leaming example to show how the discretization method’s deal with continuous value attributes.Item A Survey of Inductive Learning Algorithms M. Sc. In Information Technology Al-Neelin University(2003-01) Randa Ali Numan Al KhaldiAbstract A Survey of Inductive Learning Algorithms By Randa Ali Numan Al Khaldi M.Sc. in Information Technology Al-Neelin University , January 2003 Dr. Walid Salameh, Associate Pr0f., Thesis Supervisor Dr. Saleh Abu-Soud, Associate Pr0f., Thesis C0-Supervisor In this thesis I try to study some of well-known Inductive Learning Algorithms, because Inductive Learning Algorithms one of the most important field of Machine Learning that represent a main part of human research in these days. Inductive Learning Algoritluns are to make machine able to be smart and able to do new things and to achieve new situations by themselves without the help of human beings. Inductive Learning Algorithms were discussed in chapter4, according to their inference (output) : Decision Tree Algorithms and Production Rules Algorithms] concentrate on some of Decision Tree Algorithms as ID3, C4.5, OC1 and on Production Rules Algorithms as C4.5Rules, CN2, AQ Family, ID4. Rules. ILA, ILA-2, DCL, PILA, CAIM, GIL.Item Integrated E-Commerce A Case Stud(ALNEELAIN UNIVERSITY, 2003-08) AMER OMAR MOHAMMED ABDULAHAbstract The world has experienced major changes in the recent years, increasing intemational challenges had forced us to change our way of dealing. The now a days concept of time have changed, where promoting a new product in merely a short time matter which can’t wait more than 2 months at the most, and this lays a heavy burden on the shoulders of businessmen where is possible to avoid hard travel for meeting their goods and exhibit them in markets. Today’s society makes it nearly mandatory for everyone to have a major credit card, and the demand for credit is increasing each year. This solution is perfect for any business running in Jordan, particularly on the intemet. Generating sales is the key goal, and credit cards provide the fastest means of paying and receiving payment for a product or service. In fact, 79%of all web sales are made by credit card! This case study in hand represent in an outlined manner anticipating how a complete e-commerce solution may be presented by E-advertising to the end users within the world wide and the Arab world as well. It also concisely reveals the simplicity and the compelling features of the solution proposed. This Designer cottage intended for apprentice individuals to the world of e- commerce, and requires no teclmical acquaintance with e-commerce whatsoever. The solution makes it seamless and cost effective to make sales in intemational environment with right tools. Within this Designer cottage you will be aware of all the steps required for merchant who would like to obtain a fully Woking e-commerce store, nothing that this merchant has no technical knowledge with e-commerce whatsoever, and does not intend to obtain this knowledge.Item Serofrequency of Herpes Simplex Virus Type 2 Infection among Human Immunodeficiency Virus Patients in Khartoum state, Sudan(Al-Neelain University, 2022-11-22) Heba Almoez Bushra SaeedAbstract Background: Herpes Simplex Virus type 2 and HIV are both lifelong sexually transmitted infections (STIs) that are associated with similar risk factors. HSV-2 infections can significantly increase the risk of human immunodeficiency virus (HIV) transmission and accelerate disease progression, so monitoring the prevalence of HSV-2 infection in HIV patients can help to prevent spreading and present of new HIV cases. Aim: This study was aimed to determine the serofrequency of Herpes Simplex Virus type 2 infections among HIV patients in Khartoum state, Sudan. Methods: A total of eighty five HIV patients from different hospital were enrolled into the study. The study was descriptive cross sectional, questionnaires were used to collect the clinical and demographical data, all samples were screened for HSV-2 IgG antibodies using enzyme – linked immunosorbent assay (ELISA), and all collected data were analyzed using SPSS version 20. Results: Eighty five HIV patients were enrolled in the study, composed of (51.8%) males and (48.2%) females. Most of the subjects were (21 -40) years (55.3%). About (72.9%) of enrolled patients had viral load less than 1000 copies / ml. HSV-2 and HIV coinfection was found to be (30.6%). High frequency of anti HSV-2 IgG was recorded in females than males. The highest IgG seropositivity was found in age group (21-40) accounting for (29.8%), and high HSV-2 IgG seropositivity was found in patients who had HIV viral load less than 1000 copies\ml , which accounting (33.9%). No significant difference was observed in the result for HSV-2 infection and age group, gender or HIV viral load. Conclusion: This study provided evidence of Herpes Simplex Virus type 2 exposures among AIDS patients in Khartoum state, Sudan. This indicates that the two viruses collaborate in infection of patients and this can potentially compromise the efforts to prevent and control HIV infection if no interventions have been introduced. The identification and control of HSV-2 in HIV patients consider one of approaches in preventing incident of HIV infections. المستخلص الخلفية: يعد فيروس الهربس البسيط من النوع 2 وفيروس نقص المناعة البشرية من الأمراض المنقولة جنسياً وتستمر مع المصاب مدى الحياة و ترتبط بعوامل خطر مماثلة. يمكن أن تزيد عدوى الهربس البسيط من النوع 2 بشكل كبير من خطر انتقال فيروس نقص المناعة البشرية وتسريع تطور المرض ، لذلك يمكن أن تساعد مراقبة انتشار عدوى الهربس البسيط من النوع 2 في هذه الفئة من منع انتشار حالات الإصابة الجديدة بفيروس نقص المناعة البشرية. الهدف: هدفت هذه الدراسة إلى تحديد معدل التكرار المصلي لعدوى فيروس الهربس البسيط من النوع 2 بين مرضى الإيدز في ولاية الخرطوم ، السودان. الطريقة: تم تسجيل ما مجموعه (85 ) مريضًا مصابًا بفيروس نقص المناعة البشرية من مختلف المستشفيات في الدراسة ، واستخدمت الاستبيانات لجمع البيانات السريرية والديموغرافية ، وتم فحص جميع العينات بحثًا عن الأجسام المضادة لـلغلوبيولين المناعي ج للهربس البسيط من النوع 2 باستخدام مقايسة الممتز المناعي المرتبط بالإنزيم. النتائج : تم تسجيل (85) مريضا إيجابيا لفيروس نقص المناعة البشرية في الدراسة ، وتتألف من (51.8٪) ذكور و (48.2٪) إناث. معظم المشاركين في الدراسة تراوحت أعمارهم بين (21-40) سنة (55.3٪). حوالي (72.9٪) من المرضى المسجلين لديهم حمل فيروسي أقل من 1000 نسخة / مل. تم العثور على ان عدوى الهربس البسيط من النوع 2 وفيروس نقص المناعة البشرية تكون(30.6%) . تم تسجيل تواتر عالي لمضاد اـلغلوبيولين المناعي ج للهربس البسيط من النوع 2 في الإناث أكثر من الذكور. تم العثور على أعلى إيجابية مصلية اـلغلوبيولين المناعي ج في الفئة العمرية (21-40) وتمثل (29.8٪) ، ووجدت أعلى إيجابية مصلية اـلغلوبيولين المناعي ج في المرضى الذين لديهم حمل فيروسي لفيروس نقص المناعة البشرية أقل من 1000 نسخة / مل ، والتي تمثل (33.9٪). لم يلاحظ أي فرق معتد به في نتيجة اختبار لـلغلوبيولين المناعي ج للهربس البسيط من النوع 2 حسب الفئة العمرية أو الجنس أو الحمل الفيروسي لفيروس نقص المناعة البشرية.Item Digital Signature(RSA)(ALNEELAIN UNIVERSITY, 2002) shamiel hashim ibrahimItem performance Evalution of (AODV AND OLSR)Routing protocols Under the lmpact of Black hole Attack(AlNEElAN UNVERSLTY, 2018) Dalal omer sida hmed Hagali
