Abstract In this research, a new modified version of Tree Dimension Playfair (3D-Playfair) cipher algorithm is introduce to encrypt image. The new method is create (16 X 4 X 4) matrix based on the key being entered by the user to become more secretive, and then manipulate image data the algorithm work on trigraph rather than using digraph, and to increasing complexity of the algorithm the key is used to generate a mask that is subsequently Exclusive OR (XORed) with the scrambled image after e...
Abstract A Mobile Ad Hoc Network (MANET) is an infrastructure-less wireless network which allows a group of mobile devices to connect wirelessly without centralized administration. MANETs are useful when rapid deployment in infrastructure-less locations is required, or under emergency situations where communication is not available. Video conferencing over MANET is challenging due to features that characterize this type of network. This thesis proposed an enhanced scheme based on tuning, mod...
Abstract Diabetes Mellitus is one of the fatal diseases growing at a rapid rate in de- veloping countries. This rate is also critical in the developed countries, Dia- betes Mellitus being one of the major contributors to the mortality rate. De- tection and diagnosis of Diabetes at an early stage is the need of the day. It is required that a classifier is be designed so as to work efficient, convenient and most importantly, accurate. Artificial Intelligence and Soft Computing Techniques mimic ...
Abstract Nowadays, speech recognition plays a major role in designing a natural voice interface for communication between human and their modern digital life equipment. It is presenting an easy way to cross the language barrier between monolingual individuals. But the obvious problem with this field is the lack of wide support for several universal languages and their dialects; while most of the daily interaction is done using them. This research comes to ensure the viability of designing the...
ABSTRACT Vehicle license plate recognition is a computer vision method that aims to automatically recognize the vehicle’s identification number from the vehicle image. Therefore, it is an important component for automating many control and surveillance systems, such as: road traffic monitoring, private and public entrances, highway electronic toll collection, red light violation enforcement, and theft control. Although, considerable researches have been carried out for vehicle license plate...
The pervasiveness of the internet and available connectivity solutions brought about by cloud computing has led to an unprecedented increase in technologies built based on information technology infrastructures. This has improved the number of cloud users and substantially increasing the number of incidents related to the security of infrastructure and data in the recent past. Most organizations consider the deployment of different types of protection systems to curb various malicious ac...
ABSTRACT EEG (Electroencephalography) allows eliciting the mental state of the user, which in turn reveals the user emotion, which is an important factor in HMI (Human Machine Interaction). Researchers across the globe are developing new techniques to increase the EEG accuracy by using different signal processing, statistics, and machine learning techniques. In this work we discuss the most common techniques that can yield better results, along with discussing the common experiment steps to ...
Abstract This dissertation investigates the issues of guidance for pilgrims and how to make it more suitable for groups of pilgrims who navigate in unfamiliar areas. The dissertation will explore how to provide aid to pilgrims in crowded places by developing a pilgrim tracking and identification system using mobile phones that use NFC technology. The proposed system will provide education to pilgrims to guide them throw the Hajj journey. The proposed system will provide instructions regardin...
Abstract Sudanese software enterprise which categorized as small enterprises need frameworks and models for process improvement . Capability Maturity Model integration (CMMI ) which is designed for large scale enterprise is not suitable for Sudanese enterprise and need to be customized to suit small enterprise . The current study aims to investigate software process improvement in Sudanese software enterprise and to customized process improvement. Capability Maturity Model integration (CMMI ...
Abstract The main objective of this research is to implement an enterprise system integration using an enterprise service bus (ESB) in Sudan. The research questions are; what framework to be used to complete the integration? And what are the mechanisms that will be used to make sure that the integration process is successful? Finally, how to choose the workflow engine and what are the criteria for the choice. To achieve the research objectives, different approaches to integrate enterprise sy...
ABSTRACT In the world we live in today, the reduction in data generally has seen a great rise. This is because of the numerous advantages that comes with working with smaller efficient data instead of the original large dataset. With this analogy, we can adopt Dimensionality reduction in computer science emphasizing on reducing computer memory in order to have more storage capacity on a computer. An example of this would be to reduce digital images which are then stored in 2D matrices. Dimen...
Abstract Mobile telecommunications such as Global System for Mobile Communication ( GSM ) are now well established globally and users rely heavily on the convenient communications it provides. The level of security provided by GSM is superior to its predecessors and is more than adequate for the majority of users. However, some users in the areas of government, defense or business require more security over and above that provided by the GSM standards and by standard GSM equipment. In a GSM n...
ABSTRACT American University of Nigeria (AUN) has many web application used every day both by students and faculty. For students, faculty and other staff to know about a course or department; they have to visit the AUN website and they can only have little information about them. This problem is faced by students, faculty and visitors that want know about the school of information, technology and computing in the American University of Nigeria. SITC is the second largest school in AUN and it...
Abstract Breast cancer is the disease most common malignancy affects female population and the number of affected people is the second most common leading cause of cancer deaths among all cancer types in the developing countries. Nowadays, there is no sure way to prevent breast cancer, because its cause is not yet fully known. But there are things you can do that might lower risk such as early detection of breast cancer can play an important role in reducing the associated morbidity and m...
ABSTRACT Trust is a major factor in the internet business. This is not surprising as it is very convenient for cyber criminals to swindle unsuspecting customers. AUN SafeShop is an online store for the American University of Nigeria (AUN) Community. AUN SafeShop is a platform for AUN staff, students and faculty to buy and sell new or fairly used items among themselves. This platform is a lot safer for members of the AUN Community because it will be a near transparent system and it will be ve...