M.Sc. Thesis Samples:
(1) “Design and Implementation of a New Authentication Methods”, Abdul Ameer Hussain, Sadaam
University, College of Science, 1988, Iraq.
(2) “Development of Database Integrity”, Mouaid Abdul Razak, University of Technology, Department of
Computer Science, 1985, Iraq.
(3) “Design a New Methods for Authorized Users”, Abdul Kadir Al-Nakshabandy, National Computer Centre,
1986, Iraq.
(4) “Database Security Aspects”, Abdul Munam Al-Mashdani, National Computer Centre, 1987, Iraq.
(5) “Design and Implementation of a Distributed Database Security System”, Musaad A Al-Nemry, National
Computer Centre, 1992, Iraq.
(6) “A new Approach for Distributed Database Integrity”, Rafeek Abdul-Rahman Al-Hashemy, Iraqi
Commission for Computers and Informatics, Information Institute for Postgraduate Studies, 1992, Iraq.
(7) “Construct Weather Database for Ground Surface”, Jamal Fadhel, Department of Computer Science,
University of Technology, 1992, Iraq.
(8) “Extending the Capabilities of Web Security System”, Mazin Sameer Al-Hakeem, Iraqi Commission for
Computers and Informatics, Information Institute for Postgraduate Studies, 1999, Iraq.
(9) "Design and Implementation of Relational Database Security System", Zainab Kassim Ahmed, University
of Baghdad, Iraq, 1999.
(10) "User Identification in Distributed Database", Saad Abdulsalam, Computer Science Department,
University of Technology, 1999.
(11) "Using Steganography for File hiding", Alaa Abdul Hussein, Computer Science Department, University of
Technology, 2000.
(12) "Expert System for Query Design", Shaimaa Ouadh, Computer Science Department, University of
Technology, 2001.
(13) "Design of an Expert Database for Security", Nada Adnan, Computer Science Department, University of
Technology, 2001.
(14) "Using Genetic Algorithm in Analysis the RSA Public Key System", Mohammed Naser, Computer Science
Department, University of Technology, 2001.
(15) "Design a Protection System for an Internet Site", Soukaena hassan Hashem, Computer Science
department, University of technology, 2002.
(16) “Attacking Classes of Stream Cipher Using Genatic Algorithm”, Kareem Hashem, National Computer
Centre, 2000.
(17) “PC Based Telephone Exchange”, Waleed Abdul-Hameed, National Computer Centre, 2000, Iraq.
(18) “A New approach for Breaking RSA Public key Cipher System”, Vera Hameed, Sadaam University, 2001, Iraq.
(19) “Implementing an Expert Database System to Design a Security System”, Reehab A Al-Alousy,
Department of Computer Science, University of Technology, 2001, Iraq.
(20) “A New Approach for Relational Database Security”, Zaid Ganim Aziz, National Computer Centre, 2001, Iraq.
(21) “Using Natural Features of Arabic Letters in Text Information Hiding”, Raghad A Al-shamkhy,
Department of Computer Science, University of Technology, 2001, Iraq.
(22) “Extending SQL to Mine Association Rules”, Yasameen K Al-Wardy, Iraqi Commission for Computers and
Informatics, Information Institute for Postgraduate Studies,2002, Iraq.
(23) “Concealment of Information in Digital Image”, Maissa Ahmed Kadhem, Department of Computer
Science, University of Technology, 2002, Iraq.
(24) “Design and Construct a Mobile Database for Decision Support System”, Ali Mohammad Baseman,
Sadaam University, 2002.
(25) “Design and Evaluation of Textbook Cover”, Febronia W Jorge, Fine Art Academic, 2000, Iraq.
(26) “Cover Optimization for Image Steganography”, Needal Khoudair Khalaf, Iraqi Commission for
Computers and Informatics, Information Institute for Postgraduate Studies, 2002, Iraq.
(27) “Arabic Writing Recognition”, Salam Naser Aziz, Iraqi Commission for Computers and Informatics,
Information Institute for Postgraduate Studies, 2003.
(28) “A Proposed Configuration for the Subnet Firewall Architecture”, Soukaena Hassan Hashem,
Department of Computer Science, University of Technology, 2003, Iraq.
(29) “An Engineering Approach to Develop Web Pages Using JAVA”, The Institute for Higher Studies in
Informatics of Iraqi Commission for Computers and Informatics, Baghdad, Iraq, Sept. 2003.
(30) “New Scanning and Attacking Approach for New Generation of Viruses”, Laith M Al-Dulaimy, Iraqi
Commission for Computers and Informatics, Information Institute for Postgraduate Studies, 2001, Iraq.
(31) "Implementing Watermark in Music System", Reem Jafar Esmail, Computer Science Department,
University of Technology, 2004.
(32) "Solution for Some Internet and Networks Security Problems", Moaaid Abid Hani, Computer Science
Department, University of Technology, 2004.
(33) "Developing a Compound method of K-Means and hierarchical Method for clustering in Data Mining",
Wael Abu Azzam, Amman Arab University for Graduate Studies, 2008, Jordan.
(34) "Improving the Effectiveness of the Color Coherence Vector (CCV) Method", Hisham Hussein Al-
Rashdan, Amman Arab University for Graduate Studies, 2009, Jordan.
(35) "A Proposal for Treatments of Habitual and Fuzzy SQL Commands", Khalid Mahmoud Al-Radaideh,
Amman University for Graduate Studies, 2009, Jordan.
(36) "Design and Implementation of Data Tuning on Oracle DBMS", Mohammed jamel Abid Jaber", Amman
University for Graduate Studies, 2009, Jordan.
(37) "Tunning SQL Statements by Implementing Mobile Agent Transparent Interface Layer", Imad Hassan
Salih, Amman Arab University for Graduate Studies, 2009, Jordan.
(38) "Developing a Robust Digital Image Watermark Using Frequency and Spatial Domains", Wissam Ahmed Hassan, Amman Arab University for Graduate Studies, 2010, Jordan.
(39) "Improving Security Performance on the Banking System Distributed", Adel Ahmed Al-Dabbas, Arab
Amman University for Graduate Studies, 2010, Jordan.
(40) "Developing a Host Intrusion Prevention System by Using Data Mining", Tahani Nawaf Al-Alawnah,
Amman Arab University for Graduate Studies, 2010, Jordan.
(41) "Study of Propagation Delay for Time Triggered Ethernet", Abduallah Nawaf Al-Khasawnah, Amman
Arab University for Graduate Studies, 2010, Jordan.
(42) "Proposed Method of Factorization Analysis to Break the Bublic Key of RSA Algorithm", Bilal Sadik
Obaid, Amman Arab University, 2010, Jordan.
(43) "A Hybrid Strategy for Minimizing Association Rules", Saif Mohammed Ali, Al al-Bayt University, Prince
Hussein bin Abdullah College of Information Technology, Amman, Jordan, 2010.
(44) "Applying Machine Learning Algorith for Search Engine with openion Mining Features", Suzan Hussein Shahrour, Amman Arab University, Jordan, 2011.
(45) "Development of a Network-based Intrusion Prevention System using Data Mining Approach", Nagham Farouk Al-Sammerai, Amman Arab University, Jordan, 2011.
(46) "Web Application Security of E-Money Transfer Systems", Mohammed Saad Abdul Wahab, Amman Arab University, Jordan , 2011.
(47) "Enhanced Method for RSA Cryptosystem Algorithm", Ibrahem Abdallah Aldrisah, Amman Arab University, Jordan, 2011.
(48) “Analysis and Enhancement of Geographical Information System “GIS” Layers for solving Traffic Jam Problems”, Zaid Farhood Meki, Middle East University, 2012 , Jordan.
(49) “Improving the Watermarking Performance Using Combined Redundant Discrete Wavelet Transform
and Contourlet Transform Scheme”, Fidaa Mahmoud Shuaib, Amman Arab University, 2012, Jordan.
(50) "Data and Knowledge Protection in Data Mining", Suhad Fathi Abu-Shuhab, Amman Arab University, Jordan, 2012.
(51) "Improving the delay in Voice Over Internet Protocol (VOIP) in Wireless LAN", Jazya Muftah Ahmed, Amman Arab University, Jordan, 2012.
(52) "A Technique for concealing Confidential Information inside an Image over unsecure Network", Saad Saleh Aldahiry, Amman Arab University, Jordan, 2012.
(53) "A Proposed Method for Hiding SMS and MMS in Mobile Phone", Salwa Muftah Alshareef, Amman Arab University, Jordan, 2012.
(54) "A Method for Improving the Bluetooth Key Exchange Security", Aows Jamal Tahseen, Amman Arab University, Jordan, 2012.
(55) "A Technique for face Recognition using Algorithm-based on Artificial Neural Network Technique", Noor Humady Batti, Amman Arab University, Jordan, 2013.
(56) “Estimation of Null values in Relational Data Base System using K-Nearest neighbor and Decision Tree”, Sarah Moufak Al-Samady, Amman Arab University, Jordan, 2013.
(57) “An Authentication Model for Cloud Computing Application”, Rafal Adeeb Al-Khashab, Amman Arab University, Jordan, 2013.
(58) “A Proposed Model for Risks Management in Cloud Computing Environment”, Nora Mohammad alkury, Amman Arab University, Jordan, 2014.
(59) “A Secure Audio Hiding Method Using Mobile Device”, Afan Sabah Hamdi, Amman Arab University, Jordan, 2014.
(60) "Cash Currencies Recognition Using Digital Image Processing Concepts Implemented with KNN Classifier", Abrar Hussein Al-Khayat, Amman Arab University, Jordan, 2014.
(61) “SECURE MOBILE CLOUD COMPUTING BASED-ON FINGERPRINT”, Jalal Yousef Al-Juneidi, Amman Arab University, Jordan, 2014.
(62) "SECURING VoIP IN SIP MOBILE NETWORK', Zaid Salah Munif, Amman Arab University, Jordan, 2014.
(63) "HIDING TEXT MESSAGE IN VIDEO USING IMPROVED LSB METHOD', Maher Mohammed AL-Essa, Amman Arab University, Jordan, 2014.
(64) "The Impact of Website Factors on Trust-ability (Jordan Case Study)", Abed AlHaleem Hashem AlRialat, Amman Arab University, Jordan, 2015.
(65) “Cloud Computing Access Authentication Through Mobile Device Based on Face Recognition”, Ali Mohammad Saab, Amman Arab University, Jordan, 2015.
(66) “Prediction of Location Based on Social Media Big Data Analysis”, Raneem Naseem Abu Hussein, Amman Arab University, Jordan, 2015.
(67) "EEG Data Analysis by using Map-Reduce Technique", Ali Adel Flayyih, Amman Arab University, Jordan, 2016.
(68) "A Proposed Model for E-Mail Security in E-government", Falah Rashad Falah Al-Rawi, Amman Arab University, Jordan, 2016.
(69) “Enhancing Security Technique for E-Passport using Steganography and Diffie-Hellman key Exchange”, Muna Amin Ahmed Abdul-Hafiz, Amman Arab University, 2016.
PhD Thesis Samples:
(1) “Using Genetic Algorithm for Hand Written Numeral Recognition”, Ameer Sedik Al-Malah, Iraqi
Commission for Computers and Informatics, Information Institute for Postgraduate Studies, 2000, Iraq.
(2) “Audio Steganography Using Masking Effect”, Ziad Tariq Mohammad, Department of Computer Science,
University of Technology, 2001, Iraq.
(3) “A New Approach to Mine Negative Association Rules”, Hussain M Keetan, Iraqi Commission for
Computers and Informatics, Information Institute for Postgraduate Studies, 2002, Iraq.
(4) “Implementation of Multi Wavelet and Neural Network for Image Classification”, Dhia Abdul-Hussain,
Iraqi Commission for Computers and Informatics, Information Institute for Postgraduate Studies, 2002, Iraq.
(5) “A new Approach for Error-Correcting Codes Related to Water Mark Robustness”, Jamal Maki Abdul
jabber, Iraqi Commission for Computers and Informatics, Information Institute for Postgraduate Studies,
2003, Iraq.
(6) “Migration and Deadlock in a Distributed Databases”, Lamya H Al-Samaraay, Iraqi Commission for
Computers and Informatics, Information Institute for Postgraduate Studies, 2002, Iraq.
(7) “Detection Unknown Viruses in e-Mails”, Essra Wahib Thamir, Department of Computer Science,
University of Technology, 2004, Iraq.
(8) “A Simulated Intrusion Detection System Using Packet Header”, Hiam Hazels Mustfa Al-Anie,
Department of Computer Science, University of Technology, 2003, Iraq.
(9) "Watermark Applications in Color Image using Wavelet Transforms", Ali Kadhim Musa, Iraqi Commission
for Computers and Informatics, Informatic Institute for Postgraduate Studies, 2004, Iraq.
(10) “Design and Implementation of a Security system for the Multimedia”, Jamal Hamdan, Iraqi
Commission for Computers and Informatics, Information Institute for Postgraduate Studies, 2004, Iraq.
(11) “Building a Data Warehouse for Decision Support system”, Mortadha Mohammad Hamad , Iraqi
Commission for Computers and Informatics, Information Institute for Postgraduate Studies, 2005, Iraq.
(12) “Modification to Improve the Mobile-Commerce Security”, Soukaena Hassan Hashem Al-Kurabi,
Department of Computer Science, University of Technology, 2006, Iraq.
(13) "Investigating Distributed Database Deadlock Based on Attribute Level", Khaled Saleh Salah maabreh,
Amman Arab University for Graduate Studies, 2008, Jordan.
(14) "Virus Detection and Elimination using Artificial Immune System with Genetic Algorithm", Suha
Mohemmed Ameen Afaneh, Amman Arab University for Graduate Studies, 2010, Jordan.
(15) "AutoRegressive Moving Average (ARMA) Model Orders and Parameters Estimation Using
Evolutionary Algorithm", Khaled Eissa Al-Qawasmi, Amman Arab University for Graduate Studies, 2010,
Jordan.
(16) “Leader Election Algorithms for three Dimensional Torus Networks with the Presence of One or Two
Links Failure“, Abdulkhalek Al-Hamouri, Amman Arab University, 2012, Jordan.
(17) “Impact of Information Security Strategy Dimensions on Sustained Competitive Advantage in Telecommunications Companies”, Hasan Mahmood Shrem, Amman Arab University, Jordan, 2013.
(18) "Towards Framework for Real Knowledge Based E-Learning in Arab Nations", Emad Omar Sarhan, University of Creative Science, United Arab Emirates, 2014.
(19) "Communication in Medical Care: Influence and Uses in Arab World, Kingdom of Saudi Arabia Case Study", Mohammad Homam Arjomandi, United Arab Emirates, 2014.