Articles

Personal Identification with Iris Patterns
Mazin Khalil, Mahmood Majeed, Raid Omar (Author)
March 2009 ,Pages 13-26

Abstract: This research is aimed to design an iris recognition system. There are two main steps to verify the goal. First: applying image processing techniques on the picture of an eye for data acquisition. Second: applying neural networks techniques for identification. The image processing techniques display the steps for getting a very clear iris image necessary for extracting data from the acquisition of eye image. This picture contains all the eye (iris, pupil and lashes). So, the localization of the iris is very important. The new picture should be enhanced to bring out the pattern. The enhanced picture is segmented into 100 parts, then a standard Deviation (STD) can easily be computed for every part. These values will be used in the neural network for the identification. For neural network techniques, Backprobagation neural network was used for comparisons. The weights and output values will be stored in a text file to be used later in identification. The Backprobagation network succeeded in identification and attained to (False Acceptance Rate = 10% - False Rejection Rate = 10%).  

  PDF
Design of a Hybrid Intelligent System for Transitional Bladder Cell Carcinoma Diagnosis
Nada Saleem, Khalid Saleem (Author)
March 2009 ,Pages 27-40

Abstract: Transitional Bladder cell carcinoma is one of the most common cancers of the urinary tract, accounting for approximately 90% of Bladder cancers. In this research a new computer-based system "Design of a Hybrid Intelligent System for Transitional Bladder Cell Carcinoma Diagnosis" (DHSTCCD) has been proposed and implemented. The proposed system is composed of two main phases, the first phase is the "cell analysis phase" which consists of three main stages including segmentation stage using "Genetic Optimization Based Fuzzy Image Segmentation Algorithm" (GOFISA), morphometric and photometric feature extraction stage and "Neuro-Fuzzy Classifier Model" (NFCM) stage that has been developed and implemented to classify a set of normal and abnormal cells using hybrid intelligent technique that combines the artificial neural network and fuzzy logic. The second phase is the "patient data analysis phase", in this phase a rule-based Fuzzy Expert System has been proposed and implemented that uses the laboratory and clinical data and simulates an expert doctor’s behavior. The final diagnosis of the patients is determined from the results of the fuzzy expert system and the NFCM.  

  PDF
Simulation of Real Time 2D DWT Structure
Mohanad Ahmad (Author)
March 2009 ,Pages 41-48

Abstract: This research contains an introduction to the first works in this field, and describes the Discrete Wavelet Transform DWT which is the only kind that can be implemented in the digital computer. The research lists the important structures that are used to implement the digital filters which are the hart of DWT.  The research contains problems that face us in my M.Sc thesis to implement DWT image structure processor. In my M.Sc thesis we solve the problem of zero padding but we solve the second problem (waiting the column processor until the row processor finish its process) by using pipelineing technique. The pipeline technique solves the problem partially. This research solve the second problem completely by proposing a new structure which make the Two Dimentional DWT (2D-DWT) structure process the video in real time without waiting the row processor. The research was build fast structure that can decompose image by using DWT. The speed performance of the structure was tested using (Simulink) in (Matlab7). The results obtained from simulation of the proposed 2D DWT structure are compared with my M.Sc thesis structure and the traditional structure to show how we improve the process speed of 2D DWT structure.  

  PDF
Design and Analysis of a Sound Generator for wave file format via Parallel Printer Port
Dhuha Abdullah (Author)
March 2009 ,Pages 49-61

Abstract: Ports in computers are used mainly for two reasons : Device control & communication. Parallel ports are mainly meant for connecting the printer to the PC. The purpose of this paper is to design and analayze a sound generator for wave file format by the use of the data and command port of the parallel printer port , the parallel printer port is being programmed to transmit the data from the wave file to the designed device.                                                                                    Some of integrated circuits used in abundance in most electronic applications have been selected in order to achieve its purpose, that all the constituencies used are electronic circuits and logical circuits dependent upon in the design of this sound generator.A digital to analog converter is being used in order to transfer the data from the digital to analog to be heard by the human ear. A program written in Visual Basic language to extract the data from the wave  file and to activate the  designed device.    

  PDF
Controlled Gene-Accumulation Programming
Najla Al-Saati, Nidhal Al-Assady (Author)
March 2009 ,Pages 63-79

Abstract: A full description of a new novel method proposed for Automatic Programming is brought forward in this work. Controlled Gene-Accumulation programming is a method that is purely inspired by concepts of nature. Research will show that this method provide a better overall performance especially due to the isolation of terminals from functions. Chromosome flip folding is a new crossover operator introduced in this work; it will prove to be efficient in introducing new genetic material.             A new stage is added to the evolutionary process along with mutation, transposition and recombination, the stage is inspired from natural inoculation with two new operators: vaccines and serums, these two operators proved to have a huge effect on evolving systems by ensuring the death of weak individuals and survival of the fittest with the addition of enforced immunity of the system.             Investigations of this approach proved its superiority over other methods in various aspects, it is in a way controlled to adapt to rule complexity and the production of minimal chromosomal encodings as the chromosomes all have varying lengths genes. It has a much faster execution time compared to the well-known Gene Expression Programming method.  

  PDF
Improving Gene Expression Programming Method
Najla Al-Saati, Nidhal Al-Assady (Author)
March 2009 ,Pages 81-95

Abstract: In this work the algorithm of Gene Expression Programming (GEP) is investigated thoroughly and the major deficiencies are pointed out. Multiple suggestions for enhancements are introduced in this research aiming at solving the major deficiencies that were investigated. These improvements produced higher success rates and avoid the malfunctioning situations found in GEP. These deficiencies or weak points include: choosing the best parameter settings, using only one linking function, gene flattening problem, illegal operations in genes and lack of function biasing. Improvements suggested the following enhancement features: the Multi-Population feature, the Emergency Mutation feature, and the feature of ComponentBiasing. Tests are carried out using two different symbolic regression problems.  

  PDF
Fingerprint Image Pre- Post Processing Methods for Minutiae Extraction
Fayadh. Abed, Adnan Maroof (Author)
March 2009 ,Pages 97-110

Abstract: A set of reliable techniques is presented in this paper. These techniques include    enhancement and minutiae extraction that involve   the clarity of the ridge and valley structures of the input fingerprint images based on the frequency and orientation of the local ridges and thereby extracting correct minutiae.             Fingerprint image enhancement algorithms are evaluated and implemented to understand how the enhancement algorithm works and how well it is. Two   types of features   are presented in this  job. (i) global ridge associated with central region of the fingerprint and (ii) minutiae associated with local ridge and  furrows structure.  Extraction of minutiae, involves  a series of image enhancement   such as normalization, ridge orientation estimation, filtering, thresholding, thinning and False minutiae removal. After applying  image enhancement and minutiae extraction techniques on a set of images, we took as a sample, the results was perfect. The minutiae has been removed and a results, we got was in  better condition.  

  PDF
Home Automation Management with WLAN (802.11g) and RF Remote Control
Mahmood Majeed, Abdulsattar Khidhir, Firas Yosif (Author)
March 2009 ,Pages 111-124

Abstract: The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless home automation control use two methods, WLAN technology and RF remote control handheld to control selective home devices with integral security and protected system. The devices have been distributed in two rooms, each room has own board, these boards are connected to the desktop personal computer (PC) through one serial port RS-232 via microcontroller. The software consists of Assembly Language for programming microcontroller (AT89C51and AT89C2051) and Visual Basic Language that use to communicate between PC and two boards, also it use to design Graphical User Interface (GUI) which involving all devices needed to display in Home PC screen .  The system is low cost and flexible with the increasing variety of devices to be controlled.    

  PDF
Geometric Analysis of Images for 3D Models Reconstruction
Rou’a Ali, Abdulsatter Khidhir, Mayyada Hammoshi (Author)
March 2009 ,Pages 125-132

Abstract: Determining three-dimensional (x, y, z) to a point exists in the form of three-dimensional images of two-dimensional method is complex and requires high precision to derive the equations that were special to represent the three-dimensional geometric figure who is in fact in this research. To derive the equations for this purpose rely on certain constants in order to properly process the account. These constants is the status of the camera, the reference point in the picture and the distance between the image the camera moves to another.             Applying the equations are extracting values triple with finding the least error rate, which represents the accuracy of work and comparing the result with the real values of reality.  

  PDF
Counter Mode Development for Block Cipher Operations
Ali Sagheer (Author)
March 2009 ,Pages 133-144

Abstract: There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or byte (sometimes even one 32-bit word) at a time. With a block cipher, the same plaintext block will always encrypt to the same ciphertext block, using the same key. With a stream cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. In this paper we introduce three developments of Counter Mode of Operation of Block cipher. These developments merge between advantages of Counter Mode with other Modes. This gives a good secure Modes for General purpose block-oriented transmission Authentication, Random access, Stream-oriented transmission over noisy channel.  

  PDF
Design and Implementation of Computer Network-Based Robotic System Using HTML Language and CGi Scripts
Maan Shaker, Mahmood Majeed, Mahmood Abdullah (Author)
March 2009 ,Pages 145-152

Abstract: A design and implementation of computer network-based robotic system using HTML language and CGI (Common Gateway Interface) scripts is carried out. The network of the implemented system may be either a simple wired LAN or wireless LAN or upgrade network to the Internet. The importance of such a system may arise in industrial applications controlled by remote sensing by many users who are distributed at different locations. The work deploys the development of a remote control of a robotic system through LAN, or wireless LAN or any other networks, and it is based on building an HTTP (Hyper Text Transport Protocol) server which has an ability of receiving orders from clients found on the same local area network, and translate these orders into low level machine functions which will be used to give the robotic system different orders.  

  PDF
Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network
Mohammed Hasan (Author)
March 2009 ,Pages 153-160

Abstract: Wireless internet access based on Wireless Local Area Network (WLAN), such as a wireless-Fidelity (Wi-Fi), or Bluetooth networks will become popular with the next few years. New services will be offered that make use of the location and personal profiles to filter internet access. This paper presents security system for indoor location between two devices the mobile device and computer based (Laptop Computer) on Bluetooth technology. The system programmed by visual basic using the Microsoft® Comm (MSComm) control in combination with the others controls to control too many different USB ports. The Bluetooth access points of a network through using the port USB in the laptop computer for the location system and want to access a Global Services Mobile (GSM) Mobile device attached to the computer through a communicationPort. It can send, receive a file or write a simple message or long message into input to a textbox and, then perform hash operation through using special algorithm to generate and then send it with systemic key.    

  PDF
Building Simple Protection for Wireless-Fidelity Network
Manar Ahmed, Mohammed Hasan (Author)
March 2009 ,Pages 161-168

Abstract: This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM). This module perform Challenge-Respond based on the hash part of MAC by using the hashing operation, this challenge will occur between the administrator, and the group of the customers through wireless network, and then generate and captured MAC address for all computers connect to wireless network detection unspecified MAC address, filtering it from the MAC address spooling according to protocol programmed by Visual Java#.Net. At the first stage the generation of MAC addresses must capture by many wireless networks tools such as AirJack, FakeAp and Wellenreiter, through analysis the traces. Then the programmer identifies the techniques which can be employed the used the capability to detect the anomaly MAC address, which also the user must alert the administrator of the wireless networks, or alert the others his/her friends in same workgroup. Wireless access points have large scale of the security problems, one of them are the suffering the unauthorized access and use. So the administrator or the wireless network should deal with his/her others groups to the specified generation of MAC address, and then registered the newest of the overall MAC address of the wireless network.  

  PDF
Arabic Character Recognition Using Fractal Dimension
Khalil Alsaif, Karam Thanoon (Author)
March 2009 ,Pages 169-178

Abstract: In this work the concepts of the pattern recognition was used to recognize printed Arabic characters, and the Fractal geometric dimension method was used. The input for the system is image, with bitmap format , then the image of character is recognized, and after that it is feeding to the OCR system. A feature space containing the values of the fractal dimension for the letters of Arabic was constructed. These features were used in the recognition phase. In this phase a comparison was made between the values in the feature space and the values of the letter inputs to be recognized, the comparison was done by the minimum Euclidian distance. Results of this work are 75% succeeded. And Matlab 6.5 is used to write the functions and subroutines for this work.  

  PDF
Principle Component Selection for Face Recognition Using Neural Network
Ibrahim Saleh (Author)
March 2009 ,Pages 179-191

Abstract: Face Recognition is an emerging field of research with many challenges such as large set of images,. Artificial Neural Network approach is one of the simplest and most efficient method to overcome these obstacles in developing a system for Face Recognition.. This research deals with both face extraction and recognition, Firstly, Eigenfaces are eigenvectors of covariance matrix, representing given image space. Any new face image can then be  represented as a linear combination of these Eigenfaces which can be found  by Principal Component Analysis (PCA) for face extraction,and by Recurrent (Time Cycling) Back Propagation artificial neural network for face recognition. The whole system was performed by training using 120 color images (40 human faces with 3 poses) and testing using 40 color images. The images were taken from Collection of Facial Images: Faces95 by Computer Vision Science Research Projects. The results indicated  that the proposed method lends itself to good extraction and classification accuracy relative to existing techniques.  

  PDF
Design and Implementation of Router Remote Control System Supporting Static Route Summarization
Ali Ali (Author)
March 2009 ,Pages 193-208

Abstract:          In order to improve and upgrade the performance of devices used in data communications, such devices are particularly Routers, which are used to link computer networks among themselves, and for identification and selection of the shortest ways to access data, this research is designed and programmed for remote controlling and managing a router that links two networks by managing the Route table through controlling Route table contents. This is done by applying Route summarization algorithm for all routes that are defined statically, which aims to reduce the number of table's routes hence, increasing search operation and arise all burdens from the network administrator from route summarization. Also this research gives the ability to the network administrator to administrate and manipulate the router device without using the Telnet service which is always under attacks by the hackers. In this research, Windows Server 2003 Enterprise Edition has been used to convert a computer to a router. The research has been tested on network computers that composed of three computers, one of them is a router used to link two networks, the second computer is supplied by the Router Administration System. The other computer acts as another network. Programming is accomplished using C# programming language, one of the Visual Studio .NET Environment languages.  

  PDF
Authenticated and Secure End-To-End Communication Channel Using SMS Messages
Abdullah Abdullah (Author)
March 2009 ,Pages 209-222

Abstract: One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular and easily adopted communications technology for mobile devices. Users conduct business, disclose passwords and receive sensitive notification reports from systems using this communication technology. SMSs by default are sent in clear text form within the serving GSM (Global System for Mobile communications) network, Over The Air (OTA), and potentially over the public Internet in a predictable format. This allows anyone accessing the GSM system to read, and or modify the SMS content even on the fly.             In this paper, we present an approach mainly consists of two steps, first,  SHA-1 authentication is used to generate a message digest that is combined with previous message digest and a shared secret key to form an initial key stream. Secondly, this key will be used as input to a mathematical equation derived in prefix notation from randomly selected set of operators and functions supported by the software platform extracted from special table. The final key stream is the output of this equation which is a one time pad to encrypt the original message text. Lastly, encrypted SMS message will be sent and a randomized operation will be then applied to that table. A one-time pad, considered to be the only perfectly secure cryptosystem, secures an SMS message for transport over any medium between a mobile device and the serving GSM network and through it too.     

  PDF
Protection Against Internal Intruding using Host Identifier Authentication
Basil Alkhayaat, Abdulsattar khidhir, Omar Ibraheem (Author)
March 2009 ,Pages 223-236

Abstract: Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most effective one is the network firewall. While the firewall protecting the network from the external intruding, it does upward nothing about the internal intruding. Internal intruding or Inside attacks can lead to a big loosing. One of these attacks is attaching an unauthorized host to the network to get benefits of using the network resources provided by the server (like Internet service) or to leak information into the outside. To solve this problem, this paper suggested that two new programs have to be built under windows operating system in a client server model, one at the client and another at the server. The first supplies an authenticated unique host-ID to each packet destined to leave the network, while the latter verifies these information, allowing the authenticated packet to pass into its destined while dropping and documenting the unauthorized one. This work is considered as a logical extension of the conventional network firewall and can be installed with any of these firewalls. While the conventional firewall is protecting against outside attacks, this work is protecting against one of these inside attacks.  

  PDF
Design and Implementation of Stream Cipher Using Neural Network
Siddeq Ameen, Mazin Othman, Safwan Hasoon, Moyed Al-Razaq (Author)
March 2009 ,Pages 237-249

Abstract: The centaral problem in stream cipher cryptograph is the  the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable in cryptography because it is impossible, given a reasonable segment of its signals and computer resources, to find out more about them. Pseudorandom bit generators have been widely used to construct these sequences. The paper presents a PN sequence generator that uses neural network. Computer simulation tests have been carried out to check  the  randomness  of the generated  through statistical tests. There tests have shown the successful PN sequence generator passes all the recommended tests. The paper also proposes and validates the data encryption and decryption process using neural network instead of using traditional methods (Exclusive or). This task increases the difficulty in the breaking the cipher.    

  PDF
Face Recognition and Determination in Color Images
Manar Kashmola, Najim Altahhan (Author)
March 2009 ,Pages 13-29

Abstract: The aim of this study is face detection in colored images (single or multiple faces) where an algorithm based on skin color information, in addition to face features like eyes and mouth, are used. The study deals with the effect of colored images type in test where (jpg, jpeg) images are used. Different images of persons were obtained from the internet and different images background and their effect on face detection within the image are studied. Two groups of colored images, photographic images taken by a photographic camera and digital images taken by a digital camera are also studied. A comparison between the results of the two groups concerning face detection is made. This comparison is based on the face orientation angle for each image in the two groups using the frontal and side (right, left) template.  

  PDF
Segmentation of Brain Tumor Images Using Genetic Algorithms
Mohameed Nathem, Manar Kashmola, Dhuha Abdullah (Author)
March 2009 ,Pages 31-45

Abstract: In this research, the brain images resulting from computerized tomography  (CT) have been used in order to determine the tumor area in the brain. the steps started by preprocessing operation to the image before inputting it to algorithm .the image was converted to binary image in order to segment the image, later on into equal segments ,then the correlation coefficient  was found among these segments ,these values used as fitness function in the genetic algorithm in order to different iate between segments ,the result of the genetic algorithm was segment numbers which will be merged to form the sub-images ,then continuing these steps till determining the tumor approximate location. Another approach of image segmentation has been used without using the genetic algorithm by choosing the segments though a certain condition not randomly. Satisfying results have been reached in both approaches, but in different execution times. In both approaches tumor location was determined approximately, as a result the genetic algorithm was succeeded in about 85% while the first algorithm determine 80% of tumor locations.  

  PDF
Use Artificial Neural Network Neococcontron in Distinguishing Handwritten Arabic Numerals
Laheeb Ibrahim, Hanan Ali (Author)
March 2009 ,Pages 47-59

Abstract: Artificial Neural Networks have wide applications now a day, Among these are in the field of pattern recognition and image processing. This is due to the fact that it has a good performance and advanced mathematical computation power particularly its flexible adaptation to parallelism technique. That is why this research is conducted for the recognition of hand written Arabic numbers (0 - 9). Recognition artificial neural network is simulated the human eye for tracking the property of entered image (Feature extractor). The systems  examined on  samples of Arabic  numbers its performance  was found to be balanced in spite of the variations in position and direction of the recognized number.  

  PDF
Detect Flame Fire Using Fractal Geometry in Color Digital Images
Laheeb Ibrahim, Khalil Alsaif, Hasan Alnima (Author)
March 2009 ,Pages 61-78

Abstract: Pattern recognition, which takes features extraction as a basis for decision making, is considered as of the cutting-edge technologies. It is used in various useful applications such as tracking and monitoring objects. In this research an algorithm for detecting fire flame in the colored digital images is built. The algorithm basically depends an extracting the features of flame spots with all its spectra with reference to fractal dimension. The input image is cut into a set of equal dimension squares, then fractal dimension for each square is calculated using two-dimension variation algorithm, which is are of the algorithms used in calculating fractal dimension. Fractal dimension values in the output fractal dimension array are analyzed to detect flame spots using the computer through determining the common features and characteristics of the flame with all its spectra.  

  PDF
A Comparative Study between Traditional Learning and Virtual Learning (Design a Virtual Learning System)
Maisireem Al-Sayeg (Author)
March 2009 ,Pages 79-89

Abstract: Virtual learning is an essential source of growth in scientific in recent years by standing in the basis of many of the virtual learning programs. In this research virtual learning program has been designed (geographical for First primary school) as the first building block in opening electronic and virtual schools in Iraq to play a role in changing the mechanisms of education and teaching methods, which facilitated the use of modern techniques of voice and image programs and databases to provide classes in School anywhere in the world, for a study out of school  is necessary in the educational process.             Identification has been done to determine the importance of virtual learning on 25 teachers on the subject of geographical and 100 students from first primary school of different schools in the city of Mosul, the results showed the importance of the Internet and computer and virtual learning in the development of learning process.  

  PDF
Using Hebbian Network for Cipher
Amera Badran, Nidal Al-Asadi (Author)
March 2009 ,Pages 91-101

Abstract: This research contains two parts, in the first part, a ciphering system is built using the classical Hebbian network to protect data against many expected threats  during the transfer of the data. In the second part, deciphering has been built by using the Hebbian neural network.  The time has been calculate for both cipher and decipher. In the ciphering process, a Hebbian network has been developed  through a qualitative primary weight which has large value. Then, an equation has been applied to minimize the weight matrix. Here, The idea of  Stream Ciphering has been used so as to feed  the network entries at the ciphering stage. The work has been applied by using (Visual Basic) language, issue (6.0) with the Object Oriented Programming (OOP) on a computer of the (P III, 600MHz) type.  

  PDF
Pulmonary Tuberculosis Diagnosis Using Artificial Neural Networks
Karam Thanoon, Mohammed Hamdi (Author)
March 2009 ,Pages 103-114

Abstract: This research can detecting the Tuberculosis by using the artificial neural networks, the idea of this research is to design a system that receive the information of patient and give these information to Hamming and Maxnet network which doing the comparison between these information with constant values of human body that stored in network. The system is implemented about many humans (infected and not infected) which has been entered their information to the data base of system, and programmed the system by using visual basic 6.0 with Microsoft access software to build the data base.  

  PDF
Hiding in Text using Information Integrity Service
Dujan Taha, Ahmed Nori, Yaseen Ismaiel (Author)
March 2009 ,Pages 115-122

Abstract: Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information. The widespread adoption of electronic distribution of copyrighted material is accompanied by illicit copying and illicit distribution. This is why people used steganography. Steganography is the art of hiding transmitting data through apparently innocuous carriers in an effort to conceal the existence of the data.             The carrier can be anything used to transfer information, including for example: wood or state tablets, hollow heels, images under stamps, tiny photographs, or word arrangements. Digital carriers include: disk space, disk partitions, text, e-mail, audio, images, and video. In this paper, we propose a new conceptual framework for text file steganography by using integrity tool. Hash function was used to produce a checksum.  

  PDF
Using the Petri Network to Organize Resource Sharing between Two Processors
Firas Al-Abadi (Author)
March 2009 ,Pages 123-133

Abstract: With the development of information technology and the use of its applications as an essential aspect in almost all patterns of life especially in fields of analysis and real time systems, a problem of controlling resources appeared and how to provide the system with the resources at a proper time to avoid the system to be failed or vanishes , a state called a deadlock. This research aims to use the modern concept of Petri Net to provide synchronization and coordination between systems having more than one processor , sharing  a specific resources at a same time. The research concentrates on capability of applying feed backing concept of Petri Net to achieve a good synchronization between different systems to work efficiently without being in deadlock.  

  PDF
Finding the Amount of the Occupation of a Specific Datum in a ‎Database File
Rayan Alkhayat (Author)
March 2009 ,Pages 135-147

Abstract: This research includes constructing a software system to find the amount of a specific datum occupation in a database file using fractal dimension ,  Box Counting method was used to calculate the fractal dimension with some treatments of it are performed to qualify it for practical application and fitness for the use with database files. Because of its high performance with databases,  Microsoft Visual FoxPro 9.0 was used to create the executable application. Students degrees database was used as a case study for the given research .  

  PDF