Sie sind auf Seite 1von 28

Title of Thesis (1 Below Top Margin) 7 12 Nouns

under which your Thesis should be indeed


!tudents Na"e
(Thesis submitted in partial fulfillment of requirements for the Degree of B.S.
Computer and Information Sciences)
#a$istan %nstitute of &ngineering ' (pplied !ciences)
Nilore*+,-,.) %sla"abad
/uly) 2..0
ii
iii
1eclaration of 2riginality
I hereby declare that the wor contained in this thesis and the intellectual content of
this thesis are the product of my own wor. This thesis has not been pre!iously
published in any form nor does it contain any !erbatim of the published resources
which could be treated as infringement of the international copyright law.
I also declare that I do understand the terms "copyright# and "plagiarism$# and
that in case of any copyright !iolation or plagiarism found in this wor$ I will be held
fully responsible of the consequences of any such !iolation.
Signature% &&&&&&&&&&&&
'uthor#s (ame% Students (ame
i!
3ertificate of (ppro4al
Certified that wor contained in this thesis titled
Title of the thesis
)as carried out by Students (ame under my (our) super!ision and that in my (our)
opinion$ it is fully adequate$ in scope and quality$ for the degree of BS in Computer
and Information Sciences.
(ppro4ed by5
Signature% &&&&&&&&&&&&&&&&&&&
Super!isor#s (ame% (ame
*uly +,,-
Signature% &&&&&&&&&&&&&&&&&&&
Co.Super!isor#s (ame% //..(ame
*uly +,,-
!
1edication
!i
(c$nowledge"ent
0ratitude and endless thans to 'llah 'lmighty$ the 1ord of the )orld$ who bestowed
manind$ the light of nowledge through laurels of perception$ learning and
reasoning$ in the way of searching$ inquiring and finding the ultimate truth. To whom
we ser!e$ and to whom we pray for help.
I feel my pri!ilege and honor to e2press my sincere gratitude to my super!isor
&&&&&&&&&&&&&&& and my co.super!isor &&&&&&&&&&&&&&&&& for all their ind help$
guidance$ suggestions and support through the de!elopment of this pro3ect. )ith due
respect$ I would also lie to than pro3ect panel and coordinator for useful
discussions.
I would lie to e2press my most sincere gratitude and thans to my belo!ed
friends &&&&&&&&&&$ &&&&&&&&&&$ &&&&&&&&&&$ &&&&&&&&&&$ &&&&&&&&&& and
&&&&&&&&&& and all others who were with me in any aspect$ for their o!ernice
support and moti!ations during the wor of this thesis.
I would also lie to than 4aistan Institute of 5ngineering and 'pplied
Sciences for pro!iding !ery conduci!e educational en!ironment.
6inally$ I wish to than my family for all their support and encouragement
during my studies.

!ii
Table of 3ontents
List of Figures------------------------------------------------------------ix
List of Tables---------------------------------------------------------------x
Abstract--------------------------------------------------------------------xi
Chapter 1.Introduction-------------------------------------------------1
1.1. Heading One Point One----------------------------------------------1
1.2. Heading One Point Two----------------------------------------------1
1.3. Heading One Point Three--------------------------------------------2
1.4. Heading One Point Four---------------------------------------------2
1.5. Heading One Point Five----------------------------------------------2
1.6. Heading One Point Six-----------------------------------------------2
1.7. Heading One Point Seven-------------------------------------------3
Chapter 2.Second Chapter---------------------------------------------4
2.1. Heading Two Point One----------------------------------------------4
2.2. Heading Two Point Two----------------------------------------------5
2.2.1. Heading Two Point Two Point One---------------------------------------------------5
2.2.2. Heading Two Point Two Point Two---------------------------------------------------6
2.2.3. Heading Two Point Two Point Three------------------------------------------------7
2.3. Heading Two Point Three--------------------------------------------7
2.4. Heading Two Point One----------------------------------------------7
2.5. Heading Two Point One----------------------------------------------8
Chapter .Third Chapter------------------------------------------------!
Chapter 4.Fourth Chapter--------------------------------------------1"
Chapter #.$esults and %iscussion----------------------------------11
5.1. Heading Five Point One--------------------------------------------11
5.2. Heading Five Point One--------------------------------------------11
Chapter &.Conclusion and Future 'or(---------------------------14
6.1. on!"u#ion-------------------------------------------------------------14
!iii
6.2. Future $or%-----------------------------------------------------------14
$eferences----------------------------------------------------------------1&
i2
6ist of 7igures
7igure 2*15 7igure Two #oint 2ne8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888+
7igure 2*25 7igure Two #oint Two8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888,
7igure 2*95 7igure Two #oint Three8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888-
7igure 2*+5 7igure Two #oint 7our888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888-
7igure 2*,5 7igure Two #oint 7i4e8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888:
2
6ist of Tables
Table ,*1 Table 7i4e #oint 2ne888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888811
Table ,*2 Table 7i4e #oint Two888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888812
Table ,*9 Table 7i4e #oint Three888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888812
Table ,*+ Table 7i4e #oint 7our88888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888812
Table ,*, Table 7i4e #oint 7i4e888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888819
Table ,*- Table 7i4e #oint !i88888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888819
2i
(bstract
7
3hapter 18 %ntroduction
)rite some te2t % During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts about classification techniques were
studied.
1818 ;eading 2ne #oint 2ne
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
Bulleting 7.
Bulleting 7.
Bulleting 7.
Bulleting 7.
1828 ;eading 2ne #oint Two
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
+
1898 ;eading 2ne #oint Three
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied..
18+8 ;eading 2ne #oint 7our
The first chapter presents the general introduction about this thesis. Chapter + gi!es a
brief introduction to the 'rtificial (eural (etwors. Chapter 8 contains theory about
Support 9ector :achine. In chapter ;$ 0enetic 4rogramming is e2plained. '
comparati!e analysis of different methods for classification and conclusions is
presented in chapter <.
18,8 ;eading 2ne #oint 7i4e
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
18-8 ;eading 2ne #oint !i
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
1878 ;eading 2ne #oint !e4en
The first chapter presents the general introduction about this thesis. Chapter + gi!es a
brief introduction to the 'rtificial (eural (etwors. Chapter 8 contains theory about
8
Support 9ector :achine. In chapter ;$ 0enetic 4rogramming is e2plained. '
comparati!e analysis of different methods for classification and conclusions is
presented in chapter <.
;
3hapter 28 !econd 3hapter
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
2818 ;eading Two #oint 2ne
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. =7->.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. =7>$ =7->.
7igure 2*15 7igure Two #oint 2ne
The 6igure +.7 shows a simple neuron ? recei!ing input from @7$ @+$ and @8.
The acti!ation or output signals are 27$ 2+ and 28$ while weights on the connections
@7$ @+ and @8 are w7$ w+$ and w8. The net input to the neuron can be presented by
the equation%
7 7 + + 8 8
& y in w x w x w x = + +
(+.7)
i.e. the net input is the sum of the weighted signals from the neurons @7$ @+
and @8.
<
2828 ;eading Two #oint Two
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
Bulleting 7.
Bulleting 7.
Bulleting 7.
Bulleting 7.
282818 ;eading Two #oint Two #oint 2ne
a8 May be ;eading
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. Such a networ is
depicted in the 6igure +.+ =7->%
7igure 2*25 7igure Two #oint Two
b8 May be ;eading
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. Ane such networ is
shown in 6igure +.8 =+,>.
B
7igure 2*95 7igure Two #oint Three
c8 May be ;eading
)rite some te2t % During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. 'n e2ample is as shown
in 6igure +.;.
7igure 2*+5 7igure Two #oint 7our
282828 ;eading Two #oint Two #oint Two
a8 May be ;eading
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
b8 May be ;eading
C
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
c8 May be ;eading
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
282898 ;eading Two #oint Two #oint Three
Some common acti!ation functions are =7->%
i. Identity function%
( ) f x x for all x =
(+.8)
ii. Binary step function (with threshold D)%
7
( )
,
if x
f x
if x


=

<

(+.;)
iii. Binary Sigmoid%
( )
7
( ) 7
7
x
f x
e

=
+
(+.<)
i!. Bipolar Sigmoid%
( )
+
( ) + ( ) 7 7
7
x
g x f x
e

= =
+
(+.B)
2898 ;eading Two #oint Three
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied
28+8 ;eading Two #oint 2ne
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
The architecture of one such neuron is shown in the 6igure +.< below =7->%
E
7igure 2*,5 7igure Two #oint 7i4e
28,8 ;eading Two #oint 2ne
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
-
3hapter 98 Third 3hapter
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
7,
3hapter +8 7ourth 3hapter
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
77
3hapter ,8 <esults and 1iscussion
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
,818 ;eading 7i4e #oint 2ne
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. =7->.
)rite some te2t % During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied. =7>$ =7->.
,828 ;eading 7i4e #oint 2ne
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
Table ,*1 Table 7i4e #oint 2ne
!train 6oad #otential
,.+7< <<, 7<.,,-
,.++, BCE 7<.,7+
,.++< E,, 7<.,7<
7+
Table <.7 shows results obtained on &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
Table ,*2 Table 7i4e #oint Two
!train 6oad #otential
,.+7< <<, 7<.,,-
,.++, BCE 7<.,7+
,.++< E,, 7<.,7<
Table <.+ shows results obtained on &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
Table ,*9 Table 7i4e #oint Three
!train 6oad #otential
,.+7< <<, 7<.,,-
,.++, BCE 7<.,7+
,.++< E,, 7<.,7<
Table <.8 shows results obtained on &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
Table ,*+ Table 7i4e #oint 7our
!train 6oad #otential
,.+7< <<, 7<.,,-
,.++, BCE 7<.,7+
,.++< E,, 7<.,7<
Table <.; shows results obtained on &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
78
Table ,*, Table 7i4e #oint 7i4e
!train 6oad #otential
,.+7< <<, 7<.,,-
,.++, BCE 7<.,7+
,.++< E,, 7<.,7<
Table <.< shows results obtained &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
Table ,*- Table 7i4e #oint !i
1atasets 1iabetes
6i4er
1isorder
;epatitis Breast 3ancer
No8 of
Neurons in
;idden 6ayers
< 7, < 7, 7,
2utput 6ayers 7 7 7 7
Transfer
7unction for
;idden 6ayers
TanSig 1ogSig TanSig TanSig
7;
3hapter -8 3onclusion and 7uture
=or$
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts about classification techniques were
studied.
-818 3onclusion
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
Bulleting 7.
Bulleting 7.
Bulleting 7.
Bulleting 7.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied In this chapter the
comparison between the accuracy of the e2perimented results and that of gi!en in the
literature will be discussed and based on that comparison some conclusion will be
drawn. 6inally$ the future wor that can be done using this research will be described
-828 7uture =or$
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
7<
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied.
)rite some te2t% During the pro3ect e2isting algorithms were studied and
implemented$ and then their results were compared. 'fter ha!ing the nowledge of
e2isting techniques in the field$ basic concepts were studied In this chapter the
comparison between the accuracy of the e2perimented results and that of gi!en in the
literature will be discussed and based on that comparison some conclusion will be
drawn. 6inally$ the future wor that can be done using this research will be described.
7B
<eferences
=7> '. FerGberg and S.S. 4inter$ H4ublic 4rotection of SoftwareI$ ACM Transaction
Computer Systems$ 9ol. <$ no. ;$ pp. 8C7.8-8$ (o!. 7-EC.
=+> 9Bo2 J =Anline> '!ailable% http%KKwww.!bo2.<,megs.com
=8> :icrosoft Corp.$ H(ew Aptions for :icrosoft Ser!er 1icensing . )indows Ser!er
+,,8 Terminal Ser!icesI =Anline> '!ailable% http%KKwww.microsoft.com
KtechnetKprodtechnolK)in+LTSKdeployKtslicen.msp2
=;> :icrosoft Corp.$ HTechnical Details on :icrosoft 4roduct 'cti!ation for
)indows@4I =Anline> '!ailable% http%KKwww.microsoft.comKtechnetK
prodtechnolKwin2pproKe!aluateK2pacti!.msp2
=<> 'bobe Corp.$ H'll about acti!ation of 'dobe softwareI =Anline> '!ailable5
http%KKwww.adobe.comKacti!ationKmain.html
=B> 'utodes Inc.$ H'utoC'D 4roduct DocumentationI =Anline>. '!ailable%
http%KKusa.autodes.comKads
=C> F. Chang and :. 'tallah$ H4rotecting Software Code by 0uardsI In Proc. 1st
ACM Workshop on igital !ights Management "!M #$$1%$ Springer 1(CS
+8+,$ pp. 7B,.7C<$ +,,+.
=E> C.S. Collberg and C. Thomborson$ H)atermaring$Tamper.4roofing$ and
AbfuscationMTools for Software 4rotection$I I&&& Trans. Software &ng.$ pp.
C8<.C;B$ 'ug. +,,+
=-> )illiam Stallings$ 'etwork Security &ssentials( Applications an) Stan)ar)s$
'ddison )esley 1ongman$ pp. +E.88$ +,,7.
=7,> :icrosoft Lnowledge Base 'rticle$ H'bout :icrosoft 9isio 'cti!ation J +-8;BB$
+-8;B<$ +-C+;C$ +-C+B8$ +-8;CCI =Anline>. '!ailable%
http%KKsupport.microsoft.com
=77> Nicardo$ C.:. ata*ase Systems( Principles+ esign an) Implementation.
:ac:illan Coll Di!$ 7--,.
=7+> :acDonald$ ASP.'&T The Complete !eference$ :c0raw.Fill$ +,,+.
=78> 4ressman$ Software &ngineering , A Practitioner-s Approach$ :c0raw.Fill$
7C
pp% C-.7+7$ +,,7.
=7;> Saadia :umtaG$ Sameen Iqbal$ Irfan Fameed$ H4iracy 4rotected Software
InstallationsI$ =Anline>. '!ailable% http%KKsoftloc.,catch.com.
=7<> :icrosoft Corp.$ HInstrumenting .(5T 6ramewor 'pplications with
System.:anagementI$ .'&T .ramework S/ ocumentation 0 1.1. =CD.NA:>
=7B> Intel Corp.$ Intel Processors =Anline> '!ailable5 www.intel.comKsupport
=7C> National Corp.$ HTest Strategy and Test 4lanI$ !ational 1nifies Process #$$$.
=CD.NA:>