DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Carra, Damiano; Michiardi, Pietro; Salah, Hani; Strufe, Thorsten (IEEE, 2013-09-01)
    Motivated by the popularity of content distribution and file sharing applications that nowadays dominate Internet traffic, we focus on the incentive mechanism of a very popular, yet not very well studied, peer-to-peer ...
  • Roos, Stefanie; Salah, Hani; Strufe, Thorsten (Ad­vances in Com­put­er Com­mu­ni­ca­tions and Net­works, 2017)
    The family of Kademlia-type systems represents the most efficient and most widely deployed class of Internet-scale distributed systems. Its success has caused plenty of large-scale measurements and simulation studies, ...
  • Dweik, Saed 'Mohammad Yaser; Tamimi, Deeb Husni Deeb (Palestine Polytehnic University, 2012-05-01)
    Nowadays several life aspects aim to use technology to facilitate work, speed it up, and as an attempt to cope with this trend in the medical sector, there were some computerized system which assist medical work by using ...
  • Karama, Muneer Jebreel (2003)
    The aim of this article is to develop the issue of operation sense of fractions through the conditions in real-world for the students in 7th grade, so this advancing students’ mathematical thinking in every day mathematics ...
  • Arman, Nabil (2007)
    In this study, a parallel algorithm to generate all maximal interval groups form a given interval set is presented. The algorithm makes use of intraoperation parallelism to speed up the generation of the maximal groups. ...
  • Arman, Nabil (4th International Multiconference on Computer Science and Information Technology (CSIT2006), 2006)
    Interval databases queries are computationally intensive and lend themselves naturally to parallelization to speed up the solution of such queries. In this paper, a parallel algorithm to generate all maximal interval groups ...
  • Arman, Nabil (4th International Multiconference on Computer Science and Information Technology (CSIT2006), 2006)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). Linear ...
  • Arman, Nabil (2006 International Conference on Information and Knowledge Engineering (IKE'06), 2006)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). ...
  • Arman, Nabil (2006)
    The intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledgebase systems (deductive database systems). Linear recursion is the ...
  • Arman, Nabil; Khamayseh, Faisal (International Journal of Electrical and Computer Engineering (IJECE), 2015-09-01)
    Given a weighted directed graph G=(V;E;w), where w is non-negative weight function, G’ is a graph obtained from G by an application of path compression. Path compression reduces the graph G to a critical set of vertices ...
  • دحيدل, بيان; القاعود, منار; حمامدة, وجدان (جامعة بوليتكنك فلسطين, 2011-06-01)
    يهدف هذا المشروع الى تحليل نظام ارشفة بيانات المرضى في مستشفى يطا الحكومي القادر على التعامل مع الكم الهائل من البيانات الخاصة بالمرضى حيث يختص مجال عمل هذا المشروع بقسم التسجيل الخاص بالمشفى ويوفر هذا النظام الية متقنة ...
  • Karama, Muneer Jebreel; Karama, Muneer Jebreel (2006)
    In [1] I studied the concept of Smarandache n-expressions, for example I proposed formulas, found solutions, proposed open questions, and conjectured, but all for the fixed 3, and 2 numbers, but what will happen if these ...
  • الخياط, عدنان ماجد; جواعدة, سلطان عبد الحميد; حنيحن, احمد خليل (جامعة بوليتكنك فلسطين, 2016-06-01)
    اثرت التكنولوجيا في تطوير الشــــــركات على اختالف أنواعها، فقد عملت على تحســـــين اداءها وتنظيم جهودها وســـــهلت للزبائن الوصول الى خدماتها بشكل الكتروني وبالتالي تقليل الوقت والتكلفة وتوفير بيئة عمل متطورة وفعالة. يعتبر ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011-06-01)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Al-Ajrami, Mariam Ishaq Khamis (Palestine Polytehnic University & Bethlehem University, 2014-09-01)
    Background: The phosphatase and tensin homolog (PTEN) gene, is a tumor suppressor gene located on chromosome 10q23. Several studies showed that 30-40% of sporadic breast cancer cases show a loss of PTEN protein levels due ...
  • Madia, Mauro; Arafah, Diya; Zerbst, Uwe (Elsevier, 2014-03-13)
    The yield or limit load is a key parameter with respect to the accuracy of flaw assessment based on R6 type procedures such as the R6 routine, the SINTAP and FITNET method, the standard BS 7910 and others. In a number ...
  • Arman, Nabil; Daghameen, Khalid (2010)
    Object-Oriented development methodology is currently the main trend in software industry. Many tools were introduced to aid in the analysis and design phases of the object-oriented development methodology. However, tools ...
  • Anati, Areen Abduljawwad; Zedat, Threer Jehad (Palestine Polytehnic University, 2014-01-01)
    تقوم فكرة هذا المشروع على انشاء نظام لشبكة بحيثة بحيث يقوم كل من الاساتذة والطلاب بتبادل المعلومات والابحاث المحملة على الموقع الالكتروني كما ان يمكنهم التواصل بشكل سهل ومفتوح والتعرف على احدث الابحاث واستخدام الشبكة في ...
  • Farajallah, Mousa; Hamidouche, Wassim; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Image Processing (ICIP), 2015-09-27)
    In this paper we investigate privacy protection for the HEVC standard based on the tile concept. Tiles in HEVC enable the video to be split into independent rectangular regions. Two solutions are proposed to encrypt the ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...

Search DSpace

Browse

My Account