DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Arman, Nabil (2007)
    In this study, a parallel algorithm to generate all maximal interval groups form a given interval set is presented. The algorithm makes use of intraoperation parallelism to speed up the generation of the maximal groups. ...
  • Arman, Nabil (4th International Multiconference on Computer Science and Information Technology (CSIT2006), 2006)
    Interval databases queries are computationally intensive and lend themselves naturally to parallelization to speed up the solution of such queries. In this paper, a parallel algorithm to generate all maximal interval groups ...
  • Arman, Nabil (4th International Multiconference on Computer Science and Information Technology (CSIT2006), 2006)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). Linear ...
  • Arman, Nabil (2006 International Conference on Information and Knowledge Engineering (IKE'06), 2006)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). ...
  • Arman, Nabil (2006)
    The intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledgebase systems (deductive database systems). Linear recursion is the ...
  • Arman, Nabil; Khamayseh, Faisal (International Journal of Electrical and Computer Engineering (IJECE), 2015-09-01)
    Given a weighted directed graph G=(V;E;w), where w is non-negative weight function, G’ is a graph obtained from G by an application of path compression. Path compression reduces the graph G to a critical set of vertices ...
  • دحيدل, بيان; القاعود, منار; حمامدة, وجدان (جامعة بوليتكنك فلسطين, 2011-06-01)
    يهدف هذا المشروع الى تحليل نظام ارشفة بيانات المرضى في مستشفى يطا الحكومي القادر على التعامل مع الكم الهائل من البيانات الخاصة بالمرضى حيث يختص مجال عمل هذا المشروع بقسم التسجيل الخاص بالمشفى ويوفر هذا النظام الية متقنة ...
  • Karama, Muneer Jebreel; Karama, Muneer Jebreel (2006)
    In [1] I studied the concept of Smarandache n-expressions, for example I proposed formulas, found solutions, proposed open questions, and conjectured, but all for the fixed 3, and 2 numbers, but what will happen if these ...
  • الخياط, عدنان ماجد; جواعدة, سلطان عبد الحميد; حنيحن, احمد خليل (جامعة بوليتكنك فلسطين, 2016-06-01)
    اثرت التكنولوجيا في تطوير الشــــــركات على اختالف أنواعها، فقد عملت على تحســـــين اداءها وتنظيم جهودها وســـــهلت للزبائن الوصول الى خدماتها بشكل الكتروني وبالتالي تقليل الوقت والتكلفة وتوفير بيئة عمل متطورة وفعالة. يعتبر ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011-06-01)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Al-Ajrami, Mariam Ishaq Khamis (Palestine Polytehnic University & Bethlehem University, 2014-09-01)
    Background: The phosphatase and tensin homolog (PTEN) gene, is a tumor suppressor gene located on chromosome 10q23. Several studies showed that 30-40% of sporadic breast cancer cases show a loss of PTEN protein levels due ...
  • Madia, Mauro; Arafah, Diya; Zerbst, Uwe (Elsevier, 2014-03-13)
    The yield or limit load is a key parameter with respect to the accuracy of flaw assessment based on R6 type procedures such as the R6 routine, the SINTAP and FITNET method, the standard BS 7910 and others. In a number ...
  • Arman, Nabil; Daghameen, Khalid (2010)
    Object-Oriented development methodology is currently the main trend in software industry. Many tools were introduced to aid in the analysis and design phases of the object-oriented development methodology. However, tools ...
  • Anati, Areen Abduljawwad; Zedat, Threer Jehad (Palestine Polytehnic University, 2014-01-01)
    تقوم فكرة هذا المشروع على انشاء نظام لشبكة بحيثة بحيث يقوم كل من الاساتذة والطلاب بتبادل المعلومات والابحاث المحملة على الموقع الالكتروني كما ان يمكنهم التواصل بشكل سهل ومفتوح والتعرف على احدث الابحاث واستخدام الشبكة في ...
  • Farajallah, Mousa; Hamidouche, Wassim; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Image Processing (ICIP), 2015-09-27)
    In this paper we investigate privacy protection for the HEVC standard based on the tile concept. Tiles in HEVC enable the video to be split into independent rectangular regions. Two solutions are proposed to encrypt the ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Nassar, Ibrahim; Khamayseh, Faisal (NNGT Int. J. on Software Engineering, 2015-02-01)
    Requirement Engineering is currently one of the main directions in software research and applications. The traditional design methods of creating UML models have a high cost and long time. Activity diagram is an important ...
  • Hijawi, Hamza; Saheb, Mahmoud (Computer and Information Science, 2015-08-01)
    Sequential pattern mining in data streams environment is an interesting data mining problem. The problem of finding sequential patterns in static databases had been studied extensively in the past years, however mining ...

Search DSpace

Browse

My Account