DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Madia, Mauro; Arafah, Diya; Zerbst, Uwe (Elsevier, 2014-03-13)
    The yield or limit load is a key parameter with respect to the accuracy of flaw assessment based on R6 type procedures such as the R6 routine, the SINTAP and FITNET method, the standard BS 7910 and others. In a number ...
  • Arman, Nabil; Daghameen, Khalid (2010)
    Object-Oriented development methodology is currently the main trend in software industry. Many tools were introduced to aid in the analysis and design phases of the object-oriented development methodology. However, tools ...
  • Anati, Areen Abduljawwad; Zedat, Threer Jehad (Palestine Polytehnic University, 2014-01-01)
    تقوم فكرة هذا المشروع على انشاء نظام لشبكة بحيثة بحيث يقوم كل من الاساتذة والطلاب بتبادل المعلومات والابحاث المحملة على الموقع الالكتروني كما ان يمكنهم التواصل بشكل سهل ومفتوح والتعرف على احدث الابحاث واستخدام الشبكة في ...
  • Farajallah, Mousa; Hamidouche, Wassim; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Image Processing (ICIP), 2015-09-27)
    In this paper we investigate privacy protection for the HEVC standard based on the tile concept. Tiles in HEVC enable the video to be split into independent rectangular regions. Two solutions are proposed to encrypt the ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Nassar, Ibrahim; Khamayseh, Faisal (NNGT Int. J. on Software Engineering, 2015-02-01)
    Requirement Engineering is currently one of the main directions in software research and applications. The traditional design methods of creating UML models have a high cost and long time. Activity diagram is an important ...
  • Hijawi, Hamza; Saheb, Mahmoud (Computer and Information Science, 2015-08-01)
    Sequential pattern mining in data streams environment is an interesting data mining problem. The problem of finding sequential patterns in static databases had been studied extensively in the past years, however mining ...
  • Aljabari, Ghannam; Tamimi, Hashem (Students Innovation Conference, Palestine Polytechnic University, 2012)
    Predicting server load is involved in distributed system applications such as load balancing and load sharing. Applying machine learning based methods for load prediction in distributed system applications can improve the ...
  • Karama, Muneer Jebreel (2004)
    Magic Square, Smarandache Concatenate Magic Squares, Smarandache Prime-Concatenate Magic Squares.
  • Karama, Muneer Jebreel (2005)
    The main purpose of this paper is to introduce new concepts of Smarandache numbers, namely Smarandache Friendly Cube Numbers, and give definitions, curious note, theorem, conjectures, proposed future studies, and ask ...
  • Karama, Muneer Jebreel (2006)
    In [1], C. Ashbacher, studied the Smarandache reverse sequence: 1, 21, 321, 4321, 54321, 654321, 7654321, 87654321, 987654321, 10987654321, 1110987654321,(1) and he checked the first 35 elements and no prime were found. ...
  • Karama, Muneer Jebreel (2006)
    s Smarandache numbers s(n); Partitions P(n); Partitions sets; Smarandache numbers partitions P(s(n)).
  • Karama, Muneer Jebreel (2004)
    I have studied the Smarandache Happy Cube Numbers and I have got some interesting results and facts . I have discovered some open problems a bout the Happy Cube and Smarandache Happy Cube Numbers
  • Unknown author (2006)
    The main purpose of this paper is to introduce new concepts of Smarandache numbers, namely Smarandache Sequence of Unhappy Numbers, and give defin- ition, theorem, and ask open problems.
  • Karama, Muneer Jebreel; Karama, Muneer Jebreel (2005)
    The main purpose of this paper is to introduce new concepts of Smarandache numbers, namely Smarandache Sequence of Unhappy Numbers, and give definition, theorem, and ask open problems.
  • Jaraysa, Tamara Saber (Palestine Polytechnic University & Bethlehem University, 2016-04-01)
    Background: Hearing loss is the most common sensory disorder affecting a high rate of newborns especially in Palestine. Hearing loss incidence increases with the high rate of consanguinity observed in the Palestinian ...
  • Karama, Muneer Jebreel (2005)
    The purpose of this article is to presents 23 Smarandache Identities (SI) (or Facts) with second, three, four, and five degrees. These SI have been obtained by the help of Maple 8(Programming language, see [1]).
  • Arman, Nabil (Jerash University Journal for Research and Studies, 2003)
    This article presents a new approach for generating fault-free rule bases, which have no redundancy, circularity, inconsistency, contradiction/conflict and unreachability. The approach makes use of spanning trees. A new ...

Search DSpace


My Account