DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Zuol, Mahmuod; Al-Shaer, Mohammad; Hmied, Ibrahim (جامعة بوليتكنك فلسطين - كلية الهندسة - ميكانيك, 2018-12-01)
    Saybolt Universal Viscometer is used to measure the viscosity of liquids by measuring the time required in second for 60 milliliters of the tested liquid between 40 °C and 100 °C, to pass through a standard orifice. ...
  • Qabajeh, Liana (University of Malaya, 2012)
    Mobile Ad-Hoc NETworks (MANETs) are wireless multi-hop networks formed by a set of mobile nodes in a self-organizing way without requiring already established infrastructure. Along with their traditional uses such as ...
  • Qudaimat, Ali J. (International Institute for Educational Planning - UNESCO, Paris, France, 1999-05)
    The school building is one of the important elements in the educational process, and it is the place where the teaching-learning process activities run. Also, the situation of the school environment and building has an ...
  • Alsalamen, Rihabb; Shahin, Ghassan Omar (The International Conference on new Trends in Computing Sciences (ICTCS2017), 2017-10-11)
    Researchers have established a concrete and solid ground for web forms design and their usability testing since the nineties. However, since the dramatic shift towards devices that carries a varied set of properties, such ...
  • Khatib, Imad; Khamayseh, T.; Shweiki, M.; Hani, S.; Khashan, K.; Althiabeh, M. (Journal of Energy and Power Engineering, 2011-01-01)
    The scarcity of potable water added more pressure on the Palestinian and is considered obstacles in planning for sustainable development. It is so important to find alternatives that have no adverse effect on the environment ...
  • Farajallah, Yafa; Mujahed, Diana (جامعة بوليتكنك فلسطين - علم حاسوب, 2020-03-01)
    Recently, we have recognized that people misuse their used items by either throwing them away or keeping them without getting benefit of them. Most of them wish to get rid of their used items in a proper way, but they ...
  • Sarahneh, Sanaa (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Electronic data interchange can be classi ed as one of the important areas of information technology, where the need for data sharing increasingly required in almost every eld such as health-care, e-government, e-commerce ...
  • Abdoun, Nabil; El Assad, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforges, Olivier; Khalil, Mohamad (IEEE, 2016)
    Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (2011)
    Ad-Hoc networks are decentralized wireless networks. A fundamental problem in Ad-Hoc networks is finding a secure and correct route between a source and a destination efficiently. The need for scalable and energy efficient ...
  • Amro, Manar; Mahmoude, Aisar; mohamad, Sabreen; Naema, Ala’a (جامعة بوليتكنك فلسطين , كلية الهندسة , ميكانيك, 2014-05-31)
    Ther increasing number of cars every year causes many problems, which affects the life of people everywhere, and increase the need of more and bigger parks, and more time is needed to find a place for a car to park. Our ...
  • Salahat, Fahed H.; Martinez-Vazquez, P. (Institute of Research Engineers and Doctors IRED, 2014-11-21)
    A qualitative assessment of seismic effects on a regular building located in Palestine is presented. The assessment is based on two distinct approaches, one by following recommendations from the International and Uniform ...
  • Al-Shreef, Shrouq (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    In recent days, the fast spread of web services in our businesses and day-to-day lives has made QoS a very important aspect for both the service provider and the consumers. The consumers prefer to deal with the best web ...
  • Natsheh, Sahar (Palestine Polytechnic University (PPU), 2018-12-01)
    يختلف تشفير الصور اختلافا كبيرا عن تشفير النص نظرا لسعة البيانات المجمعه والتكرار العالي للبيانات في الصور والارتباط العالي بين البيانات في الصورة زبالتالي يصعب استخدام الطرق التقليدية في تشفير الصور حيث ان التسلسلات ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Qumsieh, Rawan (جامعة بوليتكنك فلسطين - معلوماتية, 2017-11-01)
    Image encryption is much different from that of the texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to be used for image encryption as their pseudo-random ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Abuzer, Ahmad; Tartory, Hussain (جامعة بوليتكنك فلسطين - كلية الهندسة - ميكانيك, 2009-06-01)
    This system represents a mechatronic system, which contains all the essential components, to be considered a complete mechatronic system. In addition to that, this system represents a challenge in control and implementation, ...
  • Nassar, Ibrahim; Khamayseh, Faisal (NNGT Int. J. on Software Engineering, 2015-02-01)
    Requirement Engineering is currently one of the main directions in software research and applications. The traditional design methods of creating UML models have a high cost and long time. Activity diagram is an important ...
  • Qawasmih, Naseem; Abu-Awad, Ahmed (جامعة بوليتكنك فلسطين - كلية الهندسة - ميكانيك, 2005-05-01)
    This project is to design and build a wrapping machine to wrap pallets with a stretch film (shrinkage) film which is a reprogrammable machine and it can do that in an automatic operation with a predetermined a number of ...

Search DSpace

Browse

My Account