DSpace Repository

Scientific Published Papers

Scientific Published Papers

 

Recent Submissions

  • Romi, Ismail M.; Romi, Ismail M. (Journal of Internet Banking and Commerce, 2015-02-20)
    Banks operates in a dynamic environment, with a continuous pressure from customers, and stakeholders. As well as set of challenges from banks environments and technological advancements. To determine technological ...
  • Hijawi, Hamza; Saheb, Mahmoud (Computer and Information Science, 2015-08-01)
    Sequential pattern mining in data streams environment is an interesting data mining problem. The problem of finding sequential patterns in static databases had been studied extensively in the past years, however mining ...
  • Madia, Mauro; Arafah, Diya; Zerbst, Uwe (Elsevier, 2014-03-13)
    The yield or limit load is a key parameter with respect to the accuracy of flaw assessment based on R6 type procedures such as the R6 routine, the SINTAP and FITNET method, the standard BS 7910 and others. In a number ...
  • Muneer Jebreel Karama (2017-04-18)
    The aim of this paper is to generalize B.Berggren Matrices, and Price Matrices through a general formula for matrices power; so B.Berggren Matrices and Price Matrices will become a special case when the power of a matrix ...
  • Salah, Hani; Alfatafta, Mohammed; SayedAhmed, Saed; Strufe, Thorsten (IEEE (42nd IEEE Conference on Local Computer Networks, LCN), 2017)
    Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a ...
  • Paul, Thomas; Lochschmidt, Niklas; Salah, Hani; Datta, Anwitaman; Strufe, Thorsten (IEEE (26th International Conference on Computer Communications and Networks (ICCCN)), 2017-08-01)
    P2P-based social networking services are severely challenged by churn and the lack of reliable service providers, especially considering the high frequency of posts and profile updates of their users. Improved consistency ...
  • Khamayseh, Faisal; Sharaf Eldin, Ahmed; El-Fangary, Laila (Palestine Polytechnic University, 2007-09-01)
    Current computer technology and various multimedia tools play an increasingly important and effective role in enhancing the learning process. However, current educational multimedia systems still suffer from a major drawback ...
  • Khamayseh, Faisal; Sharaf Eldin, Ahmed; El-Fangary, Laila (Egyptian Computer Society (ECS), 2009-05-01)
    While current e-learning activities mainly focus on static mode, this paper proposed a simple Active Multimodal Presentation (AMP) application, and evaluated the student achievement in static and active modes. Of the various ...
  • Adm, Mohammad; Garloff, Juergen (Linear and Multilinear Algebra, 2016)
    We consider classes of n-by-n sign regular matrices, i.e. of matrices with the property that all their minors of fixed order k have one specified sign or are allowed also to vanish, k = 1,..., n. If the sign is nonpositive ...
  • Adm, Mohammad; Garloff, Juergen (In: A Panorama of Mathematics: Pure and Applied, Contemporary Mathematics, vol. 658, Amer. Math. Soc.,, 2016)
    A totally positive matrix is a matrix having all its minors positive. The largest amount by which the single entries of such a matrix can be perturbed without losing the property of total positivity is given. Also some ...
  • Adm, Mohammad; Garloff, Juergen; Titi, Jihad (Reliable Computing, 2016)
    This paper considers intervals of real matrices with respect to partial orders and the problem to infer from some exposed matrices lying on the boundary of such an interval that all real matrices taken from the interval ...
  • Adm, Mohammad; Garloff, Juergen; Titi, Jihad (Journal of Mathematical Analysis and Applications, 2016)
    In this paper totally nonnegative (positive) matrices are considered which are matrices having all their minors nonnegative (positive); the almost totally positive matrices form a class between the totally nonnegative ...
  • Adm, Mohammad; Garloff, Juergen (Electronic Journal of Linear Algebra, 2014)
    Totally nonnegative matrices, i.e., matrices having all minors nonnegative, are considered. A condensed form of the Cauchon algorithm which has been proposed for finding a parameterization of the set of these matrices with ...
  • Adm, Mohammad; Garloff, Juergen (Linear Algebra and its Applications, 2013)
    Totally nonnegative matrices, i.e., matrices having all their minors nonnegative, and matrix intervals with respect to the checkerboard ordering are considered. It is proven that if the two bound matrices of such a matrix ...
  • Adm, Mohammad; Garloff, Juergen (Operators and Matrices, 2014-03-01)
    Tridiagonal matrices are considered which are totally nonnegative, i. e., all their minors are nonnegative. The largest amount is given by which the single entries of such a matrix can be perturbed without losing the ...
  • Fawaz, Zeinab; El Assad, Safwan; Farajallah, Mousa; Ayman, Khalil; Lozi, René; Déforges, Olivier (8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013-12-09)
    In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a ...
  • Karama, Muneer Jebreel (2003)
    The aim of this article is to develop the issue of operation sense of fractions through the conditions in real-world for the students in 7th grade, so this advancing students’ mathematical thinking in every day mathematics ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011-06-01)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...

View more