DSpace Repository

Browsing Scientific Published Papers by Title

Browsing Scientific Published Papers by Title

Sort by: Order: Results:

  • Chetto, Maryline; Noura, Hassan; El Assad, Safwan; Farajallah, Mousa (2012 International Conference for Internet Technology and Secured Transactions, 2012-12-20)
    Abstract: A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This ...
  • Aljabari, Ghannam (The 1st National Conference in Teaching and Learning, Palestine Polytechnic University, 2014)
    The purpose of this action research is to find out the impact of using multimedia technology in students’ academic achievements in the introduction to computer course. The action research was implemented on a group of ...
  • Hashlamon, Iyad; Erbatur, Kemalettin (TUBITAK, 2013-12-17)
    The Kalman filter (KF) is used extensively for state estimation. Among its requirements are the process and observation noise covariances, which are unknown or partially known in real-life applications. Uncertain and biased ...
  • Adm, Mohammad; Garloff, Juergen (Electronic Journal of Linear Algebra, 2014)
    Totally nonnegative matrices, i.e., matrices having all minors nonnegative, are considered. A condensed form of the Cauchon algorithm which has been proposed for finding a parameterization of the set of these matrices with ...
  • Khamayseh, Faisal; Arman, Nabil (Journal of Theoretical and Applied Information Technology, 2015-06-10)
    Given a graph G=(V,E,w), where V and E are finite set of vertices and edges respectively, is a directed weighted graph with weights denoted by w(e)>0 for each edge e ∈E. P(s,t) is the shortest path between the given vertices ...
  • Arman, Nabil (2013)
    Production systems have a special value since they are used in state-space searching algorithms and expert systems in addition to their use as a model for problem solving in artificial intelligence. Therefore, it is of ...
  • Karama, Muneer Jebreel (2012)
    This paper Submitted as enrichment material on the possibility of integration of the principles of human rights in Palestinian mathematics text boxes, with a view to sensitizing child rights, through the integration of ...
  • Khamayseh, Faisal (2016-08-01)
    Since the colloquial Arabic is now widespread it is required to describe the collection and classification of a multi-dialectal corpus of Arabic. Nowadays, colloquial multi-dialectal comes in almost country based forms ...
  • Aljabari, Ghannam (The 4th Palestinian International Conference on Computer and Information Technology (PICCIT), Palestine Polytechnic University, 2015)
    With the rise of the Internet of Things (IoT), Voice over IP (VoIP) systems can be integrated into the IoT gateway to communicate with things over a telephone network. Integrating VoIP systems with the IoT will become very ...
  • Arman, Nabil (4th International Arab Conference on Information Technology (ACIT’2003), 2003)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). ...
  • Khamayseh, Faisal; Sharaf Eldin, Ahmed; El-Fangary, Laila (Palestine Polytechnic University, 2007-09-01)
    Current computer technology and various multimedia tools play an increasingly important and effective role in enhancing the learning process. However, current educational multimedia systems still suffer from a major drawback ...
  • Adm, Mohammad; Garloff, Juergen (Linear and Multilinear Algebra, 2016)
    We consider classes of n-by-n sign regular matrices, i.e. of matrices with the property that all their minors of fixed order k have one specified sign or are allowed also to vanish, k = 1,..., n. If the sign is nonpositive ...
  • Adm, Mohammad; Garloff, Juergen (Linear Algebra and its Applications, 2013)
    Totally nonnegative matrices, i.e., matrices having all their minors nonnegative, and matrix intervals with respect to the checkerboard ordering are considered. It is proven that if the two bound matrices of such a matrix ...
  • Adm, Mohammad; Garloff, Juergen (Operators and Matrices, 2014-03-01)
    Tridiagonal matrices are considered which are totally nonnegative, i. e., all their minors are nonnegative. The largest amount is given by which the single entries of such a matrix can be perturbed without losing the ...
  • Adm, Mohammad; Garloff, Juergen (In: A Panorama of Mathematics: Pure and Applied, Contemporary Mathematics, vol. 658, Amer. Math. Soc.,, 2016)
    A totally positive matrix is a matrix having all its minors positive. The largest amount by which the single entries of such a matrix can be perturbed without losing the property of total positivity is given. Also some ...
  • Hashlamon, Iyad; Erbatur, Kemalettin (Robotica, 2014-11-05)
    This paper proposed a new approach for the joint friction estimation of non-slipping walking biped robots. The proposed approach is based on the combination of a measurement-based strategy and a model-based method. The ...
  • Roos, Stefanie; Salah, Hani; Strufe, Thorsten (arXiv, 2014-04-27)
    Discovery of nodes and content in large-scale distributed systems is generally based on Kademlia, today. Understanding Kademlia-type systems to improve their performance is essential for maintaining a high service quality ...
  • Chetto, Maryline; El Assad, Safwan; Farajallah, Mousa (International Journal of Internet Technology and Secured Transactions, 2014-01-01)
    A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This issue has a ...
  • Fawaz, Zeinab; El Assad, Safwan; Farajallah, Mousa; Ayman, Khalil; Lozi, René; Déforges, Olivier (8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013-12-09)
    In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a ...
  • Salah, Hani; Wulfheide, Julian; Strufe, Thorsten (IEEE, 2015-04-26)
    Named-Data Networking (NDN) is a promising architecture for future Internet. However, routers and content providers in NDN can be targets for a new DDoS attack called the Interest Flooding Attack (IFA). As a consequence, ...

Search DSpace


Browse

My Account