DSpace Repository

Browsing Scientific Published Papers by Title

Browsing Scientific Published Papers by Title

Sort by: Order: Results:

  • Romi, Ismail M.; Romi, Ismail M. (Journal of Internet Banking and Commerce, 2015-02-20)
    Banks operates in a dynamic environment, with a continuous pressure from customers, and stakeholders. As well as set of challenges from banks environments and technological advancements. To determine technological ...
  • Arman, Nabil (2013)
    Traditionally, deductive databases are designed as extensions to relational databases by either integrating a logic programming language, such as PROLOG, with a conventional relational database system that provides storage ...
  • El Assad, Safwan; Farajallah, Mousa (Signal Processing: Image Communication-Elsevier, 2016-02-29)
    During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem ...
  • Arman, Nabil (2006)
    Relational Database Schemas represent the database schema as a collection of relation schemas. Sometimes, these relation schemas are poorly designed and need to be decomposed in an attempt to choose "good" relation schemas. ...
  • Hashlamon, Iyad; Gülhan, Mehmet Mert; Ayit, Orhan; Erbatur, Kemalettin (Robotica, 2015-11-03)
    This paper proposes a new approach for slip prediction of walking biped robots. The slip prediction is a measurement-based and friction behavior-inspired approach. A measurement-based online algorithm is designed to estimate ...
  • Carra, Damiano; Michiardi, Pietro; Salah, Hani; Strufe, Thorsten (IEEE, 2013-09-01)
    Motivated by the popularity of content distribution and file sharing applications that nowadays dominate Internet traffic, we focus on the incentive mechanism of a very popular, yet not very well studied, peer-to-peer ...
  • Roos, Stefanie; Salah, Hani; Strufe, Thorsten (Ad­vances in Com­put­er Com­mu­ni­ca­tions and Net­works, 2017)
    The family of Kademlia-type systems represents the most efficient and most widely deployed class of Internet-scale distributed systems. Its success has caused plenty of large-scale measurements and simulation studies, ...
  • Karama, Muneer Jebreel (2003)
    The aim of this article is to develop the issue of operation sense of fractions through the conditions in real-world for the students in 7th grade, so this advancing students’ mathematical thinking in every day mathematics ...
  • Arman, Nabil (2007)
    In this study, a parallel algorithm to generate all maximal interval groups form a given interval set is presented. The algorithm makes use of intraoperation parallelism to speed up the generation of the maximal groups. ...
  • Arman, Nabil (4th International Multiconference on Computer Science and Information Technology (CSIT2006), 2006)
    Interval databases queries are computationally intensive and lend themselves naturally to parallelization to speed up the solution of such queries. In this paper, a parallel algorithm to generate all maximal interval groups ...
  • Arman, Nabil (4th International Multiconference on Computer Science and Information Technology (CSIT2006), 2006)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). Linear ...
  • Arman, Nabil (2006 International Conference on Information and Knowledge Engineering (IKE'06), 2006)
    The expressive power and intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledge-base systems (deductive database systems). ...
  • Arman, Nabil (2006)
    The intelligence of traditional database systems can be improved by recursion. Using recursion, relational database systems are extended into knowledgebase systems (deductive database systems). Linear recursion is the ...
  • Arman, Nabil; Khamayseh, Faisal (International Journal of Electrical and Computer Engineering (IJECE), 2015-09-01)
    Given a weighted directed graph G=(V;E;w), where w is non-negative weight function, G’ is a graph obtained from G by an application of path compression. Path compression reduces the graph G to a critical set of vertices ...
  • Karama, Muneer Jebreel; Karama, Muneer Jebreel (2006)
    In [1] I studied the concept of Smarandache n-expressions, for example I proposed formulas, found solutions, proposed open questions, and conjectured, but all for the fixed 3, and 2 numbers, but what will happen if these ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011-06-01)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Madia, Mauro; Arafah, Diya; Zerbst, Uwe (Elsevier, 2014-03-13)
    The yield or limit load is a key parameter with respect to the accuracy of flaw assessment based on R6 type procedures such as the R6 routine, the SINTAP and FITNET method, the standard BS 7910 and others. In a number ...
  • Arman, Nabil; Daghameen, Khalid (2010)
    Object-Oriented development methodology is currently the main trend in software industry. Many tools were introduced to aid in the analysis and design phases of the object-oriented development methodology. However, tools ...
  • Farajallah, Mousa; Hamidouche, Wassim; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Image Processing (ICIP), 2015-09-27)
    In this paper we investigate privacy protection for the HEVC standard based on the tile concept. Tiles in HEVC enable the video to be split into independent rectangular regions. Two solutions are proposed to encrypt the ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...

Search DSpace


Browse

My Account