DSpace Repository

Browsing Scientific Published Papers by Title

Browsing Scientific Published Papers by Title

Sort by: Order: Results:

  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Nassar, Ibrahim; Khamayseh, Faisal (NNGT Int. J. on Software Engineering, 2015-02-01)
    Requirement Engineering is currently one of the main directions in software research and applications. The traditional design methods of creating UML models have a high cost and long time. Activity diagram is an important ...
  • Hijawi, Hamza; Saheb, Mahmoud (Computer and Information Science, 2015-08-01)
    Sequential pattern mining in data streams environment is an interesting data mining problem. The problem of finding sequential patterns in static databases had been studied extensively in the past years, however mining ...
  • Aljabari, Ghannam; Tamimi, Hashem (Students Innovation Conference, Palestine Polytechnic University, 2012)
    Predicting server load is involved in distributed system applications such as load balancing and load sharing. Applying machine learning based methods for load prediction in distributed system applications can improve the ...
  • Karama, Muneer Jebreel (2004)
    Magic Square, Smarandache Concatenate Magic Squares, Smarandache Prime-Concatenate Magic Squares.
  • Karama, Muneer Jebreel (2005)
    The main purpose of this paper is to introduce new concepts of Smarandache numbers, namely Smarandache Friendly Cube Numbers, and give definitions, curious note, theorem, conjectures, proposed future studies, and ask ...
  • Karama, Muneer Jebreel (2006)
    In [1], C. Ashbacher, studied the Smarandache reverse sequence: 1, 21, 321, 4321, 54321, 654321, 7654321, 87654321, 987654321, 10987654321, 1110987654321,(1) and he checked the first 35 elements and no prime were found. ...
  • Karama, Muneer Jebreel (2006)
    s Smarandache numbers s(n); Partitions P(n); Partitions sets; Smarandache numbers partitions P(s(n)).
  • Karama, Muneer Jebreel (2004)
    I have studied the Smarandache Happy Cube Numbers and I have got some interesting results and facts . I have discovered some open problems a bout the Happy Cube and Smarandache Happy Cube Numbers
  • Unknown author (2006)
    The main purpose of this paper is to introduce new concepts of Smarandache numbers, namely Smarandache Sequence of Unhappy Numbers, and give defin- ition, theorem, and ask open problems.
  • Karama, Muneer Jebreel; Karama, Muneer Jebreel (2005)
    The main purpose of this paper is to introduce new concepts of Smarandache numbers, namely Smarandache Sequence of Unhappy Numbers, and give definition, theorem, and ask open problems.
  • Karama, Muneer Jebreel (2005)
    The purpose of this article is to presents 23 Smarandache Identities (SI) (or Facts) with second, three, four, and five degrees. These SI have been obtained by the help of Maple 8(Programming language, see [1]).
  • Arman, Nabil (Jerash University Journal for Research and Studies, 2003)
    This article presents a new approach for generating fault-free rule bases, which have no redundancy, circularity, inconsistency, contradiction/conflict and unreachability. The approach makes use of spanning trees. A new ...
  • Arman, Nabil; Richards, Dana; Rine, David (2004, 2004)
    The development of efficient algorithms to corrects fault is rule-based systems is very crucial in extending the verification and validation of rule sets and in the development of rule-based systems. While it is important ...
  • Paul, Thomas; Stephen, Stephen; Salah, Hani; Strufe, Thorsten (PPU, 2016)
    Online Social Networks (OSNs) have become an essential part of the social life for more than one billion people. OSNs have received a considerable attention from different research communities. OSN providers, however, ...
  • Adm, Mohammad; Garloff, Juergen; Titi, Jihad (Reliable Computing, 2016)
    This paper considers intervals of real matrices with respect to partial orders and the problem to infer from some exposed matrices lying on the boundary of such an interval that all real matrices taken from the interval ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan; Odeh, Mohammad (International Journal of Computer Science and Security (IJCSS), 2011-06-02)
    Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications ...
  • Arman, Nabil; Daghameen, Khalid (2010)
    The trend towards the use of object-oriented methods for software systems development has made it necessary for the use of object-oriented approaches in object-oriented software systems development. Class diagrams ...

Search DSpace


Browse

My Account