DSpace Repository

Master of Informatics

Master of Informatics

 

Recent Submissions

  • Muhsen, Rami (جامعة بوليتكنك فلسطين - معلوماتية, 2013-09-01)
    The number of people using the Internet as a main source of information is constantly growing. And since the content of some of this information could be fraudulent or unreliable, the need for a method to determine its ...
  • Saleh, Yousef (جامعة بوليتكنك فلسطين - معلوماتية, 2015-08-01)
    Sensitive and confidential data is a requisite for most of the companies, so protection of this data takes great attention by company top management, administrators and IT managers. Data leakage causes negative impact on ...
  • Shawer, Walla (جامعة بوليتكنك فلسطين - معلوماتية, 2015-12-01)
    t As the world tends to increase the use of the Mobile Ad hoc wireless Networks (MANETs), a very important challenging issue is to enhance the performance of the used routing protocols. Each of the routing protocols ...
  • Kurar, Berat (جامعة بوليتكنك فلسطين - معلوماتية, 2015-12-01)
    Proteins’ structures and functions play key roles in organisms’ life. However, it is timely and costly to experimentally determine the attributes of protein sequences. There is a tremendous growth in the amount of available ...
  • Sweiti, Suzanne (جامعة بوليتكنك فلسطين - معلوماتية, 2015-12-01)
    Mobile agents are executing software entities that are capable of migrating from server to server in heterogeneous networks on behalf of network users. Agent systems are subject to failures that result from bad communication, ...
  • Isayed, Anwar (جامعة بوليتكنك فلسطين - معلوماتية, 2015-07-01)
    P300-Speller is one of the most popular paradigm for constructing Brain Computer Interface (BCI) system that allows subjects to type letters by focusing on a specific target on a computer screen. When BCI system recognises ...
  • Tmiezh, Mohammed (Palestine Polytechnic University - معلوماتية, 2018-01-01)
    Abstract Web-applications of today are data-intensive. These applications have databases that store large amount of data, using almost SQL databases. On the other hand, such databases su er from lack of security. One ...
  • Qumsieh, Rawan (جامعة بوليتكنك فلسطين - معلوماتية, 2017-11-01)
    Image encryption is much different from that of the texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to be used for image encryption as their pseudo-random ...
  • sleeman, Jumah (جامعة بوليتكنك فلسطين - معلوماتية, 2018-06-01)
    Author’s Names Disambiguation (AD) is a type of record linkage which is applied to scholarly documents. The ambiguity often occurs due to different factors such as authors who have more than one name version, or group of ...
  • Abu Sabha, Sabha (جامعة بوليتكنك فلسطين - معلوماتية, 2016-05-31)
    Software development life cycle (SDLC) plays a signi cant role in building a good quality software. SDLC has six stages listed as follows: Requirement Analysis, Design, Development, Testing, and Maintenance. The success ...
  • Al-Shreef, Shrouq (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    In recent days, the fast spread of web services in our businesses and day-to-day lives has made QoS a very important aspect for both the service provider and the consumers. The consumers prefer to deal with the best web ...
  • Sowan, Islam (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Enterprise Resource Planning (ERP) systems are widely used systems across the world. At the beginning, they were business organizational technology, which are used to improve companies’ performance and to manage their ...
  • Tamiza, Lubaba (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Choosing suitable track is a key success in the academic and professional life. Whenever the specialization is appropriate for the student; an increase in students' performance is the natural result. In addition, it is an ...
  • Adi, Safa (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Feature selection is one of a key success factor for classification problem in high dimensional datasets. This process aims to select the discriminative subsets of features in order to enhance the classification performance ...
  • Alsalamen, Rihabb (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Researchers have established a concrete and solid ground for web forms de- sign and their usability testing since the nineties. However, since the dramatic shift towards devices that carries a varied set of properties, ...
  • Sarahneh, Sanaa (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Electronic data interchange can be classi ed as one of the important areas of information technology, where the need for data sharing increasingly required in almost every eld such as health-care, e-government, e-commerce ...
  • Qdemat, Ibrahim (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Author name disambiguation is well known problem in digital libraries that aims at identifying the real owner of a scienti c contribution. Author name disambiguation is a challenging problem because of di erent name ...
  • Al-Adrah, Dalal (جامعة بوليتكنك فلسطين - معلوماتية, 2017-05-31)
    Severalstudentssu erfromdyscalculia.Manyresearchandstudieshave beencarriedouttotacklethisproblem.Mostoftheseresearchestriedto identifywhetherastudentsu ersfromdyscalculiaornot,withoutanyfur- ther detailsonthecase.Base ...