DSpace Repository

Master of Informatics

Master of Informatics

 

Recent Submissions

  • Badran, Sultan (جامعة بوليتكنك فلسطين - معلوماتية, 2021-06-01)
    يف ضوء التقدم الذي أحرزه قطاع التكنولوجيا يف جماالت سرعة اإلنرتنت وتطوير اخلدمات السحابية، باإلضافة إىل ادلزايا األخرى اليت توفرىا السحابة مثل ادلوثوقية وسهولة الوصول من أي مكان ويف أي وقت، رأى معظم مالكي البيانات فرصة ...
  • Dbabseh, Esraa (جامعة بوليتكنك فلسطين - معلوماتية, 2021-01-01)
    The Automatic Meter Reading (AMR) for energy consumption is one of the most important issues in smart cities, as meters and electricity companies suffer from insecurity. One of the most common attacks is a denial of ...
  • AL-Jundi, Mohammad (جامعة بوليتكنك فلسطين - معلوماتية, 2021-02-01)
    في هذه الأطروحة، تم اقتراح نموذج تنبؤ لاحتساب الأخطاء في المرحلتين الأوليين من دورة حياة تطوير البرمجيات، للسماح لمديري المشاريع باتخاذ القرار المناسب في الوقت المناسب. تستخدم هذه الأطروحة المقاييس الأكثر ارتباطاً بموثوقية ...
  • Al-Aloul, Samah (جامعة بوليتكنك فلسطين - معلوماتية, 2020-09-01)
    Traffic is the pulse of any city that impacts the social, economic and healthy life of millions of people. Demand prediction, mainly taxi demand prediction, plays an important role in intelligent transportation systems ...
  • Amleh, Deema (جامعة بوليتكنك فلسطين - معماري, 2020-12-01)
    Daylight and access to outside views are key factors to improve the healing environment for patients in the intensive care unit (ICU), which decreases the incidence of delirium. This is essential as well to provide ...
  • Hushlamoun, Sameeha (جامعة بوليتكنك فلسطين - معماري, 2020-12-01)
    The building envelope is the major component that protects the indoor environment against the outdoor atmosphere, and in particular, building facades technologies play a significant role in controlling the indoor ...
  • Attawna, Mahdi (جامعة بوليتكنك فلسطين - معلوماتية, 2020-08-01)
    Computer games are one of the popular fields which use machine learning and artificial intelligence. Many of these games have a large search space, which makes them too vast for even supercomputers to brute force. Seega ...
  • Amro, Fedaa (جامعة بوليتكنك فلسطين - معلوماتية, 2019-03-01)
    Sentiment Analysis can be achieved using lexicons and machine learning methods to identify the sentiment of a content and opinion mining of a text. With the large amount of news being generated nowadays through various ...
  • Amro, Zaher (جامعة بوليتكنك فلسطين - معلوماتية, 2019-09-01)
    The increasing interest in data security has led to the emergence of the security assessment metrics. These metrics work generally with stream data; they give a proper indication about the security level of their encryption ...
  • Hassouneh, Ghadeer (جامعة بوليتكنك فلسطين - معلوماتية, 2019-08-01)
    Different machine learning classifiers work well only when the training data is balanced. That is, when the number of positive examples is similar to the number of negative examples. If the training data is not balanced, ...
  • Abuzalata, Amal (جامعة بوليتكنك فلسطين - معلوماتية, 2019-07-01)
    ان عملية التنبؤ بأداء الطالب هي عملية صعبة ومليئة بالتحديات, وذلك يرجع الى كمية البيانات الكبيرة جدا والمخزنة في قواعد بيانات الجامعات والمؤسسات التعليمية. علم التنقيب عن البيانات يقوم بالبحث داخل قواعد البيانات هذه ...
  • Isayed, Samer (Palestine Polytechnic University (PPU), 2018-09-01)
    The field of image compression and encryption is growing up these days as the channels are being more involved with the world-wide web. To have the credit of any image transferred over the web, you need to decrease ...
  • Amro, Dalia (جامعة بوليتكنك فلسطين - معلوماتية, 2019-01-01)
    Wireless sensor networks (WSNs) hold a group of spatial sensor nodes circulated to collect, monitor, record data which can be considered as an important data in critical areas that human cannot reach. The special ability ...
  • Natsheh, Sahar (Palestine Polytechnic University (PPU), 2018-12-01)
    يختلف تشفير الصور اختلافا كبيرا عن تشفير النص نظرا لسعة البيانات المجمعه والتكرار العالي للبيانات في الصور والارتباط العالي بين البيانات في الصورة زبالتالي يصعب استخدام الطرق التقليدية في تشفير الصور حيث ان التسلسلات ...
  • Abu Dawoud, Sawsan; al_Khayyat, Mervat (جامعة بوليتكنك فلسطين - اتمتة صناعية, 2009-12-01)
    This project aim to design and implement an optical communication system using fiber optic, this system consists of transmitter, receiver and the optical fiber as communication channel. In our system we will ...
  • Muhsen, Rami (جامعة بوليتكنك فلسطين - معلوماتية, 2013-09-01)
    The number of people using the Internet as a main source of information is constantly growing. And since the content of some of this information could be fraudulent or unreliable, the need for a method to determine its ...
  • Saleh, Yousef (جامعة بوليتكنك فلسطين - معلوماتية, 2015-08-01)
    Sensitive and confidential data is a requisite for most of the companies, so protection of this data takes great attention by company top management, administrators and IT managers. Data leakage causes negative impact on ...
  • Shawer, Walla (جامعة بوليتكنك فلسطين - معلوماتية, 2015-12-01)
    t As the world tends to increase the use of the Mobile Ad hoc wireless Networks (MANETs), a very important challenging issue is to enhance the performance of the used routing protocols. Each of the routing protocols ...
  • Kurar, Berat (جامعة بوليتكنك فلسطين - معلوماتية, 2015-12-01)
    Proteins’ structures and functions play key roles in organisms’ life. However, it is timely and costly to experimentally determine the attributes of protein sequences. There is a tremendous growth in the amount of available ...
  • Sweiti, Suzanne (جامعة بوليتكنك فلسطين - معلوماتية, 2015-12-01)
    Mobile agents are executing software entities that are capable of migrating from server to server in heterogeneous networks on behalf of network users. Agent systems are subject to failures that result from bad communication, ...

View more