DSpace Repository

Browsing Master of Informatics by Title

Browsing Master of Informatics by Title

Sort by: Order: Results:

  • Abuzalata, Amal (جامعة بوليتكنك فلسطين - معلوماتية, 7/1/2019)
    ان عملية التنبؤ بأداء الطالب هي عملية صعبة ومليئة بالتحديات, وذلك يرجع الى كمية البيانات الكبيرة جدا والمخزنة في قواعد بيانات الجامعات والمؤسسات التعليمية. علم التنقيب عن البيانات يقوم بالبحث داخل قواعد البيانات هذه من أجل ...
  • Aljabari, Alaa (جامعة بوليتكنك فلسطين - informatics, 1/1/2013)
    Traffic congestion is one of the most important problems we face in our daily life. This problem has a huge effect on economy and environment. The total of congestion cost in America in 2010 reached to 101 billion dollar ...
  • Abu Sabha, Sabha (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2016)
    Software development life cycle (SDLC) plays a signi cant role in building a good quality software. SDLC has six stages listed as follows: Requirement Analysis, Design, Development, Testing, and Maintenance. The success ...
  • Isayed, Anwar (جامعة بوليتكنك فلسطين - معلوماتية, 7/1/2015)
    P300-Speller is one of the most popular paradigm for constructing Brain Computer Interface (BCI) system that allows subjects to type letters by focusing on a specific target on a computer screen. When BCI system recognises ...
  • Saleh, Yousef (جامعة بوليتكنك فلسطين - معلوماتية, 8/1/2015)
    Sensitive and confidential data is a requisite for most of the companies, so protection of this data takes great attention by company top management, administrators and IT managers. Data leakage causes negative impact on ...
  • Abu Dawoud, Sawsan; al_Khayyat, Mervat (جامعة بوليتكنك فلسطين - اتمتة صناعية, 12/1/2009)
    This project aim to design and implement an optical communication system using fiber optic, this system consists of transmitter, receiver and the optical fiber as communication channel. In our system we will study ...
  • Al-Adrah, Dalal (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Severalstudentssu erfromdyscalculia.Manyresearchandstudieshave beencarriedouttotacklethisproblem.Mostoftheseresearchestriedto identifywhetherastudentsu ersfromdyscalculiaornot,withoutanyfur- ther detailsonthecase.Basedon ...
  • Amro, Dalia (جامعة بوليتكنك فلسطين - معلوماتية, 1/1/2019)
    Wireless sensor networks (WSNs) hold a group of spatial sensor nodes circulated to collect, monitor, record data which can be considered as an important data in critical areas that human cannot reach. The special ability ...
  • Salamin, Sami (جامعة بوليتكنك فلسطين - informatics, 2/1/2012)
    The Multi Objective Genetic Algorithm is the process of simultaneously optimizing two or more conflicting objectives subject to certain constraints. Compute Unified Device Architecture (CUDA) is a general purpose ...
  • Hushlamoun, Sameeha (جامعة بوليتكنك فلسطين - معماري, 12/1/2020)
    The building envelope is the major component that protects the indoor environment against the outdoor atmosphere, and in particular, building facades technologies play a significant role in controlling the indoor thermo-visual ...
  • AbuJoodeh, Mohammed (جامعة بوليتكنك فلسطين - informatics, 2022-06-01)
    Cyber and Information security are among the most critical challenges facing nowadays technologies, especially with the discrepancy in devices' capabilities that have increased with the emergence of the Internet of Things ...
  • Dbabseh, Esraa (جامعة بوليتكنك فلسطين - معلوماتية, 1/1/2021)
    The Automatic Meter Reading (AMR) for energy consumption is one of the most important issues in smart cities, as meters and electricity companies suffer from insecurity. One of the most common attacks is a denial of ...
  • Tmiezh, Mohammed (Palestine Polytechnic University - معلوماتية, 1/1/2018)
    Abstract Web-applications of today are data-intensive. These applications have databases that store large amount of data, using almost SQL databases. On the other hand, such databases su er from lack of security. One of ...
  • Wohoush, Samer (جامعة بوليتكنك فلسطين - informatics, 6/1/2011)
    The main problem of searching the Genome DNA sequences is the large size of sequences and the very high and variant sequences lengths. There are different methods used to enhance sequence searching like using database ...
  • Amleh, Deema (جامعة بوليتكنك فلسطين - معماري, 12/1/2020)
    Daylight and access to outside views are key factors to improve the healing environment for patients in the intensive care unit (ICU), which decreases the incidence of delirium. This is essential as well to provide appropriate ...
  • Qdemat, Ibrahim (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Author name disambiguation is well known problem in digital libraries that aims at identifying the real owner of a scienti c contribution. Author name disambiguation is a challenging problem because of di erent name strings ...
  • Sweiti, Suzanne (جامعة بوليتكنك فلسطين - معلوماتية, 12/1/2015)
    Mobile agents are executing software entities that are capable of migrating from server to server in heterogeneous networks on behalf of network users. Agent systems are subject to failures that result from bad communication, ...
  • Tamiza, Lubaba (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Choosing suitable track is a key success in the academic and professional life. Whenever the specialization is appropriate for the student; an increase in students' performance is the natural result. In addition, it is an ...
  • Amro, Zaher (جامعة بوليتكنك فلسطين - معلوماتية, 9/1/2019)
    The increasing interest in data security has led to the emergence of the security assessment metrics. These metrics work generally with stream data; they give a proper indication about the security level of their encryption ...
  • sleeman, Jumah (جامعة بوليتكنك فلسطين - معلوماتية, 6/1/2018)
    Author’s Names Disambiguation (AD) is a type of record linkage which is applied to scholarly documents. The ambiguity often occurs due to different factors such as authors who have more than one name version, or group of ...

Search DSpace


Browse

My Account