DSpace Repository

Browsing Master of Informatics by Title

Browsing Master of Informatics by Title

Sort by: Order: Results:

  • sleeman, Jumah (جامعة بوليتكنك فلسطين - معلوماتية, 6/1/2018)
    Author’s Names Disambiguation (AD) is a type of record linkage which is applied to scholarly documents. The ambiguity often occurs due to different factors such as authors who have more than one name version, or group of ...
  • Al-Aloul, Samah (جامعة بوليتكنك فلسطين - معلوماتية, 9/1/2020)
    Traffic is the pulse of any city that impacts the social, economic and healthy life of millions of people. Demand prediction, mainly taxi demand prediction, plays an important role in intelligent transportation systems in ...
  • Ayyash, Mohammad (جامعة بوليتكنك فلسطين - informatics, 7/1/2011)
    The demand for high data rate WLAN becomes very high. Therefore, The IEEE has standardized the 802.1 ln, which implements multiple input multiple output (MIMO) antennas. The emergence of several radio technologies, such ...
  • Shawer, Walla (جامعة بوليتكنك فلسطين - معلوماتية, 12/1/2015)
    t As the world tends to increase the use of the Mobile Ad hoc wireless Networks (MANETs), a very important challenging issue is to enhance the performance of the used routing protocols. Each of the routing protocols used ...
  • Adi, Safa (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Feature selection is one of a key success factor for classification problem in high dimensional datasets. This process aims to select the discriminative subsets of features in order to enhance the classification performance ...
  • Khamayseh, Sundous (جامعة بوليتكنك فلسطين - معلوماتية, 9/1/2021)
    Communication technologies evolve drastically in recent years. These recent developments in communication technologies inevitably lead to increasing demand for communication technologies. They also lead to allocating ...
  • Aljabari, Ahmad (جامعة بوليتكنك فلسطين - informatics, 6/1/2012)
    Power-performance tradeoff is a critical issue in the heterogeneous multiprocessor system, especially, in the modern mobile computers with large number of cores. Task scheduling in heterogeneous multiprocessor systems ...
  • Abutaha, Mohammed (جامعة بوليتكنك فلسطين - informatics, 7/1/2011)
    Nowadays, Cryptography plays a major role in protecting information. Hash function is a welldefined procedure that digests a large data chunks into a small one. The returned value from hash function is called hash code. ...
  • Sowan, Islam (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Enterprise Resource Planning (ERP) systems are widely used systems across the world. At the beginning, they were business organizational technology, which are used to improve companies’ performance and to manage their ...
  • Kurar, Berat (جامعة بوليتكنك فلسطين - معلوماتية, 12/1/2015)
    Proteins’ structures and functions play key roles in organisms’ life. However, it is timely and costly to experimentally determine the attributes of protein sequences. There is a tremendous growth in the amount of available ...
  • Hashlamoun, Lubna (جامعة بوليتكنك فلسطين - informatics, 2022-08-01)
    Wireless Body Area Networks (WBAN)s are gaining popularity, as real-time diagnosis and electronic therapy of patients are two key components driving the healthcare field. In addition to the digital technologies involved ...
  • Dweik, Osama (جامعة بوليتكنك فلسطين - informatics, 6/1/2021)
    KINECT has been recently introduced in the market as a low cost 3D acquisition device, so it will be interesting to discover the power of this device when we use it for gesture recognition. In this thesis, we propose a ...
  • AL-Jundi, Mohammad (جامعة بوليتكنك فلسطين - معلوماتية, 2/1/2021)
    في هذه الأطروحة، تم اقتراح نموذج تنبؤ لاحتساب الأخطاء في المرحلتين الأوليين من دورة حياة تطوير البرمجيات، للسماح لمديري المشاريع باتخاذ القرار المناسب في الوقت المناسب. تستخدم هذه الأطروحة المقاييس الأكثر ارتباطاً بموثوقية ...
  • AL-Jundi, Mohammad (جامعة بوليتكنك فلسطين - معلوماتية, 2/1/2021)
    في هذه الأطروحة، تم اقتراح نموذج تنبؤ لاحتساب الأخطاء في المرحلتين الأوليين من دورة حياة تطوير البرمجيات، للسماح لمديري المشاريع باتخاذ القرار المناسب في الوقت المناسب. تستخدم هذه الأطروحة المقاييس الأكثر ارتباطاً بموثوقية ...
  • Qasrawi, Hiba (جامعة بوليتكنك فلسطين - ماجستير معلوماتية, 2022-12-01)
    Due to the rapid development of wireless communication technology and the growing demand for services, it is expected that the emergence of Vehicular Ad hoc Networks (VANET)s would enable a variety of applications such ...
  • Sarahneh, Sanaa (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Electronic data interchange can be classi ed as one of the important areas of information technology, where the need for data sharing increasingly required in almost every eld such as health-care, e-government, e-commerce ...
  • Al-Shreef, Shrouq (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    In recent days, the fast spread of web services in our businesses and day-to-day lives has made QoS a very important aspect for both the service provider and the consumers. The consumers prefer to deal with the best web ...
  • Natsheh, Sahar (Palestine Polytechnic University (PPU), 12/1/2018)
    يختلف تشفير الصور اختلافا كبيرا عن تشفير النص نظرا لسعة البيانات المجمعه والتكرار العالي للبيانات في الصور والارتباط العالي بين البيانات في الصورة زبالتالي يصعب استخدام الطرق التقليدية في تشفير الصور حيث ان التسلسلات ...
  • Qumsieh, Rawan (جامعة بوليتكنك فلسطين - معلوماتية, 11/1/2017)
    Image encryption is much different from that of the texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to be used for image encryption as their pseudo-random ...
  • Shehadeh, Karmel (جامعة بوليتكنك فلسطين - informatics, 2022-08-01)
    Requirement engineering plays a very important role in the software development life cycle. The success or failure of a software project depends prominently on the requirement engineering phase. Requirement documents ...

Search DSpace


Browse

My Account