DSpace Repository

Browsing Master of Informatics by Title

Browsing Master of Informatics by Title

Sort by: Order: Results:

  • Adi, Safa (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Feature selection is one of a key success factor for classification problem in high dimensional datasets. This process aims to select the discriminative subsets of features in order to enhance the classification performance ...
  • Khamayseh, Sundous (جامعة بوليتكنك فلسطين - معلوماتية, 9/1/2021)
    Communication technologies evolve drastically in recent years. These recent developments in communication technologies inevitably lead to increasing demand for communication technologies. They also lead to allocating ...
  • Aljabari, Ahmad (جامعة بوليتكنك فلسطين - informatics, 6/1/2012)
    Power-performance tradeoff is a critical issue in the heterogeneous multiprocessor system, especially, in the modern mobile computers with large number of cores. Task scheduling in heterogeneous multiprocessor systems ...
  • Abutaha, Mohammed (جامعة بوليتكنك فلسطين - informatics, 7/1/2011)
    Nowadays, Cryptography plays a major role in protecting information. Hash function is a welldefined procedure that digests a large data chunks into a small one. The returned value from hash function is called hash code. ...
  • Sowan, Islam (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Enterprise Resource Planning (ERP) systems are widely used systems across the world. At the beginning, they were business organizational technology, which are used to improve companies’ performance and to manage their ...
  • Kurar, Berat (جامعة بوليتكنك فلسطين - معلوماتية, 12/1/2015)
    Proteins’ structures and functions play key roles in organisms’ life. However, it is timely and costly to experimentally determine the attributes of protein sequences. There is a tremendous growth in the amount of available ...
  • Hashlamoun, Lubna (جامعة بوليتكنك فلسطين - informatics, 2022-08-01)
    Wireless Body Area Networks (WBAN)s are gaining popularity, as real-time diagnosis and electronic therapy of patients are two key components driving the healthcare field. In addition to the digital technologies involved ...
  • Dweik, Osama (جامعة بوليتكنك فلسطين - informatics, 6/1/2021)
    KINECT has been recently introduced in the market as a low cost 3D acquisition device, so it will be interesting to discover the power of this device when we use it for gesture recognition. In this thesis, we propose a ...
  • AL-Jundi, Mohammad (جامعة بوليتكنك فلسطين - معلوماتية, 2/1/2021)
    في هذه الأطروحة، تم اقتراح نموذج تنبؤ لاحتساب الأخطاء في المرحلتين الأوليين من دورة حياة تطوير البرمجيات، للسماح لمديري المشاريع باتخاذ القرار المناسب في الوقت المناسب. تستخدم هذه الأطروحة المقاييس الأكثر ارتباطاً بموثوقية ...
  • AL-Jundi, Mohammad (جامعة بوليتكنك فلسطين - معلوماتية, 2/1/2021)
    في هذه الأطروحة، تم اقتراح نموذج تنبؤ لاحتساب الأخطاء في المرحلتين الأوليين من دورة حياة تطوير البرمجيات، للسماح لمديري المشاريع باتخاذ القرار المناسب في الوقت المناسب. تستخدم هذه الأطروحة المقاييس الأكثر ارتباطاً بموثوقية ...
  • Qasrawi, Hiba (جامعة بوليتكنك فلسطين - ماجستير معلوماتية, 2022-12-01)
    Due to the rapid development of wireless communication technology and the growing demand for services, it is expected that the emergence of Vehicular Ad hoc Networks (VANET)s would enable a variety of applications such ...
  • Sarahneh, Sanaa (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Electronic data interchange can be classi ed as one of the important areas of information technology, where the need for data sharing increasingly required in almost every eld such as health-care, e-government, e-commerce ...
  • Al-Shreef, Shrouq (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    In recent days, the fast spread of web services in our businesses and day-to-day lives has made QoS a very important aspect for both the service provider and the consumers. The consumers prefer to deal with the best web ...
  • Natsheh, Sahar (Palestine Polytechnic University (PPU), 12/1/2018)
    يختلف تشفير الصور اختلافا كبيرا عن تشفير النص نظرا لسعة البيانات المجمعه والتكرار العالي للبيانات في الصور والارتباط العالي بين البيانات في الصورة زبالتالي يصعب استخدام الطرق التقليدية في تشفير الصور حيث ان التسلسلات ...
  • Qumsieh, Rawan (جامعة بوليتكنك فلسطين - معلوماتية, 11/1/2017)
    Image encryption is much different from that of the texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to be used for image encryption as their pseudo-random ...
  • Shehadeh, Karmel (جامعة بوليتكنك فلسطين - informatics, 2022-08-01)
    Requirement engineering plays a very important role in the software development life cycle. The success or failure of a software project depends prominently on the requirement engineering phase. Requirement documents ...
  • Amro, Fedaa (جامعة بوليتكنك فلسطين - معلوماتية, 3/1/2019)
    Sentiment Analysis can be achieved using lexicons and machine learning methods to identify the sentiment of a content and opinion mining of a text. With the large amount of news being generated nowadays through various ...
  • Muhsen, Rami (جامعة بوليتكنك فلسطين - معلوماتية, 9/1/2013)
    The number of people using the Internet as a main source of information is constantly growing. And since the content of some of this information could be fraudulent or unreliable, the need for a method to determine its ...
  • Alsalamen, Rihabb (جامعة بوليتكنك فلسطين - معلوماتية, 5/31/2017)
    Researchers have established a concrete and solid ground for web forms de- sign and their usability testing since the nineties. However, since the dramatic shift towards devices that carries a varied set of properties, ...
  • Badran, Sultan (جامعة بوليتكنك فلسطين - معلوماتية, 6/1/2021)
    يف ضوء التقدم الذي أحرزه قطاع التكنولوجيا يف جماالت سرعة اإلنرتنت وتطوير اخلدمات السحابية، باإلضافة إىل ادلزايا األخرى اليت توفرىا السحابة مثل ادلوثوقية وسهولة الوصول من أي مكان ويف أي وقت، رأى معظم مالكي البيانات فرصة ...

Search DSpace


Browse

My Account