DSpace Repository

Browsing Scientific Published Papers by Title

Browsing Scientific Published Papers by Title

Sort by: Order: Results:

  • Qabajeh, Liana (University of Malaya, 2012)
    Mobile Ad-Hoc NETworks (MANETs) are wireless multi-hop networks formed by a set of mobile nodes in a self-organizing way without requiring already established infrastructure. Along with their traditional uses such as ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (IEEE, 2009)
    Wireless Mobile Ad-Hoc Networks (MANETs) are becoming highly applicable in many fields. Due to MANETs special characteristics, secure routing may be one of the most difficult areas to deal with as opponents can add ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (IEEE, 2009)
    Wireless Mobile Ad-Hoc Networks (MANETs) are becoming highly applicable in many fields. Due to MANETs special characteristics, secure routing may be one of the most difficult areas to deal with as opponents can add ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (2009)
    Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public. Due to MANETs inherent characteristics, secure routing may be one of the most difficult areas ...
  • Qudaimat, Ali J. (International Institute for Educational Planning - UNESCO, Paris, France, 1999-05)
    The school building is one of the important elements in the educational process, and it is the place where the teaching-learning process activities run. Also, the situation of the school environment and building has an ...
  • Alsalamen, Rihabb; Shahin, Ghassan Omar (The International Conference on new Trends in Computing Sciences (ICTCS2017), 2017-10-11)
    Researchers have established a concrete and solid ground for web forms design and their usability testing since the nineties. However, since the dramatic shift towards devices that carries a varied set of properties, such ...
  • Khatib, Imad; Khamayseh, T.; Shweiki, M.; Hani, S.; Khashan, K.; Althiabeh, M. (Journal of Energy and Power Engineering, 2011-01-01)
    The scarcity of potable water added more pressure on the Palestinian and is considered obstacles in planning for sustainable development. It is so important to find alternatives that have no adverse effect on the environment ...
  • Abdoun, Nabil; El Assad, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforges, Olivier; Khalil, Mohamad (IEEE, 2016)
    Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (2011)
    Ad-Hoc networks are decentralized wireless networks. A fundamental problem in Ad-Hoc networks is finding a secure and correct route between a source and a destination efficiently. The need for scalable and energy efficient ...
  • Salahat, Fahed H.; Martinez-Vazquez, P. (Institute of Research Engineers and Doctors IRED, 2014-11-21)
    A qualitative assessment of seismic effects on a regular building located in Palestine is presented. The assessment is based on two distinct approaches, one by following recommendations from the International and Uniform ...
  • Farajallah, Mousa; Gautier, Guillaume; Hamidouche, Wassim; Déforges, Olivier; El Assad, Safwan (https://arxiv.org/, 2021-03-09)
    Versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020. VVC introduces several new coding tools providing a significant coding ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Baker Mohammed Al-Abbas, Mohammed; Mustafa Khaleel Abu Hammad, Rawan; Mahmoud Mohammad Al-Tawalbeh, Fatima; (Mohammed Amin) Mahmoud Al-Alawn, Mariana; Salim Suleiman Issa, Yahya; Yousef Ahmad Jawabra, Naser; Farhan Obed, Abed; Tahir Anees, Rao (Journal of Education and Practice, 2020-04-30)
    The purpose of this practice-based paper is to investigate the artistic reflections and self-aesthetics into the process of artwork making. Every stage of this process represents a particular significance from the initial ...
  • Arman, Nabil (The 10th International Conference on Information Technology (ICIT 2021),, 2021-07-15)
    Functional and non-functional requirements are equally important in software engineering. Both of them are mixed together within the same software requirement document. Usually, they are expressed in natural languages. ...
  • Shehadeh, Karmel; Arman, Nabil; Khamayseh, Faisal (IEEE, 2021-07-14)
    Functional and non-functional requirements are equally important in software engineering. Both of them are mixed together within the same software requirement document. Usually, they are expressed in natural languages. So, ...
  • Nassar, Ibrahim; Khamayseh, Faisal (NNGT Int. J. on Software Engineering, 2015-02-01)
    Requirement Engineering is currently one of the main directions in software research and applications. The traditional design methods of creating UML models have a high cost and long time. Activity diagram is an important ...
  • Alami, Nermeen; Arman, Nabil; Khamayseh, Faisal (IEEE Explore, 2017-10-23)
    A sequence diagram is one of UML models that are usually used within the analysis phase in software system development. Since generating such sequence diagrams is performed manually, automated or semi-automated support is ...
  • Obaid, R.; Kinzel, D.; Oppel, M.; Gonzalez, L. (2015-03-29)
    The concept of nuclear spin isomers was already introduced in the early days of quantum mechanics. Despite its importance, not much work has been done to separate them experimentally by pushing the ratio away from its ...

Search DSpace


Browse

My Account