DSpace Repository

Browsing Scientific Published Papers by Title

Browsing Scientific Published Papers by Title

Sort by: Order: Results:

  • Qabajeh, Liana (University of Malaya, 2012)
    Mobile Ad-Hoc NETworks (MANETs) are wireless multi-hop networks formed by a set of mobile nodes in a self-organizing way without requiring already established infrastructure. Along with their traditional uses such as ...
  • Qabajeh, Liana (Journal of Telecommunications and Information Technology, 2022-07)
    The multicasting technique supports a variety of applications that require data to be instantaneously trans- mitted to a set of destination nodes. In environments with continuously moving nodes, such as mobile ad-hoc ...
  • Qabajeh, Liana (International Journal of Electrical and Electronic Engineering & Telecommunications, 2022-01)
    Mobile Ad-hoc networks are getting progressively more popular. In such networks, nodes are continuously moving, hence, seeking an efficient route from a particular source to projected destination is a vital issue. ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (IEEE, 2009)
    Wireless Mobile Ad-Hoc Networks (MANETs) are becoming highly applicable in many fields. Due to MANETs special characteristics, secure routing may be one of the most difficult areas to deal with as opponents can add ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (IEEE, 2009)
    Wireless Mobile Ad-Hoc Networks (MANETs) are becoming highly applicable in many fields. Due to MANETs special characteristics, secure routing may be one of the most difficult areas to deal with as opponents can add ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (2009)
    Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public. Due to MANETs inherent characteristics, secure routing may be one of the most difficult areas ...
  • Qudaimat, Ali J. (International Institute for Educational Planning - UNESCO, Paris, France, 1999-05)
    The school building is one of the important elements in the educational process, and it is the place where the teaching-learning process activities run. Also, the situation of the school environment and building has an ...
  • Alsalamen, Rihabb; Shahin, Ghassan Omar (The International Conference on new Trends in Computing Sciences (ICTCS2017), 2017-10-11)
    Researchers have established a concrete and solid ground for web forms design and their usability testing since the nineties. However, since the dramatic shift towards devices that carries a varied set of properties, such ...
  • Khatib, Imad; Khamayseh, T.; Shweiki, M.; Hani, S.; Khashan, K.; Althiabeh, M. (Journal of Energy and Power Engineering, 2011-01-01)
    The scarcity of potable water added more pressure on the Palestinian and is considered obstacles in planning for sustainable development. It is so important to find alternatives that have no adverse effect on the environment ...
  • Abdoun, Nabil; El Assad, Safwan; Abutaha, Mohammed; Assaf, Rima; Deforges, Olivier; Khalil, Mohamad (IEEE, 2016)
    Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology ...
  • Qabajeh, Liana; Kiah, Miss; Qabajeh, Mohammed (2011)
    Ad-Hoc networks are decentralized wireless networks. A fundamental problem in Ad-Hoc networks is finding a secure and correct route between a source and a destination efficiently. The need for scalable and energy efficient ...
  • Khamayseh, Baraa; Arman, Nabil; Khamayseh, Faisal (IBIMA, 2022)
    Throughout the requirement engineering, the classification of user requirements has been a major concern of software engineering researchers. In this paper, we first highlighted the contributions of recent authors and ...
  • Khamayseh, B; Arman, Nabil; K, Faisal (International Business Information Management Association (IBIMA), 2022-11)
    Throughout the requirement engineering, the classification of user requirements has been a major concern of software engineering researchers. In this paper, we first highlighted the contributions of recent authors and ...
  • Belal, Almassri (ARPN Journal of Engineering and Applied Sciences, 2023-12-30)
    Many existing Reinforced Concrete (RC) buildings in moderate to high seismic hazard zones (including old RC buildings and historical structures in Palestine) have inadequate capacity to resist earthquake loads, most of the ...
  • Salahat, Fahed H.; Martinez-Vazquez, P. (Institute of Research Engineers and Doctors IRED, 2014-11-21)
    A qualitative assessment of seismic effects on a regular building located in Palestine is presented. The assessment is based on two distinct approaches, one by following recommendations from the International and Uniform ...
  • Farajallah, Mousa; Gautier, Guillaume; Hamidouche, Wassim; Déforges, Olivier; El Assad, Safwan (https://arxiv.org/, 2021-03-09)
    Versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020. VVC introduces several new coding tools providing a significant coding ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • Arafah, Diya; Hegana, Ashenafi (LAP LAMBERT Academic Publishing, 2014-07-17)
    Electrically actuated brake system came in use with enhance assistance braking functions. The Electro-Hydraulic Brake (EHB) system are currently used in hybrid vehicles and favoured over the Electro-Mechanical Brake (EMB) ...

Search DSpace


Browse

My Account