رسائل الماجستير كليةتكنولوجيا المعلومات
عنوان الرسالة | الكلية | التخصص | السنة | تحميل |
---|---|---|---|---|
Task Scheduling Using Best-Level-Job-First on Private Cloud Computing | Information Technology | Computer Science | 2016 | Download |
A Method for Static Video Summarization for Reducing Power Consumption and Its Impact on Bandwidth | Information Technology | Computer Science | 2016 | Download |
Image Encryption System by Generating Chains from the Secret Key | Information Technology | Computer Science | 2016 | Download |
Performance Analysis for Fully and Partially Homomorphic Encryption Techniques | Information Technology | Computer Science | 2016 | Download |
A Comparative Study of Classification Techniques for English to Arabic Speech Recognition | Information Technology | Computer Information Systems | 2016 | Download |
A New Statistical Anomaly Detector Model for Keystroke Dynamics on Touch Mobile Devices | Information Technology | Computer Science | 2016 | Download |
The Hiding of Multimedia Secret Files in Dual RGB Cover Images Using LSB Steganography Techniques | Information Technology | Computer Science | 2016 | Download |
Developing Parallel Technique for the Internet of Things Devices by using local Map Reduce at the sink node. | Information Technology | Computer Science | 2016 | Download |
Analytical Study for the Mutable Order-Preserving Encoding with Periodically Encryption Key Changing | Information Technology | Computer Science | 2016 | Download |
Investigation on Order-Preserving Encryption for Database in Cloud Computing | Information Technology | Computer Science | 2016 | Download |
Applying the Kinect Device for Human Identification System in the ATM Environment | Information Technology | Computer Science | 2016 | Download |
A Customer - Oriented Software Development Life Cycle | Information Technology | Computer Science | 2008 | Download |
A Decision Support System for E-banking Adoption in Jordan : A Critical Success Factors Perspective | Information Technology | Computer Information Systems | 2008 | Download |
A Generic Menu - Based Interface for Web Querying | Information Technology | Computer Information Systems | 2008 | Download |
A Model For Designing And Adapting Mobile Learning Content | Information Technology | Computer Information Systems | 2008 | Download |
An Intelligent Face Authentication System for ATM aAccess | Information Technology | Computer Science | 2008 | Download |
Design Secure E-Voting Scheme | Information Technology | Computer Science | 2008 | Download |
Embedding Hex-Cells into Tree- Hybercube Network | Information Technology | Computer Science | 2008 | Download |
Towards An Ontology for Software Product Quality Attributes | Information Technology | Computer Information Systems | 2009 | Download |
A Model For E-Learning Content Design | Information Technology | Computer Information Systems | 2009 | Download |
A Multi-Layer Perceptron neural network Based -model for Face Detection | Information Technology | Computer Science | 2009 | Download |
design and implementation of mobile learning content model | Information Technology | Computer Information Systems | 2009 | Download |
Designing A Secure E- Payment protocol | Information Technology | Computer Science | 2009 | Download |
Towards Ontology For Reguirements Engineering process in E-Government Application | Information Technology | Computer Information Systems | 2008 | Download |
Deriving System Model From Business Process Model (JCR Case Study) | Information Technology | Computer Information Systems | 2009 | Download |
A knowledge based system for developing cognitive map based on geographical map | Information Technology | Computer Science | 2011 | Download |
A model for Outsourcing Monitoring System | Information Technology | Computer Science | 2010 | Download |
A Robust Framework for Watermarking System | Information Technology | Computer Information Systems | 2010 | Download |
Database fragmentation Technque for News Websites | Information Technology | Computer Information Systems | 2009 | Download |
Design A Model for Dynamic workflow Management System | Information Technology | Computer Information Systems | 2010 | Download |
Designing A model for Wireless Load Data Sheet in Aircraft | Information Technology | Computer Information Systems | 2010 | Download |
Developing a Payment System Using Contactless Smart card | Information Technology | Computer Information Systems | 2010 | Download |
mouse Gestural hindi Digits Recopgnition Using Neural Network | Information Technology | Computer Science | 2010 | Download |
THE VERIFICATION FROM THE CITIZEN IN E-GOVERNMENT APPLICATION | Information Technology | Computer Information Systems | 2010 | Download |
Using Architectural Blueprints for Intelligent Robot Cognitive Mapping as a Knowledge-based system | Information Technology | Computer Information Systems | 2010 | Download |
A secure electronic voting scheme based on evox-MA and revs voting blind signature protocols | Information Technology | Computer Science | 2011 | Download |
an efficient digital image watermarking system based on contourlet transform and discrete wavelet transform | Information Technology | Computer Science | 2011 | Download |
Anonymous and non-repudiation E-cash scheme based on partially blind sigature | Information Technology | Computer Science | 2011 | Download |
artifical neuro-fuzzy logic system human emotions | Information Technology | Computer Science | 2011 | Download |
desigen of intelligent database system for vehicle fault diagnosis | Information Technology | Computer Science | 2011 | Download |
intrusion detection model inspired by immune using k-means and naive bayes as hybrid learning approach | Information Technology | Computer Science | 2012 | Download |
A comparative study of duplicate record detection techniques | Information Technology | Computer Science | 2012 | Download |
A Hybrid statistical and morphological arabic language diacritizing system | Information Technology | Computer Science | 2012 | Download |
A Knowledge acquisition framework in trace - based reasoning for valuing knowledge | Information Technology | Computer Science | 2012 | Download |
A Proposed software description language for representing program logic in XML | Information Technology | Computer Science | 2012 | Download |
An enhanced steady state genetic algorithm model for misuse network intrusion detection system | Information Technology | Computer Science | 2012 | Download |
Communication impact on non-contiguous allocation strategies for 2- D mesh multicomputer system | Information Technology | Computer Information Systems | 2012 | Download |
Design and implementation of portal system for schools in less-developed area : A field study in karak governorate | Information Technology | Computer Science | 2012 | Download |
Developing a decision support system for seaport management case study : iraqi seaports | Information Technology | Computer Information Systems | 2012 | Download |
Developing a virtual-machine-based distributed web crawling model | Information Technology | Computer Information Systems | 2012 | Download |
evaluating semantic measures by computing the coverage of a condensed | Information Technology | Computer Science | 2016 | Download |
voice eneryption twin stream cipher algorithm | Information Technology | Computer Science | 2016 | Download |
enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process | Information Technology | Computer Science | 2012 | Download |
Geographical information systems in analysis and enhancement for problems solving and decision making | Information Technology | Computer Information Systems | 2012 | Download |
Improving scheduling on symmetric multiprocessing SMP architecture based on process behavior | Information Technology | Computer Information Systems | 2012 | Download |
Modeling and analysis of cloud collaborative commerce | Information Technology | Computer Information Systems | 2012 | Download |
XML database schema refinement through functional dependencies and normalization | Information Technology | Computer Information Systems | 2012 | Download |
A framework model for arabic handwritten text recognittion to handle missing text fragments | Information Technology | Computer Science | 2013 | Download |
A model for handwriting recognition using wavelet function and genetic algorithm | Information Technology | Computer Information Systems | 2013 | Download |
A Critical Analysis of Kamila Shamsie's Burnt Shadows | Information Technology | Computer Information Systems | 2015 | Download |
a semantic ontology based concept for measuring security compliance of cloud service providers | Information Technology | Computer Information Systems | 2013 | Download |
An efficient associative classification algorithm for text categorization | Information Technology | Computer Information Systems | 2012 | Download |
A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography Algorithms | Information Technology | Computer Information Systems | 2016 | Download |
An enhanced hopfield network model for misuse intrusion detection system | Information Technology | Computer Science | 2013 | Download |
An enhanced technique for segmentation and encrypt data to storing in cloud computing | Information Technology | Computer Information Systems | 2013 | Download |
automobile accident prediction and avoidance system using multilayer preceptron neural networks | Information Technology | Computer Science | 2013 | Download |
design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledge | Information Technology | Computer Science | 2013 | Download |
Developing a computer - based information system to improve the diagnosis of blood anemia | Information Technology | Computer Information Systems | 2013 | Download |
Developing a high-performance adjustable-quality data compressipn scheme for multimedia messaging | Information Technology | Computer Science | 2013 | Download |
Enhanced k_way method in apriori algorithm for mining the association rules through embedding SQL commands | Information Technology | Computer Information Systems | 2013 | Download |
Enhancement of a steganographic algorithm for hiding text messages in image | Information Technology | Computer Science | 2013 | Download |
Enhancing open space method in data hiding technique - text under text | Information Technology | Computer Information Systems | 2013 | Download |
Enhancing the compression ratio of the HCDC-based text compression scheme | Information Technology | Computer Information Systems | 2013 | Download |
hybrid technique for arabic text compression | Information Technology | Computer Science | 2013 | Download |
latent semantic analysis LSA and ontological concepts to support e-recruitment | Information Technology | Computer Science | 2013 | Download |
Real time arabic translation system for signboard images based on printed character recognition | Information Technology | Computer Science | 2013 | Download |
Using semantic ontology to evaluate tenders and bidders for e-government applications | Information Technology | Computer Information Systems | 2013 | Download |
Deriving a new Markup Language from the Extensible Markup Language (XML) to enhance Electrical Engineering Applicaions | Information Technology | Computer Information Systems | 2014 | Download |
a hybrid broadcasting technique based on massage priority in vanet | Information Technology | Computer Science | 2014 | Download |
A Model of Environment Representation Architecture for Intelligent Robot | Information Technology | Computer Science | 2014 | Download |
A new approach for real time Face recognition System using a modified Eigenfaces with Edge Tracking | Information Technology | Computer Information Systems | 2014 | Download |
An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data | Information Technology | Computer Science | 2014 | Download |
An Enhanced model For government applications in iraq | Information Technology | Computer Information Systems | 2014 | Download |
An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection | Information Technology | Computer Information Systems | 2014 | Download |
Bandwidth Saving method based Sharing Data Downloaded From Cloud Between Smartphones In Wifi Network | Information Technology | Computer Science | 2014 | Download |
Cloud Customer Relationship Management (CRM)Ontology | Information Technology | Computer Information Systems | 2014 | Download |
Comparative analysis of Database Performance for Well-Known Cloud Computing Enviroments | Information Technology | Computer Information Systems | 2014 | Download |
Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms | Information Technology | Computer Information Systems | 2014 | Download |
Extracting instances to improve semantic matching in the domain of Renewable Energy | Information Technology | Computer Information Systems | 2014 | Download |
Increasing The Lifetime of Wireless Sensor Networks using LEACH Protocol | Information Technology | Computer Information Systems | 2014 | Download |
Intrusion Detectiopn System Based on Carpenter/Grossperg Artificial Neural Network | Information Technology | Computer Science | 2014 | Download |
Resource Allocation Technique to Obtain Energy Efficient Cloud | Information Technology | Computer Science | 2014 | Download |
Scaling Cloud resources under different Virtualization Hybervisors Types with Regards to Machine Utilization | Information Technology | Computer Information Systems | 2014 | Download |
Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method | Information Technology | Computer Science | 2014 | Download |
Text Image steganography Using LSD Method | Information Technology | Computer Science | 2014 | Download |
new techniqure to embed encrypted or code in colored image by using first and third lsb | Information Technology | Computer Information Systems | 2014 | Download |
Back Propagation Recursive Least Squares Algorithm for Intrusion Detection Systems | Information Technology | Computer Science | 2014 | Download |
Multimedia Information Acquisition and Retrieval Enhancement using Intelligent Search System_. | Information Technology | Computer Science | 2015 | Download |
Cost Break-Even Model for Cloud Computing | Information Technology | Computer Information Systems | 2015 | Download |
Computer Aided Diagnosis of Breast Cancer Using Image Processing Techniques and Neural Networks with Logistic Regression | Information Technology | Computer Science | 2015 | Download |
Kohonen SOM with conscience function neural network based energy efficient cluctering and routing wireless sensor networks | Information Technology | Computer Science | 2015 | Download |
New Technique for Cross-Platform Availability Control over Electronic Messages | Information Technology | Computer Information Systems | 2015 | Download |
Practical Measurements Framework for Software Integrity | Information Technology | Computer Science | 2015 | Download |
Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network | Information Technology | Computer Science | 2015 | Download |
Enhance the Security of Cloud Computing Environment Using Semantic Segregation Techniques | Information Technology | Computer Science | 2015 | Download |
User Authentication System Using Emoji pictures passwords | Information Technology | Computer Science | 2015 | Download |
Secure Communication Based on Encryption and LSB Steganography Voice | Information Technology | Computer Science | 2016 | Download |
Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes Model | Information Technology | Computer Science | 2015 | Download |
A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation | Information Technology | Computer Science | 2015 | Download |
A MULTI-MODEL KEYSTROKE DYNAMICS ANOMALY DETECTOR FOR USER AUTHENTICATION | Information Technology | Computer Science | 2016 | Download |
Comparative Analysis for the Performance of Order Preserving Encryption Technique | Information Technology | Computer Science | 2016 | Download |
A Content-Based Brain Tumor Images System for Classification, Retrieval and Diagnosis | Information Technology | Computer Science | 2016 | Download |
Data Gathering Using Mobile Elements In Wireless Sensors Networks (WSNs) | Information Technology | Computer Science | 2016 | Download |
Partial query processing over encrypted data with Object Relational Mapping. | Information Technology | Computer Science | 2016 | Download |
Enhancing the Performance of the Hybrid Recovery Method by Defining Video Content Type | Information Technology | Computer Information Systems | 2016 | Download |
Background Subtraction Using Coplanar Filter and Quadtree Decomposition for Objects Counting | Information Technology | Computer Information Systems | 2016 | Download |
Comparative Study between (SVM) and (KNN) Classifiers after adding (PCA) to Improve of IntrusionDetection System | Information Technology | Computer Information Systems | 2015 | Download |
Analytical Study for Measuring the Effects of Database Segregation Multi-tenancy Approaches on Cost and Performance in Cloud Computing | Information Technology | Computer Information Systems | 2015 | Download |
Voice Encryption Using Twin Stream Cipher Algorithm | Information Technology | Computer Science | 2016 | Download |
Performance Evaluation of Similarity Functions for Duplicate Record Detection | Information Technology | Computer Information Systems | 2011 | Download |
Proposed Model For Software Configuration Management Theoretical Tool | Information Technology | Computer Information Systems | 2011 | Download |
Performance Evaluation of Blocking Methods for Duplicate Record Detection | Information Technology | Computer Information Systems | 2010 | Download |
Towards Achieving, Self-Load Balancing In Autonomic Overlay Networks | Information Technology | Computer Science | 2012 | Download |
Precluding Software Piracy Using Asymmetric Cryptography | Information Technology | Computer Information Systems | 2009 | Download |
CFD_Mine: Discovery of Conditional Functional Dependencies in Relational Databases. | Information Technology | Computer Science | 2009 | Download |
A New Secure Architecture for Trust and Privacy on Social Network Sites | Information Technology | Computer Science | 2011 | Download |
A Comparative Study of Indexing Techniques for Relational Database Management Systems | Information Technology | Computer Information Systems | 2011 | Download |
The Effectiveness of Haar Features and Threshold in Multiple Face Detection Systems Based on Adaboost Algorithm | Information Technology | Computer Science | 2011 | Download |
Mobile Trade Agent Security | Information Technology | Computer Information Systems | 2011 | Download |
A Hybrid Approach for Web Change Detection | Information Technology | Computer Information Systems | 2009 | Download |
GPS – MCRM INTEGRATION SOLUTION | Information Technology | Computer Information Systems | 2009 | Download |
Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography | Information Technology | Computer Science | 2011 | Download |
A Decision Support System for E-banking Adoption in Jordan: A Critical Success Factors Perspective | Information Technology | Computer Information Systems | 2008 | Download |
A Secure Home Appliances Remote Control Model | Information Technology | Computer Science | 2014 | Download |
Image Steganography Technique Based on Predetermined Pattern and Histogram Analysis | Information Technology | Computer Science | 2015 | Download |
Hiding Secret Images within RGB Images Using an Enhanced LSB Method | Information Technology | Computer Science | 2014 | Download |
A Model for Cognitive Map Construction Using Spatial Information Indoor Environment | Information Technology | Computer Science | 2014 | Download |
Design of Anti Money Laundering Framework for Jordan | Information Technology | Computer Information Systems | 2009 | Download |
Integrating Internet of Things and Wireless Sensor Networks for Metropolitan Explosive Detection | Information Technology | Computer Science | 2014 | Download |
Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGA | Information Technology | Computer Information Systems | 2015 | Download |
Framework Model of Integration xRM with GIS | Information Technology | Computer Information Systems | 2011 | Download |
A Framework Model for Arabic Handwritten Text Recognition to Handle Missing Text Fragments | Information Technology | Computer Science | 2013 | Download |
Evaluating Semantic Measures by Computing the Coverage of a Condensed Text | Information Technology | Computer Science | 2016 | Download |
Enhanced Distributed Defense Mechanism Against Volumetric DDoS Attacks | Information Technology | Computer Science | 2017 | Download |
Offline Arabic Handwritten Isolated Character Recognition System Using Support vector Machine and Neural Network | Information Technology | Computer Science | 2017 | Download |
The Semantic Similarity Measures Using Arabic Ontology | Information Technology | Computer Science | 2017 | Download |
Detecting Phishing Emails Using Machine Learning Techniques | Information Technology | Computer Science | 2017 | Download |
Statistical Steganalysis Detector Model for 8-bit Depth Images | Information Technology | Computer Science | 2017 | Download |
Measuring the Quality of Online Learning Material Using Semantic Similarity Measures | Information Technology | Computer Science | 2017 | Download |
Statistical Arabic Grammar Analyzer Based on Rules Mining Approach Using Naïve Bayesian Algorithm | Information Technology | Computer Science | 2017 | Download |
Modified Random Early Detection (RED) Technique Using Various Congestion Indicators | Information Technology | Computer Information Systems | 2017 | Download |
Accuracy Evaluation of Brain Tumor Detection using Entropy-based Image Thresholding | Information Technology | Computer Information Systems | 2017 | Download |
Adoption Conceptual Framework based on Agility and Flexibility in Cloud Computing System | Information Technology | Computer Science | 2017 | Download |
Performance Analysis for Hashing Over Encrypted Data Techniques | Information Technology | Computer Information Systems | 2017 | Download |
Finding Cliques In Simulated Social Networks Using Graph Coloring Technique | Information Technology | Computer Science | 2017 | Download |
Building Ontology-based Metadata to Support Arabic Quality Assurance Documentation | Information Technology | Computer Science | 2017 | Download |
Multiple Pseudo Random Number Generators Implementation for Watermarking Technique | Information Technology | Computer Science | 2017 | Download |
A Signcryption Approach Based on Rabin Digital Signature Schemes | Information Technology | Computer Science | 2017 | Download |
Computation Complexity Improvement for Digital Signature Algorithm | Information Technology | Computer Science | 2017 | Download |
Security Enhancement of Image Steganography Using Embedded Integrity Features | Information Technology | Computer Science | 2017 | Download |
The Detection of Data Hiding in RGB Images Using Statistical Steganalysis | Information Technology | Computer Science | 2017 | Download |
An Improved Text Watermarking Algorithm for Color Images | Information Technology | Computer Science | 2017 | Download |
An anomaly detection model for signature authentication on mobile devices | Information Technology | Computer Science | 2018 | Download |
Image classification based on enhancement of local binary pattern | Information Technology | Computer Science | 2018 | Download |
Implementation of proposed lightweight cryptosystem for use in Cloud Computing Security | Information Technology | Computer Science | 2018 | Download |
Optimizing Indoor Tracking System for Wireless Sensor Networks Using ZigBee | Information Technology | Computer Science | 2018 | Download |
Comparative study for Order Preserving Encryption Characteristic | Information Technology | Computer Science | 2018 | Download |
Enhancement of Digital Signature Scheme | Information Technology | Computer Science | 2018 | Download |
PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics on Mobile Devices | Information Technology | Computer Science | 2019 | Download |
Improving AES Algorithm using Multiple Secret Keys | Information Technology | Computer Science | 2019 | Download |
Steganalysis of Color Images for Low Payload Detection | Information Technology | Computer Science | 2019 | Download |
Imperceptibility and Robustness Improvement using segmented DWT Watermarking Technique | Information Technology | Computer Science | 2019 | Download |
Article Reformatting Algorithm for Multiple Journal Template | Information Technology | Computer Science | 2019 | Download |
ANN and DNN-based Models for DDoS Detection via Network Traffic Forecasting | Information Technology | Computer Science | 2019 | Download |
Tuning Approach to Improve Multilayer Perceptron for Breast Cancer Prediction | Information Technology | Computer Science | 2019 | Download |
Automated Arabic Essay Grading System based on Support Vector Machine and Text Similarity Algorithm | Information Technology | Computer Science | 2019 | Download |
Strengthening the MD5 File Integrity Algorithm with User Fingerprint | Information Technology | Computer Science | 2019 | Download |
Image Analysis for Mandible Bone Properties on Cone-Beam CT to Detect Osteoporosis | Information Technology | Computer Science | 2019 | Download |
Efficient Graph-Based Image Segmentation for Natural Images | Information Technology | Computer Science | 2017 | Download |
A COMPARATIVE STUDY OF TWO OBJECTIVE FUNCTIONS | Information Technology | Computer Science | 2020 | Download |
User Authentication Based on Statistical Mouse Dynamics Biometrics | Information Technology | Computer Science | 2020 | Download |
A Hadoop map reduce implementation of C5.0 decision | Information Technology | Computer Science | 2020 | Download |
An Improved BIRCH Algorithm for Breast Cancer Clustering | Information Technology | Computer Science | 2020 | Download |
Toward an Arabic Essay Grading Benchmark | Information Technology | Computer Science | 2020 | Download |
How to Detect Phishing Website Using Three-Model Ensemble | Information Technology | Computer Science | 2020 | Download |
Deep CPC Deep Learning Model for Colorectal Polyps Classification (1) | Information Technology | Computer Science | 2020 | Download |
Enhanced Arabic Root-Based Lemmatizer | Information Technology | Computer Science | 2020 | Download |
Homomorphic Encryption of Text Documents | Information Technology | Cyber Security and Cloud Computing | 2020 | Download |
A New Symmetric Lightweight Encryption Algorithm Based on DNA for Internet of Things Devices | Information Technology | Cyber Security and Cloud Computing | 2021 | Download |
A Novel Framework to Secure Schema for Data Warehouse in Cloud Computing (Force Encryption Schema Solution) | Information Technology | Cyber Security and Cloud Computing | 2021 | Download |
Energy Efficient Localization Model in Mobile Computing | Information Technology | Cyber Security and Cloud Computing | 2021 | Download |
Agile Encryption Scheme for Multimedia Files Using Random Data | Information Technology | Computer Science | 2021 | Download |
An Empirical Study of Multi-instance RPL Protocol | Information Technology | Computer Science | 2021 | Download |
Detecting Bug Severity Level using Machine Learning Techniques | Information Technology | Computer Science | 2021 | Download |
Jordanian Companies’ Stock Price Prediction using Hybrid RNN with Long Term Short Memory and Tabu List Memory | Information Technology | Computer Science | 2021 | Download |
Lightweight Cryptosystem for IoT Image Encryption Using DNA | Information Technology | Computer Science | 2021 | Download |
Innovative Technique to Encrypt Data for Data Mining Purposes in Cloud Computing | Information Technology | Cyber Security and Cloud Computing | 2021 | Download |
The Impact of Cloud Computing Involvement on Competitive Advantage | Information Technology | Cyber Security and Cloud Computing | 2021 | Download |
The Impact of Cloud Computing Involvement on Competitive Advantage | Information Technology | Cyber Security and Cloud Computing | 2022 | Download |