Browsing PhD and MSc Theses- Faculty of Information Technology by Title
Now showing items 51-70 of 124
-
Client Side Action Against Cross Site Scripting Attacks
(the islamic university, 2012)Cross-Site Scripting is one of the main attacks of many Web-based services. Since Web browsers support the execution of scripting commands embedded in the retrieved content, Attacker can gain this feature maliciously to ... -
Combine Genetic Algorithm and Particle Swarm Optimization Approach for Neural Network Classification
(الجامعة الإسلامية - غزة, 2016)Artificial Neural Network (ANN) has played a significant role in many areas because of its ability to solve many complex problems that mathematical methods failed to solve. However, it has some shortcomings that lead it ... -
concepts seeds gathering and dataset updating algorithm for handling concept drift
(الجامعة الإسلامية - غزة, 2015) -
Detecting and Counting People Faces in Images Using Deep Learning Approach
(الجامعة الإسلامية بغزة, 2019-12)Computer vision has received increased attention in recent years. Researchers have made remarkable advancement in the field of computer vision. Computer vision applications include object detection and image classification. ... -
Detecting DDoS Attack Using A Multilayer Data Mining techniques
(الجامعة الإسلامية - غزة, 2015)Availability is one of the three main components of computer security, along with confidentiality and integrity. One of the major threats to network security is Denial of Service (DDoS),which is a relatively simple, but ... -
Detecting Inactivity Segments in E-learning Video Recordings ( DISE )
(الجامعة الإسلامية - غزة, 2015)Lecture video recordings used in e-learning typically contain segments of inactivity which are better removed in order to save storage and bandwidth load, and to decrease viewing time and effort. This problem is also common ... -
detecting polymorphic no operations in shellcode based on mining techniques
(الجامعة الإسلامية - غزة, 2016) -
Detecting Subjectivity in Staff Performance Appraisals Using Text Mining (Teachers’ Appraisals of Palestinian Government Case Study)
(الجامعة الإسلامية - غزة, 2015)As human resources are the resources that carry out many important activities in an organization, Human Resource Management (HRM) should catch up with the latest developments to manage these resources efficiently. Staff ... -
Detection and Prevention of XSS Vulnerabilities in MOODLE
(الجامعة الإسلامية - غزة, 2016)MOODLE (Modular Object-oriented Dynamic Learning Environment) is one of the most popular e-learning environment in the world, MOODLE is same as web application that vulnerable to illegal attacks so, the need for confidentiality, ... -
Detection Model for Pharming Attack Based on IP-Address Check and Website Predictability
(الجامعة الإسلامية - غزة, 2013)With the deployment of broadband Internet access, the importance of saving sensitive personal and financial information becomes more troubling, so it has become necessary to search for appropriate and effective solutions ... -
Developing Agile Applications Using Iterative Database Design Model
(الجامعة الإسلامية - غزة, 2016)Software development are becoming more complex day after day, customer requirements becomes more complex and changing a lot, and software development methodologies are trying to respond to those emergent business needs and ... -
Diagnosing Heart Diseases Using Ontology and SWRL Rules
(الجامعة الإسلامية - غزة, 2017)Heart disease is the most common disease worldwide which is considered the main cause of death. According to cardiologists in Palestine, the heart disease was the main cause of death among the Palestinians, at a rate of ... -
effect of information technology based intervention on glycemic control of children suffering from diabetes
(جامعة عين شمس - مصر, 2015) -
Efficient Adaptive Load Balancing Algorithm for Cloud Computing Under Bursty Workloads By Sally Fouad Issawi Supervised By: Dr. Alaa
(الجامعة الإسلامية - غزة, 2015)Cloud computing is a recent emerging technology in IT industry. It is an evolution of previous computing models such as grid computing. It enables a wide range of users to access a large sharing pool of resources over the ... -
Efficient Arabic Word Outline by Combining Active Contour Model and Corner Detection
(الجامعة الإسلامية - غزة, 2017)Graphical curves and surfaces fitting are hot areas of research studies and application, such as artistic applications, analysis applications and encoding purposes. Outline capture of digital word images is important in ... -
Efficient Load Balancing Algorithm in Cloud Computing
(الجامعة الإسلامية - غزة, 2015)Recently, cloud computing become a new global trend of computing. It is a modern style of using the power of Internet and wide area network (WAN) to offer resources remotely. It’s a new solution and strategy to achieve ... -
enhanced context aware role based access control framework for pervasive environment
(الجامعة الإسلامية - غزة, 2014) -
Enhancing of CryptoBI Algorithm for Data Security in Local Area Network
(الجامعة الإسلامية - غزة, 2015)The CryptoBI version1 “A Novel Cryptography Method Based on Image for Key Generation” algorithm is a new type of symmetric encryption algorithm that prevents the attacks and avoids key exchange between the two sides of ... -
exploiting wikipedia to support exploratory arabic search on the web
(الجامعة الإسلامية - غزة, 2016) -
Exploring Guidance for prevent aginst XSS attacks in open CMS
(الجامعة الإسلامية - غزة, 2014)