Browsing PhD and MSc Theses- Faculty of Information Technology by Title
Now showing items 1-20 of 124
-
A Cloud-Based Applications Transformation Framework for the Palestinian e-Government
(الجامعة الإسلامية - غزة, 2015)The acceleration in the pace of software development in the Palestinian e-Government shows a critical issue in delivering services due to the lack of resources and due the geographically distributed government institutes ... -
A Confidentiality Protection Approach Based on Three-Way Fragmentation for Cloud Out-Sourcing of Mobile Data
(الجامعة الإسلامية - غزة, 2015)Despite the increasing dependency on smart phones and mobile data-sensitive applications, these devices have limited storage and processing capabilities. They operate in unreliable environments leading to possible loss of ... -
A DATA MINING BASED FRAUD DETECTION MODEL FOR WATER CONSUMPTION BILLING SYSTEM IN MOG
(الجامعة الإسلامية - غزة, 2012)Financial losses due to financial frauds are mounting, recognizing the problem of losses and the area of suspicious behavior is the challenge of fraud detection. Applying data mining techniques on financial statements can ... -
A High Performance Parallel Classifier for Large-Scale Arabic Text
(الجامعة الإسلامية - غزة, 2013)Text classification has become one of the most important techniques in text mining. It is the process of classifying documents into predefined categories or classes based on their content. A number of machine learning ... -
A Mobile Context-Aware Recommendation System Based on DBpedia
(الجامعة الإسلامية - غزة, 2017)Context-aware recommendation systems generate more relevant recommendations by adapting them to the specific contextual situation of the user. They have been widely used for tourism to recommend locations relevant to the ... -
A Model for Strengthening Accuracy in Detecting the Anomalous Firewall Rules in Small Network (SADAR)
(الجامعة الإسلامية - غزة, 2015)The firewall policy rules is a core technology that has an important role in the network security, through controlling the traffic with income and outgoing the packets over the network. Moreover, the management of the ... -
A Model to Detect the Integrity Violation of Shared File in the Cloud
(الجامعة الإسلامية - غزة, 2016)Nowadays, there is an increasing trend in outsourcing data to remote cloud servers, where users store their data at specific storage space offered by Cloud service provider (CSP) with low cost. Many of cloud service provider ... -
A model to ensure tha integrity of user's data in the cloud
(الجامعة الإسلامية - غزة, 2014) -
A New Approach Based on Soft Frequent Pattern Mining for Detecting Significant Events in Arabic Microblogs
(الجامعة الإسلامية بغزة, 2018-08)Recently, Microblogs have become the new communication medium between users. It allows millions of users to post and share content of their own activities, opinions about different topics. Posting about occurring real-world ... -
A Personalized Context-Dependent Web Search Engine Using Word Net (Sama Search Engine)
(the islamic university, 2012)It is a fact that the growth of information resources on the WWW is increasing at every moment. So, it has increasingly become difficult for users to find information satisfies their individual needs. The current search ... -
A SOA Based Framework for the Palestinian e-Government Integrated Central Database
(the islamic university, 2011)The Integrated Central Database is one of the core components in the Palestinian e-Government Technical Framework. The current Integrated Central Database model lacks features such as: Interoperability, Flexibility, and ... -
A Two-Phase Snake Method for Object Segmentation against Background Clutter and Boundary Concavities
(الجامعة الإسلامية - غزة, 2015)Various object segmentation methods have been proposed based on the classical Active Contour Model (Snake), which has been used extensively to locate object boundaries in images. However, these methods have limited capability ... -
A Web-Based Collaborative e-Learning Environment Based on a Model of Social Cognitive Development Theories
(الجامعة الإسلامية - غزة, 2012)Putting all powerful Web technologies like Cloud Computing and Web 2.0 technologies together in an e-learning environment maximizes the opportunity for learners to acquire knowledge and skills in an interactive, collaborative ... -
abnormal network trafic detection based on clustering and classification techniques dos case study
(الجامعة الإسلامية - غزة, 2013) -
Ad Campaigns Generation Using Deep Learning Approach
(الجامعة الإسلامية بغزة, 2019-04)An advertising campaign is a set of advertising messages that related to each others. It identifies the message of promotion of a brand, a product, or a service. Campaigns usually use multiple media to promote the product ... -
Adaptation of Acoustic and Language Model for Improving Arabic Automatic Speech Recognition
(الجامعة الإسلامية - غزة, 2016)First and foremost, I thank Almighty Allah for giving me the inspiration, patience, determination and strength to complete this work successfully I would like to express my sincere thanks and appreciation to my supervisor ... -
Adaptive Worms Detection Model Based on Multi Classifiers
(الجامعة الإسلامية - غزة, 2012)In recent times, the networks security has become a place of interest of researchers, threats has become an issue for each networks system, and a source of concern. Worms attacks have been major security threats to networks ... -
An Adaptive Active Contour Model for Building Extraction from Aerial Images
(الجامعة الإسلامية - غزة, 2016)Building extraction from aerial images is one of the recent topics of remote sensing that used in many applications such as urban planning, disaster management, military planning, and Geographic Information Systems (GIS). ... -
an analytical study of perception of palestine in western social media based on twitter
(الجامعة الإسلامية - غزة, 2017)