• العربية
    • English
  • English 
    • العربية
    • English
  • Login
Home
Publisher PoliciesTerms of InterestHelp Videos
Submit Thesis
IntroductionIUGSpace Policies
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search 
  •   Home
  • Faculty of Information Technology
  • PhD and MSc Theses- Faculty of Information Technology
  • Search
  •   Home
  • Faculty of Information Technology
  • PhD and MSc Theses- Faculty of Information Technology
  • Search

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 30

  • Sort Options:
  • Relevance
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Improve Radiologists Productivity in Hospitals Based on Data Mining Techniques

El-Sibakhi, Mona Abdul-Fattah (الجامعة الإسلامية - غزة, 2017)
Modern radiology departments have enormous databases of images and text. Like any databases, which are rich in data content, but poor in information content. Data Mining is an effective tool that extracts useful information ...
Thumbnail

Prediction Model Based on Time Series for Chloride and Nitrate Concentration in Municipal Groundwater Wells in Gaza Strip

Elastal, Shukri M. A. (الجامعة الإسلامية - غزة, 2017)
Thumbnail

Steganography within LSB and Second LSB with Randomness Depending on Indicators Using Secret Key

Saqer, Wesam Monir (الجامعة الإسلامية - غزة, 2017)
Steganography is the art of science that is concerned with hiding communications by hiding secret information inside a medium as a carrier, called cover medium, to be sent over communication channels to meant parties. ...
Thumbnail

LSBs Steganography Based on R-Indicator

Abo Mousa, Sheren Mohammed (الجامعة الإسلامية - غزة, 2017)
Steganography is the art and science of hiding secret data inside other data called the cover data. This makes it hard to detect the existence of the secret data by third parties. There are different models of carrier that ...
Thumbnail

A Model to Detect the Integrity Violation of Shared File in the Cloud

Lulu, Safaa Taher (الجامعة الإسلامية - غزة, 2016)
Nowadays, there is an increasing trend in outsourcing data to remote cloud servers, where users store their data at specific storage space offered by Cloud service provider (CSP) with low cost. Many of cloud service provider ...
Thumbnail

detecting polymorphic no operations in shellcode based on mining techniques

Al-khateeb, Fady Riad (الجامعة الإسلامية - غزة, 2016)
Thumbnail

Time Estimation for Next Request to Prevent DOS Attack on RESTful Services

Subaih, Mona Ismail (الجامعة الإسلامية - غزة, 2016)
Systems are getting integrated faster and easier using web API, as applications and cloud API’s nowadays are shifting to REST-based services in the detriment of SOAP-based ones. RESTful services are a lightweight alternative ...
Thumbnail

Detection and Prevention of XSS Vulnerabilities in MOODLE

Al-azaiza, Rola (الجامعة الإسلامية - غزة, 2016)
MOODLE (Modular Object-oriented Dynamic Learning Environment) is one of the most popular e-learning environment in the world, MOODLE is same as web application that vulnerable to illegal attacks so, the need for confidentiality, ...
Thumbnail

Malware Detection Based on Permissions on Android Platform Using Data Mining

Nasman, Mohammed I. (الجامعة الإسلامية - غزة, 2016)
With the spreading of smart mobile devices to nearly every person, Android Operating System is dominating the mobile’s operating systems. Due to the weak policy of submitting application to Google Play store, attackers ...
Thumbnail

An Approach for Detecting and Preventing DoS Attacks in LAN

Tabash, Majed I M (الجامعة الإسلامية - غزة, 2015)
Nowadays, Denial of service (DoS) attacks, have become a major security threat to networks and to the Internet, DoS is harmful to the networks as it delays legitimate users from accessing the server, usually services such ...
  • 1
  • 2
  • 3

The institutional repository of the Islamic University of Gaza was established as part of the ROMOR project that has been co-funded with support from the European Commission under the ERASMUS + European programme. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Contact Us | Send Feedback
 

 

Browse

All of IUGSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsSupervisorsThis CollectionBy Issue DateAuthorsTitlesSubjectsSupervisors

My Account

LoginRegister

Discover

AuthorAbo Mousa, Sheren Mohammed (1)Abu Hamada, Mohammed H. (1) Abusilmiyeh, Zakaria M. (1) Al-azaiza, Rola (1) Al-khateeb, Fady Riad (1) Alakhras, Mohammed O. (1) Albiltaje, Heba S (1) Atallah, Rasha R. (1) Awad, Badran M (1) El-buhaisi, Areej (1)... View MoreSupervisor
Barhoom, Tawfiq S. (30)
Date Issued2015 (8)2014 (5)2016 (5)2012 (4)2017 (4)2013 (3)2011 (1)

The institutional repository of the Islamic University of Gaza was established as part of the ROMOR project that has been co-funded with support from the European Commission under the ERASMUS + European programme. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Contact Us | Send Feedback