Search
Now showing items 1-9 of 9
enhanced context aware role based access control framework for pervasive environment
(الجامعة الإسلامية - غزة, 2014)
A model to ensure tha integrity of user's data in the cloud
(الجامعة الإسلامية - غزة, 2014)
Automated Complaint System Using Text Mining Techniques
(الجامعة الإسلامية - غزة, 2014)
Complaints System is the system that manages the process of how organizations handle, manage, respond and report to client’s complaints. Manual organizing for large number of requests is extremely difficult, time consuming, ...
Using opinion mining method for product improvement
(الجامعة الإسلامية - غزة, 2014)
Melanoma Detection Using Mobile Technology and Feature-Based Classification Techniques
(الجامعة الإسلامية - غزة, 2014)
Melanoma is one of the most dangerous types of skin cancer in terms of the ratio of death cases. Probability of death increases when it is diagnosed late. However, it is possible to treat melanoma successfully when diagnosed ...
Filtering Features and Recommender Model For Messaging System of MOODLE FRMM
(الجامعة الإسلامية - غزة, 2014)
E-learning systems are powerful way for enriching learning and teaching process. With the spread of this culture, there is a need for Learning management system as MOODLE, aTutor , canvas and Sakai. MOODLE allows students ...
Free Viewpoint Video Based on Stitching Technique
(الجامعة الإسلامية - غزة, 2014)
Image stitching is a technique used for creating one panoramic scene from multiple images. It is used in panoramic photography and video where the viewer can only scroll horizontally and vertically across the scene. However, ...
Exploring Guidance for prevent aginst XSS attacks in open CMS
(الجامعة الإسلامية - غزة, 2014)
implementing and comprising of otp techniques totp , hotp , crotp to prevent replay attack in radius protocol
(الجامعة الإسلامية - غزة, 2014)