Now showing items 1-20 of 22

    • Thumbnail

      A High Performance Enhanced Sequential and Parallel AES

      El-faleet, Fadi Zuhair Ibrahem (the islamic university, 2011)
      In this thesis we discuss how to make a balance between the key size and the speed of the encryption algorithm such that the encryption algorithm has high speed and strong encryption. Since security always comes at a cost ...
    • Thumbnail

      A Scalable Trust Management scheme for Mobile Ad Hoc Networks

      Khattab, Yaser Ali (الجامعة الإسلامية - غزة, 2013)
      Mobile ad hoc networks MANETs, have special resource requirements and different topology features, they establish themselves on fly without reliance on centralized or specialized entities such as base stations. All the ...
    • Thumbnail

      An Efficient Approach for Data Encryption Using Two Keys

      Abusalim, Belal Y (الجامعة الإسلامية - غزة, 2015)
      Internet security has witnessed an explosive and exciting growth in the past three decades . Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure ...
    • Thumbnail

      An Interception System for ISPs (ISISP)

      Bader, Ahed Ahmad A Elrahman (الجامعة الإسلامية - غزة, 2016)
      Due to rapid changes and consequent new threats to networks there is a need for the design of systems that enhances network security. These systems make network administrators fully aware of the potential vulnerability of ...
    • Thumbnail

      Automatic Arabic Text Summarization

      Elfarra, Eyad (الجامعة الإسلامية - غزة, 2015)
      Arabic language is one of the most famous languages in the world; its importance comes from being the fifth language that has native speakers in the world. Creating a good summary of the text is one of the most important ...
    • Thumbnail

      brain tumor detection based on curvelet and artificial neural netrwork

      Al Kahlout, Muhammad R. (الجامعة الإسلامية - غزة, 2013)
    • Thumbnail

      Building an Effective Stemmer for Arabic Language to Improve Search Effectiveness

      Shagalieh, Ahmed Ibraheem J (الجامعة الإسلامية - غزة, 2014)
      Creating good stemming rules for the Arabic language comes from the importance of Arabic language as the sixth most used language in the world. Stemming is very important in information Retrieval, data mining, language ...
    • Thumbnail

      Congestion Management in Interconnection Networks

      Bolbol, Raed Mohammed (الجامعة الإسلامية - غزة, 2012)
      Interconnection networks (INs) are becoming more and more powerful and hence place increasingly higher demands on the networks that interconnect their processors or processing nodes. Many of the applications running on ...
    • Thumbnail

      Content-Based Image Retrieval (CBIR) System Based on the Clustering and Genetic Algorithm

      Mikhraq, Ahmed K. (الجامعة الإسلامية - غزة, 2013)
      Nowadays, virtually all spheres of human life including commerce, government, academics, hospitals, crime prevention, surveillance, engineering and historical research use information as images, so the volume of digital ...
    • Thumbnail

      Design and Implementation of a Standard Library for WebCube Components and Events

      Sunoallh, Saad J. M. (الجامعة الإسلامية - غزة, 2013)
      3D web browsing is a promising trend for interaction with web content. WebCube is a new model for 3D web browsing that capitalizes on features of virtual reality technology with those of conventional browsing in order to ...
    • Thumbnail

      Developing Interactive Cross Lingual Information Retrieval Tool

      Mortaja, Mohammed S (الجامعة الإسلامية - غزة, 2017)
      The growing requirement on the Internet have made users access to the information expressed in a language other than their own , which led to Cross lingual information retrieval (CLIR) .CLIR is established as a major topic ...
    • Thumbnail

      Enhanced Learning Management System (LMSs)

      Timraz, Mohammed A.k (الجامعة الإسلامية - غزة, 2013)
      SAQ is Web-based software you use over the internet with a web browser. You don’t have to install any CDs, download any software, or worry about upgrades. If you use an online bank or web-based email program like Gmail, ...
    • Thumbnail

      Enhanced RED Protocol Using Multipath Routing

      Al Abrag, Farid K. O. (الجامعة الإسلامية - غزة, 2015)
      Our proposed Enhanced Random Early Detection (ERED) gateways for congestion avoidance in packet switched networks. The gateway detects incipient congestion by computing the average queue size after converting to secondary ...
    • Thumbnail

      Hacker Location Detection System (HLDS) for IPv6 Routers

      El Khateeb, Tayseer Jaber Ahmed (the islamic university, 2012)
      The Enhanced IPv6-next generation routers and IPv6-network architectures are two of the most important aspects of the Internet today. The users’ demand of new and more complex services, as well as significant constraints ...
    • Thumbnail

      Improved Spam Detection Using DBSCAN and Advanced Digest Algorithm

      Ahmed, Alaa (الجامعة الإسلامية - غزة, 2013)
      Mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. Nowadays, detecting and filtering are still the most ...
    • Thumbnail

      Metaheuristic Clustering Algorithm

      Abudalfa, Shadi I. (the islamic university, 2010)
      In this thesis we describe an essential problem in data clustering and present some solutions for it. We investigate using distance measures other than Euclidean type for improving the performance of clustering. We also ...
    • Thumbnail

      Modern Approach for WEB Applications Vulnerability Analysis

      Jnena, Rami M. (الجامعة الإسلامية - المدينة, 2013)
      The numbers of security vulnerabilities that are being found today are much higher in applications than in operating systems. This means that the attacks aimed at web applications are exploiting vulnerabilities at the ...
    • Thumbnail

      Novel Hybrid Cryptosystem Based on Quasi Group, Chaotic and ElGamal Cryptography

      Abu Ghali, Heba Ali Mohammed (the islamic university, 2011)
      In this thesis, a hybrid cryptosystem as proposed, it consists of public and private key cryptosystems; it combines the advantages of these cryptosystem types. Elgamal public key cryptosystem is improved; its disadvantages ...
    • Thumbnail

      Operating System Response to Router Advertisement Packet in IPv6

      Nabi, Saeb Reyad Abd El (الجامعة الإسلامية - غزة, 2015)
      With growth of internet IPv4 address will run out soon. So the need of new IP protocol is indispensable. IPv6 with 128-bit address space is developed and maintain the support of IPv4 protocols with some upgrades such as ...
    • Thumbnail

      Operating System Response to Router Advertisement Packet in IPv6.

      Abd EL Nabi, Saeb Reyad (2015)
      With growth of internet IPv4 address will run out soon. So the need of new IP protocol is indispensable. IPv6 with 128-bit address space is developed and maintain the support of IPv4 protocols with some upgrades such as ...