Browsing by Supervisor "mmikki"
Now showing items 1-20 of 22
-
A High Performance Enhanced Sequential and Parallel AES
(the islamic university, 2011)In this thesis we discuss how to make a balance between the key size and the speed of the encryption algorithm such that the encryption algorithm has high speed and strong encryption. Since security always comes at a cost ... -
A Scalable Trust Management scheme for Mobile Ad Hoc Networks
(الجامعة الإسلامية - غزة, 2013)Mobile ad hoc networks MANETs, have special resource requirements and different topology features, they establish themselves on fly without reliance on centralized or specialized entities such as base stations. All the ... -
An Efficient Approach for Data Encryption Using Two Keys
(الجامعة الإسلامية - غزة, 2015)Internet security has witnessed an explosive and exciting growth in the past three decades . Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure ... -
An Interception System for ISPs (ISISP)
(الجامعة الإسلامية - غزة, 2016)Due to rapid changes and consequent new threats to networks there is a need for the design of systems that enhances network security. These systems make network administrators fully aware of the potential vulnerability of ... -
Automatic Arabic Text Summarization
(الجامعة الإسلامية - غزة, 2015)Arabic language is one of the most famous languages in the world; its importance comes from being the fifth language that has native speakers in the world. Creating a good summary of the text is one of the most important ... -
brain tumor detection based on curvelet and artificial neural netrwork
(الجامعة الإسلامية - غزة, 2013) -
Building an Effective Stemmer for Arabic Language to Improve Search Effectiveness
(الجامعة الإسلامية - غزة, 2014)Creating good stemming rules for the Arabic language comes from the importance of Arabic language as the sixth most used language in the world. Stemming is very important in information Retrieval, data mining, language ... -
Congestion Management in Interconnection Networks
(الجامعة الإسلامية - غزة, 2012)Interconnection networks (INs) are becoming more and more powerful and hence place increasingly higher demands on the networks that interconnect their processors or processing nodes. Many of the applications running on ... -
Content-Based Image Retrieval (CBIR) System Based on the Clustering and Genetic Algorithm
(الجامعة الإسلامية - غزة, 2013)Nowadays, virtually all spheres of human life including commerce, government, academics, hospitals, crime prevention, surveillance, engineering and historical research use information as images, so the volume of digital ... -
Design and Implementation of a Standard Library for WebCube Components and Events
(الجامعة الإسلامية - غزة, 2013)3D web browsing is a promising trend for interaction with web content. WebCube is a new model for 3D web browsing that capitalizes on features of virtual reality technology with those of conventional browsing in order to ... -
Developing Interactive Cross Lingual Information Retrieval Tool
(الجامعة الإسلامية - غزة, 2017)The growing requirement on the Internet have made users access to the information expressed in a language other than their own , which led to Cross lingual information retrieval (CLIR) .CLIR is established as a major topic ... -
Enhanced Learning Management System (LMSs)
(الجامعة الإسلامية - غزة, 2013)SAQ is Web-based software you use over the internet with a web browser. You don’t have to install any CDs, download any software, or worry about upgrades. If you use an online bank or web-based email program like Gmail, ... -
Enhanced RED Protocol Using Multipath Routing
(الجامعة الإسلامية - غزة, 2015)Our proposed Enhanced Random Early Detection (ERED) gateways for congestion avoidance in packet switched networks. The gateway detects incipient congestion by computing the average queue size after converting to secondary ... -
Hacker Location Detection System (HLDS) for IPv6 Routers
(the islamic university, 2012)The Enhanced IPv6-next generation routers and IPv6-network architectures are two of the most important aspects of the Internet today. The users’ demand of new and more complex services, as well as significant constraints ... -
Improved Spam Detection Using DBSCAN and Advanced Digest Algorithm
(الجامعة الإسلامية - غزة, 2013)Mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. Nowadays, detecting and filtering are still the most ... -
Metaheuristic Clustering Algorithm
(the islamic university, 2010)In this thesis we describe an essential problem in data clustering and present some solutions for it. We investigate using distance measures other than Euclidean type for improving the performance of clustering. We also ... -
Modern Approach for WEB Applications Vulnerability Analysis
(الجامعة الإسلامية - المدينة, 2013)The numbers of security vulnerabilities that are being found today are much higher in applications than in operating systems. This means that the attacks aimed at web applications are exploiting vulnerabilities at the ... -
Novel Hybrid Cryptosystem Based on Quasi Group, Chaotic and ElGamal Cryptography
(the islamic university, 2011)In this thesis, a hybrid cryptosystem as proposed, it consists of public and private key cryptosystems; it combines the advantages of these cryptosystem types. Elgamal public key cryptosystem is improved; its disadvantages ... -
Operating System Response to Router Advertisement Packet in IPv6
(الجامعة الإسلامية - غزة, 2015)With growth of internet IPv4 address will run out soon. So the need of new IP protocol is indispensable. IPv6 with 128-bit address space is developed and maintain the support of IPv4 protocols with some upgrades such as ... -
Operating System Response to Router Advertisement Packet in IPv6.
(2015)With growth of internet IPv4 address will run out soon. So the need of new IP protocol is indispensable. IPv6 with 128-bit address space is developed and maintain the support of IPv4 protocols with some upgrades such as ...