Browsing PhD and MSc Theses- Faculty of Information Technology by Title
Now showing items 43-62 of 124
-
automatic arabic text summarization for large scale multiple documents using genetic algorithm and mapreduce
(الجامعة الإسلامية - غزة, 2016) -
Automatic Arabic Text Summarization System (AATSS) Based on Semantic Feature Extraction
(the islamic university, 2011)Recently, one of the problems arisen due to the amount of information and it’s availability on the web, is the increased need for effective and powerful tool to automatically summarize text. For English and European languages ... -
Automatic Linking of Short Arabic Text to Wikipedia Articles
(الجامعة الإسلامية - غزة, 2016)Given the enormous amount of unstructured texts available on the Web, there has been an emerging need to increase discoverability of and accessibility to these texts. One of the proposed solutions is to annotate texts with ... -
Automatic Ontology-Based Document Annotation for Arabic Information Retrieval
(الجامعة الإسلامية - غزة, 2013)The r R apid d D evelopment s in the semantic search technology give s motivation to build an efficient and scalable document annotation and retrieval techniques. Most existing methods and techniques in the field of document ... -
automatic usability evaluation on educational websites using data mining methods
(الجامعة الإسلامية - غزة, 2013) -
breast cancer severity degree predication unsing data mining techniques in the gaza strip
(الجامعة الإسلامية - غزة, 2018) -
Building and Evaluating a SOA-Based Model for Purchase Order Management in E-Commerce System
(الجامعة الإسلامية - غزة, 2012)E-Commerce systems are characterized by complex Web applications that use different operating systems and different technologies. One of the most popular E-Commerce applications is conducted between businesses (B2B) and ... -
buliding a sentiment lexicon for the palestinian dialect
(الجامعة الإسلامية - غزة, 2016) -
Client Side Action Against Cross Site Scripting Attacks
(the islamic university, 2012)Cross-Site Scripting is one of the main attacks of many Web-based services. Since Web browsers support the execution of scripting commands embedded in the retrieved content, Attacker can gain this feature maliciously to ... -
Combine Genetic Algorithm and Particle Swarm Optimization Approach for Neural Network Classification
(الجامعة الإسلامية - غزة, 2016)Artificial Neural Network (ANN) has played a significant role in many areas because of its ability to solve many complex problems that mathematical methods failed to solve. However, it has some shortcomings that lead it ... -
concepts seeds gathering and dataset updating algorithm for handling concept drift
(الجامعة الإسلامية - غزة, 2015) -
Detecting and Counting People Faces in Images Using Deep Learning Approach
(الجامعة الإسلامية بغزة, 2019-12)Computer vision has received increased attention in recent years. Researchers have made remarkable advancement in the field of computer vision. Computer vision applications include object detection and image classification. ... -
Detecting DDoS Attack Using A Multilayer Data Mining techniques
(الجامعة الإسلامية - غزة, 2015)Availability is one of the three main components of computer security, along with confidentiality and integrity. One of the major threats to network security is Denial of Service (DDoS),which is a relatively simple, but ... -
Detecting Inactivity Segments in E-learning Video Recordings ( DISE )
(الجامعة الإسلامية - غزة, 2015)Lecture video recordings used in e-learning typically contain segments of inactivity which are better removed in order to save storage and bandwidth load, and to decrease viewing time and effort. This problem is also common ... -
detecting polymorphic no operations in shellcode based on mining techniques
(الجامعة الإسلامية - غزة, 2016) -
Detecting Subjectivity in Staff Performance Appraisals Using Text Mining (Teachers’ Appraisals of Palestinian Government Case Study)
(الجامعة الإسلامية - غزة, 2015)As human resources are the resources that carry out many important activities in an organization, Human Resource Management (HRM) should catch up with the latest developments to manage these resources efficiently. Staff ... -
Detection and Prevention of XSS Vulnerabilities in MOODLE
(الجامعة الإسلامية - غزة, 2016)MOODLE (Modular Object-oriented Dynamic Learning Environment) is one of the most popular e-learning environment in the world, MOODLE is same as web application that vulnerable to illegal attacks so, the need for confidentiality, ... -
Detection Model for Pharming Attack Based on IP-Address Check and Website Predictability
(الجامعة الإسلامية - غزة, 2013)With the deployment of broadband Internet access, the importance of saving sensitive personal and financial information becomes more troubling, so it has become necessary to search for appropriate and effective solutions ... -
Developing Agile Applications Using Iterative Database Design Model
(الجامعة الإسلامية - غزة, 2016)Software development are becoming more complex day after day, customer requirements becomes more complex and changing a lot, and software development methodologies are trying to respond to those emergent business needs and ... -
Diagnosing Heart Diseases Using Ontology and SWRL Rules
(الجامعة الإسلامية - غزة, 2017)Heart disease is the most common disease worldwide which is considered the main cause of death. According to cardiologists in Palestine, the heart disease was the main cause of death among the Palestinians, at a rate of ...