Master Thesis Faculty of Information Technology

NameYearFacultyMajorsDowload
Task Scheduling Using Best-Level-Job-First on Private Cloud Computing2016Information TechnologyComputer Science Download
A Method for Static Video Summarization for Reducing Power Consumption and Its Impact on Bandwidth2016Information TechnologyComputer Science Download
Image Encryption System by Generating Chains from the Secret Key2016Information TechnologyComputer Science Download
Performance Analysis for Fully and Partially Homomorphic Encryption Techniques2016Information TechnologyComputer Science Download
A Comparative Study of Classification Techniques for English to Arabic Speech Recognition2016Information TechnologyComputer Information SystemsDownload
A New Statistical Anomaly Detector Model for Keystroke Dynamics on Touch Mobile Devices2016Information TechnologyComputer Science Download
The Hiding of Multimedia Secret Files in Dual RGB Cover Images Using LSB Steganography Techniques2016Information TechnologyComputer Science Download
Developing Parallel Technique for the Internet of Things Devices by using local Map Reduce at the sink node.2016Information TechnologyComputer Science Download
Analytical Study for the Mutable Order-Preserving Encoding with Periodically Encryption Key Changing2016Information TechnologyComputer Science Download
Investigation on Order-Preserving Encryption for Database in Cloud Computing2016Information TechnologyComputer Science Download
Applying the Kinect Device for Human Identification System in the ATM Environment2016Information TechnologyComputer Science Download
A Customer - Oriented Software Development Life Cycle2008Information TechnologyComputer Science Download
A Decision Support System for E-banking Adoption in Jordan : A Critical Success Factors Perspective2008Information TechnologyComputer Information SystemsDownload
A Generic Menu - Based Interface for Web Querying2008Information TechnologyComputer Information SystemsDownload
A Model For Designing And Adapting Mobile Learning Content2008Information TechnologyComputer Information SystemsDownload
An Intelligent Face Authentication System for ATM aAccess2008Information TechnologyComputer Science Download
Design Secure E-Voting Scheme2008Information TechnologyComputer Science Download
Embedding Hex-Cells into Tree- Hybercube Network2008Information TechnologyComputer Science Download
Towards An Ontology for Software Product Quality Attributes2009Information TechnologyComputer Information SystemsDownload
A Model For E-Learning Content Design2009Information TechnologyComputer Information SystemsDownload
A Multi-Layer Perceptron neural network Based -model for Face Detection2009Information TechnologyComputer Science Download
design and implementation of mobile learning content model2009Information TechnologyComputer Information SystemsDownload
Designing A Secure E- Payment protocol2009Information TechnologyComputer Science Download
Towards Ontology For Reguirements Engineering process in E-Government Application2008Information TechnologyComputer Information SystemsDownload
Deriving System Model From Business Process Model (JCR Case Study)2009Information TechnologyComputer Information SystemsDownload
A knowledge based system for developing cognitive map based on geographical map2011Information TechnologyComputer Science Download
A model for Outsourcing Monitoring System2010Information TechnologyComputer Science Download
A Robust Framework for Watermarking System2010Information TechnologyComputer Information SystemsDownload
Database fragmentation Technque for News Websites2009Information TechnologyComputer Information SystemsDownload
Design A Model for Dynamic workflow Management System2010Information TechnologyComputer Information SystemsDownload
Designing A model for Wireless Load Data Sheet in Aircraft2010Information TechnologyComputer Information SystemsDownload
Developing a Payment System Using Contactless Smart card2010Information TechnologyComputer Information SystemsDownload
mouse Gestural hindi Digits Recopgnition Using Neural Network2010Information TechnologyComputer Science Download
THE VERIFICATION FROM THE CITIZEN IN E-GOVERNMENT APPLICATION2010Information TechnologyComputer Information SystemsDownload
Using Architectural Blueprints for Intelligent Robot Cognitive Mapping as a Knowledge-based system2010Information TechnologyComputer Information SystemsDownload
A secure electronic voting scheme based on evox-MA and revs voting blind signature protocols2011Information TechnologyComputer Science Download
an efficient digital image watermarking system based on contourlet transform and discrete wavelet transform2011Information TechnologyComputer Science Download
Anonymous and non-repudiation E-cash scheme based on partially blind sigature2011Information TechnologyComputer Science Download
artifical neuro-fuzzy logic system human emotions2011Information TechnologyComputer Science Download
desigen of intelligent database system for vehicle fault diagnosis2011Information TechnologyComputer Science Download
intrusion detection model inspired by immune using k-means and naive bayes as hybrid learning approach2012Information TechnologyComputer Science Download
A comparative study of duplicate record detection techniques2012Information TechnologyComputer Science Download
A Hybrid statistical and morphological arabic language diacritizing system2012Information TechnologyComputer Science Download
A Knowledge acquisition framework in trace - based reasoning for valuing knowledge2012Information TechnologyComputer Science Download
A Proposed software description language for representing program logic in XML2012Information TechnologyComputer Science Download
An enhanced steady state genetic algorithm model for misuse network intrusion detection system2012Information TechnologyComputer Science Download
Communication impact on non-contiguous allocation strategies for 2- D mesh multicomputer system2012Information TechnologyComputer Information SystemsDownload
Design and implementation of portal system for schools in less-developed area : A field study in karak governorate2012Information TechnologyComputer Science Download
Developing a decision support system for seaport management case study : iraqi seaports2012Information TechnologyComputer Information SystemsDownload
Developing a virtual-machine-based distributed web crawling model2012Information TechnologyComputer Information SystemsDownload
evaluating semantic measures by computing the coverage of a condensed2016Information TechnologyComputer Science Download
voice eneryption twin stream cipher algorithm2016Information TechnologyComputer Science Download
enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process2012Information TechnologyComputer Science Download
Geographical information systems in analysis and enhancement for problems solving and decision making2012Information TechnologyComputer Information SystemsDownload
Improving scheduling on symmetric multiprocessing SMP architecture based on process behavior2012Information TechnologyComputer Information SystemsDownload
Modeling and analysis of cloud collaborative commerce2012Information TechnologyComputer Information SystemsDownload
XML database schema refinement through functional dependencies and normalization2012Information TechnologyComputer Information SystemsDownload
A framework model for arabic handwritten text recognittion to handle missing text fragments2013Information TechnologyComputer Science Download
A model for handwriting recognition using wavelet function and genetic algorithm2013Information TechnologyComputer Information SystemsDownload
A Critical Analysis of Kamila Shamsie's Burnt Shadows2015Information TechnologyComputer Information SystemsDownload
a semantic ontology based concept for measuring security compliance of cloud service providers2013Information TechnologyComputer Information SystemsDownload
An efficient associative classification algorithm for text categorization2012Information TechnologyComputer Information SystemsDownload
A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography Algorithms2016Information TechnologyComputer Information SystemsDownload
An enhanced hopfield network model for misuse intrusion detection system2013Information TechnologyComputer Science Download
An enhanced technique for segmentation and encrypt data to storing in cloud computing2013Information TechnologyComputer Information SystemsDownload
automobile accident prediction and avoidance system using multilayer preceptron neural networks2013Information TechnologyComputer Science Download
design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledge2013Information TechnologyComputer Science Download
Developing a computer - based information system to improve the diagnosis of blood anemia2013Information TechnologyComputer Information SystemsDownload
Developing a high-performance adjustable-quality data compressipn scheme for multimedia messaging2013Information TechnologyComputer Science Download
Enhanced k_way method in apriori algorithm for mining the association rules through embedding SQL commands2013Information TechnologyComputer Information SystemsDownload
Enhancement of a steganographic algorithm for hiding text messages in image2013Information TechnologyComputer Science Download
Enhancing open space method in data hiding technique - text under text2013Information TechnologyComputer Information SystemsDownload
Enhancing the compression ratio of the HCDC-based text compression scheme2013Information TechnologyComputer Information SystemsDownload
hybrid technique for arabic text compression2013Information TechnologyComputer Science Download
latent semantic analysis LSA and ontological concepts to support e-recruitment2013Information TechnologyComputer Science Download
Real time arabic translation system for signboard images based on printed character recognition2013Information TechnologyComputer Science Download
Using semantic ontology to evaluate tenders and bidders for e-government applications2013Information TechnologyComputer Information SystemsDownload
Deriving a new Markup Language from the Extensible Markup Language (XML) to enhance Electrical Engineering Applicaions2014Information TechnologyComputer Information SystemsDownload
a hybrid broadcasting technique based on massage priority in vanet2014Information TechnologyComputer Science Download
A Model of Environment Representation Architecture for Intelligent Robot2014Information TechnologyComputer Science Download
A new approach for real time Face recognition System using a modified Eigenfaces with Edge Tracking2014Information TechnologyComputer Information SystemsDownload
An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data2014Information TechnologyComputer Science Download
An Enhanced model For government applications in iraq2014Information TechnologyComputer Information SystemsDownload
An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection2014Information TechnologyComputer Information SystemsDownload
Bandwidth Saving method based Sharing Data Downloaded From Cloud Between Smartphones In Wifi Network2014Information TechnologyComputer Science Download
Cloud Customer Relationship Management (CRM)Ontology2014Information TechnologyComputer Information SystemsDownload
Comparative analysis of Database Performance for Well-Known Cloud Computing Enviroments2014Information TechnologyComputer Information SystemsDownload
Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms2014Information TechnologyComputer Information SystemsDownload
Extracting instances to improve semantic matching in the domain of Renewable Energy2014Information TechnologyComputer Information SystemsDownload
Increasing The Lifetime of Wireless Sensor Networks using LEACH Protocol2014Information TechnologyComputer Information SystemsDownload
Intrusion Detectiopn System Based on Carpenter/Grossperg Artificial Neural Network2014Information TechnologyComputer Science Download
Resource Allocation Technique to Obtain Energy Efficient Cloud2014Information TechnologyComputer Science Download
Scaling Cloud resources under different Virtualization Hybervisors Types with Regards to Machine Utilization2014Information TechnologyComputer Information SystemsDownload
Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method2014Information TechnologyComputer Science Download
Text Image steganography Using LSD Method2014Information TechnologyComputer Science Download
new techniqure to embed encrypted or code in colored image by using first and third lsb2014Information TechnologyComputer Information SystemsDownload
Back Propagation Recursive Least Squares Algorithm for Intrusion Detection Systems2014Information TechnologyComputer Science Download
Multimedia Information Acquisition and Retrieval Enhancement using Intelligent Search System_.2015Information TechnologyComputer Science Download
Cost Break-Even Model for Cloud Computing2015Information TechnologyComputer Information SystemsDownload
Computer Aided Diagnosis of Breast Cancer Using Image Processing Techniques and Neural Networks with Logistic Regression2015Information TechnologyComputer Science Download
Kohonen SOM with conscience function neural network based energy efficient cluctering and routing wireless sensor networks2015Information TechnologyComputer Science Download
New Technique for Cross-Platform Availability Control over Electronic Messages2015Information TechnologyComputer Information SystemsDownload
Practical Measurements Framework for Software Integrity2015Information TechnologyComputer Science Download
Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network2015Information TechnologyComputer Science Download
Enhance the Security of Cloud Computing Environment Using Semantic Segregation Techniques2015Information TechnologyComputer Science Download
User Authentication System Using Emoji pictures passwords2015Information TechnologyComputer Science Download
Secure Communication Based on Encryption and LSB Steganography Voice2016Information TechnologyComputer Science Download
Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes Model2015Information TechnologyComputer Science Download
A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation2015Information TechnologyComputer Science Download
A MULTI-MODEL KEYSTROKE DYNAMICS ANOMALY DETECTOR FOR USER AUTHENTICATION2016Information TechnologyComputer Science Download
Comparative Analysis for the Performance of Order Preserving Encryption Technique2016Information TechnologyComputer Science Download
A Content-Based Brain Tumor Images System for Classification, Retrieval and Diagnosis2016Information TechnologyComputer Science Download
Data Gathering Using Mobile Elements In Wireless Sensors Networks (WSNs)2016Information TechnologyComputer Science Download
Partial query processing over encrypted data with Object Relational Mapping.2016Information TechnologyComputer Science Download
Enhancing the Performance of the Hybrid Recovery Method by Defining Video Content Type2016Information TechnologyComputer Information SystemsDownload
Background Subtraction Using Coplanar Filter and Quadtree Decomposition for Objects Counting2016Information TechnologyComputer Information SystemsDownload
Comparative Study between (SVM) and (KNN) Classifiers after adding (PCA) to Improve of IntrusionDetection System2015Information TechnologyComputer Information SystemsDownload
Analytical Study for Measuring the Effects of Database Segregation Multi-tenancy Approaches on Cost and Performance in Cloud Computing2015Information TechnologyComputer Information SystemsDownload
Voice Encryption Using Twin Stream Cipher Algorithm2016Information TechnologyComputer Science Download
Performance Evaluation of Similarity Functions for Duplicate Record Detection2011Information TechnologyComputer Information SystemsDownload
Proposed Model For Software Configuration Management Theoretical Tool2011Information TechnologyComputer Information SystemsDownload
Performance Evaluation of Blocking Methods for Duplicate Record Detection2010Information TechnologyComputer Information SystemsDownload
Towards Achieving, Self-Load Balancing In Autonomic Overlay Networks2012Information TechnologyComputer Science Download
Precluding Software Piracy Using Asymmetric Cryptography2009Information TechnologyComputer Information SystemsDownload
CFD_Mine: Discovery of Conditional Functional Dependencies in Relational Databases.2009Information TechnologyComputer Science Download
A New Secure Architecture for Trust and Privacy on Social Network Sites2011Information TechnologyComputer Science Download
A Comparative Study of Indexing Techniques for Relational Database Management Systems2011Information TechnologyComputer Information SystemsDownload
The Effectiveness of Haar Features and Threshold in Multiple Face Detection Systems Based on Adaboost Algorithm2011Information TechnologyComputer Science Download
Mobile Trade Agent Security2011Information TechnologyComputer Information SystemsDownload
A Hybrid Approach for Web Change Detection2009Information TechnologyComputer Information SystemsDownload
GPS – MCRM INTEGRATION SOLUTION2009Information TechnologyComputer Information SystemsDownload
Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography2011Information TechnologyComputer Science Download
A Decision Support System for E-banking Adoption in Jordan: A Critical Success Factors Perspective2008Information TechnologyComputer Information SystemsDownload
A Secure Home Appliances Remote Control Model2014Information TechnologyComputer Science Download
Image Steganography Technique Based on Predetermined Pattern and Histogram Analysis2015Information TechnologyComputer Science Download
Hiding Secret Images within RGB Images Using an Enhanced LSB Method2014Information TechnologyComputer Science Download
A Model for Cognitive Map Construction Using Spatial Information Indoor Environment2014Information TechnologyComputer Science Download
Design of Anti Money Laundering Framework for Jordan2009Information TechnologyComputer Information SystemsDownload
Integrating Internet of Things and Wireless Sensor Networks for Metropolitan Explosive Detection2014Information TechnologyComputer Science Download
Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGA2015Information TechnologyComputer Information SystemsDownload
Framework Model of Integration xRM with GIS2011Information TechnologyComputer Information SystemsDownload
A Framework Model for Arabic Handwritten Text Recognition to Handle Missing Text Fragments2013Information TechnologyComputer Science Download
Evaluating Semantic Measures by Computing the Coverage of a Condensed Text2016Information TechnologyComputer Science Download
Enhanced Distributed Defense Mechanism Against Volumetric DDoS Attacks2017Information TechnologyComputer Science Download
Offline Arabic Handwritten Isolated Character Recognition System Using Support vector Machine and Neural Network2017Information TechnologyComputer Science Download
The Semantic Similarity Measures Using Arabic Ontology2017Information TechnologyComputer Science Download
Detecting Phishing Emails Using Machine Learning Techniques2017Information TechnologyComputer Science Download
Statistical Steganalysis Detector Model for 8-bit Depth Images2017Information TechnologyComputer Science Download
Measuring the Quality of Online Learning Material Using Semantic Similarity Measures2017Information TechnologyComputer Science Download
Statistical Arabic Grammar Analyzer Based on Rules Mining Approach Using Naïve Bayesian Algorithm2017Information TechnologyComputer Science Download
Modified Random Early Detection (RED) Technique Using Various Congestion Indicators2017Information TechnologyComputer Information SystemsDownload
Accuracy Evaluation of Brain Tumor Detection using Entropy-based Image Thresholding2017Information TechnologyComputer Information SystemsDownload
Adoption Conceptual Framework based on Agility and Flexibility in Cloud Computing System2017Information TechnologyComputer Science Download
Performance Analysis for Hashing Over Encrypted Data Techniques2017Information TechnologyComputer Information SystemsDownload
Finding Cliques In Simulated Social Networks Using Graph Coloring Technique2017Information TechnologyComputer Science Download
Building Ontology-based Metadata to Support Arabic Quality Assurance Documentation2017Information TechnologyComputer Science Download
Multiple Pseudo Random Number Generators Implementation for Watermarking Technique2017Information TechnologyComputer Science Download
A Signcryption Approach Based on Rabin Digital Signature Schemes2017Information TechnologyComputer Science Download
Computation Complexity Improvement for Digital Signature Algorithm2017Information TechnologyComputer Science Download
Security Enhancement of Image Steganography Using Embedded Integrity Features2017Information TechnologyComputer Science Download
The Detection of Data Hiding in RGB Images Using Statistical Steganalysis2017Information TechnologyComputer Science Download
An Improved Text Watermarking Algorithm for Color Images2017Information TechnologyComputer Science Download
An anomaly detection model for signature authentication on mobile devices2018Information TechnologyComputer Science Download
Image classification based on enhancement of local binary pattern2018Information TechnologyComputer Science Download
Implementation of proposed lightweight cryptosystem for use in Cloud Computing Security2018Information TechnologyComputer Science Download
Optimizing Indoor Tracking System for Wireless Sensor Networks Using ZigBee2018Information TechnologyComputer Science Download
Comparative study for Order Preserving Encryption Characteristic2018Information TechnologyComputer Science Download
Enhancement of Digital Signature Scheme2018Information TechnologyComputer Science Download
PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics on Mobile Devices2019Information TechnologyComputer Science Download
Improving AES Algorithm using Multiple Secret Keys2019Information TechnologyComputer Science Download
Steganalysis of Color Images for Low Payload Detection2019Information TechnologyComputer Science Download
Imperceptibility and Robustness Improvement using segmented DWT Watermarking Technique2019Information TechnologyComputer Science Download
Article Reformatting Algorithm for Multiple Journal Template2019Information TechnologyComputer Science Download
ANN and DNN-based Models for DDoS Detection via Network Traffic Forecasting2019Information TechnologyComputer Science Download
Tuning Approach to Improve Multilayer Perceptron for Breast Cancer Prediction2019Information TechnologyComputer Science Download
Automated Arabic Essay Grading System based on Support Vector Machine and Text Similarity Algorithm2019Information TechnologyComputer Science Download
Strengthening the MD5 File Integrity Algorithm with User Fingerprint2019Information TechnologyComputer Science Download
Image Analysis for Mandible Bone Properties on Cone-Beam CT to Detect Osteoporosis2019Information TechnologyComputer Science Download
Efficient Graph-Based Image Segmentation for Natural Images2017Information TechnologyComputer Science Download
A COMPARATIVE STUDY OF TWO OBJECTIVE FUNCTIONS2020Information TechnologyComputer Science Download
User Authentication Based on Statistical Mouse Dynamics Biometrics2020Information TechnologyComputer Science Download
A Hadoop map reduce implementation of C5.0 decision2020Information TechnologyComputer Science Download
An Improved BIRCH Algorithm for Breast Cancer Clustering2020Information TechnologyComputer Science Download
Toward an Arabic Essay Grading Benchmark2020Information TechnologyComputer Science Download
How to Detect Phishing Website Using Three-Model Ensemble2020Information TechnologyComputer Science Download
Deep CPC Deep Learning Model for Colorectal Polyps Classification (1)2020Information TechnologyComputer Science Download
Enhanced Arabic Root-Based Lemmatizer2020Information TechnologyComputer Science Download
Homomorphic Encryption of Text Documents2020Information TechnologyCyber Security and Cloud Computing Download
A New Symmetric Lightweight Encryption Algorithm Based on DNA for Internet of Things Devices2021Information TechnologyCyber Security and Cloud Computing Download
A Novel Framework to Secure Schema for Data Warehouse in Cloud Computing (Force Encryption Schema Solution)2021Information TechnologyCyber Security and Cloud Computing Download
Energy Efficient Localization Model in Mobile Computing2021Information TechnologyCyber Security and Cloud Computing Download
Agile Encryption Scheme for Multimedia Files Using Random Data2021Information TechnologyComputer Science Download
An Empirical Study of Multi-instance RPL Protocol2021Information TechnologyComputer Science Download
Detecting Bug Severity Level using Machine Learning Techniques2021Information TechnologyComputer Science Download
Jordanian Companies’ Stock Price Prediction using Hybrid RNN with Long Term Short Memory and Tabu List Memory2021Information TechnologyComputer Science Download
Lightweight Cryptosystem for IoT Image Encryption Using DNA2021Information TechnologyComputer Science Download
Innovative Technique to Encrypt Data for Data Mining Purposes in Cloud Computing2021Information TechnologyCyber Security and Cloud Computing Download
The Impact of Cloud Computing Involvement on Competitive Advantage2021Information TechnologyCyber Security and Cloud Computing Download
The Impact of Cloud Computing Involvement on Competitive Advantage2022Information TechnologyCyber Security and Cloud Computing Download