Master Thesis Faculty of Information Technology
Name | Year | Faculty | Majors | Dowload |
---|---|---|---|---|
Task Scheduling Using Best-Level-Job-First on Private Cloud Computing | 2016 | Information Technology | Computer Science | Download |
A Method for Static Video Summarization for Reducing Power Consumption and Its Impact on Bandwidth | 2016 | Information Technology | Computer Science | Download |
Image Encryption System by Generating Chains from the Secret Key | 2016 | Information Technology | Computer Science | Download |
Performance Analysis for Fully and Partially Homomorphic Encryption Techniques | 2016 | Information Technology | Computer Science | Download |
A Comparative Study of Classification Techniques for English to Arabic Speech Recognition | 2016 | Information Technology | Computer Information Systems | Download |
A New Statistical Anomaly Detector Model for Keystroke Dynamics on Touch Mobile Devices | 2016 | Information Technology | Computer Science | Download |
The Hiding of Multimedia Secret Files in Dual RGB Cover Images Using LSB Steganography Techniques | 2016 | Information Technology | Computer Science | Download |
Developing Parallel Technique for the Internet of Things Devices by using local Map Reduce at the sink node. | 2016 | Information Technology | Computer Science | Download |
Analytical Study for the Mutable Order-Preserving Encoding with Periodically Encryption Key Changing | 2016 | Information Technology | Computer Science | Download |
Investigation on Order-Preserving Encryption for Database in Cloud Computing | 2016 | Information Technology | Computer Science | Download |
Applying the Kinect Device for Human Identification System in the ATM Environment | 2016 | Information Technology | Computer Science | Download |
A Customer - Oriented Software Development Life Cycle | 2008 | Information Technology | Computer Science | Download |
A Decision Support System for E-banking Adoption in Jordan : A Critical Success Factors Perspective | 2008 | Information Technology | Computer Information Systems | Download |
A Generic Menu - Based Interface for Web Querying | 2008 | Information Technology | Computer Information Systems | Download |
A Model For Designing And Adapting Mobile Learning Content | 2008 | Information Technology | Computer Information Systems | Download |
An Intelligent Face Authentication System for ATM aAccess | 2008 | Information Technology | Computer Science | Download |
Design Secure E-Voting Scheme | 2008 | Information Technology | Computer Science | Download |
Embedding Hex-Cells into Tree- Hybercube Network | 2008 | Information Technology | Computer Science | Download |
Towards An Ontology for Software Product Quality Attributes | 2009 | Information Technology | Computer Information Systems | Download |
A Model For E-Learning Content Design | 2009 | Information Technology | Computer Information Systems | Download |
A Multi-Layer Perceptron neural network Based -model for Face Detection | 2009 | Information Technology | Computer Science | Download |
design and implementation of mobile learning content model | 2009 | Information Technology | Computer Information Systems | Download |
Designing A Secure E- Payment protocol | 2009 | Information Technology | Computer Science | Download |
Towards Ontology For Reguirements Engineering process in E-Government Application | 2008 | Information Technology | Computer Information Systems | Download |
Deriving System Model From Business Process Model (JCR Case Study) | 2009 | Information Technology | Computer Information Systems | Download |
A knowledge based system for developing cognitive map based on geographical map | 2011 | Information Technology | Computer Science | Download |
A model for Outsourcing Monitoring System | 2010 | Information Technology | Computer Science | Download |
A Robust Framework for Watermarking System | 2010 | Information Technology | Computer Information Systems | Download |
Database fragmentation Technque for News Websites | 2009 | Information Technology | Computer Information Systems | Download |
Design A Model for Dynamic workflow Management System | 2010 | Information Technology | Computer Information Systems | Download |
Designing A model for Wireless Load Data Sheet in Aircraft | 2010 | Information Technology | Computer Information Systems | Download |
Developing a Payment System Using Contactless Smart card | 2010 | Information Technology | Computer Information Systems | Download |
mouse Gestural hindi Digits Recopgnition Using Neural Network | 2010 | Information Technology | Computer Science | Download |
THE VERIFICATION FROM THE CITIZEN IN E-GOVERNMENT APPLICATION | 2010 | Information Technology | Computer Information Systems | Download |
Using Architectural Blueprints for Intelligent Robot Cognitive Mapping as a Knowledge-based system | 2010 | Information Technology | Computer Information Systems | Download |
A secure electronic voting scheme based on evox-MA and revs voting blind signature protocols | 2011 | Information Technology | Computer Science | Download |
an efficient digital image watermarking system based on contourlet transform and discrete wavelet transform | 2011 | Information Technology | Computer Science | Download |
Anonymous and non-repudiation E-cash scheme based on partially blind sigature | 2011 | Information Technology | Computer Science | Download |
artifical neuro-fuzzy logic system human emotions | 2011 | Information Technology | Computer Science | Download |
desigen of intelligent database system for vehicle fault diagnosis | 2011 | Information Technology | Computer Science | Download |
intrusion detection model inspired by immune using k-means and naive bayes as hybrid learning approach | 2012 | Information Technology | Computer Science | Download |
A comparative study of duplicate record detection techniques | 2012 | Information Technology | Computer Science | Download |
A Hybrid statistical and morphological arabic language diacritizing system | 2012 | Information Technology | Computer Science | Download |
A Knowledge acquisition framework in trace - based reasoning for valuing knowledge | 2012 | Information Technology | Computer Science | Download |
A Proposed software description language for representing program logic in XML | 2012 | Information Technology | Computer Science | Download |
An enhanced steady state genetic algorithm model for misuse network intrusion detection system | 2012 | Information Technology | Computer Science | Download |
Communication impact on non-contiguous allocation strategies for 2- D mesh multicomputer system | 2012 | Information Technology | Computer Information Systems | Download |
Design and implementation of portal system for schools in less-developed area : A field study in karak governorate | 2012 | Information Technology | Computer Science | Download |
Developing a decision support system for seaport management case study : iraqi seaports | 2012 | Information Technology | Computer Information Systems | Download |
Developing a virtual-machine-based distributed web crawling model | 2012 | Information Technology | Computer Information Systems | Download |
evaluating semantic measures by computing the coverage of a condensed | 2016 | Information Technology | Computer Science | Download |
voice eneryption twin stream cipher algorithm | 2016 | Information Technology | Computer Science | Download |
enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process | 2012 | Information Technology | Computer Science | Download |
Geographical information systems in analysis and enhancement for problems solving and decision making | 2012 | Information Technology | Computer Information Systems | Download |
Improving scheduling on symmetric multiprocessing SMP architecture based on process behavior | 2012 | Information Technology | Computer Information Systems | Download |
Modeling and analysis of cloud collaborative commerce | 2012 | Information Technology | Computer Information Systems | Download |
XML database schema refinement through functional dependencies and normalization | 2012 | Information Technology | Computer Information Systems | Download |
A framework model for arabic handwritten text recognittion to handle missing text fragments | 2013 | Information Technology | Computer Science | Download |
A model for handwriting recognition using wavelet function and genetic algorithm | 2013 | Information Technology | Computer Information Systems | Download |
A Critical Analysis of Kamila Shamsie's Burnt Shadows | 2015 | Information Technology | Computer Information Systems | Download |
a semantic ontology based concept for measuring security compliance of cloud service providers | 2013 | Information Technology | Computer Information Systems | Download |
An efficient associative classification algorithm for text categorization | 2012 | Information Technology | Computer Information Systems | Download |
A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography Algorithms | 2016 | Information Technology | Computer Information Systems | Download |
An enhanced hopfield network model for misuse intrusion detection system | 2013 | Information Technology | Computer Science | Download |
An enhanced technique for segmentation and encrypt data to storing in cloud computing | 2013 | Information Technology | Computer Information Systems | Download |
automobile accident prediction and avoidance system using multilayer preceptron neural networks | 2013 | Information Technology | Computer Science | Download |
design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledge | 2013 | Information Technology | Computer Science | Download |
Developing a computer - based information system to improve the diagnosis of blood anemia | 2013 | Information Technology | Computer Information Systems | Download |
Developing a high-performance adjustable-quality data compressipn scheme for multimedia messaging | 2013 | Information Technology | Computer Science | Download |
Enhanced k_way method in apriori algorithm for mining the association rules through embedding SQL commands | 2013 | Information Technology | Computer Information Systems | Download |
Enhancement of a steganographic algorithm for hiding text messages in image | 2013 | Information Technology | Computer Science | Download |
Enhancing open space method in data hiding technique - text under text | 2013 | Information Technology | Computer Information Systems | Download |
Enhancing the compression ratio of the HCDC-based text compression scheme | 2013 | Information Technology | Computer Information Systems | Download |
hybrid technique for arabic text compression | 2013 | Information Technology | Computer Science | Download |
latent semantic analysis LSA and ontological concepts to support e-recruitment | 2013 | Information Technology | Computer Science | Download |
Real time arabic translation system for signboard images based on printed character recognition | 2013 | Information Technology | Computer Science | Download |
Using semantic ontology to evaluate tenders and bidders for e-government applications | 2013 | Information Technology | Computer Information Systems | Download |
Deriving a new Markup Language from the Extensible Markup Language (XML) to enhance Electrical Engineering Applicaions | 2014 | Information Technology | Computer Information Systems | Download |
a hybrid broadcasting technique based on massage priority in vanet | 2014 | Information Technology | Computer Science | Download |
A Model of Environment Representation Architecture for Intelligent Robot | 2014 | Information Technology | Computer Science | Download |
A new approach for real time Face recognition System using a modified Eigenfaces with Edge Tracking | 2014 | Information Technology | Computer Information Systems | Download |
An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data | 2014 | Information Technology | Computer Science | Download |
An Enhanced model For government applications in iraq | 2014 | Information Technology | Computer Information Systems | Download |
An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection | 2014 | Information Technology | Computer Information Systems | Download |
Bandwidth Saving method based Sharing Data Downloaded From Cloud Between Smartphones In Wifi Network | 2014 | Information Technology | Computer Science | Download |
Cloud Customer Relationship Management (CRM)Ontology | 2014 | Information Technology | Computer Information Systems | Download |
Comparative analysis of Database Performance for Well-Known Cloud Computing Enviroments | 2014 | Information Technology | Computer Information Systems | Download |
Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms | 2014 | Information Technology | Computer Information Systems | Download |
Extracting instances to improve semantic matching in the domain of Renewable Energy | 2014 | Information Technology | Computer Information Systems | Download |
Increasing The Lifetime of Wireless Sensor Networks using LEACH Protocol | 2014 | Information Technology | Computer Information Systems | Download |
Intrusion Detectiopn System Based on Carpenter/Grossperg Artificial Neural Network | 2014 | Information Technology | Computer Science | Download |
Resource Allocation Technique to Obtain Energy Efficient Cloud | 2014 | Information Technology | Computer Science | Download |
Scaling Cloud resources under different Virtualization Hybervisors Types with Regards to Machine Utilization | 2014 | Information Technology | Computer Information Systems | Download |
Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method | 2014 | Information Technology | Computer Science | Download |
Text Image steganography Using LSD Method | 2014 | Information Technology | Computer Science | Download |
new techniqure to embed encrypted or code in colored image by using first and third lsb | 2014 | Information Technology | Computer Information Systems | Download |
Back Propagation Recursive Least Squares Algorithm for Intrusion Detection Systems | 2014 | Information Technology | Computer Science | Download |
Multimedia Information Acquisition and Retrieval Enhancement using Intelligent Search System_. | 2015 | Information Technology | Computer Science | Download |
Cost Break-Even Model for Cloud Computing | 2015 | Information Technology | Computer Information Systems | Download |
Computer Aided Diagnosis of Breast Cancer Using Image Processing Techniques and Neural Networks with Logistic Regression | 2015 | Information Technology | Computer Science | Download |
Kohonen SOM with conscience function neural network based energy efficient cluctering and routing wireless sensor networks | 2015 | Information Technology | Computer Science | Download |
New Technique for Cross-Platform Availability Control over Electronic Messages | 2015 | Information Technology | Computer Information Systems | Download |
Practical Measurements Framework for Software Integrity | 2015 | Information Technology | Computer Science | Download |
Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network | 2015 | Information Technology | Computer Science | Download |
Enhance the Security of Cloud Computing Environment Using Semantic Segregation Techniques | 2015 | Information Technology | Computer Science | Download |
User Authentication System Using Emoji pictures passwords | 2015 | Information Technology | Computer Science | Download |
Secure Communication Based on Encryption and LSB Steganography Voice | 2016 | Information Technology | Computer Science | Download |
Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes Model | 2015 | Information Technology | Computer Science | Download |
A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation | 2015 | Information Technology | Computer Science | Download |
A MULTI-MODEL KEYSTROKE DYNAMICS ANOMALY DETECTOR FOR USER AUTHENTICATION | 2016 | Information Technology | Computer Science | Download |
Comparative Analysis for the Performance of Order Preserving Encryption Technique | 2016 | Information Technology | Computer Science | Download |
A Content-Based Brain Tumor Images System for Classification, Retrieval and Diagnosis | 2016 | Information Technology | Computer Science | Download |
Data Gathering Using Mobile Elements In Wireless Sensors Networks (WSNs) | 2016 | Information Technology | Computer Science | Download |
Partial query processing over encrypted data with Object Relational Mapping. | 2016 | Information Technology | Computer Science | Download |
Enhancing the Performance of the Hybrid Recovery Method by Defining Video Content Type | 2016 | Information Technology | Computer Information Systems | Download |
Background Subtraction Using Coplanar Filter and Quadtree Decomposition for Objects Counting | 2016 | Information Technology | Computer Information Systems | Download |
Comparative Study between (SVM) and (KNN) Classifiers after adding (PCA) to Improve of IntrusionDetection System | 2015 | Information Technology | Computer Information Systems | Download |
Analytical Study for Measuring the Effects of Database Segregation Multi-tenancy Approaches on Cost and Performance in Cloud Computing | 2015 | Information Technology | Computer Information Systems | Download |
Voice Encryption Using Twin Stream Cipher Algorithm | 2016 | Information Technology | Computer Science | Download |
Performance Evaluation of Similarity Functions for Duplicate Record Detection | 2011 | Information Technology | Computer Information Systems | Download |
Proposed Model For Software Configuration Management Theoretical Tool | 2011 | Information Technology | Computer Information Systems | Download |
Performance Evaluation of Blocking Methods for Duplicate Record Detection | 2010 | Information Technology | Computer Information Systems | Download |
Towards Achieving, Self-Load Balancing In Autonomic Overlay Networks | 2012 | Information Technology | Computer Science | Download |
Precluding Software Piracy Using Asymmetric Cryptography | 2009 | Information Technology | Computer Information Systems | Download |
CFD_Mine: Discovery of Conditional Functional Dependencies in Relational Databases. | 2009 | Information Technology | Computer Science | Download |
A New Secure Architecture for Trust and Privacy on Social Network Sites | 2011 | Information Technology | Computer Science | Download |
A Comparative Study of Indexing Techniques for Relational Database Management Systems | 2011 | Information Technology | Computer Information Systems | Download |
The Effectiveness of Haar Features and Threshold in Multiple Face Detection Systems Based on Adaboost Algorithm | 2011 | Information Technology | Computer Science | Download |
Mobile Trade Agent Security | 2011 | Information Technology | Computer Information Systems | Download |
A Hybrid Approach for Web Change Detection | 2009 | Information Technology | Computer Information Systems | Download |
GPS – MCRM INTEGRATION SOLUTION | 2009 | Information Technology | Computer Information Systems | Download |
Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography | 2011 | Information Technology | Computer Science | Download |
A Decision Support System for E-banking Adoption in Jordan: A Critical Success Factors Perspective | 2008 | Information Technology | Computer Information Systems | Download |
A Secure Home Appliances Remote Control Model | 2014 | Information Technology | Computer Science | Download |
Image Steganography Technique Based on Predetermined Pattern and Histogram Analysis | 2015 | Information Technology | Computer Science | Download |
Hiding Secret Images within RGB Images Using an Enhanced LSB Method | 2014 | Information Technology | Computer Science | Download |
A Model for Cognitive Map Construction Using Spatial Information Indoor Environment | 2014 | Information Technology | Computer Science | Download |
Design of Anti Money Laundering Framework for Jordan | 2009 | Information Technology | Computer Information Systems | Download |
Integrating Internet of Things and Wireless Sensor Networks for Metropolitan Explosive Detection | 2014 | Information Technology | Computer Science | Download |
Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGA | 2015 | Information Technology | Computer Information Systems | Download |
Framework Model of Integration xRM with GIS | 2011 | Information Technology | Computer Information Systems | Download |
A Framework Model for Arabic Handwritten Text Recognition to Handle Missing Text Fragments | 2013 | Information Technology | Computer Science | Download |
Evaluating Semantic Measures by Computing the Coverage of a Condensed Text | 2016 | Information Technology | Computer Science | Download |
Enhanced Distributed Defense Mechanism Against Volumetric DDoS Attacks | 2017 | Information Technology | Computer Science | Download |
Offline Arabic Handwritten Isolated Character Recognition System Using Support vector Machine and Neural Network | 2017 | Information Technology | Computer Science | Download |
The Semantic Similarity Measures Using Arabic Ontology | 2017 | Information Technology | Computer Science | Download |
Detecting Phishing Emails Using Machine Learning Techniques | 2017 | Information Technology | Computer Science | Download |
Statistical Steganalysis Detector Model for 8-bit Depth Images | 2017 | Information Technology | Computer Science | Download |
Measuring the Quality of Online Learning Material Using Semantic Similarity Measures | 2017 | Information Technology | Computer Science | Download |
Statistical Arabic Grammar Analyzer Based on Rules Mining Approach Using Naïve Bayesian Algorithm | 2017 | Information Technology | Computer Science | Download |
Modified Random Early Detection (RED) Technique Using Various Congestion Indicators | 2017 | Information Technology | Computer Information Systems | Download |
Accuracy Evaluation of Brain Tumor Detection using Entropy-based Image Thresholding | 2017 | Information Technology | Computer Information Systems | Download |
Adoption Conceptual Framework based on Agility and Flexibility in Cloud Computing System | 2017 | Information Technology | Computer Science | Download |
Performance Analysis for Hashing Over Encrypted Data Techniques | 2017 | Information Technology | Computer Information Systems | Download |
Finding Cliques In Simulated Social Networks Using Graph Coloring Technique | 2017 | Information Technology | Computer Science | Download |
Building Ontology-based Metadata to Support Arabic Quality Assurance Documentation | 2017 | Information Technology | Computer Science | Download |
Multiple Pseudo Random Number Generators Implementation for Watermarking Technique | 2017 | Information Technology | Computer Science | Download |
A Signcryption Approach Based on Rabin Digital Signature Schemes | 2017 | Information Technology | Computer Science | Download |
Computation Complexity Improvement for Digital Signature Algorithm | 2017 | Information Technology | Computer Science | Download |
Security Enhancement of Image Steganography Using Embedded Integrity Features | 2017 | Information Technology | Computer Science | Download |
The Detection of Data Hiding in RGB Images Using Statistical Steganalysis | 2017 | Information Technology | Computer Science | Download |
An Improved Text Watermarking Algorithm for Color Images | 2017 | Information Technology | Computer Science | Download |
An anomaly detection model for signature authentication on mobile devices | 2018 | Information Technology | Computer Science | Download |
Image classification based on enhancement of local binary pattern | 2018 | Information Technology | Computer Science | Download |
Implementation of proposed lightweight cryptosystem for use in Cloud Computing Security | 2018 | Information Technology | Computer Science | Download |
Optimizing Indoor Tracking System for Wireless Sensor Networks Using ZigBee | 2018 | Information Technology | Computer Science | Download |
Comparative study for Order Preserving Encryption Characteristic | 2018 | Information Technology | Computer Science | Download |
Enhancement of Digital Signature Scheme | 2018 | Information Technology | Computer Science | Download |
PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics on Mobile Devices | 2019 | Information Technology | Computer Science | Download |
Improving AES Algorithm using Multiple Secret Keys | 2019 | Information Technology | Computer Science | Download |
Steganalysis of Color Images for Low Payload Detection | 2019 | Information Technology | Computer Science | Download |
Imperceptibility and Robustness Improvement using segmented DWT Watermarking Technique | 2019 | Information Technology | Computer Science | Download |
Article Reformatting Algorithm for Multiple Journal Template | 2019 | Information Technology | Computer Science | Download |
ANN and DNN-based Models for DDoS Detection via Network Traffic Forecasting | 2019 | Information Technology | Computer Science | Download |
Tuning Approach to Improve Multilayer Perceptron for Breast Cancer Prediction | 2019 | Information Technology | Computer Science | Download |
Automated Arabic Essay Grading System based on Support Vector Machine and Text Similarity Algorithm | 2019 | Information Technology | Computer Science | Download |
Strengthening the MD5 File Integrity Algorithm with User Fingerprint | 2019 | Information Technology | Computer Science | Download |
Image Analysis for Mandible Bone Properties on Cone-Beam CT to Detect Osteoporosis | 2019 | Information Technology | Computer Science | Download |
Efficient Graph-Based Image Segmentation for Natural Images | 2017 | Information Technology | Computer Science | Download |
A COMPARATIVE STUDY OF TWO OBJECTIVE FUNCTIONS | 2020 | Information Technology | Computer Science | Download |
User Authentication Based on Statistical Mouse Dynamics Biometrics | 2020 | Information Technology | Computer Science | Download |
A Hadoop map reduce implementation of C5.0 decision | 2020 | Information Technology | Computer Science | Download |
An Improved BIRCH Algorithm for Breast Cancer Clustering | 2020 | Information Technology | Computer Science | Download |
Toward an Arabic Essay Grading Benchmark | 2020 | Information Technology | Computer Science | Download |
How to Detect Phishing Website Using Three-Model Ensemble | 2020 | Information Technology | Computer Science | Download |
Deep CPC Deep Learning Model for Colorectal Polyps Classification (1) | 2020 | Information Technology | Computer Science | Download |
Enhanced Arabic Root-Based Lemmatizer | 2020 | Information Technology | Computer Science | Download |
Homomorphic Encryption of Text Documents | 2020 | Information Technology | Cyber Security and Cloud Computing | Download |
A New Symmetric Lightweight Encryption Algorithm Based on DNA for Internet of Things Devices | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
A Novel Framework to Secure Schema for Data Warehouse in Cloud Computing (Force Encryption Schema Solution) | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
Energy Efficient Localization Model in Mobile Computing | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
Agile Encryption Scheme for Multimedia Files Using Random Data | 2021 | Information Technology | Computer Science | Download |
An Empirical Study of Multi-instance RPL Protocol | 2021 | Information Technology | Computer Science | Download |
Detecting Bug Severity Level using Machine Learning Techniques | 2021 | Information Technology | Computer Science | Download |
Jordanian Companies’ Stock Price Prediction using Hybrid RNN with Long Term Short Memory and Tabu List Memory | 2021 | Information Technology | Computer Science | Download |
Lightweight Cryptosystem for IoT Image Encryption Using DNA | 2021 | Information Technology | Computer Science | Download |
Innovative Technique to Encrypt Data for Data Mining Purposes in Cloud Computing | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
The Impact of Cloud Computing Involvement on Competitive Advantage | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
The Impact of Cloud Computing Involvement on Competitive Advantage | 2022 | Information Technology | Cyber Security and Cloud Computing | Download |