Computer Science
Permanent URI for this collection
Browse
Browsing Computer Science by Subject "دراسات عليا"
Now showing 1 - 20 of 55
Results Per Page
Sort Options
- ItemAn Aggregate Scalable Scheme for Expanding the Crossbar Switch Network; Design and Performance Analysis(AL-Quds University, 2004-09-05) أحلام محمد درويش قريع; Ahlam Mohammed Darwish Qrie; عبدالكريم عياد; Rashid JAYOUSI; Luai MALHISNew computer network topology, called Penta-S, is simulated. This network is built of cross bar switch modules. Each module connects 32 computer nodes. Each node has two ports, one connects the node to the crossbar switch module and the other connects the node to a correspondent client node in another module through a shuffle link. The performance of this network is simulated under various network sizes, packet lengths and loads. The results are compared with those obtained from Macramé project for Clos multistage interconnection network and 2D-Grid network. The throughput of Penta-S falls between the throughput of Clos and the throughput of 2D-Grid networks. The maximum throughput of Penta-S was obtained at packet length of 128 bytes. Also the throughput grows linearly with the network size. On the opposite of Clos and 2D-Grid networks, the per-node throughput of Penta-S improves as the network size grows. The per-packet latency proved to be better than that of Clos network for large packet lengths and high loads. Also the packet latency proved to be nearly constant against various loads. The cost-efficiency of Penta-S proved to be better than those of 2D-Grid and Clos networks for large number of nodes (>200 nodes in the case of 2D-Grid and >350 nodes in the case of Clos).On the opposite of other networks, the cost-efficiency of Penta-S grows as its size grows. So this topology suits large networks and high traffic loads.
- ItemSemantic Resolution and Mapping in E-Learning System(AL-Quds University, 2009-04-11) ياسمين ابراهيم عزمي بالي; Yasmin Ibrahim azmi Bali; رشيد الجيوسي; Nedal Kafri; Nizar Awartani
- Itemاستخلاص الاهداف التعليمية من النص العربي على اساس تصنيفات بلوم(AL-Quds University, 2019-06-23) طارق عصام عبد العزيز علي; Tareq I A Ali; بديع سرطاوي; رشيد جيوسي; رضوان طهبوب
- Itemاعداد نظام توصية لبيئة تعليمية اعتماداً على تحصيل الطلاب في مخرجات عملية التعلم(AL-Quds University, 2018-06-03) عبير حسن عبد الرحيم دار موسى; ABEER H A dar mousa; بديع سرطاوي; Kamel Hashem; Ahmad EwaisStudents in any learning environment differ in their level of knowledge, achieved learning outcomes, learning style, preferences, misunderstand and attempts in solving and addressing problems when their expectations are not met. When a student searches the web as an attempt to solve a problem, he suffers from the large number of resources which are, in most cases, not related to his “needs”, or may be related but complex and advance. The result of his search might make him more confused, scattered, depressed and finally result in wasting his time which – in some cases -may have negative effects on his achievements. From here comes the need for an intelligent learning system that can guide studentsbased on their needs. This research attempts to design and build an educational recommender system for a web-based learning environment in order to generate meaningful recommendations of the most interested and relevant learning materials that suit students’ needs based on their profiles1 . This can be achieved by accessing students’ history, exploring their learning navigation patterns and making use of similar students’ experiences and their success stories. The study proposed a design for a hybrid recommender system architecture which consists of two recommendation approaches: the content and collaborative filtering. The study concentrates on the collaborative recommender engine which will recommend learning materials based on students’ level of knowledge, looking at active students' profiles, and achievements in both learning outcomes and learning outcomes levels making use of similar students’ success stories and reflecting their good experience on active student who are in the same level of knowledge. The design of the collaborative recommender engine includes the “learning” module from which the engine learns past students’ access pattern and the “advising” module from which the engine reflects the experience of similar success stories on active students. The content base recommender engine with its suggested stages is considered as future work, the research used the k-mean cluster algorithm to find out similar students where five distance function are used: Euclidean, Correlation. Jaccard,cosine and Manhattan. The cosine function shows to be the most accurate distance function with the minimum SSE but the highest processing time that doesn’t differ a lot when compared the rest functions. The best number of clusters for the selected dataset was determined using three methods Elbow, Gap-statistic and average Silhouette approach where the best number of cluster shows to be three. The research used the two result rating matrices of similar good and good students with Learnings material in order to calculate learning material weights and rank them based on highest weights which results in a final recommendation list.
- Itemالتعليم والتدريب المتعدد للشبكات العصبية الصناعية المتطورة : استخدام المحاكيات والنظام الخلوي في تصميم هيكلية الشبكات(AL-Quds University, 2006-10-05) أسماء حلمي يوسف أبو صلاح; Asma Hilmi Yousef Abu Salah; يحيى السلقان; د. رشيد جيوسي; د. داود زعتري
- Itemالمتطلبات الوظيفية للتسجيلات الببليوجرافية للفهرسة المقروءة أليا باستخدام لغة OWL)(AL-Quds University, 2013-05-10) رنا زهير عطا عبده; Rana Zuhair Atta Abdo; بديع سرطاوي; لا يوجدLibraries and librarians have a key role in delivering information. They have an interesting task in supporting information, supplying researchers with materials they need and help them to access information from multiple libraries at once. Therefore librarians are looking forward to communicate and merge their catalogues together in one union catalogue. Consequently it was a big deal for us to support the union catalogue by building bibliographic catalogue ontology.On the one hand, most bibliographic catalogues based on Machine Readable Catalogue (MARC) format to integrate system which meets the needs of participating libraries to share their bibliographic records. On the other hand, the International Federation of Library and Association (IFLA) final report on Functional Requirements for Bibliographic Record (FRBR) represents Entity Relationship (ER) between items of the bibliographic record and brings major changes to cataloging, in order to facilitate accessing bibliographic catalogue. Thus building ontology could serve as a semantic layer over FRBR and MARC. Ontology provides vocabulary for representing knowledge about some concepts with its relationship with other terms explicitly and machine interpretability. In addition, Ontology Web Language (OWL) is the new formal language for representing ontologies in the semantic web. It is a new technology and a World Wide Web Consortium (W3C) recommendation. Therefore, depending on OWL which is basically an opening of the ER model to work on the web, FRBR data could live in OWL layer. The purpose of this study is to build an ontology which could serve as a semantic layer over FRBR and MARC. Besides, since many libraries catalogues depend on the most popular MARC; MARC 21 and UNIMARC; we adopt MARC 21 and UNIMARC as a sample to our study. Our model builds a semantic layer over the schema mapping between FRBR entities and attributes to its corresponding of MARC 21 and UNIMARC. Finally, we design an interface to allow collaboration between variant libraries based on a web service. Our web service offers the data in Resource Description Framework (RDF) format (technical binding). Publishing RDF documents across applications is an effective way of data integration and exchange. It presents opportunities to employ linked data to the authority file. In general our ontology represents a semantic layer to all bibliographic records to exist in one web service and one union catalogue.
- Itemالمحسنات النحوية للجمل البنائية في لغات البرمجة(AL-Quds University, 2011-05-01) مصطفى صدقي عبد التميم; Mustafa Sudqi Abed Altamim; رشيد الجيوسي; Raid Al-Zaghal; Mahmoud SahebSoftware application development is a daily task done by developers and code writers all over the world. A valuable portion of developers‘ time is spent in writing repetitive keywords, debugging code, trying to understand its semantic, and fixing syntax errors. These tasks become harder when no integrated development environment (IDE) is available or developers use remote access terminals like UNIX and simple text editors for code writing. Syntactic sugar constructs in programming languages are found to offer simple and easy syntax constructs to make developers' lives easier and smoother. In this study we propose a new set of syntactic sugar constructs, and try to find if they really can help developers in reducing syntax errors, make code shorter, more readable, easier to write, and can help in debugging and semantic understanding. Our methodology was to construct a new syntactic sugar constructs set extracted from existing programming languages' syntax in addition to other syntactic enhancements proposed by us, then we verified the efficiency of the new syntactic sugar constructs set through executing an exploratory case study with students and professional programmers. The exploratory case study results showed positive indicators for using the new proposed syntactic sugar constructs set to write programs' syntax. They helped in reducing syntax errors, making the code more readable, easier to write, and to understand.
- Itemالمنهج الإحصائي لتحديد نموذج الطابور المناسب المستند على التطبيقات(AL-Quds University, 2015-05-14) نعيمه 'محمد سالم' صالح حرباوي; Naimeh Mohammad Salem Saleh Hirbawi; بديع سرطاوي; رائد الزغل; اسامه سلامهQueuing theory is a mathematical study of queues or waiting lines. It is used to model many systems in different fields in our life, whether simple or complex systems. The key idea in queuing theory of a mathematical model is to improve performance and productivity of the applications. Queuing models are constructed in order to compute the performance measures for the applications and to predict the waiting times and queue lengths. This thesis is depended on previous papers of queuing theory for varies application which analyze the behavior of these applications and shows how to calculate the entire queuing statistic determined by measures of variability (mean, variance and coefficient of variance) for variety of queuing systems in order to define the appropriate queuing model. Computer simulation is an easy powerful tool to estimate approximately the proper queuing model and evaluate the performance measures for the applications. This thesis presents a new simulation model for defining the appropriate models for the applications and identifying the variables parameters that affect their performance measures. It depends on values of mean, variance and coefficient of the real applications, comparing them to the values for characteristics of the queuing model, then according to the comparison the appropriate queuing model is approximately identified.The simulation model will measure the effectiveness performance of queuing models A/B/1 where A is inter arrival distribution, B is the service time distributions of the type Exponential, Erlang, Deterministic and Hyper-exponential. The effectiveness performance of queuing model are: *L : The expected number of arrivals in the system. *Lq : The expected number of arrivals in the queue. *W : The expected time required a customer to spend in the system. *Wq : The expected time required a customer to spend in Queue. *U : the server utilization.
- Itemالنظام الذكي المختص بأنظمة مراقبة التسلل الإلكترونية بمناطق خوادم الشبكة(AL-Quds University, 2016-06-04) محمد رامي زهير حسن سعيفان; 'Mohamed Rami' Zuher Hassan Isifan; جاد النجار; د. رشيد الجيوسي; د. بديع السرطاوي; Dr. Ahmad AlsadehPrediction of network attacks and machine understandable security vulnerabilities are complex tasks for current available Intrusion Detection System [IDS]. IDS software is important for an enterprise network. It logs security information occurred in the network. In addition, IDSs are useful in recognizing malicious hack attempts, and protecting it without the need for change to client‟s software. Several researches in the field of machine learning have been applied to make these IDSs better a d smarter. In our work, we propose approach for making IDSs more analytical, using semantic technology. We made a useful semantic connection between IDSs and National Vulnerability Databases [NVDs], to make the system semantically analyzed each attack logged, so it can perform prediction about incoming attacks or services that might be in danger. We built our ontology skeleton based on standard network security. Furthermore, we added useful classes and relations that are specific for DMZ network services. In addition, we made an option to mallow the user to update the ontology skeleton automatically according to the network needs. Our work is evaluated and validated using four different methods: we presented a prototype that works over the web. Also, we applied KDDCup99 dataset to the prototype. Furthermore,we modeled our system using queuing model, and simulated it using Anylogic simulator. Validating the system using KDDCup99 benchmark shows good results law false positive attacks prediction. Modeling the system in a queuing model allows us to predict the behavior of the system in a multi-users system for heavy network traffic.
- Itemانخفاض التغييرات في الناقل من خوارزمية ستيجانوغرافي(AL-Quds University, 2014-01-22) محمد فهمي عباس خرمه; Mohammed Fahmi Abbass Kharma; جهاد النجار; Wael Hassonah; د. نائل سليمان; Nidal Kafriهدفت هذه الدراسة التعرف إلى أثر استخدام طريقة التعلم من خالل السياق لمادة العلوم الجتماعية في أنماط التفاعل الصفي و تحصيل طالبات الصف السابع الاساسي واتجاهاتهن نحوه. تكونت عينة الدراسة من طلبة الصف السابع األساسي في المدارس الحكومية التابعة لمديرية التربية والتعليم بيت لحم، حيث شملت(49)طالبة، إنتظمن في ثالث شعب بإحدى مدارس مديرية بيت لحم، حيث اشتملت الشعبة التجريبية على (20 )طالبة، والشعبة الضابطة على (32 )طالبة. استبانة لقياس ولتحقيق أهداف الد ارسة أعدت الباحثة مجموعة من األدوات: اختبار تحصيلي، و اتجاهات الطالبات نحو طريقة التعلم من خالل السياق، و أداة فالندرز لقياس أنماط التفاعل الصفي و قامت الباحثة بإجراء مقابالت لطالبات المجموعة التجريبية وأبدين اتجاهات ايجابية نحو هذا األسلوب من التعلم. وبذلك تشير نتائج الدراسة إلى فاعلية استخدام طريقة التعلم من خالل السياق لمادة العلوم االجتماعية في أنماط التفاعل الصفي وتحصيل طالبات الصف السابع األساسي. حيث وجدت فروق دالة إحصائياً في أثر استخدام طريقة التعلم من خالل السياق على التحصيل ولصالح المجموعة التجريبية ما أدى إلى ارتفاع نسبة مشاركة الطالبات ولعب دور فاعل في الصفً على النتائج أوصت وبناء الباحثة ضرورة اعتماد وزارة التربية والتعليم أساليب تعليمية حديثة مثل التعلم من خالل السياق، ليكون لها دور في تفاعل الطلبة و تلبية رغباتهم وحاجاتهم وبالتالي تحسين تحصيلهم، وتدريب المعلمين على كيفية استخدام هذه الطريقة ألهميتها ونجاعتها، و ذلك من خالل دمج مواد العلوم االجتماعية في كتاب واحد.
- Itemأمن المعلومات وحفظها(AL-Quds University, 2013-08-20) محمد احمد محمود جاموس; Mohammed Ahmad Mahmoud Jamoos; رشدي حمامرة; نضال كفري; امين ابو سمرة
- Itemإطار الويب الدلالي (SWF)(AL-Quds University, 2010-06-05) أحمد يحيى محمد ندى; Ahmad yahya mohammed nada; بديع سرطاوي; رائد زغل; منى مطر
- Itemإطار منظم لمجموعات العمل الصغيرة لتطوير البرمجيات(AL-Quds University, 2015-05-10) سامي كامل موسى قاسم; Sami Kamel Mousa Qasem; رائد الزغل; رشيد الجيوسي; YousefAbuzir
- Itemبروتوكول التوجيه (DSDV) المحسن لتعزيز الأداء في الشبكات اللاسلكية المخصصة (Ad Hoc) في البيئات ذات السرعات المتباينة(AL-Quds University, 2018-12-12) مضاء عبد اللطيف يوسف عبد الجواد; MADA ABDEL LATIF YOUSEF ABDEL JAWAD; سعيد صلاح; رائد الزغل; نضال كفري; اياد طومار
- Itemبروتوكولات التوجيه الخاصة بـ MANET: دراسة مقارنة(AL-Quds University, 2010-03-06) عماد ابراهيم محمد أبو سعده; Imad Ibraheem Mohammad AbuSada; رائد الزغل; نضال الكفري; معتصم بابا
- Itemبناء الملف التعلمي اعتماداً على مخرجات التعلم التي تم تحقيقها (DLP)(AL-Quds University, 2017-12-05) بهاء محمد غالب خضر ثابت; Baha Mohammed Ghaleb Khader Thabet; بديع سرطاوي; Kamel Hashem; Fatima Hallak
- Itemبناء نموذج التحكم في الصلاحيات القائم على الدور لكل مستخدم بشكل ديناميكي من وجهة نظر المستخدم (DUO-RBAC)(AL-Quds University, 2018-04-10) حازم مالك حسني كيوان; Hazem Malek Husni Kiwan; رشيد الجيوسي; Badie Sartawi; Radwan TahboubMost researchers now trend to use role mining to generate role-based access control model from the existing user-permission assignments. User-oriented role-based access control is a type of role-based access control model, which aims to use role mining from end user perspective to generate a user-oriented RBAC model, since the user almost prefer a simple and minimum role assignments. This research is the first for generating a dynamic user-oriented rolebased access control model (DUO-RBAC) for inserting a new user-permission assignments (new UPA) to the existing user-oriented RBAC model. In a quick clarification, if there is a system which has user-permission assignments, a user-oriented RBAC model can be generated which contains new roles, each one assigns to users and permissions. Then, if we have a new users with new permissions should enter the system which has the model, we will regenerate a new model with new roles assignments to include these new users. Re-generating roles will be done by our dynamic model, with three constraints. First, there are no changes in the number of role assignments for each user in the system after the inserting process, since the user will be conflicted if he has different number of roles from time to time. Second, the permissions that each user has before the inserting process must be the same after generating the new model. Last one, will take into account that each user assign to number of roles no more than t (maximum number of roles that each user can assign), where t is predefined in the existing user-oriented RBAC model. Also, we develop a new algorithm, which based on user-oriented role mining to find the optimal way for inserting the new user permission assignments to the existing model. Our experiments applied on benchmark “Access Control” real datasets to evaluate the results and show the effectiveness of our developed algorithm of several measures. Those measures are: optimal number of roles to make the objective function minimized, optimal number of user-role assignments and generating a new model from end user perspective (keep the new generated model suitable from end-user perspective).
- Itemبيئة ثلاثية الأبعاد استنادًا إلى الاستعارة على سطح المكتب(AL-Quds University, 2004-12-30) سوزان جميل حلمي سلطان.; Suzanne Jamil Hilmi Sultan; غسان القيمري; Rashid Jayousi; Yousef Asad Hassouneh
- Itemتجربة المستخدم والمشاعر المتولدة/ المستخلصة رقميا(AL-Quds University, 2017-05-14) محمد رأفت محمد عوده; Muhammad Rafaat Mohammad Odeh; بديع سرطاوي; Dr. Jad Najjar; Dr.Rashid Aljayosi; Dr.Ma’moun Nawahdah
- Itemتحسين أمان البرامج في نماذج دورة حياة البرامج(AL-Quds University, 2010-06-23) أحمد جميل عبدالخالق فحل; AHMAD JAMEEL ABD ALKHALEQ FAHEL; رائد الزغل; نضال كفري; اسامة مرعي
- «
- 1 (current)
- 2
- 3
- »