Princess Sumaya University for Technology

Displaying 1-6 of 6 results

  • White Papers // Apr 2011

    Multilayer Model for Arabic Text Compression

    This paper describes a multilayer model-based approach for text compression. It uses linguistic information to develop a multilayer decomposition model of the text in order to achieve better compression. This new approach is illustrated for the case of the Arabic language, where the majority of words are generated according to...

    Provided By Princess Sumaya University for Technology

  • White Papers // Jan 2011

    Stream Processing Environmental Applications in Jordan Valley

    Database system architectures have been gone through innovative changes, specially the unifications of algorithms and data via the integration of programming languages with the database system. Such an innovative changes is needed in Stream-based applications since they have different requirements for the principal of stream data processing system. For example,...

    Provided By Princess Sumaya University for Technology

  • White Papers // Dec 2010

    Determining an Optimal Number of Access Points Using GPS Data to Secure a Wireless Network Environment

    Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a...

    Provided By Princess Sumaya University for Technology

  • White Papers // Apr 2010

    A Data Mashup for Dynamic Composition of Adaptive Courses

    This paper presents a novel adaptive course composition system that based on mashing up learning content in a web application. The system includes three major components, static course system, data mashup, and adaptive course composer. The first system enables lecturers to build multiple lesson courses that are managed with corresponding...

    Provided By Princess Sumaya University for Technology

  • White Papers // Mar 2010

    Detecting and Localizing Wireless Network Attacks Techniques

    WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss some techniques and approaches which can help to detect, localize and identify wireless network attacks, which present a unique set of challenges...

    Provided By Princess Sumaya University for Technology

  • White Papers // Jun 2009

    E-Learning on the Cloud

    Cloud computing technologies have changed the way applications are developed and accessed. They are aimed at running applications as services over the Internet on a scalable infrastructure. Many applications such as word processing, spreadsheets, presentations, databases and more can all be accessed from a web browser, while the software and...

    Provided By Princess Sumaya University for Technology

  • White Papers // Jun 2009

    E-Learning on the Cloud

    Cloud computing technologies have changed the way applications are developed and accessed. They are aimed at running applications as services over the Internet on a scalable infrastructure. Many applications such as word processing, spreadsheets, presentations, databases and more can all be accessed from a web browser, while the software and...

    Provided By Princess Sumaya University for Technology

  • White Papers // Dec 2010

    Determining an Optimal Number of Access Points Using GPS Data to Secure a Wireless Network Environment

    Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a...

    Provided By Princess Sumaya University for Technology

  • White Papers // Jan 2011

    Stream Processing Environmental Applications in Jordan Valley

    Database system architectures have been gone through innovative changes, specially the unifications of algorithms and data via the integration of programming languages with the database system. Such an innovative changes is needed in Stream-based applications since they have different requirements for the principal of stream data processing system. For example,...

    Provided By Princess Sumaya University for Technology

  • White Papers // Mar 2010

    Detecting and Localizing Wireless Network Attacks Techniques

    WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss some techniques and approaches which can help to detect, localize and identify wireless network attacks, which present a unique set of challenges...

    Provided By Princess Sumaya University for Technology

  • White Papers // Apr 2011

    Multilayer Model for Arabic Text Compression

    This paper describes a multilayer model-based approach for text compression. It uses linguistic information to develop a multilayer decomposition model of the text in order to achieve better compression. This new approach is illustrated for the case of the Arabic language, where the majority of words are generated according to...

    Provided By Princess Sumaya University for Technology

  • White Papers // Apr 2010

    A Data Mashup for Dynamic Composition of Adaptive Courses

    This paper presents a novel adaptive course composition system that based on mashing up learning content in a web application. The system includes three major components, static course system, data mashup, and adaptive course composer. The first system enables lecturers to build multiple lesson courses that are managed with corresponding...

    Provided By Princess Sumaya University for Technology