Zarqa Private University

Displaying 1-5 of 5 results

  • White Papers // Oct 2009

    TS-PVM: A Fault Tolerant PVM Extension for Real Time Applications

    In this paper, a fault tolerant extension of the de facto message passing system parallel virtual machine, TS- parallel virtual machine, is introduced. This extension enables real time applications over parallel virtual machine. In PVM and similar message passing systems, if the message receiver is not available, due to network...

    Provided By Zarqa Private University

  • White Papers // Oct 2009

    Multi Purpose Code Generation Using Fingerprint Images

    Extracting minutia and other features from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. This paper proposes a method for the generation of long and secure code that may be used for multi-purpose applications, such as ATM, coded door locks and other security...

    Provided By Zarqa Private University

  • White Papers // Jul 2009

    An Empirical Examination of Maturity Model as Measurement of Information Technology Governance Implementation

    The aim of this study is to evaluate information technology governance implementation in the Jordanian domestic banks using the maturity model. An empirical survey using self-administered questionnaire has been carried out to achieve the study objectives. The study results reveal that Jordanian domestic banks applied effective awareness and communications, responsibility...

    Provided By Zarqa Private University

  • White Papers // Oct 2008

    Enforcing User-Defined Constraints During the Run-Time in OODB

    In this paper a run-time model is proposed. The run-time model enforces integrity constraints for attributes that are derived from composition and inheritance hierarchies. The run-time model is designed for enforcing the logical integrity constraints in object-oriented databases during the run-time. A new technique called detection method is designed to...

    Provided By Zarqa Private University

  • White Papers // Oct 2008

    Modelling Concurrent Mobile Transactions Execution in Broadcasting Environments

    Broadcast is an efficient and scalable method for resolving the bandwidth limitation in a wireless environment. There is a trade-off between clients' access time and throughput for update mobile transactions in on-demand data dissemination environments. Data scheduling at the fixed server can allow more transactions to commit while retaining the...

    Provided By Zarqa Private University

  • White Papers // Jul 2009

    An Empirical Examination of Maturity Model as Measurement of Information Technology Governance Implementation

    The aim of this study is to evaluate information technology governance implementation in the Jordanian domestic banks using the maturity model. An empirical survey using self-administered questionnaire has been carried out to achieve the study objectives. The study results reveal that Jordanian domestic banks applied effective awareness and communications, responsibility...

    Provided By Zarqa Private University

  • White Papers // Oct 2008

    Enforcing User-Defined Constraints During the Run-Time in OODB

    In this paper a run-time model is proposed. The run-time model enforces integrity constraints for attributes that are derived from composition and inheritance hierarchies. The run-time model is designed for enforcing the logical integrity constraints in object-oriented databases during the run-time. A new technique called detection method is designed to...

    Provided By Zarqa Private University

  • White Papers // Oct 2008

    Modelling Concurrent Mobile Transactions Execution in Broadcasting Environments

    Broadcast is an efficient and scalable method for resolving the bandwidth limitation in a wireless environment. There is a trade-off between clients' access time and throughput for update mobile transactions in on-demand data dissemination environments. Data scheduling at the fixed server can allow more transactions to commit while retaining the...

    Provided By Zarqa Private University

  • White Papers // Oct 2009

    TS-PVM: A Fault Tolerant PVM Extension for Real Time Applications

    In this paper, a fault tolerant extension of the de facto message passing system parallel virtual machine, TS- parallel virtual machine, is introduced. This extension enables real time applications over parallel virtual machine. In PVM and similar message passing systems, if the message receiver is not available, due to network...

    Provided By Zarqa Private University

  • White Papers // Oct 2009

    Multi Purpose Code Generation Using Fingerprint Images

    Extracting minutia and other features from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. This paper proposes a method for the generation of long and secure code that may be used for multi-purpose applications, such as ATM, coded door locks and other security...

    Provided By Zarqa Private University