Zarqa Private University

Displaying 1-4 of 4 results

  • White Papers // Oct 2009

    TS-PVM: A Fault Tolerant PVM Extension for Real Time Applications

    In this paper, a fault tolerant extension of the de facto message passing system parallel virtual machine, TS- parallel virtual machine, is introduced. This extension enables real time applications over parallel virtual machine. In PVM and similar message passing systems, if the message receiver is not available, due to network...

    Provided By Zarqa Private University

  • White Papers // Oct 2009

    Multi Purpose Code Generation Using Fingerprint Images

    Extracting minutia and other features from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. This paper proposes a method for the generation of long and secure code that may be used for multi-purpose applications, such as ATM, coded door locks and other security...

    Provided By Zarqa Private University

  • White Papers // Jul 2009

    An Empirical Examination of Maturity Model as Measurement of Information Technology Governance Implementation

    The aim of this study is to evaluate information technology governance implementation in the Jordanian domestic banks using the maturity model. An empirical survey using self-administered questionnaire has been carried out to achieve the study objectives. The study results reveal that Jordanian domestic banks applied effective awareness and communications, responsibility...

    Provided By Zarqa Private University

  • White Papers // Jun 2008

    The Constraints of Object-Oriented Databases

    Object-Oriented DataBases (OODBs) have been designed to support large and complex programming projects. The data accuracy, consistency, and integrity in OODBs are extremely important for developers and users. Checking the integrity constraints in OODBs is a fundamental problem in database design. Existing OODB Management Systems (OODBMSs) lack to a capability...

    Provided By Zarqa Private University

  • White Papers // Jul 2009

    An Empirical Examination of Maturity Model as Measurement of Information Technology Governance Implementation

    The aim of this study is to evaluate information technology governance implementation in the Jordanian domestic banks using the maturity model. An empirical survey using self-administered questionnaire has been carried out to achieve the study objectives. The study results reveal that Jordanian domestic banks applied effective awareness and communications, responsibility...

    Provided By Zarqa Private University

  • White Papers // Oct 2009

    TS-PVM: A Fault Tolerant PVM Extension for Real Time Applications

    In this paper, a fault tolerant extension of the de facto message passing system parallel virtual machine, TS- parallel virtual machine, is introduced. This extension enables real time applications over parallel virtual machine. In PVM and similar message passing systems, if the message receiver is not available, due to network...

    Provided By Zarqa Private University

  • White Papers // Oct 2009

    Multi Purpose Code Generation Using Fingerprint Images

    Extracting minutia and other features from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. This paper proposes a method for the generation of long and secure code that may be used for multi-purpose applications, such as ATM, coded door locks and other security...

    Provided By Zarqa Private University

  • White Papers // Jun 2008

    The Constraints of Object-Oriented Databases

    Object-Oriented DataBases (OODBs) have been designed to support large and complex programming projects. The data accuracy, consistency, and integrity in OODBs are extremely important for developers and users. Checking the integrity constraints in OODBs is a fundamental problem in database design. Existing OODB Management Systems (OODBMSs) lack to a capability...

    Provided By Zarqa Private University