Announcement iconContinuing Accepting Applications for Admission !!
for the Spring Semester of the Academic Year 2019/2020

Computer Science

Monday, May 14, 2018
Researcher Abeer Zarour, a Computer Science student at the Faculty of Graduate Studies

Researcher Abeer Abdullah Zarour, Computer Science at the Faculty of Graduate Studies at the Arab American University, defended her master thesis entitled “Building a Methodology Based on the Terminology Classification to Separate the Applicants Resumes and Compare them to the Job Announcements”

The researcher pointed to the importance of extracting information from CVs in activating and accelerating the automatic screening of candidates, and the process of directing resumes towards the functional categories affiliated with them and arranging them automatically according to their fulfillment of the job announcements’ requirements.

Saturday, January 28, 2017

Researcher Salah Jabarin, student at AAUP Faculty of Graduate Studies, defended his thesis in Computer Science entitled: “Communication and Accuracy in Private Networks”.

Researcher Jabarin discussed in his thesis on private bilateral communication networks that have distinctive and unique privacy, stressing on the need for protocols able to manage network and ensure high level of accuracy, communication and provide suitable quality and quantity service. The researcher simulated and evaluated four of the protocols, designed to deal with private networks.

Tuesday, January 24, 2017

Researcher Abdulmin’em Abu Hasan Arab American University student at Graduates Faculty defended his Master research in Computer Science field entitled “Analyzing Fraud and Phishing Attacks via the internet and develop prevention techniques”.

Researcher Abu Hasan discussed in his research on online phishing attacks, solutions and defense mechanisms that can be taken to reduce or prevent it from happening , these attacks aims to deception users to reveal their personal information like passwords or credit card number, pointing to developing three ways to solve and those phishing the 1st depends on adding new level at the authentication process that uses a user's mobile phone as a second authentication, in addition to a user name and password.

Pages

Subscribe to RSS - Computer Science