Announcement iconContinuing Accepting Applications for Admission !!
for the Spring Semester of the Academic Year 2019/2020

master

Saturday, January 28, 2017

Researcher Salah Jabarin, student at AAUP Faculty of Graduate Studies, defended his thesis in Computer Science entitled: “Communication and Accuracy in Private Networks”.

Researcher Jabarin discussed in his thesis on private bilateral communication networks that have distinctive and unique privacy, stressing on the need for protocols able to manage network and ensure high level of accuracy, communication and provide suitable quality and quantity service. The researcher simulated and evaluated four of the protocols, designed to deal with private networks.

Tuesday, January 24, 2017

Researcher Reem Azouqa, Commercial Law student at AAU’s Faculty of Graduate Studies, defended her Master thesis master thesis entitled “Buyer's right to terminate contract and Seller’s right to reform when breach in the commitment implementation occur”.

Her research discussed the buyer's right to terminate the sale contract in accordance with the Vienna Convention on International Sales, according to the descriptive and analytical approach comparative, in addition to discussing the seller’s right to reform when the breach in the commitment implementation occur.

The thesis found a number of useful results in this regard, especially in the context of the State of Palestine attempt to join this agreement and WTO agreements.

Tuesday, January 24, 2017

Researcher Abdulmin’em Abu Hasan Arab American University student at Graduates Faculty defended his Master research in Computer Science field entitled “Analyzing Fraud and Phishing Attacks via the internet and develop prevention techniques”.

Researcher Abu Hasan discussed in his research on online phishing attacks, solutions and defense mechanisms that can be taken to reduce or prevent it from happening , these attacks aims to deception users to reveal their personal information like passwords or credit card number, pointing to developing three ways to solve and those phishing the 1st depends on adding new level at the authentication process that uses a user's mobile phone as a second authentication, in addition to a user name and password.

Pages

Subscribe to RSS - master