AUST, Loading Knowledge...
+963 994 554 140
info@aust.edu.sy
العربية
عربي
About AUST
University President's Message
Vice President
Board of Trustees
University Council
Vision, Message, Strategic Objectives and Quality policy
Our strategy
Faculties
Faculty of Dentistry
Faculty of Pharmacy
Faculty of Informatics Engineering
Faculty of Architecture
Faculty of Chemical Engineering
Faculty of Petroleum Engineering
Faculty of Translation and Languages
Directorates
University Secretariat
University Rector’s Office
Directorate of Human Resources
Directorate of Admission and Registration
Examination Directorate
Directorate of Information Systems and Communications
Financial Directorate
Directorate of Quality and Accreditation
Directorate of Public Relations and Media
Directorate of Legal Affairs and Contracts
Directorate of Engineering Affairs
Directorate of Cultural Relations
Safety and Public Security
Scientific Research Affairs Office
Library Affairs Office
Divan Section
Activity section
Admission
Admission and registration system
Stop Registration System
Regulations for penalties and warnings
Credit hour system
Examinations system
University calendar
University rebates system
Research
Faculty of Dentistry
Faculty of Pharmacy
Faculty of Informatics Engineering
Faculty of Architecture
Faculty of Chemical Engineering
Faculty of Petroleum Engineering
Faculty of Translation and Languages
Other Sciences
Student Services
Transportation Services
Student Electronic Portal
University Cafeteria
University Housing
Contact us
Student Portal
Research
Main
Research
Faculty of Informatics Engineering
Improved Algorithm Steganography For Using Technology Puzzle
Read More
An Algorithm Proposed To Hide , Encrypt and Compress A Large Image In Multiple Images LSB Technology
Read More
Analysis and Performance Evaluation of OpenFlow Controller in SDN using N-Policy
Read More
An analytical study of the design and performance of an antivirus program
Read More
Comparison of different GPT versions and study of the effectiveness of CAHTGPT in the medical sector
Read More
New Technology to Hide a File in Multiple Images Using the Cut Map
Read More
Development of hybrid encryption algorithms
Read More
Design and test of anti – virus program
Read More
An Algorithm Developed For the Watermark Using the Cut Map
Read More
New Technology To Compress, Encrypt And Hide A File In Several Images Using Puzzle Technology
Read More
System Design to Recognize of Time Plans Labels Using Neoural Networks
Read More
Proposing Algorithem to extract Value of Industrial Counter from Image of Pulse Plan
Read More
Study The Impact of the Scheduling Algorithms on the Performance of Routing Protocols in Mobile Wireless Networks
Read More
Increasing Input Block and Encryption Efficiency by Mixing BBM & IDEA
Read More
Quality of Service Evaluation of Constant Data and MPEG-4 Frames using IEEE 802.11e and IEEE 802.11 in Mobile Wireless Networks
Read More
Comparing the performance of service and neighbor discovery protocols in D2D technology
Read More
Quality of Service of Routing Protocols in VANETs
Read More
Improving discovery rate in device-to-device (D2D) communications Using Power control technique
Read More
Enhanced Routing Protocols in Mobile Wireless Networks
Read More
Development of a Data Encryption Algorithm to Enhance Security in D2D Communications by Secure Key Exchange
Read More
Multipath Routing Protocols in Mobile Wireless Networks
Read More
Improving Performance of 4G Networks by Allocating Resources in D2D Communications
Read More
A Comparative Study of the Algorithms used to Plagiarism Detection
Read More
Real-time Monitoring System for the Development of Interactive E-learning System in Higher Education Institutions
Read More
Analytical Study to Check the Validity of The Test Metric LOC
Read More
SLOC the Base Unit to Derive Metrics and Essential Input for Cost Estimation Models
Read More
The Effect of Software Testability Metrics on Software Testing
Read More
Predict Class Testability Using Source Code Complexity Metrics
Read More
إنشاء شبكة تبادل المعطيات في وزارة التربية
Read More
الاستثمار الأمثل للشبكات المحلية باستخدام VLAN
Read More
Building a Herbal Medicine Ontology Aligned with Symptoms and Diseases Ontologies
Read More
Enhanced RSA Cryptosystem Based On four Prime Numbers
Read More
JAVA Program For Texts Encryption Using Modified RSA Algorithm
Read More
The Encryption Using Pythagorean Matrix
Read More
Analyze Android Applications to Build a Model that Represents Application Components and How they Interact With Each Other
Read More
Comparison of Web Services Composition Design Models
Read More
Testing MapReduce Applications
Read More
Develop a Software Library to Test Big Data Applications in a Simulated Hadoop Environment
Read More
Generate Test Cases for GUI Applications using Artificial Bee Colony Algorithm
Read More
Mobility adaptive clustering algorithm for wireless sensor networks with mobile nodes
Read More
Image Encryption Using RSA based on Large Prime Number
Read More
Detection of Black Hole attack in MANETS using IDSAODV and Reverse AODV
Read More
Studying the Effect of Changing the Security Techniques Used in the MS-LEACH Protocol on the Energy Consumed in WSN Networks
Read More
Propose a New Routing Protocol (VC-LEACH) to Reduce the Consumed Energy in WSNs
Read More
Reducing the Consumed Energy in the Dynamic Clustering for Wireless Sensor Networks
Read More
Performance Evaluation of Hierarchical Routing Protocols in Homogeneous and Heterogeneous Wireless Sensor Networks
Read More
Robust Adaptive Beamforming Based on Convex Optimization with Variable Diagonal Loading
Read More
Improve the robustness of MVDR beamforming method based on steering vector estimation and sparse constraint
Read More
Hybrid Beamforming in 5G Network using Singular Value Decomposition
Read More
Study and compare Improvement The Algorithms of improvement the MVDR Beamforming
Read More
Study and Comparison The Performance of Channel Estimation in MIMO-OFDM When We Use STBC
Read More
Improve the Random Access in IEEE802.11 ad To accommodate the increase in the number of users in IoT applications
Read More
Energy-efficient Fault-tolerant Scheduling of Parallel Applications on Distributed Real-time Systems
Read More
Energy-efficient Scheduling based on Reliability and Deadline of Parallel Applications in Distributed Real-time Systems
Read More
A Reference Study of consensus Algorithms in Extended Distributed Systems
Read More
Study, Build and Analyze CAN 2.0 Network Model Using MATLAB
Read More
Study and Build a CAN FD Network Model and Compare its Performance with CAN 2.0
Read More
Analyzing the attack on Internet Control Messages Protocol in IPv6 (ICMPv6)
Read More
A proposed High Resolution Method for Medical DICOM Images Compression using Deep Learning
Read More
Developing Protection techniques from attacks in IPv6
Read More
Studying the Recoding Algorithm and User Scheduling in Multibeam MultigroupSatellite Network
Read More
Evaluating of energy and cost saving in Cloud Radio Access Networks C-RAN
Read More
Internet of Things-IOT: Definition, Architecture and Applications
Read More
Visibility Graph of a Set of Line Segments: A Dynamic Sequential Algorithm and Its Parallel Version
Read More
Robust Watermarking Algorithm
Read More
Improve the Performance of Advice Systems Based on Cooperative Liquidation Using Trust Relationships
Read More
Motion planning in unknown environment
Read More
Detection of the Arabic letters using convolutional neural networks
Read More
A review of the most important Word Embedding Techniques in Natural Language Processing
Read More
Analytical study of methods for identifying some skin diseases
Read More
Applying Transfer Learning in image classification
Read More
Using DWT to Include Digital Watermark in Audio
Read More
Analytical study of methods of detecting counterfeit currency
Read More
New Approach to Identify Some Skin Diseases
Read More
Performance Analysis in Software Defined Networks (SDNs)
Read More
Performance Analysis of Software Defined Networks Controllers: POX and Opendaylight
Read More
0
Students
0
Teachers
0
Graduates
0
Faculties