|
|
|
|
|
|
OverView
|
|
Dr. Atef Ahmed Mohamad Obeidat is an Associate Professor at Al-Balqa Applied University specializing in computer science with a focus on computer networks and security. His academic credentials include a Ph.D. from Novosibirsk State Technical University and extensive teaching experience across various programming and computer science subjects. He has contributed to the field through impactful research and publications, including a notable study on intrusion detection.
|
|
|
|
|
|
Research Intersets:
|
The Networks.
The Security.
The Steganography.
The operating systems.
|
|
|
|
|
Qualifications
|
| #
|
Degree
|
University
|
Specialization
|
Graduation year
|
| 1 | PHD | Novosibirsk State Technical University | computer science | 2009 | | 2 | MASTER DEGREE | University of Jordan | computer science | 2001 | | 3 | BACHELOR'S DEGREE | Yarmouk University | computer science | 1991 |
|
|
|
|
|
Experiences
|
|
Academic Experience:
|
2020 -Current :Associate professor,Al-Balqa Applied University,Jordan.
2019 -2020 :Associate professor,Just,Jordan.
2010 -2019 :assistant professor,Al-Balqa Applied University,Jordan.
|
Administrative Experience:
|
|
|
|
|
|
|
|
|
Publications
|
1- An Adaptive Audio Wave Steganography Using Simulated Annealing Algorithm ,International Journal of Electrical and Computer Engineering (IJECE), 2025,Vol. 15,no. 2. 2- An Adaptive Fractal Image Steganography using Mandelbrot and Linear Congruent Generator ,International Journal of Communication Networks and Information Security (IJCNIS), 2024,Vol. ,no. . 3- Novel Approach for Intrusion Detection Using
Simulated Annealing Algorithm Combined with
Hopfield Neural Network ,IJCNIS, 2020,Vol. 12,no. 3. 4- An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms ,International Journal of Cloud Applications and Computing, 2020,Vol. 8,no. 2.
|
|
|
|
|
|
|
University Courses Taught
|
1- ++programming with C. 2- programming with Java. 3- Operating system. 4- Visual programming for smart devices. 5- Data structure. 6- Algorithms. 7- Data bases. 8- networks. 9- Wep programming.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Journals Editor/ Reviewer
|
|
|
|
|
|
Review:
|
Journal of Computer Science.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

|
|