|
|
|
|
|
OverView
|
Proffessor of computer engineering, Albalqa applied uinversity intersted in: Digital image processing, computer applications, data security, artificial neural networks
|
|
|
|
|
Research Intersets:
|
Digital image processing, computer applications, data security, artificial neural networks
|
|
|
|
Qualifications
|
#
|
Degree
|
University
|
Specialization
|
Graduation year
|
1 | PHD | Cherkasy State Technological University | Computer engineering | 1986 |
|
|
|
|
Experiences
|
Academic Experience:
|
2016 -2017 :Lecturer,German University,Jordan. 2013 -2014 :Lecturer,King Hussien University,Jordan. 2011 -2011 :Lecturer,Scientific applied university,Jordan. 2006 -2007 :Lecturer,Scientific applied university,Jordan. 1991 -1993 :Lecturer,Isra University,Jordan. 1990 -1994 :Lecturer,Jordan Uinversity,Jordan.
|
Administrative Experience:
|
1995 -2002 :Consultant,Ministry of education,Jordan.
|
|
|
|
|
Publications
|
1- Rounds Reduction and Blocks Controlling to Enhance the Performanceof Standard Method of Data Cryptography ,IJCSNS International Journal of Computer Science and Network Security, 2022,Vol. 21,no. 12. 2- Comparative Analysis of Fingerprint Features Extraction Methods ,Journal of Hunan University Natural Sciences, 2022,Vol. 48,no. 12. 3- DEEP MACHINE LEARNING TO ENHANCE ANN PERFORMANCE:
FINGERPRINT CLASSIFIER CASE STUDY ,Journal of Southwest Jiaotong University, 2021,Vol. 56,no. 6. 4- Improving the Efficiency and Scalability of Standard Methods for Data Cryptography ,Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data. International Journal of Computer Science and Network Security, 2021,Vol. 21,no. 12.
|
|
|
|
|
University Courses Taught
|
1- Operating systems. 2- Computer architecture. 3- Digital image proceesing. 4- Machine learning. 5- Data base desigh. 6- Big data. 7- Data analysis. 8- Artificial neural networks. 9- Digital system design. 10- Programming languageas.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* Training cources. * Scientific seminars. * Scientific days.
|
|
|
|
|
|
|
|
|
|
|
|