الجمعة 21-11-2025 الموافق 1 جمادي الآخرة 1447 منصة البلقاء الرقمية منصة البلقاء الرقمية | التوعية بالامن السيراني شهر التوعية بالامن السيبراني | خريجو البلقاء | English
عن الجامعةmenu arrow الكليات والعمادات menu arrow وحدة القبول والتسجيل المراكز العلمية menu arrow الوحدات الادارية menu arrow بوابة القبولات مكتب التعليم التقني المشاريع والمؤتمرات menu arrow البلقاء والعالم
عن الجامعة:
bullet عن الجامعة
bullet الرسالة الملكية
bullet كلمة الرئيس
bullet الرؤيا و الرسالة
bullet رئاسة الجامعة
bullet مجلس الامناء

bullet مجلس الجامعة
bullet مجلس العمداء
bullet الرؤساء السابقون
bullet قصص نجاح
bullet البلقاء في عيونهم
bullet السياسات العامة لجامعة البلقاء التطبيقية
bullet الخطة الاستراتيجية 2021 - 2025
bullet خطة إدارة المخاطر 2021-2025
العمادات:
bullet  شؤون الطلبة
bullet  البحث العلمي و الابتكار
كليات مركز الجامعة:
bullet  الدراسات العليا
bullet  الطب
bullet  العلوم الطبية المساندة
bullet  التمريض
bullet  العلوم
bullet  الامير عبدالله بن غازي للاتصالات وتكنولوجيا المعلومات
bullet  الذكاء الاصطناعي

bullet  الهندسة
bullet  الأعمال
bullet  السلط للعلوم الإنسانية
bullet  الزراعة التكنولوجية
bullet  السلط التقنية
bullet  الحقوق
الكليات الخارجية:
bullet  الحصن الجامعية
bullet  اربد الجامعية
bullet  عجلون الجامعية
bullet  الهندسة التكنولوجية
bullet  عمان الجامعية للعلوم المالية والادارية
bullet  الاميرة عاليه الجامعية
bullet  الزرقاء الجامعية

bullet  الاميرة رحمة الجامعية
bullet  الكرك الجامعية
bullet  الشوبك الجامعية
bullet  معان الجامعية
bullet  العقبة الجامعية

bullet  أكاديمية الأمير الحسين بن عبد الله الثاني للحماية المدنية
المراكز العلمية
bullet مركز الحاسوب
bullet مركز اللغات
bullet مركز الاستشارات والدراسات والتدريب
bullet المركز الوطني للتدريب وتأهيل المدربين
bullet مركز التطوير وضمان الجودة
bullet المركز الدولي لبحوث المياه والبيئة والطاقة
bullet المركز الاردني الكوري للمعلومات وتكنولوجيا الاتصالات
bullet مركز العقبة للتعليم والتدريب البحري
bullet مركز تكنولوجيا التعلم والتعليم
bullet مركز الابتكار والابداع وريادة الاعمال
bullet  مركز القياس والتشخيص الشامل للإعاقات
bullet مركز التطوير الوظيفي
bullet مركز التطوير الوظيفي لكليات إقليم الشمال
bullet مكتب التعليم التقني
bullet مركز الرصد البيئي
الوحدات:
bullet وحدة القبول والتسجيل
bullet وحدة التقييم والامتحانات العامة
bullet وحدة المكتبة المركزية
bullet وحدة الشؤون المالية
bullet وحدة التأمين الصحي
bullet وحدة الخدمات العامة

bullet  وحدة الرئاسة
bullet وحدة اللوازم والاشغال
bullet وحدة الرقابة والتدقيق الداخلي
bullet وحدة التعاون والعلاقات الدولية
bullet وحدة التنمية وخدمة المجتمع المحلي
الدوائر:
bullet دائرة شؤون العاملين
bullet منصة البلقاء الرقمية
bullet نادي العاملين
وحدة القبول والتسجيل:
bullet الصفحة الرئيسية
bullet التعليمات
bullet  نشرة تخصصات البكالوريوس
bullet نشرة تخصصات البكالوريوس التقني
bullet نشرة تخصصات الدبلوم
bullet التحقق من الشهادات
bullet بوابة القبولات

bullet طلب التحقق من صحة شهادة
bullet دليل الطالب
bullet التقويم الجامعي 2021 _ 2022
bullet التقويم الجامعي 2022 _ 2023
bullet نظام التسجيل الإلكتروني
bullet دراسة نسب التشغيل لخريجي جامعة البلقاء التطبيقية
bullet عرض تقديمي عن دراسة نسب التشغيل لخريجي جامعة البلقاء التطبيقية
المشاريع و المؤتمرات:
bullet المؤتمر الدولي الأول للذكاء الاصطناعي في العلوم الصحية
bullet مؤتمر كلية الأعمال الدولي الثاني - مستقبل الاستدامة لبيئة الاعمال: التنمية السياحية، الابتكار والمرونة
bullet المؤتمر الدولي الاول - مستقبل الاستدامة لبيئة الاعمال: تجارب عملية
bullet 3D GARMENT DESIGN TRAINING
bullet INTERNISA
bullet Med-Quad
bullet Erasmus+ Projects bullet WATER4MED
OverView
Research Intersets
Qualifications
Publications
University Courses Taught
Master and Phd thesis contributions
Conferences and Workshops
Books
Journals Editor/ Reviewer
Journals Editor/ Reviewer
Refrences
Prof. Obaida M. Al-Hazaimeh
Network Security and Cybersecurity
PROFESSOR
AL-HUSON UNIVERSITY COLLEGE
https://www.bau.edu.jo/@dr_obaida
 Major: Computer Science
 Minor: Network Security and Cybersecurity
 dr_obaida@bau.edu.jo
 009627010400
عربي
ORCID ID: 0000-0001-5641-4892
WoS: https://www.webofscience.com/wos/author/record/U-6661-2017
Scopus Author ID: 57015295000
Scopus Link: https://www.scopus.com/authid/detail.uri?authorId=57015295000
Researcher ID: 8519
Google Scholar: https://scholar.google.com/citations?user=9irbMQ8AAAAJ&hl=en

OverView
Obaida M. Al-Hazaimeh's current research focus is on Cyber-Security (Cryptography), which is mainly focusing on creating an electronic equivalent of security primitives such as confidentiality, integrity, identification, and authentication. To achieve this goal, the research concentrates on the design of cryptographic protocols and the development of security architectures for computer systems. The theoretical work on cryptographic algorithms and protocols is mainly based on number theory; other fields of mathematics relevant to cryptography such as elliptic curve, braid theory and chaos theory are also being investigated. The goal is to achieve efficient and secure solutions.

Research Intersets:
Developing new algorithms for detecting cybersecurity attacks and enhancing encryption techniques using artificial intelligence, IOT

Qualifications
# Degree University Specialization Graduation year
1PHDUniversiti Utara MalaysiaComputer Science2010
2MASTER DEGREEUniversiti Sains MalaysiaComputer Science2006
3BACHELOR'S DEGREEApplied Science Private UniversityComputer Science2004

Publications
1- Enhanced IoT cybersecurity through Machine Learning - based penetration testing ,Applied Computer Science, 2025,Vol. 21,no. 2.
2- Intelligent dynamic bandwidth allocation for real-time IoT in fog-based optical networks ,Simulation Modelling Practice and Theory, 2025,Vol. ,no. .
3- Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity ,International Journal of Interactive Mobile Technologies, 2025,Vol. 19,no. 3.
4- Security Enhanced Dynamic Bandwidth Allocation-Based Reinforcement Learning ,WSEAS Transactions on Information Science and Applications, 2025,Vol. 1,no. 22.
5- End-To-End Cybersecurity Encryption- Video Algorithm ,WSEAS Transactions on Computer Research, 2025,Vol. 13,no. 1.
6- ANALYSIS AND EVOLUTION OF SHA-1 ALGORITHM - ANALYTICAL TECHNIQUE ,International Journal of Computer Networks and Communications, 2024,Vol. 16,no. 3.
7- A NEW APPROACH FOR BREAST CANCER DETECTION- BASED MACHINE LEARNING TECHNIQUE ,Applied Computer Science, 2024,Vol. 20,no. 1.
8- A Novel Chaotic Map Partially Blind Signature Scheme Based on Quadratic Residue Problems ,Journal of Discrete Mathematical Sciences & Cryptography, 2024,Vol. 24,no. 3.
9- Vehicle To Vehicle and Vehicle To Ground Communication - Speech Encryption Algorithm ,2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 2023,Vol. ,no. .
10- A New Authentication Scheme Based on Chaotic Maps and Factoring Problems ,International Conference on Mathematics and Computations, 2023,Vol. 17,no. 8.
11- Enhance Linux Security Server Misconfigurations and hardening Methods ,Information Sciences Letters, 2023,Vol. 12,no. 3.
12- Swin Transformer-Based Segmentation and Multi-Scale Feature Pyramid Fusion Module for Alzheimer Disease with Machine Learning ,International Journal of Online and Biomedical Engineering (iJOE), 2023,Vol. 09,no. 04.
13- Analytical Approach for Data Encryption Standard Algorithm ,International Journal of Interactive Mobile Technologies, 2023,Vol. 17,no. 14.
14- Analysis of the current state of deepfake techniques-creation and detection methods ,Indonesian Journal of Electrical Engineering and Computer Science, 2022,Vol. 28,no. 03.
15- Chaotic Map and Quadratic Residue Problems-Based Hybrid Signature Scheme ,International Journal for Computers & Their Applications, 2022,Vol. 29,no. 04.
16- A signature algorithm based on chaotic maps and factoring problems ,Journal of Discrete Mathematical Sciences and Cryptography, 2022,Vol. 25,no. 08.
17- Chaotic based multimedia encryption: a survey for network and internet security ,Bulletin of Electrical Engineering and Informatics, 2022,Vol. 11,no. 4.
18- Image encryption using anti-synchronisation and Bogdanov transformation map ,International Journal of Computing Science and Mathematics, 2022,Vol. 15,no. 01.
19- Chaotic elliptic map for speech encryption ,Indonesian Journal of Electrical Engineering and Computer Science, 2022,Vol. 25,no. 02.
20- Combining Artificial Intelligence and Image Processing for Diagnosing Diabetic Retinopathy in Retinal Fundus Images ,International Journal of Online and Biomedical Engineering, 2022,Vol. 18,no. 03.
21- A novel RGB image steganography using simulated annealing and LCG via LSB ,International Journal of Computer Network and Information Security, 2021,Vol. 21,no. 1.
22- A Hybrid SVM NAIVE-BAYES Classifier for Bright Lesions Recognition in Eye Fundus Images ,International Journal on Electrical Engineering and Informatics, 2021,Vol. 13,no. 03.
23- A new speech encryption algorithm based on dual shuffling H?non chaotic map ,International Journal of Electrical and Computer Engineering, 2021,Vol. 11,no. 3.
24- A split and merge video cryptosystem technique based on dual hash functions and Lorenz system ,International Journal of High Performance Computing and Networking, 2021,Vol. 17,no. 1.
25- A new image encryption scheme using dual chaotic map synchronization ,International Arab Journal of Information Technology, 2021,Vol. 18,no. 01.
26- Phonocardiogram Classification Based on Machine Learning with Multiple Sound Features ,Journal of Computer Science, 2020,Vol. 16,no. 11.
27- A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol ,International Journal of Electrical and Computer Engineering (IJECE) , 2020,Vol. 10,no. 5.
28- An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem ,Journal of Discrete Mathematical Sciences and Cryptography, 2020,Vol. 23,no. 04.
29- A new RSA public key encryption scheme with chaotic maps ,International Journal of Electrical and Computer Engineering (IJECE), 2020,Vol. 10,no. 02.
30-  Source Code Explorer System to Enhance the Software Maintainability and Scalability ,International Journal of Education and Information Technologies, 2019,Vol. 13,no. .
31- Automated Pedestrian Recognition Based on Deep Convolutional Neural Networks ,International Journal of Machine Learning and Computing, 2019,Vol. 09,no. 05.
32- Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys ,Neural Computing and Applications, 2019,Vol. 31,no. .
33- An efficient identity-based cryptographic model for Chebyhev chaotic map and integer factoring based cryptosystem ,Journal of Applied Security Research, 2019,Vol. 14,no. 03.
34- Geometrical-based approach for robust human image detection ,Multimedia Tools and Applications, 2019,Vol. 78,no. 06.
35- NLP and IR Based Solution for Confirming Classification of Research Papers ,Journal of Theoretical and Applied Information Technology, 2018,Vol. 96,no. 16.
36- An effective image processing method for detection of diabetic retinopathy diseases from retinal fundus images ,Int. J. of Signal and Imaging Systems Engineering, 2018,Vol. 11,no. 04.
37- Revising Programs Internal Documentation for Developers Sustaining ,Journal of Theoretical & Applied Information Technology, 2017,Vol. 95,no. 18.
38- A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments ,Neural Computing and Applications, 2017,Vol. 28,no. 1.
39- A Topic Modeling Based Solution for Confirming Software Documentation Quality ,International Journal of Advanced Computer Science and Applications, 2016,Vol. 7,no. 2.
40- High Quality-Low Computational Cost Technique for Automated Principal Object Segmentation Applied in Solar and Medical Imaging ,Computer and Information Science, 2016,Vol. 9,no. 2.
41- Combining Audio Samples and Image Frames for Enhancing Video Security ,Indian Journal of Science and Technology, 2015,Vol. 08,no. 10.
42- Spam E-mail Filtering Using ECOS Algorithms ,Indian Journal of Science and Technology, 2015,Vol. 8,no. S9.
43- A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map ,Computer and Information Science, 2014,Vol. 7,no. 4.
44- A dual curvature shell phased array simulation for delivery of high intensity focused ultrasound ,Computer and Information Science, 2014,Vol. 07,no. 03.
45- HANON Chaotic Map - Based New Digital Image Encryption Algorithm ,MAGNT Research Report, 2014,Vol. 02,no. 04.
46- Cross correlation-new based technique for speaker recognition ,International Journal of Academic Research, 2014,Vol. 06,no. .
47- A PAIR-WISE KEY ESTABLISHMENT SCHEME FOR AD HOC NETWORKS ,International Journal of Computer Networks and Communications, 2013,Vol. 05,no. 02.
48- A New Approach for Complex Encrypting and Decrypting Data ,International Journal of Computer Networks & Communications, 2013,Vol. 5,no. 2.
49- Increase the Security Level for Real-Time Application Using New Key Management Solution ,International Journal of Computer Science Issues, 2012,Vol. 09,no. 03.

University Courses Taught
1- Theory of Computation and Automata.
2- Compiler design and automation.
3- Computer and Network Forensiec-1.
4- Computer and Network Forensiec-2.
5- Modern Encryption.
6- Artificial Intelligent.
7- Networks Security.
8- Wireless Computer Network.
9- Cryptography.

Master and Phd thesis contributions
Thesis Supervision
A New Classification Approach Based on Geometrical Model for Human Detection in Images ,University of Salford,Phd Thesis,2019.
Thesis Defense Committee Membership
Voiced Cyber bullying Detection Using Machine Learning ,Yarmouk University,Master Thesis,2023.
A Concurrent Face Recognition for E-Learning Identification and Authentication ,University of Jordan,Master Thesis,2023.
Identifying the Best Base Classifier and the Significance of Capturing the Correlations among Labels in Multi-label Classification ,Al al-Bayt University,Master Thesis,2022.
Synchronization of Chaotic Systems with Application to Cryptography ,Yarmouk University,Master Thesis,2018.

Conferences and Workshops
# Conference/Workshop Name Conference/Workshop Place Conference/Workshop Date
12024 International Conference on Applied Mathematics & Computer Science (ICAMCS)Spain2024/09
23rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)Spain2023/07
3International Conference on Mathematics and ComputationsJordan2022/05
42019 the 4th International Conference on Multimedia and Image Processing (ICMIP)Malaysia2019/01
52014 IEEE International Conference on Control Science and Systems EngineeringChina2014/12

Books
# Book Name Publisher Name Year
1A New Authentication Scheme Based on Chaotic Maps and Factoring ProblemsSpringer Nature Singapore2023

Journals Editor/ Reviewer
Review:
IET Image Processing.
Microscopy Research and Technique.
Network: Computation in Neural Systems.
Biomedical Engineering - Applications, Basis and Communications.
International Journal of Artificial Intelligence.
World Journal of Traditional Chinese Medicine.
IEEE Multimedia.
Journal of Intelligent and Fuzzy Systems.
Advances in Mathematical Physics.
Journal of Applied Security Research.
SIAM Journal on Imaging Sciences.
Concurrency Computation Practice and Experience.
Cogent Engineering.
Computer Methods in Biomechanics and Biomedical Engineering: Imaging and Visualization.
Applied Soft Computing Journal.
IEEE Access.
Neural Computing and Applications.
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS.
DIABETES OBESITY & METABOLISM.
Journal of Imaging Science and Technology.
CLINICAL MEDICINE INSIGHTS-CASE REPORTS.
Electromagnetic Biology and Medicine.
Journal of Pharmacology and Experimental Therapeutics.
Malaysian Journal of Medicine and Health Sciences.
PeerJ Computer Science.
Journal of Computational Design and Engineering.
Optical and Quantum Electronics.
Digital Health.
IEEE Transactions on Industrial Informatics.
Biotechnic and Histochemistry.
BMJ Open Ophthalmology.
Journal of Medical Imaging and Health Informatics.
Institution of Electronics and Telecommunication Engineers (IETE).
Connection Science.

Other Contributions:
*Erasmus+ Program of the European Union - Staff and students training workshops - Development of Remote and Virtual Laboratories Co-funded by the Erasmus+ Program of the European Union for Teaching and Training Engineering Students in the South Mediterranean and Sub-Saharan Higher Education Institutions (RL4Eng) ? Spain - University of Castilla-La Mancha (UCLM) from 10 - 17 February 2024..

Refrences
Prof. Dr. Saeid M. Abu-Romman-Al-Balqa Applied University ,saeid.aburomman@bau.edu.jo.
Prof. Dr. Samer Samarah-YARMOUK University ,samers@yu.edu.jo.
Prof. Dr. Ammar Ali Deeb Almomani-Al-Balqa Applied University ,ammarnav6@bau.edu.jo.
Prof. Dr. Ashraf Abu-Ein-Al-Balqa Applied University ,ashraf.abuain@bau.edu.jo.
Prof. Dr. Zaid Ahmed Salem Al-Anber-Al-Balqa Applied University ,z_alanber@bau.edu.jo.


Print CV
Print CV



اتصل بنا
جامعة البلقاء التطبيقية
 962 5 3491111+
 962 5 3532312+
  السلط 19117 . الاردن, ص. ب. 206
شبكات التواصل الإجتماعي
Facebook Twitter Youtube Instgram Linked In
Google Play App Store
سياسة حماية البيانات و الخصوصية
©2022 جميع الحقوق محفوظة جامعة البلقاء التطبيقية تصميم وبرمجة مركز الحاسوب
إضغط هنا لمشاهدة أفضل إعدادات التصفح