|
|
|
|
|
|
|
OverView
|
|
received the B.S. degree in Computer Science from Al-Balqa Applied University, Jordan in 2005, the MSc in Computer Science from Yarmouk University, Jordan in 2009, PHD in Business Intelligence from The World Islamic Sciences and Education University, Jordan in 2022, Working as instructor in Al-Balqa Applied University/Al-Huson University College-Department of Information Technology.
|
|
|
|
|
|
Research Intersets:
|
|
Network Security, Data Analysis, Business Intelligence
|
|
|
|
|
Qualifications
|
| #
|
Degree
|
University
|
Specialization
|
Graduation year
|
| 1 | PHD | The World Islamic Sciences and Education University | Administration | 2022 |
|
|
|
|
|
|
|
|
|
|
|
Publications
|
1- ANALYSIS AND EVOLUTION OF SHA-1 ALGORITHM - ANALYTICAL TECHNIQUE ,International Journal of Computer Networks and Communications, 2024,Vol. 16,no. 3. 2- The Impact of Business Intelligence on Strategic Entrepreneurship: The Mediating Role of Organizational Agility ,International Review of Management and Marketing, 2022,Vol. 12,no. 5. 3- Chaotic Elliptic Map for Speech Encryption ,Indonesian Journal of Electrical Engineering and Computer Science, 2022,Vol. 25,no. 2. 4- Proposed Technologies for Solving Future 5G Heterogeneous Networks Challenges ,International Journal of Computer Applications, 2016,Vol. 142,no. 10. 5- A Security Scheme for Providing AIC Triad in Mobile Cloud Computing ,International Journal of Computer Science & Information Security, 2016,Vol. 14,no. 4. 6- A PAIR-WISE KEY ESTABLISHMENT SCHEME FOR AD HOC NETWORKS ,International Journal of Computer Networks and Communications, 2013,Vol. 5,no. 2. 7- Cognitive Sensor Techniques to Face Security Challenges in CWSN ,International Journal of Computer Science Issues, 2013,Vol. 10,no. 2.
|
|
|
|
|
|
|
University Courses Taught
|
1- DATABASES DESIGN AND MANAGEMENT. 2- DIGITAL LOGIC DESIGN. 3- INTRODUCTION TO COMPUTER PROGRAMMING. 4- BASICS OF WEBSITE DESIGN. 5- MULTIMEDIA SYSTEMS. 6- THEORY OF COMPUTATION AND AUTOMATA. 7- COMPILERS DESIGN AND PROGRAMMING. 8- DECISION SUPPORT SYSTEMS. 9- SYSTEM ANALYSIS AND DESIGN. 10- ENCRYPTION.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|