|
|
|
|
|
|
OverView
|
PhD Degree in Computer Science and Software Engineering, De Montfort University, Leicester-United Kingdom (2009-2012).
Previously M.Sc, Computer Science (2009) and B.Sc Computer Information Systems (2006) from Al-Balqa Applied University, Al-Salt, Hashemite Kingdom of Jordan.
I was on a sabbatical leave in the United States of America for the academic year (2023-2024), I worked as Dean of the Faculty of Artificial Intelligence at Al-Balqa Applied University in Jordan (August 2021 - August 2023). Previously a Head of Computer Information Systems Department (2020-2021).
Previously a lecturer at De Montfort University/UK, with responsibility for teaching and project supervision at B.Sc & M.Sc levels (2010-to 2012), and teaching on Modules 'Programming in C' and Internet Software Development' .
|
|
|
|
|
|
Research Intersets:
|
Artificial Intelligence
Machine learning
Networking
internet of things (IOT)
Natural Language Processing
Security
|
|
|
|
|
Qualifications
|
| #
|
Degree
|
University
|
Specialization
|
Graduation year
|
| 1 | PHD | De Montfort University | Computer Science and Software Engineering | 2012 | | 2 | MASTER DEGREE | Al-Balqa Applied University | Computer Science | 2009 | | 3 | BACHELOR'S DEGREE | Al-Balqa Applied University | computer information systems | 2006 |
|
|
|
|
|
|
|
|
|
|
|
Publications
|
1- An Efficient IoT-based Prediction and Diagnosis of Cardiovascular Diseases for Healthcare Using Machine Learning Models ,International Journal of Computing and Digital Systems, 2025,Vol. 17,no. 1. 2- Utilizing a Hybrid Cat-Swarm Optimization Algorithm for Seamless Vertical Handoff in Vanet
,Wireless Personal Communications, 2024,Vol. 137,no. 1. 3-
Ensemble of Deep Features for Breast Cancer Histopathological Image Classification ,The Computer Journal, 2024,Vol. 67,no. 6. 4- Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques ,CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024,Vol. 27,no. 7. 5- Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
,IEEE Access, 2023,Vol. 11,no. 1. 6- Skin cancer malignancy classification and segmentation using machine learning algorithms ,Springer, 2023,Vol. ,no. . 7- Efficient bandwidth allocation in SDN-based peer-to-peer data streaming using machine learning algorithm
,The Journal of Supercomputing, 2022,Vol. 79,no. 6. 8- Cloud security threats and solutions: A survey
,Wireless Personal Communications, 2022,Vol. ,no. . 9- Cloud-based email phishing attack using machine and deep learning algorithm ,Complex & Intelligent Systems, 2022,Vol. 9,no. 3. 10- Vehicle routing problems based on Harris Hawks optimization
,Journal of Big Data, 2022,Vol. 9,no. 1. 11- An Architecture of IoT-Aware Healthcare Smart System by Leveraging Machine Learning
,International Arab Journal of Information Technology, 2022,Vol. ,no. . 12- Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography
,Electronics , 2022,Vol. 11,no. 7. 13- A machine learning approach for non-invasive fall detection using Kinect
,Multimedia Tools and Applications, 2022,Vol. 81,no. 11. 14- Intelligent transmission control layer for efficient node management in SDN
,CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021,Vol. 25,no. 1. 15- Connectivity analysis of V2V communication with discretionary lane changing approach
,The Journal of Supercomputing, 2021,Vol. 78,no. 1. 16- A novel mechanism to handle address spoofing attacks in SDN based IoT ,CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021,Vol. 24,no. 4. 17- A study on modeling vehicles mobility with MLC for enhancing vehicle-to-vehicle connectivity in VANET
,Journal of Ambient Intelligence and Humanized Computing, 2020,Vol. 12,no. 1. 18- An IOT Based Framework For Students? Interaction And Plagiarism Detection In Programming Assignments ,Journal of Theoretical and Applied Information Technology , 2019,Vol. 97,no. 18.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|