كتابة النص: الأستاذ الدكتور يوسف أبو العدوس - جامعة جرش قراءة النص: الدكتور أحمد أبو دلو - جامعة اليرموك مونتاج وإخراج : الدكتور محمد أبوشقير، حمزة الناطور، علي ميّاس تصوير : الأستاذ أحمد الصمادي الإشراف العام: الأستاذ الدكتور يوسف أبو العدوس
فيديو بمناسبة الإسراء والمعراج - إحتفال كلية الشريعة بجامعة جرش 2019 - 1440
فيديو بمناسبة ذكرى المولد النبوي الشريف- مونتاج وإخراج الدكتور محمد أبوشقير- كلية تكنولوجيا المعلومات
التميز في مجالات التعليم والبحث العلمي، وخدمة المجتمع، والارتقاء لمصاف الجامعات المرموقة محليا واقليميا وعالميا.
المساهمة في بناء مجتمع المعرفة وتطوره من خلال إيجاد بيئة جامعية، وشراكة مجتمعية محفزة للابداع، وحرية الفكر والتعبير، ومواكبة التطورات التقنية في مجال التعليم، ومن ثم رفد المجتمع بما يحتاجه من موارد بشرية مؤهلة وملائمة لاحتياجات سوق العمل.
تلتزم الجامعة بترسيخ القيم الجوهرية التالية: الإلتزام الإجتماعي والأخلاقي، الإنتماء،العدالة والمساواة، الإبداع، الجودة والتميّز، الشفافية والمحاسبة، الحرية المنظبطة والمستقبلية.
professor:Computer Science
Ph.D. Kharkov State Poly-technical ,University, Kharkov Ukraine, 2001
Period
University
Work Description
2005-2006
Irbid National University
Head of the computer information systems department
2011-2012
Jerash university
Head of computer science department
2017-2016
Jerash University
Managing the university's social networking site
2018-2014
Deputy Dean, Faculty of Computer Science and Information Technology
2016-2018
Member of the Disciplinary Board for students
2018-Preent
Dean, Faculty of Computer Science and Information Technology
This Matching input keywords with historical or information domain is an important point in modern computations in order to find the best match information domain for specific input queries. Matching algorithms represents hot area of researches in computer science and artificial intelligence. In the area of text matching, it is more reliable to study semantics of the pattern and query in terms of semantic matching. This paper improves the semantic matching results between input queries and information ontology domain. The contributed algorithm is a hybrid technique that is based on matching extracted instances from booth, the queries and in information domain. The instances extraction algorithm that is presented in this paper are contributed which is based on mathematical and statistical analysis of objects with respect to each other and also with respect to marked objects. The instances that are instances from the queries and information domain are subjected to semantic matching to find the best match, match percentage, and to improve the decision making process. An application case was studied in this paper which is related to renewable energy, where the input queries represents the customer requirements input and the knowledge domain is renewable energy vendors profiles. The comparison was made with most known recent matching researches.
Requirements establishment and definition are very critical tasks in software development. This study discusses the process of requirements definition, and key characteristics affecting the success of software projects development. An evaluation framework is proposed in order to verify users’ requirements and reduce associated risks on software project development. The framework was developed based on the relationships between the components of software project request. A preliminary assessment study was conducted and confirmed the applicability and usefulness of the proposed framework in detecting errors in user’s requirements.
Looking at the broad spectrum of Mobile ad hoc Networks (MANETs) applications, security challenges imposed during its deployment have triggered researchers to analyze the vulnerabilities of such networks and deduce newer reliable solutions. In this study, an attempt is made to address the challenges imposed by security impairments in Intrusion Detection Systems (IDS) in the context of MANETs. This study covers a broad analysis of IDS architectures and algorithms and measures advantages and disadvantages associated with these architectures. This study contributes significantly to IDS successful implementation and triggers researchers in this field, to develop more robust solutions encountering the security drawbacks and challenges currently experienced.
Steganography is the techniques can be concealed secret messages inside the cover. The aim of steganography is to keep a secret message within no modified. Message integrity is the scheme that can validate the secret message when it arrived in order to ensure if it is correctly delivered or has been altered. This paper contributes to the information security community by reviewed message integrity methods that using steganography technique.
Steganography is a method of hiding information inside a cover. Several algorithms were developed to hide secret messages inside digital media such as image, audio, video and text. Prior researches focused their efforts into two main issues: the security of the secret message before embedding and complexity of intelligent work to achieve a reliable message hiding inside the cover. This paper introduces a new steganography technique that addresses the security issue based on multilevel security by applied wavelet transformation and digital modulation. The secret message is being modulated inside the cover by using wavelet domain. This method will add high security to the secret message with robustness to external attackers. The experimental results have shown that the peak signal-to-noise ratio (PSNR) is near 50 db without detecting the secret message after embedded in the cover.
Electromagnetic inference (EMI) is a major issue for all electronic devices, and it represents a major problem in wireless communication schemes. ZigBee is a wireless communication technology based on IEEE 802.15. 4 standard, mainly using 2.4 GHz band in most ISM and electronic applications, but the performance of ZigBee nodes is seriously impaired by the interference generated in this channel frequency. This paper investigates the interference immunity of Zigbee devices and presents a new adaptive algorithm for selecting a new channel with low interference levels during network transmissions. The proposed algorithm achieves high packet delivery rates and low delay ratio within different levels of channel interference.
This work contributes to the multimedia security fields by given that more protected steganography technique which ensures message confidentiality and integrity. An Advanced Least Significant Bit (ALSB) technique is presented in order to meet audio steganography requirements, which are imperceptibility, capacity, and robustness. An extensive evaluation study was conducted measuring the performance of proposed NLSB algorithm. A set of factors were measured and used during evaluation, this includes; Peak Signal to Noise Ratio (PSNR) and Bit Error Rate. MP3 Audio files from five different audio generators were used during evaluation. Results indicated that ALSB outperforms standard Least Significant Bit (SLSB) technique. Moreover, ALSB can be embedding an utmost of 750 kb into MP3 file size less than 2 MB with 30db average achieving enhanced capacity capability.
Mobile Ad-hoc network (MANET) is the guiding technology of ubiquitous era and a cornerstone in the 4G communication architecture. MANET has limited resources and characterized with high mobility and frequent topology change. Routing in MANET should follow these constrains, otherwise, it can severely degrade the performance of MANET. Owing to Greedy routing (GFS) nature in MANET, a certain part of the MANET becomes congested before other parts. In such area the nodes have failed to forward packets in a timely manner or drop them, thus such nodes called Network Holes. This paper presents a simple and efficient enhanced GFS routing algorithm called Intelligent Fuzzy logic Greedy forwarding Scheme (IFGFS). IFGFS consider the De-congestion level of each mobile node as another selective metric besides distance. In order to validate our algorithm, we rely on a wide simulation experiments. The evaluation results showed the correctness of our new proposed algorithm the adaptive-congestion IFGFS which maximize the performance of the network.
Multi-level encryption approaches are becoming more popular as they combine the strength of multiple basic/traditional approaches into a complex one. Many multilevel encryption approaches have been introduced for different systems, like Internet of Things, sensor networks, big data, and the web. The main obstacles in building such approaches are to have a secure as well as a computationally efficient multi-level encryption approach. In this paper, we propose a computationally efficient multi-level encryption framework that combines the strength of symmetric, the encryption algorithm AES (Advance Encryption Standard), Feistel network, Genetic Algorithm’s Crossover and Mutation techniques, and HMAC. The framework was evaluated and compared to a set of benchmark symmetric encryption algorithms, such as RC5, DES, and 3-DES. The evaluation was carried out on an identical platform and the algorithms were compared using the throughput and running time performance metrics and Avalanche effect security metric. The results show that the proposed framework can achieve the highest throughput and the lowest running time compared to the considered benchmarked symmetric encryption algorithms and passes the avalanche effect criterion.
A Mobile Ad-hoc Network (MANET) is an assortment of wireless nodes that creates a temporal network between mobile nodes with no centralized administrator. The performance of MANET can be assessed by virtue of implementation of routing protocols. Continuous movement of mobile nodes in MANET results in frequent topology changes causing a major performance challenge. Several MANET routing protocols are available within different categories, mainly topology-based and position-based routing protocols. This work presents a new performance evaluation framework, aiming to find optimal positionbased routing protocols features achieving best performance within different environmental conditions considering; terrain areas, density of nodes and mobility speeds. The performance analysis carried out in this work focused on a set of metrics including; delay, throughput, packet delivery ratio and power consumption. Results have indicated that LAR protocol achieved best performance considering all metrics, while DREAM protocol proven to attain best energy consumption. Results were investigated in terms of scalability, mobility and energy efficiency, in order to select optimal protocol features and provide recommendations for future design and implementation of position-based routing protocols.
No.
عنوان البحث
Article Title
المؤلفون
Authors
المؤتمر
Conference
المنظمون
Organizers
السنة
Year
Advanced Object Monitoring Using Wireless Sensors Network
Mohammad alrawajbeh and Ahmad Haboush
International Conference on Communication Management an Information Technology
ICCMIT
2015
BioCloud Anetwork Cloud-Computing Method for Predicting RNA Secondary Structure
Ahmad Haboush
International Center of Econmics ,Humanities & Managment
ICEHM
2016
المبنى ورقم القاعة
الوقت
اليوم
المادة
الهندسة 603
8
ح ث
هندسة البرمجيات
الهندسة 719
11
تصميم وتنظيم الحاسوب
الهندسة 602
ن ر
مهارات حاسوب/استدراكي
All Rights Reseved © 2023 - Developed by: Prof. Mohammed M. Abu Shquier Editor: Ali Mayyas