شبكات الحاسوب والأنظمة الموزعة

تمتد المواضيع التي يهتم أعضاء المجموعة البحثية بها الى مجالات واسعة، تشمل:

1.      هيكلية الشبكات

2.      بروتوكولات الشبكات 

3.      نمذجة الشبكات وتحليلها

4.      الشبكات اللاسلكية

5.      قياسات الشبكات

6.      ادارة الشبكات

7.      الوكلاء المتحركون

8.      امن الشبكات

9.      الامن في تكنولوجيا الوكلاء المتحركون

10.  التشفير

 

اعضاء المجموعة البحثية:

1.      د. امل الدويك

2.      د. رضوان طهبوب

3.      د. مراد ابو صبيح

4.      د. ليانا التميمي

5.      م. ايمن وزوز

6.      د. هاني صلاح (منسق المجموعة)

7.      د. موسى فرج الله

8.      د. محمد الدشت

 

Journals and Conferences

1) Amal Dweik and I. Ismail, "Fault tolerance of Mobile Agents". The International Arab conference on Information Technology "ACIT2005". Held at 6th to 8th Dec.2005, Amman.

2 Amal Dweik, and I. Ismail, "Fault tolerance of Mobile Agents – Centralized Approach". 2nd International Computer Engineering Conference- Engineering the Information Society ICENCO'2007". Faculty of Engineering, Cairo University. Cairo, EGYPT. December 26-28, 2006.

3) Amal Dweik and S. Ahmad, “Fault Tolerance of Mobile Agents Systems – FTMAS”. Egyptian Journal of Information. Accepted to be published, Vol.2, Issue: 10. September, 2009. Cairo. Egypt.

4) Amal Dweik, I. Ismail, and S. Ahmad, "Fault tolerance of Mobile Agents Systems (FTMAS) Modeling". The International Arab conference on Information Technology "ACIT2012". 10th to 13th Dec.2012, Zarqa, Jordan.

5) Amal Dweik, I. Ismail, and S. Ahmad, Fault Tolerance Mobile Agent Execution System (FTMAS) Modeling and Performance Analysis. The 5th International Conference on Information & Communication Systems (ICICS2014), April 1st – 3rd 2014, Irbid, Jordan.

6) Amal Dweik and A. Amro: Wait-Then-Migrate Fault Tolerance Approach using Open Nebula, in PICCIT2015, Hebron, Plaestine.

7) S. Sweiti and Amal Dweik, IRCFT implementation and results. PICCIT2015, Proceedings of the 4th Palestinian International Conference on Computer and Information Technology. October, 2015.

8) S. Sweiti and Amal Dweik, Integrated Checkpoint-Replication fault Tolerance Approach of Mobile Agents”IRCFT”. ACCIT, Proceedings of the 16th International Conference on Information Technology. December, 2015.

9) W. shawar, Amal Dweik, ”A New Approach for QOS Based Ant Colony Optimization Routing Protocol In MANETs (QOS-Based ACO)”, 4th Palestinian International Conference on Computer and Information Technology (PICCIT 2015), Palestine Polytechnic University , 2015.

10) W. shawar, Amal Dweik,”A Survey: The Agent Based Routing Protocols In the Wireless Ad hoc Networks”, 4th Palestinian International Conference on Computer and Information Technology (PICCIT 2015), Palestine Polytechnic University, 2015.

11) S. Sweiti and A. Dweik, “Integrated Replication-Checkpoint Fault Tolerance Approach of mobile agents “IRCFT””. International Arab Journal of Information Technology (IAJIT). Volume 13, no. 1A, February 2016.

12) I. Sharha and A. Dweik, “Digital Interactive Storytelling Approaches: A Systematic Review”, Proceedings of the 3rd International Conference on Computer Science & Engineering (CSEN-2016), Dubai, 27-28/8/2016.

 

Books

1) Fault Tolerance of Mobile Agents, LAP LAMBERT Academic Publishing (April 30, 2012), ISBN-10: 3848438267, ISBN-13: 978-3848438266.

 

الدكتور رضوان طهبوب:

1)  Adnan Muhaimenul; Nagi Mohamad; Kianmehr Keivan; Tahboub Radwan; Ridley Mick; Rokne Jon; Promoting where, when and what? An analysis of web logs by integrating data mining and social network techniques to guide ecommerce business promotions, Social Network Analysis and Mining, 1, 3, 173-185, 2011, Springer

2)  Tahboub Radwan; Lazarescu Vasile; Novel Approach for Remote Energy Meter Reading Using Mobile Agents,Third International Conference on Information Technology: New Generations (ITNG'06),,,84-89,2006,IEEE

3)  Vieru Rodica; Tahboub Radwan; Constantinescu C; Lazarescu, V; New results using the audio watermarking based on wavelet transform,International Symposium on Signals, Circuits and Systems, 2005. ISSCS 2005., 2, 441-444, 2005, IEEE

4)  Tahboub Radwan; Lazarescu Dan; Lazarescu Vasile; Modeling and simulation of secure automatic energy meter reading and management systems using mobile agents, IJCSNS International Journal of Computer Science and Network Security, 7, 1, 244-253,2007, Citeseer

5)  Tahboub Radwan; Lazarescu Dan; Lazarescu Vasile; Software engineering and database Web management in Daleelcom design, International Conference on Information Technology: Coding and Computing (ITCC'05)-Volume II, 2, 823-824, 2005, IEEE.

6)  Taha Mohammed Abu; Farajallah Mousa; Tahboub Radwan; A Practical One Way Hash Algorithm based on Matrix Multiplication,International Journal of Computer Applications(0975–8887) Volume, 2011.

7)  Tahboub Radwan; Hanini Muna; Time Modeling in Educational Chat Room, European Journal of Scientific Research, 122,,27-35,2014.

8)  Tahboub R; Lazarescu D; Secure Information Store Web Access in Time Sheet Management System,University Politehnica of Bucharest Scientific Bulletin, Series C: Electrical Engineering, 66, 2,15-30, 2004.

9)  Sarahneh Sanaa; Tahboub Radwan; Secure Data Sharing Polices and Architecture Preserving Privacy.

10)  Isayed Samer; Tahboub Radwan; A review of optical Braille recognition, Web Applications and Networking (WSWAN), 2015 2nd World Symposium on, 42375, 2015, IEEE

11)  Tahboub Radwan; Constantinescu Rodica; Lazarescu Vasile; Radoi Constantin; ,Simulation results for secure automatic energy meter reading using mobile agents. Part 1, REVUE ROUMAINE DES SCIENCES TECHNIQUES SERIE ELECTROTECHNIQUE ET ENERGETIQUE,53,1,75,2008,

12) CONSTANTINESCU Rodica; LAZARESCU Vasile; TAHBOUB Radwan; GEOMETRICAL FORM RECOGNITION USING “ONE-STEP-SECANT” ALGORITHM IN CASE OF NEURAL NETWORK.

13) Hanini Muna; A M Jabari Nidal; Tahboub Radwan; Text Modeling in Adaptive Educational Chat Room,International Journal of Computer Applications,103,5,33-37,2014.

14)  Farajallah Mousa; Taha Mohammed Abu; Tahboub Radwan; A Practical One Way Hash Algorithm based on Matrix Multiplication,International Journal of Computer Applications, 23, 2, 2011, International Journal of Computer Applications, 244 5 th Avenue,# 1526, New York, NY 10001, USA India.

15) Tahboub, Radwan; Constantinescu, Rodica; LĂZĂRESCU, VASILE; RĂDOI, CONSTANTIN; ,Simulation results for secure automatic energy meter reading using mobile agents. Part 2,REVUE ROUMAINE DES SCIENCES TECHNIQUES-SERIE ELECTROTECHNIQUE ET ENERGETIQUE,53,2,213-223,2008,EDITURA ACAD ROMANE CALEA 13 SEPTEMBRIE NR 13, SECTOR 5, BUCURESTI 050711, ROMANIA

16) Aykanat, Cevdet; Oflazer, Kemal; Tahboub, Radwan; ,Parallel Implementation of the Backpropagation Algorithm on Hypercube Systems,Parallel Computing on Distributed Memory Multiprocessors,,,301-313,1993,Springer Berlin Heidelberg

17)   Halawani, Bayan; Isieed, Samer; Younes, Wisam; Tahboub, Radwan; ,Braille to Text/Voice Converter (BT/VC),,,,,,

18)  Taha, Mohammed Abu; Farajalla, Mousa; Tahboub, Radwan; ,Article: A Practical One Way Hash Algorithm based on Matrix Multiplication},International Journal,23,,33-37,,

19) Tahboub, Radwan; Saleh, Yousef; ,Data Leakage/Loss Prevention Systems (DLP),Computer Applications and Information Systems (WCCAIS), 2014 World Congress on,,,42375,2014,IEEE

20)  HANINI, MUNA; TAHBOUB, RADWAN; JABARI, NEDAL AM; ,STUDENT MODELING IN ADAPTIVE EDUCATIONAL CHAT ROOM.,Journal of Theoretical & Applied Information Technology,58,3,,2013,

21)   AbuTaha, Mohammed; Occupied, Palestinian; Farajallah, Mousa; Territori, Palestinian Occupied; Tahboub, Radwan; Odeh, Mohammad; ,Survey Paper: Cryptography Is The Science Of Information Security Full text,,,,,2011,

22) Zatari, Daoud I; Tahboub, Radwan; Nawahda, M; Aljabari, T; ,Design and implementation of a telemedicine system in Palestine,Journal of telemedicine and telecare,5,suppl 1,39-41,1999,SAGE Publications

23) Zatari, Daoud I; Tahboub, Radwan; ,Realtime implementation of a simple telemedicine model in Palestine,Journal of Telemedicine and Telecare,6,suppl 1,202-202,2000,SAGE Publications

24) Sowan, Islam K; Tahboub, Radwan; ,Erp Systems Critical Success Factors,,,,,,

25) Tahboub, Radwan; Saleh, Yousef; Hebron, Palestine; ,Precaution Model for Data Leakage Prevention/Loss (DLP) Systems,,,,,,

26) Warasna, Fida; Tahboub, Radwan; ,Security issues in Mobile Cloud Computing Frameworks based on Mobile Agents,,,,,,

27) AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan; Odeh, Mohammad; ,Survey paper: cryptography is the science of information security,International Journal of Computer Science and Security (IJCSS),5,3,298,2011,

28) Alsharif, Bana; Tahboub, Radwan; Arafeh, Labib; ,ARABIC TEXT TO SPEECH SYNTHESIS USING QURAN-BASED NATURAL LANGUAGE PROCESSING MODULE,Journal of Theoretical and Applied Information Technology,83,1,148,2016,Journal of Theoretical and Applied Information

29) Kurar, Berat; Tahboub, Radwan; ,Internet Scale DoS Attacks,International Journal of Applied Mathematics, Electronics and Computers,3,2,83-89,2015,

30) Tahboub Radwan, L Vasile; ,Novel Approach for Remote Energy Meter Reading Using Mobile Agents,IEEE Information Technology: New Generations,,,,2006,

 

 

Patents:

“Systems and Methods for Distance Measurement in Wireless Networks”, Filled by Proximetry Corporation, March 2007

 

Journal Publications (With Peer Review):

1) Abusubaih M. (2016), "Using Measurement-based methods for channel selection in 802.11 WLANs", Int. J. Wireless and Mobile Computing, Vol. 10, No. 4, 2016, Inderscience.   

2)  Abusubaih M. (2016), "Using Partially Overlapping Channels in Home 802.11g WLANs", Wireless Personal Communications, Springer, DOI: 10.1007/s11277-015-3114-7.

3)  Abusubaih M. (2012), "Heterogeneous Uncoordinated Deployment of WLANs: An Evolving Problem for Current and Future Wi-Fi Access”, International Journal of Network Management, John Wiley & Sons, doi: 10.1002/nem.1815.

4)  Abusubaih M. (2012), "Joint RTS/CTS and Time Slotting for Interference Mitigation in Multi-BSS 802.11 Wireless LANs”, Computers and Electrical Engineering, Volume 38, Issue 3, pp. 672–680 Elsevier.

5)  Abusubaih M. (2012), "An Approach for Discriminating losses in 802.11 Wireless LANs”, IET Communications, Volume: 6 , Issue: 10, pp. 1262 - 1269, IEEE.

6)  Abusubaih M. (2011), “ A combined approach for Detecting Hidden Nodes in 802.11 WLANs”, Annals of Telecommunications, Volume 66, Issue 11-12, pp 635-642, Springer.

7)  Abusubaih M. (2010), “ Anomaly Problem in WLANs, Insight on Possible Solutions",  Communications of the Arab Computer Society, Vol. 3 No.2.

8)  Abusubaih M., Wiethoelter S., Gross J., and Wolisz A. (2008), "A New Access Point Selection Policy for Multi-Rate IEEE 802.11 WLANs", International Journal of Parallel, Emergent and Distributed Systems (IJPEDS), vol. 23, pp. 291 -- 307, Taylor & Francis.

9)  Abusubaih M.,  Ghareeb I. (2004), “Performance of MFSK signals with postdetection square-law diversity combining in arbitrarily correlated Nakagami-m fading channels”, IEEE Communication Letters, Vol. 8, NO. 2, pp 108-110.

10)  Abusbaih M., Ghareb I. (2001), “Performance of QDPSK signals with postdetection equal gain diversity combining in arbitrarily correlated Nakagami-m fading channels”,IEEE Communication Letters, Vol. 5, NO. 11, pp 441-443.

     

Conference Publications (With Peer Review)

1)  Abusubaih M. (2013), "IEEE 802.11n Dual Band Access Points for Boosting the Performance of Heterogeneous WiFi Networks”, ACM PM2HW2N Workshop, Accepted.

2) Abusubaih M. (2012),  “Performance of MIMO 802.11n in Heterogeneous Deployments”, ACM SAC 2012, Italy.

3)  Abusubaih M. (2012), “Mutual Interference between Bluetooth and 802.11n MIMO Devices”, 19th IEEE International Conference on Telecommunications, ICT 2012, Lebanon, 2012.

4)  Abusubaih M. (2010). “A new approach for Interference Measurement in 802.11 WLANs”, IEEE PIMRC2010, Turkey.  

5) Abusubaih M. (2010), “Performance Anomaly in 802.11 WLANs”, NGMAST 2012.

6)  Abusubaih M., Rathke B., and Wolisz A. (2009), "A Framework for Interference Mitigation in Multi-BSS 802.11Wireless LANs", In Proc. of the The 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2009, Kos, Greece.  

7)  Abusubaih M., Rathke B., and Wolisz A. (2008), "Collaborative Setting of  RTS/CTS in Multi Rate Multi-BSS IEEE 802.11Wireless LANs", In Proc. Of the 16'th IEEE Worksho on Local and Metropolitan Area Networks, IEEE LANMAN' 08, Cluj-Napoca, Romania.    

8) Abusubaih M., and Wolisz A. (2008), "Interference-Aware Decentralized Access Point Selection Policy for Multi-Rate IEEE 802.11 Wireless LANs", In Proc. of the 19'th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, IEEE PIMRC, Cannes, France.

9) Abusubaih M., and Wolisz A. (2007), "An Optimal Station Association Policy for Multi-Rate IEEE 802.11 Wireless LANs", In Proc. of the 10'th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Networks (MSWIM'07), Chania, Crete Island, Greece.

10)  Abusubaih M., Rathke B., and Wolisz A. (2007), "A Dual Distance Measurement Scheme for Indoor IEEE 802.11 Wireless Local Area Networks", In Proc. Of the 9'th IFIP/IEEE International Conference on Mobile and Wireless Communication Networks (MWCN'07), Cork, Ireland.

11) Abusubaih A., Gross J., and Wolisz A. (2007), "An Inter-Access Point Coordination Protocol for Dynamic Channel Selection in IEEE802.11 Wireless LANs", In Proc 1st IEEE Workshop on Autonomic Communications and Network Management (ACNM 2007), Munich, Germany.

12) Abusubaih M., Gross J., Wiethoelter S., and Wolisz A. (2006), "On Access Point Selection in IEEE 802.11 Wireless Local Area Networks", In Proc. Of the Sixth International Workshop on Wireless Local Networks (WLN 2006), Tampa, FL, USA.

 

Journals:

1) Ammar M. A. Abu Znaid, Mohd. Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, Liana Khamis Qabajeh, and Omar Adil Mahdi, 'An Efficient anchor nodes Distribution for Accurate Localization (EDAL) in mobile Wireless Sensor Networks',  journal of supercomputing (ISI journal, impact factor 1.08), under review.

2) Liana Tamimi, Feda Amro, 'Clean code best practices: a survey study', to be submitted soon.

3) Liana Tamimi, Mousa Farajallah, Samer Isieed, 'Real-Time Colored Image Selective Encryption', in progress.

4) Liana Tamimi, Dalya Amro, 'Secure Routing Protocol for Wireless Sensor Network', in progress.

5) Liana Tamimi, Mohammad Qabajeh, 'QoS Routing Protocol for Mobile Ad-Hoc Network', in progress.

6) Liana Tamimi, Islam Al-Najar'Steganography techniques: a survey', in progress.

7)  Ammar M. Abu znaid, Mohd. Yamani I. Idris, Ainuddin W. Abdul Wahab, Liana Kh. Qabajeh, Omar A. Mahdi, 2014, ‘Low communication cost (LCC) scheme for localizing mobile wireless sensor networks’, Wireless Networks, Vol., No. First online: 12 January 2016, pp. 1-11. (ISI-indexed publication)

8)  Ammar M. A. Abu Znaid, Mohd. Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, Liana Khamis Qabajeh, and Omar Adil Mahdi, 'Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review', Journal of Sensors, 2017 (ISI journal, impact factor 0.71), published.

9)  Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2014, ‘A Survey on Scalable Multicasting in Mobile Ad Hoc Networks’, Wireless Personal Communications, Vol. 80, No. 1, pp. 369-393. (ISI-indexed publication)

10) Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh, 2013, A more secure and scalable routing protocol for mobile ad hoc networks’, Security and Communication Networks Vol. 6, No. 3, pp. 286-308.(ISI-indexed publication)

11) Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh, 2011, ‘Secure Unicast Position-Based Routing Protocols for Ad-Hoc Networks’, Acta Polytechnica Hungarica (Journal of Applied Sciences) Vol. 8, No. 6, pp.191-214.(ISI-indexed publication)

12) Miss Laiha Mat Kiah, Liana K. Qabajeh & Mohammad M. Qabajeh, 2010, ‘Unicast Position-Based Routing Protocols for Ad-Hoc Networks’, Acta Polytechnica Hungarica (Journal of Applied Sciences) Vol. 7, No. 5, pp.19-46. (ISI-indexed publication)

13) Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2010, ‘Geographical Multicast Quality of Service Routing Protocol for Mobile Ad-Hoc Networks’, Journal of Engineering Letters, Vol. 18, No. 3, pp. 212-225. (Scopus-indexed publication)

14) Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh, 2009, ‘A Scalable and Secure Position-Based Routing Protocol for Ad-Hoc Networks’, Malaysian Journal of Computer Science, Vol. 22, No.  2, pp. 99-120. (ISI-indexed publication)

15) Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh, 2009, ‘A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks’, International Journal of Computer Science and Network Security, Vol. 9, No. 2, pp. 131-140. (Refereed publication)

16)  Aisha Hashim, Mohammad M. Qabajeh, Othman Khalifa & Liana K. Qabajeh, 2008, ‘Review of multicast qos routing protocols for mobile ad hoc networks’, International Journal of Computer Science and Network Security, Vol. 8, No. 12, pp. 108-117. (Refereed publication)

 

Conferences:

1)  Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh,  2010, ‘A Scalable and Secure Position-Based Routing Protocol for MANETs’, proceedings of the Annual International Conference on Network Technologies & Communication (NTC 2010), 29-30 November, Phuket Beach Resort, Thailand, pp. N7-N12.

2)  Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2010, ‘A Tree-based QoS Multicast Routing Protocol for MANETs’, proceedings of the Annual International Conference on Network Technologies & Communications (NTC 2010), 29-30 November, Phuket Beach Resort, Thailand, pp. N1-N7.

3)  Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2010, ‘Position-based QoS Multicast Routing Protocol for Mobile Ad Hoc Networks’, proceedings of the International Conference on Computer and Communication Engineering (ICCCE 2010), 11-13 May, Kuala Lumpur, Malaysia, pp.136-142.

4)  Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh,  2009, ‘A Scalable Secure Routing Protocol for MANETs’, proceedings of the International Conference on Computer Technology and Development (ICCTD 2009), 13-15 November, Kota Kinabalu, Malaysia, pp. 143-147.

5)  Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, , 2009, ‘Quality of Service Multicast Routing Protocol for Large Scale MANETs’, proceedings of the International Conference on Computer Technology and Development (ICCTD 2009), 13 - 15 November, Kota Kinabalu, Malaysia, pp.136-140.

6)  Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh, 2009, ‘A Scalable, Distributed and Secure Routing Protocol for MANETs’, proceedings of the International Conference on Computer Engineering and Applications (ICCEA 2009), 6-8 June, Manila, Philippine, pp. 51-56.

 

Book Chapters:

1)  Liana K. Qabajeh, Miss Laiha Mat Kiah  & Mohammad M. Qabajeh, 2011, ‘A Survey of Position-Based Routing Protocols for Ad-Hoc Networks’, (DOI: 10.1007/978-1-84996-510-1_4), Book chapter in Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic, Roman Trobec, Application and Multidisciplinary Aspects of Wireless Sensor Networks: Concepts, Integration, and Case Studies, (ISBN 976-1-84996-509-5), part 1, pp. 47-83, Springer.

 

1)  T. Li, H.​ Salah, M. He, T.​ Strufe, and S. Santini: REMO: Resource Efficient Distributed Network Monitoring, submitted.

2)  T. Paul, N. Lochschmidt, H.​ Salah, A. Datta and T.​ Strufe: Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks, in IEEE ICCCN 2017, Vancouver, Canada.

3)  H.​ Salah, M. Fatafta, S. SayyedAhmed, and T.​ Strufe: CoMon++: Mitigating Cache Pollution Attacks in NDN Effectively and Efficiently, in IEEE LCN 2017, Singapore.

4)  H.​ Salah and T.​ Strufe: Eval­u­at­ing and Mit­i­gat­ing a Col­lu­sive Ver­sion of the In­ter­est Flood­ing At­tack in NDN, in IEEE ISCC 2016, Messi­na, Italy.

5) S.​ Roos, H.​ Salah, and T.​ Strufe: On the Rout­ing of Kadem­lia-type Sys­tems, book chap­ter (ac­cept­ed for pub­li­ca­tion in the "Ad­vances in Com­put­er Com­mu­ni­ca­tions and Net­works" book), 2016.

6) H.​ Salah, Mea­sur­ing, Un­der­stand­ing, and Im­prov­ing Con­tent Dis­tri­bu­tion Tech­nolo­gies, PhD Dis­ser­ta­tion, TU Darm­stadt, Novem­ber 2015, Darm­stadt, Ger­many.

7) H.​ Salah, J.​ Wulfhei­de, and T.​ Strufe: Co­or­di­na­tion Sup­ports Se­cu­ri­ty: A New De­fence Mech­a­nism Against In­ter­est Flood­ing in NDN, in IEEE LCN 2015, Clear­wa­ter - Flori­da, USA. 

8) S.​ Roos, H.​ Salah, and T.​ Strufe: De­ter­min­ing the Hop Count in Kadem­lia-type Sys­tems, in IEEE ICCCN 2015, Las Vegas - Neva­da, USA.

9) H.​ Salah, J.​ Wulfhei­de, and T.​ Strufe: Lightweight Co­or­di­nat­ed De­fence Against In­ter­est Flood­ing At­tacks in NDN (poster paper), in IEEE IN­FO­COM 2015, Hong Kong. 

10) H.​ Salah and T.​ Strufe: CoMon: An Ar­chi­tec­ture for Co­or­di­nat­ed Caching and Cache-Aware Rout­ing in CCN, in IEEE CCNC 2015, Las Vegas - Neva­da, USA.

11) T.​ Paul, S.​ Stephen, H.​ Salah, and T.​ Strufe, The Stu­dents’ Por­tal of Il­me­nau: A Holis­tic OSN’s User Be­haviour Model, in PIC­C­IT 2015, He­bron, Pales­tine.

12) H.​ Salah, S.​ Roos, and T.​ Strufe: Di­ver­si­ty En­tails Im­prove­ment: A New Neigh­bour Se­lec­tion Scheme for Kadem­lia-type Sys­tems, in IEEE P2P 2014, Lon­don, UK.

13) H.​ Salah, S.​ Roos, and T.​ Strufe: Char­ac­ter­iz­ing Graph-The­o­ret­ic Prop­er­ties of a Large-Scale DHT: Mea­sure­ments vs.​ Simula­tions, in IEEE ISCC 2014, Madeira, Por­tu­gal. (Best Stu­dent Paper Award)

14) H.​ Salah, B.​ Schiller, and T.​ Strufe: CoMon: A Sys­tem Ar­chi­tec­ture for Im­prov­ing Caching in CCN (poster paper), in IEEE IN­FO­COM 2014, Toron­to, Cana­da.

15) H.​ Salah, S.​ Roos, T.​ Strufe: A Lightweight Ap­proach for Im­prov­ing the Lookup Per­for­mance in Kadem­lia-type Sys­tems (tech­ni­cal re­port), 2014.

16) H.​ Salah and T.​ Strufe: Cap­tur­ing Con­nec­tiv­i­ty Graphs of a Large-Scale P2P Over­lay Net­work, in IEEE ICDCS's Hot­POST 2013, Philadel­phia, USA.

17) D.​ Carra, P.​ Michiar­di, H.​ Salah, and T.​ Strufe: On the Im­pact of In­cen­tives in eMule - Anal­y­sis and Mea­sure­ments of a Pop­u­lar File-Shar­ing Ap­pli­ca­tion, in IEEE JSAC 2013. (Impact factor: 4.138)

18) S.​ Roos, H.​ Salah, T.​ Strufe: Com­pre­hend­ing Kadem­lia Rout­ing: A The­o­rit­i­cal Frame­work for the Hop Count Dis­tri­bu­tion (tech­ni­cal re­port), 2013.

 

1) Hamidouche, Wassim, Farajallah, Mousa, N Sidaty, S El Assad, and O Deforges. "Real-time selective video encryption based on the chaos system in scalable HEVC extension." Signal Processing: Image Communication, Q1 journal, Impact Factor:2.244, 58 (2017): 73-86.

2) Farajallah, Mousa, Rawan Qumsieh, and Samer Isayed. "Selective Hybrid Chaotic-Based Cipher for Real-Time Image Application" The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016.

3) El Assad, Safwan, and Mousa Farajallah. "A new chaos-based image encryption system." Signal Processing: Image Communication, Q1 journal, Impact Factor: 2.244, 41 (2016): 144-157.

4) Farajallah Mousa, El Assad Safwan and Deforges Olivier, " Fast and secure chaos-based cryptosystem for images", International Journal of Bifurcation and Chaos (IJBC), Q1 Journal, Impact Factor: 1.329, 26.02 (2016): 1650021

5) AbuTaha Mohammed, El Assad Safwan and Farajallah Mousa "Chaos-based Cryptosystems using Dependent Diffusion: An Overview", IEEE ICITST-2015, December 14-16, 2015, London, UK.

6) M. Farajallah, W. Hamidouche, O. Deforges, and S. El Assad, "ROI Selective Video Encryption In The HEVC Video Standard", in IEEE International Conference on Image Processing (ICIP) SJR H Index: 84, 27-30 September 2015, Quebec City, Canada.

7) W. Hamidouche, M. Farajallah, M. Raulet, O. Deforges, and S. El Assad, "Selective video encryption using chaotic system in the SHVC extension", in 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) SJR H Index: 104, 19 - 24 April 2015, Brisbane, Australia.

8) M. Chetto, S. El Assad, M. Farajallah, et al., "A lightweight chaos-based cryptosystem for dynamic security management in real-time overloaded applications", Int. J. Internet Technology and Secured Transactions, Q4 Journal, Impact Factor: 0.6, vol. 5, no. 3, pp. 262274, 2014.

9) S. El Assad, M. Farajallah, C. Vladeanu, et al., "Chaos-based block ciphers: An overview", in The 10th International Conference on Communications, 29-31 May, 2014.

10 ) Z. Fawaz, S. El Assad, M. Farajallah, A. Khalil, R. Lozi, O. Deforges, D. Battikh, B. Bakhache, M. Khalil, K. Samrouth, et al., "Lightweight chaos-based cryptosystem for secure images", in 8th International Conference on Internet Technology and Secured Transactions 2013, SJR H Index: 4: ISTP Workshop, London, UK, 9-12 Dec, 2013.

11) M. Farajallah, Z. Fawaz, S. El Assad, and O. Deforges, "Efficient image encryption and authentication scheme based on chaotic sequences", in SECURWARE 2013, The 7th International Conference on Emerging Security Information, Systems and Technologies, SJR H Index: 2, Barcelona, Spain, pp. 150155, IARIA, 25-31 August, 2013.

12) M. Farajallah, S. El Assad, and M. Chetto, "Dynamic Adjustment of The Chaos Based Security in Real-Time Energy Harvesting Sensors", in Green  Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (ITHINGS/CPSCOM), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, SJR H Index: 5, Beijing, China, pp. 282289, IEEE, 20-23 Aug, 2013.

13) M. Chetto, H. Noura, S. El Assad, and M. Farajallah, "How to guarantee secured transactions with QoS and real-time constraints", in 2012 International Conference For Internet Technology And Secured Transactions, SJR H Index: 4, London, Uk, pp. 4044, IEEE, 10-12 Dec, 2012.

14) M. Farajallah and M. Abu Taha, "A practical one way hash algorithm (POH), in The 2012 Conference on Innovations in Computing and Engineering Machinery CICEM2012, Amman, Jordan, ACM, Evaluation of reference 6, 9-11 April, 2012.

15) M. A. Taha, M. Farajallah, and R. Tahboub, "A practical one way hash algorithm based on matrix multiplication", International Journal of Computer Applications, vol. 23, 2011.

16) M. AbuTaha, M. Farajallah, R. Tahboub, and M. Odeh, "Survey paper: cryptography is the science of information security", International Journal of Computer Science and Security (IJCSS), vol. 5, no. 3, p. 298, 2011.

17) R. Hamamreh, M. Odeh, and M. Farajallah, "RAMD: Route authentication and misdirection detection protocol", in The 13th IEEE Joint International Computer Science and Information Technology Conference, Chongqing, China, pp. 643648, 20-22 Aug, 2011.

18) M. Farajallah, "Self-generating multi key cryptosystem for non-invertible matrices based on hill cipher", Master Thesis, Al-Quds University, Jerusalem, Palestine, Extended Book of reference 11, 2010.

19) R. A. Hamamreh and M. Farajallah, "Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher", International Journal of Computer Science and Network Security, pp. 1116, 2009.

20) M. Farajallah and R. Hamamreh, "Self-generating multi keys cryptosystem model for non-invertible matrices based on hill cipher", in SAM09 - The 2009 International Conference on Security and Management, Las Vegas, Nevada, USA, pp. 665672, 13-16 July, 2009.

 

Research Projects

Project Title: Intelligent Algorithms for Prediction and Optimization in Heterogeneous Clusters

Project Team: Dr. Mohammed Aldasht (PI) , Dr. Ghandi Manasrah and Dr. Mahmud Alsaheb

Financed by: Deanship of Scientific Research at the Palestine Polytechnic University

Supervised Master Thesis:

 

1)     Ahmed Jabari, “Dynamic thread scheduling on heterogeneous MCP”, 2011

2)     Sami Salamin, “Multi-objective genetic algorithm optimization using CUDA”, 2012

3)     Wael Takrouri, “Parallelizing Computation of a Hybrid Algorithm of Nonlinear Model Predictive Control”, 2014

4)     Murad Alkubabji, “Genetic-based feature selection for classification in large datasets”, 2015.

5)     Azeeza Zakaria Salameh, “Optimization of High Dimensional Data Visualization using Parallel Genetic Algorithm”, 2016.

6)     Fatima.I.koumi, “Feature Selection for Large Datasets  using Particle Swarm Optimization” , 2016.

 

Publications

1)  M. Aldasht, “Particle Swarm Optimization for the Exploration of Distributed Dynamic Load Balancing Algorithms”, International Journal of Soft Computing, Volume 10 Issue 5, PP. 307-314, 2015.

2)  Rihabb Salamen, Mohammed Aldasht, A Survey on TCP Performance for Mobile and Wireless Networks, The 4th Palestinian International Conference on Computer and Information Technology (PICCIT), Hebron, Palestine, October 7-8, 2015.

3)  M. M. Aldasht, M. H. Saheb, I. Najjar, M. H. Tamimi, T. O. Takruri "University Course Scheduling Using Parallel Multi-Objective Evolutionary Algorithms", Journal of Theoretical and Applied Information Technology, JATIT, Volume 22 Issue 2, December 31, 2010.

4)  M. Aldasht, M. Alsaheb, S. Adi, M. Abu-qobita, "University Course Scheduling Using Evolutionary Algorithms", Fourth International Multi-Conference on Computing in the Global Information Technology, IARIA, Cannes, Frances, 23-28 August, 2009.

5)  M. Aldasht, J.Ortega, C.G.Puntonet, "Dynamic Load Balancing in Heterogeneous Clusters". The 2nd Palestinian International Conference on Computer and Information Technology (PICCIT), Hebron, Palestine, September, 2007.

6)  M. Aldasht, J. Ortega, C. G. Puntonet, A. F. Diaz, "Exploración Evolutiva del Equilibrado de Carga Dinámico y Distribuido". Jornadas de Paralelismo, Universidad de Granada, Granada, 2005.

7) M. Aldasht, J. Ortega, C. G. Puntonet, A. F. Díaz, ”A Genetic Exploration of Dynamic Load Balancing Algorithms”. IEEE Conference on Evolutionary Computation, Portland, Oregon, 2004.

8) M. Aldasht, J. Ortega, C. G. Puntonet, "Computación Evolutiva y Procedimientos de distribución de carga en clusters de computadores" Monografías del Dpto. de Arquitectura y Tecnología de Computadores. Julio-2004. Dep. Legal: GR-1182-2004.

9) J. M. Górriz, C. G. Puntonet, M. Salmerón, J. Ortega, M. Aldasht: "Time series forecasting based on parallel neural network", EIS-2004, 29-febrero al 2 de Marzo, Madeira-Portugal. 2004. (IEEE)

10) J. M. Górriz, C. G. Puntonet, M. Aldasht, M. Salmerón, M. Damas: “Neural AR Prediction model using exogenous series implemented in parallel programming languages”. Jornadas de Paralelismo, Leganés, Madrid, 2003. ISBN: 84-89315-34-5.