
Radwan TahboubPalestine Polytechnic University · College of Information Technology and Computer Engineering; department of Computer Engineering.
Radwan Tahboub
Phd. in Computer Engineering and Information Systems.
About
38
Publications
31,324
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
214
Citations
Citations since 2017
Introduction
•Ass. Professor in Computer Systems at CITCE / PPU (1994-now)
•Chairperson of the of CE dept, CITCE/ PPU.
•Bethlehem University, Visiting Part time staff, (2009-2011)
•Director of FFKITCE IT Center of Excellence (2005-2009)
•Computer center director at PPU (1998-2004)
•Ph.D. in Tele-communication and Information Technology, Bucharest Polytechnic University, Romania, 2007
•M.sc. in CSE from Bilkent University in Ankara Turkey, 1992
•B.sc. degree in EE Eng. from METU, Ankara Turkey, 1990
Additional affiliations
Publications
Publications (38)
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that are suitable for devices with limited capabilities. In this paper, a comprehensive literature survey that discusses the most prominent encryption algorithms used in device security in general and IoT devices in specific has been conducted. Many studi...
Choosing suitable track is a key success in the academic and professional life. Whenever the specialization is appropriate for the student; an increase in students' performance is the natural result. Many studies investigated the influential factors affecting specialization selection by using statistical methods, but none of the researches studied...
Data sharing is the process of interchanging, analyzing, retrieving and integrating data. Although data sharing facilitates the way that data can be exchanged, security concerns arise as a challenge for conducting data sharing. Many policies include confidentiality, integrity, availability and privacy must be taken into consideration. In this resea...
— The Enterprise Resources Planning (ERP) systems are one of the most frequently used systems by business organizations. Recently, the university sectors began using the ERP system in order to increase the quality of their academic and administrative services. However, the implementation of ERP is complicated, risky, and no one factor can guarantee...
Natural Language Processing (NLP) Module for Arabic Text to Speech is introduced in this paper. It’s a module from our integrated design for Arabic named as Holy Quran Based- Arabic Text to Speech (HQBATTS). HQB-ATTS system is implemented using some Tajweed rules that are used in Standard Arabic. Through this paper, new ideas are adopted and discus...
Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field. Data sharing concept can be defined as the process of interchanging, analyzing, retrieving and integrating data among multiple data sources in a controlled access manner....
Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field. Data sharing concept can be defined as the process of interchanging, analyzing, retrieving and integrating data among multiple data sources in a controlled access manner....
Sensitive and confidential data are a requisite for most of the companies, Data leakage causes negative impact on companies. Data leakage/loss prevention (DLP) systems are the solutions that protect sensitive data from being in non-trusted hands. DLP systems have weaknesses in detection stenography leaks, so any hidden sensitive data could be sent...
Natural Language Processing (NLP) Module for Arabic Text to Speech is introduced in this paper. It's a module from our integrated design for Arabic named as Holy Quran Based-Arabic Text to Speech (HQB-ATTS). HQB-ATTS system is implemented using some Tajweed rules that are used in Standard Arabic. Through this paper, new ideas are adopted and discus...
After the revolution of cloud computing and mobile cloud computing (MCC), MCC uses Mobile Agents (MA) techniques to increase its efficiency. The frameworks of mobile cloud computing based on mobile agent used to be more robust and secure. In this paper we compared between different MCC and CC frameworks based on security issues on mobile agent and...
The Enterprise Resources Planning (ERP) systems are one of the highly complex systems in the information systems field; the implementations of this type of systems need a long time, high cost, and a lot of resources. Many factors affect the successful implementation of ERP system. The critical success factors (CSFs) can be categorized as general, I...
The Enterprise Resources Planning (ERP) systems are one of the highly complex systems in the information systems field; the implementations of this type of systems need a long time, high cost, and a lot of resources. Many factors affect the successful implementation of ERP system. The critical success factors (CSFs) can be categorized as general, I...
Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field. Data sharing concept can be defined as the process of interchanging, analyzing, retrieving and integrating data among multiple data sources in a controlled access manner....
The process to take a Braille document image and convert its content into its equivalent natural language characters, is
called Optical Braille Recognition (OBR). It involves two main consecutive steps: Braille cell recognition and Braille cell transcription.
Braille cell recognition contains few steps including: Image acquisition, Image De-skewing...
This paper discussed a model for monitoring the text and
expressions used by the student during the educational chat
session with his colleagues about a particular topic assigned to
be discussed during a particular session. Monitoring is done
through text modeling process by evaluating the expressions
used by the student within the session tim...
Abstract— Internet scale DoS attack is a new evolution of conventional flooding DoS attack with the inspiration of shutting down the Internet due to its vulnerable infrastructure. Past DoS attacks directly attacked the victim, usually a single host. Consequently, defences were designed to identify the excessive traffic or filter illegitimate traffi...
Sensitive and confidential data are a requisite for most companies, so protection for this data takes great attention by company's top management, administrators and
IT managers. Data leakage causes negative impact on companies. The traditional security approaches, such as firewalls, can't protect data from leakage. Data leakage/loss prevention (DL...
This paper discussed a model for monitoring the student activity during the educational chat session with his colleagues about a particular topic assigned to discuss it during a particular session. Monitoring is done through time modeling by evaluating the effective use of time by the student and exploited to the largest possible period of time in...
This paper introduced a viable method for modeling student in adaptive educational chat room. This is a complementary solution to the discussion rooms that have been discussed in the virtual classroom AVCM. Adopted this model to study the behavior of the student during the chat session and find an assessment of knowledge depending on it. That's whe...
الخلاصة:
ان قضية امن المعلومات تعد من اهم قضايا العصر الحديث حيث ان الاعتماد الحالي على الانترنت اصبح في جميع مجالات الحياة ;فأصبحت قضية حماية هذه المعلومات من الاختراق قضية مهمة .
من المعروف ان خوارزمية التشفير ذات الاختزال تعمل بالاتجاه الواحد ولا يمكن الوصول الى اصلها او استرجاعه ويمكن تصميم خوارزمية مشابهة تعمل بالاتجاه الواحد وذلك باستخدام احد...
The rapid development of the internet introduced new trend of electronic transactions that is gradually dominating all aspects
of our daily life. The amount of data maintained by websites to keep track of the visitors is growing exponentially. Benefitting
from such data is the target of the study described in this paper. We investigate and explore...
This report identifies the skills needed to implement and deploy an e-government framework, focusing on the interoperability, security, and legal needs. The report also suggests a training program of six training tutorials, or alternatively, six academic courses, that are necessary to build these skills.
The methodology used to identify the missing...
ان قضية امن المعلومات تعد من اهم قضايا العصر الحديث حيث ان الاعتماد الحالي على الانترنت اصبح في جميع مجالات الحياة ;فأصبحت قضية حماية هذه المعلومات من الاختراق قضية مهمة .
من المعروف ان خوارزمية التشفير ذات الاختزال تعمل بالاتجاه الواحد ولا يمكن الوصول الى اصلها او استرجاعه ويمكن تصميم خوارزمية مشابهة تعمل بالاتجاه الواحد وذلك باستخدام احدى الطرق ا...
Ahli Hospital Wind Energy Project (AWEP) is an
innovative pilot project that involves the design and
implementation of an integrated low-cost, sustainable and
reliable clean energy system, with very low environmental costs,
and to create public awareness as to the enormous opportunities
offered by the clean energy technologies. One of the main
obje...
Intelligent and secure automatic energy meters reading and management using Mobile agents can. be of great importance for municipalities and energy distribution companies so as to efficiently read these meters and to decrease the number of traditional visits required by the energy company, and decreasing the number of employees used in performing t...
Key words: Automatic Meter Reading (AMR), Mobile agents, Client server, JADE (Java agent development environment), OPNET. Intelligent and secure automatic energy meters reading and management using mobile agents can be of great importance for municipalities and energy distribution companies so as to efficiently read these meters and to decrease the...
The purpose of this paper is the recognition of geometrical shapes: rectangle and ellipse by using the "one-step-secant" algorithm of neural network. The first step is to build up a neural network with two layers and two input vectors. The first layer has twenty neurons, while the second one includes only two neurons. The second step is to create a...
Summary The current energy saving technologies rely on conventional data logging systems, where the current methods in retrieving the energy data is not convenient, and the cost of the data logging systems is high. The Automatic energy Meter Reading (AMR) technology is network-based applications used by electric/energy companies to increase perform...
Power or energy meter systems can be incorporated with embedded controllers such as micro Web-servers with Ethernet port to transmit the reader data over the Internet. Such data can be then fed and integrated into existing energy management systems located at power companies and organizations. The problem of efficiently collecting data from a large...
The audio watermarking based on wavelet transform algorithm depends on embedding and extracting bits in the watermark. The original algorithm depends on the idea of determining the signal spectrum computed by detailed and approximated wavelet coefficients and by inserting the watermark in the spectrum (Vieru et al., 2003). The wavelet coefficients...
This paper describes the software engineering techniques used in the development of a Web-based dynamic advertisement directory portal for different companies, called Daleelcom portal. Companies or firms that have membership in this portal can manage and administer their information database using Web-based forms that are designed using ASP .NET te...
The shortage of expert physicians and health-care providers in Palestine has created the need for a telemedicine system. The difficulty and the cost of transfer between Palestinian cities in the current political situation makes it important to use such systems. This paper describes the project's progress. The software and hardware required were de...
Backpropagation is a supervised learning procedure for a class of artificial neural networks which has recently been widely
used in training such neural networks to perform relatively nontrivial tasks like text-to-speech conversion or autonomous
land vehicle control. However, the slow rate of convergence of the backpropagation algorithm has limited...