Radwan Tahboub

Radwan Tahboub
Palestine Polytechnic University · College of Information Technology and Computer Engineering; department of Computer Engineering.

Phd. in Computer Engineering and Information Systems.

About

38
Publications
31,324
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
214
Citations
Citations since 2017
5 Research Items
129 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
Introduction
•Ass. Professor in Computer Systems at CITCE / PPU (1994-now) •Chairperson of the of CE dept, CITCE/ PPU. •Bethlehem University, Visiting Part time staff, (2009-2011) •Director of FFKITCE IT Center of Excellence (2005-2009) •Computer center director at PPU (1998-2004) •Ph.D. in Tele-communication and Information Technology, Bucharest Polytechnic University, Romania, 2007 •M.sc. in CSE from Bilkent University in Ankara Turkey, 1992 •B.sc. degree in EE Eng. from METU, Ankara Turkey, 1990
Additional affiliations
July 2016 - August 2016
Palestine Polytechnic University
Position
  • Dean of College of Information Technology and Computer Engineering
October 2012 - present
Palestine Polytechnic University
Position
  • CE Department Head
Description
  • Received the Ph.D. in 2007, M.sc. in CSE from Bilkent University in Ankara Turkey and B.sc. degree in EE Eng. from Middle East Technical University in Ankara Turkey, 1990.
October 1994 - present
Palestine Polytechnic University
Position
  • Professor (Assistant)
Description
  • Assistant professor, chairperson of the of CE and CS department, college of Information Technology and computer engineering at Palestine Polytechnic University, worked as on part-time basis at Bethlehem University (2 years).

Publications

Publications (38)
Chapter
Full-text available
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that are suitable for devices with limited capabilities. In this paper, a comprehensive literature survey that discusses the most prominent encryption algorithms used in device security in general and IoT devices in specific has been conducted. Many studi...
Conference Paper
Full-text available
Choosing suitable track is a key success in the academic and professional life. Whenever the specialization is appropriate for the student; an increase in students' performance is the natural result. Many studies investigated the influential factors affecting specialization selection by using statistical methods, but none of the researches studied...
Article
Full-text available
Data sharing is the process of interchanging, analyzing, retrieving and integrating data. Although data sharing facilitates the way that data can be exchanged, security concerns arise as a challenge for conducting data sharing. Many policies include confidentiality, integrity, availability and privacy must be taken into consideration. In this resea...
Article
Full-text available
— The Enterprise Resources Planning (ERP) systems are one of the most frequently used systems by business organizations. Recently, the university sectors began using the ERP system in order to increase the quality of their academic and administrative services. However, the implementation of ERP is complicated, risky, and no one factor can guarantee...
Article
Full-text available
Natural Language Processing (NLP) Module for Arabic Text to Speech is introduced in this paper. It’s a module from our integrated design for Arabic named as Holy Quran Based- Arabic Text to Speech (HQBATTS). HQB-ATTS system is implemented using some Tajweed rules that are used in Standard Arabic. Through this paper, new ideas are adopted and discus...
Article
Full-text available
Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field. Data sharing concept can be defined as the process of interchanging, analyzing, retrieving and integrating data among multiple data sources in a controlled access manner....
Article
Full-text available
Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field. Data sharing concept can be defined as the process of interchanging, analyzing, retrieving and integrating data among multiple data sources in a controlled access manner....
Conference Paper
Full-text available
Sensitive and confidential data are a requisite for most of the companies, Data leakage causes negative impact on companies. Data leakage/loss prevention (DLP) systems are the solutions that protect sensitive data from being in non-trusted hands. DLP systems have weaknesses in detection stenography leaks, so any hidden sensitive data could be sent...
Conference Paper
Full-text available
Natural Language Processing (NLP) Module for Arabic Text to Speech is introduced in this paper. It's a module from our integrated design for Arabic named as Holy Quran Based-Arabic Text to Speech (HQB-ATTS). HQB-ATTS system is implemented using some Tajweed rules that are used in Standard Arabic. Through this paper, new ideas are adopted and discus...
Conference Paper
Full-text available
After the revolution of cloud computing and mobile cloud computing (MCC), MCC uses Mobile Agents (MA) techniques to increase its efficiency. The frameworks of mobile cloud computing based on mobile agent used to be more robust and secure. In this paper we compared between different MCC and CC frameworks based on security issues on mobile agent and...
Article
Full-text available
The Enterprise Resources Planning (ERP) systems are one of the highly complex systems in the information systems field; the implementations of this type of systems need a long time, high cost, and a lot of resources. Many factors affect the successful implementation of ERP system. The critical success factors (CSFs) can be categorized as general, I...
Article
Full-text available
The Enterprise Resources Planning (ERP) systems are one of the highly complex systems in the information systems field; the implementations of this type of systems need a long time, high cost, and a lot of resources. Many factors affect the successful implementation of ERP system. The critical success factors (CSFs) can be categorized as general, I...
Conference Paper
Full-text available
Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field. Data sharing concept can be defined as the process of interchanging, analyzing, retrieving and integrating data among multiple data sources in a controlled access manner....
Conference Paper
Full-text available
The process to take a Braille document image and convert its content into its equivalent natural language characters, is called Optical Braille Recognition (OBR). It involves two main consecutive steps: Braille cell recognition and Braille cell transcription. Braille cell recognition contains few steps including: Image acquisition, Image De-skewing...
Article
Full-text available
This paper discussed a model for monitoring the text and expressions used by the student during the educational chat session with his colleagues about a particular topic assigned to be discussed during a particular session. Monitoring is done through text modeling process by evaluating the expressions used by the student within the session tim...
Conference Paper
Full-text available
Abstract— Internet scale DoS attack is a new evolution of conventional flooding DoS attack with the inspiration of shutting down the Internet due to its vulnerable infrastructure. Past DoS attacks directly attacked the victim, usually a single host. Consequently, defences were designed to identify the excessive traffic or filter illegitimate traffi...
Article
Full-text available
Sensitive and confidential data are a requisite for most companies, so protection for this data takes great attention by company's top management, administrators and IT managers. Data leakage causes negative impact on companies. The traditional security approaches, such as firewalls, can't protect data from leakage. Data leakage/loss prevention (DL...
Article
Full-text available
This paper discussed a model for monitoring the student activity during the educational chat session with his colleagues about a particular topic assigned to discuss it during a particular session. Monitoring is done through time modeling by evaluating the effective use of time by the student and exploited to the largest possible period of time in...
Article
Full-text available
This paper introduced a viable method for modeling student in adaptive educational chat room. This is a complementary solution to the discussion rooms that have been discussed in the virtual classroom AVCM. Adopted this model to study the behavior of the student during the chat session and find an assessment of knowledge depending on it. That's whe...
Data
Full-text available
الخلاصة: ان قضية امن المعلومات تعد من اهم قضايا العصر الحديث حيث ان الاعتماد الحالي على الانترنت اصبح في جميع مجالات الحياة ;فأصبحت قضية حماية هذه المعلومات من الاختراق قضية مهمة . من المعروف ان خوارزمية التشفير ذات الاختزال تعمل بالاتجاه الواحد ولا يمكن الوصول الى اصلها او استرجاعه ويمكن تصميم خوارزمية مشابهة تعمل بالاتجاه الواحد وذلك باستخدام احد...
Article
Full-text available
The rapid development of the internet introduced new trend of electronic transactions that is gradually dominating all aspects of our daily life. The amount of data maintained by websites to keep track of the visitors is growing exponentially. Benefitting from such data is the target of the study described in this paper. We investigate and explore...
Technical Report
Full-text available
This report identifies the skills needed to implement and deploy an e-government framework, focusing on the interoperability, security, and legal needs. The report also suggests a training program of six training tutorials, or alternatively, six academic courses, that are necessary to build these skills. The methodology used to identify the missing...
Data
Full-text available
ان قضية امن المعلومات تعد من اهم قضايا العصر الحديث حيث ان الاعتماد الحالي على الانترنت اصبح في جميع مجالات الحياة ;فأصبحت قضية حماية هذه المعلومات من الاختراق قضية مهمة . من المعروف ان خوارزمية التشفير ذات الاختزال تعمل بالاتجاه الواحد ولا يمكن الوصول الى اصلها او استرجاعه ويمكن تصميم خوارزمية مشابهة تعمل بالاتجاه الواحد وذلك باستخدام احدى الطرق ا...
Conference Paper
Full-text available
Ahli Hospital Wind Energy Project (AWEP) is an innovative pilot project that involves the design and implementation of an integrated low-cost, sustainable and reliable clean energy system, with very low environmental costs, and to create public awareness as to the enormous opportunities offered by the clean energy technologies. One of the main obje...
Article
Full-text available
Intelligent and secure automatic energy meters reading and management using Mobile agents can. be of great importance for municipalities and energy distribution companies so as to efficiently read these meters and to decrease the number of traditional visits required by the energy company, and decreasing the number of employees used in performing t...
Article
Full-text available
Key words: Automatic Meter Reading (AMR), Mobile agents, Client server, JADE (Java agent development environment), OPNET. Intelligent and secure automatic energy meters reading and management using mobile agents can be of great importance for municipalities and energy distribution companies so as to efficiently read these meters and to decrease the...
Article
Full-text available
The purpose of this paper is the recognition of geometrical shapes: rectangle and ellipse by using the "one-step-secant" algorithm of neural network. The first step is to build up a neural network with two layers and two input vectors. The first layer has twenty neurons, while the second one includes only two neurons. The second step is to create a...
Article
Full-text available
Summary The current energy saving technologies rely on conventional data logging systems, where the current methods in retrieving the energy data is not convenient, and the cost of the data logging systems is high. The Automatic energy Meter Reading (AMR) technology is network-based applications used by electric/energy companies to increase perform...
Conference Paper
Full-text available
Power or energy meter systems can be incorporated with embedded controllers such as micro Web-servers with Ethernet port to transmit the reader data over the Internet. Such data can be then fed and integrated into existing energy management systems located at power companies and organizations. The problem of efficiently collecting data from a large...
Conference Paper
Full-text available
The audio watermarking based on wavelet transform algorithm depends on embedding and extracting bits in the watermark. The original algorithm depends on the idea of determining the signal spectrum computed by detailed and approximated wavelet coefficients and by inserting the watermark in the spectrum (Vieru et al., 2003). The wavelet coefficients...
Conference Paper
This paper describes the software engineering techniques used in the development of a Web-based dynamic advertisement directory portal for different companies, called Daleelcom portal. Companies or firms that have membership in this portal can manage and administer their information database using Web-based forms that are designed using ASP .NET te...
Article
Full-text available
The shortage of expert physicians and health-care providers in Palestine has created the need for a telemedicine system. The difficulty and the cost of transfer between Palestinian cities in the current political situation makes it important to use such systems. This paper describes the project's progress. The software and hardware required were de...
Chapter
Full-text available
Backpropagation is a supervised learning procedure for a class of artificial neural networks which has recently been widely used in training such neural networks to perform relatively nontrivial tasks like text-to-speech conversion or autonomous land vehicle control. However, the slow rate of convergence of the backpropagation algorithm has limited...

Network

Cited By