×
لؤي علي طوالبه
• قسم هندسة الحاسوب - عضو هيئة تدريس

  • الدكـتوراة في هندسه حاسوب من جامعة ولاية اوريجون, 2004
  • ماجستير في هندسه حاسوب من جامعة ولاية اوريجون, 2002
  • بكالوريوس في هندسة كهربائية من جامعة العلوم والتكنولوجيا الاردنيه, 2000

    Publications
  • Lo'ai A. Tawalbeh, Anas Basalamah, Rashid Mehmood, and Hala Tawalbeh., "Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption," IEEE Access, vol. 5, no. 1, pp. 858-868, 2016
  • Lo'ai Tawalbeh, Yousef Haddad, Omar Khamis, Elhadj Benkhelifa Yaser Jararweh,and Fahd AlDosari, "Efficient and Secure Software-Defined Mobile Cloud Computing Infrastructure?. ," International Journal of High Performance Computing and Networking (IJHPCN), vol. 9, no. 2, pp. 0-0,
  • Lo'ai A. Tawalbeh, Yaser Jararweh, Fadi ababneh and Fahd Dosari., " Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing?," Journal of Networks., vol. 10, no. 1, pp. 70-76, 2015
  • Y. Jararweh, , O. Al-Sharqawi, N. Abdulla, L. A. Tawalbeh, M. Alhammouri, " High-Throughput Encryption for Cloud Computing Storage System. ," International Journal of Cloud Applications and Computing, vol. 4, no. 2, pp. 0-0,
  • L. A. Tawalbeh, M. Mowafi and W. Aljobi ., "The Potential of using Elliptic Curve Cryptography for Multimedia Encryption," IET Information Security Journal, Institution of Engineering and Technology, vol. 7, no. 2, pp. 1-8, 2013
  • L. A. Tawalbeh, O. BaniMelhem and M. Al-Batati., "A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and Optical Pixel Adjustment Process ," Information Security Journal; A Golbal Prespective, vol. 21, no. 5, pp. 256-268, 2012
  • L. A. Tawalbeh, H. Al-Hajsalem, T. Abu Qtaish and A. Khatabeh, "A New efficient symmetric encryption algorithm design and implementation," Journal of Information Assurance and Security, vol. 7, no. 2, pp. 101-109, 2012
  •  L. A. Tawalbeh, Y. Jararweh and A. Moh’md, "An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications ," The International Arab Journal of Information Technology, vol. 9, no. 1, pp. 284-290, 2012
  • L. A. Tawalbeh, A. Mohammad and A. A. Gutub., "Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations ," Journal of Signal Processing Systems,, vol. 59, no. 3, pp. 233-244, 2010
  • A. F. Tenca, S. Park and L. A.  Tawalbeh , "Carry-save representation is shift-unsafe: the problem and its solution," IEEE Transactions on Computers, vol. 55, no. 5, pp. 630-636,
  • L. A.  Tawalbeh, A. F. Tenca, and C. K. Koc., "A radix-4 scalable design," IEEE Potentials Magazine, vol. 24, no. 2, pp. 16-19,
  • L o’ai A. Tawalbeh, Waseem Bakhader, Houbing Song., "A Mobile Cloud Computing Model Using the Cloudlet Scheme for Big Data Applications," 2015 IEEE Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE 2016), Jun 2016, pp. 0-0
  • Elhadj Benkhelifa, Thomas Welsh, Lo’ai A. Tawalbeh and Yaser Jararweh,, "Framework for Mobile Devices Analysis," In the 7th Ambient systems and Networks conference (ANT 2016), May 2016, pp. 1188-1193
  • Elhadj Benkhelifa, Thomas Welsh, Lo’ai A. Tawalbeh, Fahd Al-Dosari, Abdallah Khreishah, and Yaser Jararweh, "GA-Based Resource Augmentation Negotiation for Energy-Optimised Mobile Ad-hoc Cloud," The 4th IEEE Mobile Cloud conference, Mar 2016, pp. 0-0, Oxford University
  • "A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain", IEEE ACCESS
  • "Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks", Telecommunication Systems
  • "Automated negotiated user profiling across distributed social mobile clouds for resource optimisation", CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
  • "Delay-aware power optimization model for mobile edge computing systems", Personal and Ubiquitous Computing
  • "Edge enabled IoT system model for secure healthcare", Measurement
  • "Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption", Ieee Access
  • "Improved Gossip protocol for blockchain applications ", Cluster Computing
  • "Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications", IEEE ACCESS
  • "Software Defined Systems Support for Secure Cloud Computing based on Data Classification", ANNALS OF TELECOMMUNICATIONS
  • "Zero-day attack detection: a systematic literature review", Artificial Intelligence Review
  • Faculty Member, Department of Computer Engineering, Apr 2006 - Present
  • Full-time Lecturer, Department of Computer Engineering, Feb 2005 - Apr 2006
  • Associate Prof., Umm Al-Qura University, Saudi Arabia, Sep 2013-Present
  • Associate prof., Jordan University of Science and Technology-Computer Eng. Dept., Jordan, Jan 2012-Present
  • COMPUTER DESIGN
  • COMPUTER NETWORK SECURITY
  • COMPUTER ORGANIZATION AND DESIGN
  • DIGITAL LOGIC DESIGN
  • DIGITAL LOGIC DESIGN LAB
  • DIGITAL LOGIC DESIGN LAB (NON-CPE-STUDENTS)
  • EMBEDDED REAL-TIME SYSTEMS
  • ENGINEERING COMPUTATIONS
  • ENGINEERING COMPUTATIONS LAB
  • HDL COMPUTER DESIGN LAB
  • NETWORK MANAGEMENT AND SECURITY
  • NETWORK MANAGEMENT AND SECURITY LAB
  • PRACTICAL TRAINING
  • SPECIAL TOPICS IN COMPUTER ENGINEERING
  • Scripting Languages Lab