Adnan A. Hnaif
About University
Al-Zaytoonah Private University of Jordan (henceforth, Al-Zaytoonah) was established in 1993 after receiving its license and general accreditation by Decision No. 848 on March 6, 1993. Instruction began on September 6, 1993, and since then Al-Zaytoonah has witnessed ... Read more
Academic & Administrative Staff
There are 300 faculty members of various ranks distributed among the six faculties of the University, and 80 teaching and research assistants and lab technicians. In addition, there are 210 administrative employees and 260 workers.

Al Zaytoonah University of Jordan

Blog

Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation

Routing protocols are the fundamental block of selecting the optimal path from a source node to a destination node in internetwork. Due to emerge the large networks in business aspect thus; they operate diverse routing protocols in their infrastructure. In order to keep a large network connected; the implementation of the route redistribution is needed in network routers. This paper creates the four scenarios on the same network topology by using Optimized Network Engineering Tools Modeler (OPNET 14.5) simulator in order to analyze the performance of the route redistribution among three routing protocols by configuring three protocols from a set of Routing Information Protocol (RIPv2), Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System (IS-IS) dynamic routing protocols on each scenario. The first scenario is EIGRP_OSPF_ISIS, the second scenario is EIGRP_OSPF_RIPv2, the third scenario is RIPv2_EIGRP_ISIS, and the fourth scenario is RIPv2_OSPF_ISIS. The simulation results showed that the RIPv2_EIGRP_ISIS scenario outperforms the other scenarios in terms of network convergence time, the hops number, jitter, packet delay variation, packet end to end delay; therefore, it fits real time applications such as voice and video conferencing. In contrast, the EIGRP_OSPF_ISIS scenario has better results compared with other scenarios in terms of response time in case of using web browsing, database query, and Email services.

Smart System for Forest Fire Using Sensor Network

Wireless sensor network systems deploy a dense array of small, low-cost sensors that observe the local environment. The system can be deployed anywhere, even in inaccessible places. This technology can provide real time monitoring for forest fires. Ignition can be determined rapidly, depending on the wake/sleep schedule of the system nodes. This study investigates the coverage and fire detection ability of a wireless network system. Sub-networks in randomly-distributed nodes convert the network from being randomly distributed to being organised, and reduce the operation time and energy consumption of each node. Dividing the network into three sub-networks increases network battery lifetime by 2.7% and increases energy performance by 63% compared to conventional fire detection networks. The proposed network only requires each node to be equipped with a cheap temperature sensor. Analysis of data from multiple sensors can indicate not only the presence of a fire, but also its intensity, behaviour and direction of spread, which can greatly assist firefighting efforts.

A NOVEL HEADER MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS

The evolving necessity of the Internet increases the demand on the bandwidth.
Therefore, this demand opens the doors for the hackers’ community to develop new
methods and techniques to gain control over networking systems. Hence, the intrusion
detection systems (IDS) are insufficient to prevent/detect unauthorized access the
network. Network Intrusion Detection System (NIDS) is one example that still suffers
from performance degradation due the increase of the link speed in today’s networks.
In This paper we proposed a novel algorithm to detect the intruders, who’s trying to
gain access to the network using the packets header parameters such as;
source/destination address, source/destination port, and protocol without the need to
inspect each packet content looking for signatures/patterns. However, the “Packet
Header Matching” algorithm enhances the overall speed of the matching process
between the incoming packet headers against the rule set. We ran the proposed
algorithm to proof the proposed concept in coping with the traffic arrival speeds and
the various bandwidth demands. The achieved results were of significant
enhancement of the overall performance in terms of detection speed.

E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY

In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This
protocol is summarized in three processes: firstly, access control process which involves the identification
and authentication phases for the applied citizens. Secondly, the voting process which will be done by
ciphering the voter information using public-key encryption cryptosystem (RSA), to be submitted over an
insecure network to the specified government election server. Finally, the election server administrator will
sort the final result by deciphering the received encrypted information using RSA private key. Actually, this
E-Voting protocol is more efficient than others E-Voting protocols since the voter can vote from his/her own
personal computer (PC) without any extra cost and effort. The RSA public-key encryption system ensures the
security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size
becomes crucial.

A New Exact Pattern Matching Algorithm (WEMA)

In pattern matching or recognition the match usually has to be exact. This study, introduce a new general approach algorithm, called the Weighted Exact Matching Algorithm (WEMA). The WEMA applied to match the exact pattern within a text depending on preparing the text in an index matrix weight with the locations of characters in alphabetical order to perform direct access matching. Whereby, WEMA check the possibility of the pattern existence before applying the matching process. The simulation result showed significant improvement in the exact string matching and therefore extreme competence in the real applications.

An algorithm to improve the performance of string matching

Approximate string matching algorithms are techniques used to find a pattern ‘P’ in a text ‘T’ partially or exactly. These techniques
become very important in terms of performance and the accuracy of searching results. In this paper, we propose a general approach
algorithm, called the Direct Matching Algorithm (DMA). The function of this algorithm is to perform direct access matching for the
exact pattern or its similarities within a text depending on the location of a character in alphabetical order. We simulated the DMA in
order to show its competence. The simulation result showed significant improvement in the exact string matching or similarity matching,
and therefore extreme competence in the real applications.

MOBILE PAYMENT METHOD BASED ON PUBLIC-KEY CRYPTOGRAPHY

Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash,
cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is
summarized in three processes: firstly, the authentication process, which involves the authentication phases
for the applied customers. Secondly, the member recognition process which tests and ensures the customer
membership by the market server. Finally, payment processwhich will be done by ciphering the customer
information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to
the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since
the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key
encryption system ensures the security of the proposed method. However, to prevent a brute force attack,
the choice of the key size becomes crucial.

TRAFFIC LIGHT MANAGEMENT SYSTEM BASED ON HAMILTONIAN ROUTING TECHNIQUE

Traffic congestions are recognized as a major problem in the modern urban cities. The Hashemite Kingdom
of Jordan is considered as one of the top countries worldwide that is suffering from the traffic jam problem
due to its old infrastructure. The current traffic light signals system in Jordan is still controlled by the fixed
timers. Therefore, this research develops an intelligent Traffic Light Management System Based on the
Hamiltonian Routing Technique (TLBH) and on the Decision Support System (DSS) in order to execute a
proper action. Hence, this research develops a system can that be used to minimize the waiting time on the
traffic signals for vehicles, which can in return lead to the reduction of the traffic congestion incurred by the
vehicles.
This research is comprehensive to many scenarios, where three of these scenarios are listed in this
research and are implemented by the system by using the MATLAB programming language; based on
specific rules. According to these sufficient testing scenarios, the simulation result shows significant
improvements in the TLBH technique in comparison with the current traffic system. The proposed
technique has the minimum total and waiting time in all scenarios compared to the current traffic system.
Keywords:Traffic light management system, routing protocols, Hamiltonian routing technique.

A New Platform NIDS Based on WEMA

Abstract
The increasing speed of today’s computer networks directly affects the performance of Network Intrusion Detection Systems (NIDS) in terms of speed of detection of threads. Therefore, the performance of the existing algorithms needs to be improved to enhance the speed of detection engine used in NIDS applications. Hence, this paper defines a new platform NIDS to enhance the speed of detection engine based on Weighted Exact Matching Algorithm (WEMA). Furthermore, this platform can be run in sequential and in parallel mode, using the pthread techniques, in order to increase the total performance of NIDS applications.

C.V

Curriculum Vitae Adnan Ahmad Abdelfattah Hnaif
 Personal Information :  * Date of Birth:19/9/1975 . * Place of Birth: Jordan . * Nationality : Jordanian. * Marital Status:Married
 Academic Qualifications
BSc Department Dept. of Computer Sciences Year 1995-1999/2000 University: Mu’tah University ; Ph.D Thesis Title MULTITHREADED SCALABLE MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS Department Dept. of NAV6 Year 2010 University: Universiti Sains Malaysia (USM) Country:Malaysia

 Programming Language
1 Java 2 VB.Net 3 Android Mobile programming 4 PHP 5 C , C++ 6 Visual Basic 6
 Courses & Certificates * Advanced Maintenance Computer Course For 84 Hours. * Oracle9i (SQL, PL/SQL, Form, Report) For 90 Hours. * (VB, ASP, ADO).Net For 45 Hours.
Contact Information  – Address : Alzaytoonah University – Computer Networks Dept. – Mobile Phone : +962797622668. – E-Mail : adnan_hnaif@zuj.edu.jo : adnan_houneif@hotmail.com
Database  * Oracle9i (SQL, PL/SQL, Form, Report). * Ms Access.
Courses can be taught  * Network Security. * Introduction to Computer Networks. * Advance Computer Networks and Communications. * * Network Monitoring and Documentation *Databases. * Java Programming Language. * Parallel Programming. * Voice over IP (VoIP).
 Experience
Year(s) Rank Scientific degree University/Company Country 3 2010 – Up to now Assistant prof. Alzaytoonah University Jordan. 2007- 2009 Research Assistant National Advanced IPv6 Center of Excellence Malaysia ,  2005-2007 Lecturer at Shaqra college- Al-Imam Muhammad Ibn Saud Islamic University Saudis Arabia ,  2002-2005 Programmer Housing Urban Development Cooperation (HUDC) Jordan
, and 2001-2002 Lecturer Zarqa private college Jordan
Publications 

* ADNAN A. HNAIF, AMNAH EL-OBAID AND NANCY AL-RAMAHI, TRAFFIC LIGHT MANAGEMENT SYSTEM BASED ON

HAMILTONIAN ROUTING TECHNIQUE. Journal of Theoretical and Applied Information Technology, 30th June 2017 – Vol. 95. No. 12 — 2017

pages 2792 – 2802.

* Ahmad AA Alkhatib, Mohammad Alia and Adnan Hnaif, Smart System for Forest Fire Using Sensor Network. International Journal of Security and Its Applications. Vol. 11, No. 7 (2017), pp.1-16 , http://dx.doi.org/10.14257/ijsia.2017.11.7.01

* Zeyad Mohammad, Ahmad Abusukhon, Adnan A. Hnaif and Issa S. Al-Otoum, Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation, (IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 8, No. 3, 2017

* Adnan A. Hnaif, Mohammad A. Alia, Mobile Payment Method Base On Public-Key Cryptography. International Journal of Computer Networks & Communications (IJCNC), 7(2), 2015, DOI: 10.5121/ijcnc.2015.7207

* Abdallah A. Hlayel, Adnan A. Hnaif. An algorithm to improve the performance of string matching. Journal of Information Science, 2014, DOI: 10.1177/0165551513519039 ,  jis.sagepub.com
* Abdallah A. Hlayel, Adnan A. Hnaif. A New Exact Pattern Matching Algorithm (WEMA). Journal of Applied Science, 13(24), 2013. ISSN 1812-5654 / DOI:10.3923/jas.2013
* Mohammad A. Alia, Adnan A. Hnaif, Hayam K. Al-Anie and Abdelfatah Aref Tamimi, “Graphical Password Based On Standard Shapes” , Science Series Data Report Vol 4, No. 2;Feb 2012.
* Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif. E-Voting Protocol Based On Public-Key Cryptography. International Journal of Computer Science and Information Technology (IJCSIT). Vol. 3. 2011.
* Mohammad A. Alia, Adnan A. Hnaif, Hayam K. Al-Anie , Khulood Abu Maria, Ahmed M. Manasrah, M. Imran Sarwar, A Novel Header Matching Algorithm for Intrusion Detection Systems, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.

* Mosleh M. Abu Alhaj, M. halaiqah, Muhannad A. Abu hashem, Adnan A. Hnaif, O. Abouabdalla, and Ahmad Manasrah, “An Innovative Platform to Improve the Performance of Exact-String Matching Algorithms”, International Journal of Computer Science and Information Security, 2010.
* Imad J. Mohamad, Anas F. Bayan, Hussein A. Al bazaar, and Adnan A. Hnaif, “ A New Dynamic-Auto-Static Technique for dhcpv4 IP Address Allocation”, Proceeding of 2009 IEEE International Conference on Antennas, Propagation and Systems (INAS 2009), 3-5, Dec. 2009, Johor, Malaysia.
*Adnan A. Hnaif et al, Parallel Quick Search Algorithm to speed Packet Payload Filtering in NIDS, Journal of Engineering Science and Technology, 2009
* Adnan A. Hnaif et al, Parallel Quick Search Algorithm to speed Packet Payload Filtering in NIDS, International conference on Network Applications, Protocols and Services (NetApps, 2008).
* Adnan Ahmad Hnaif and Aman Jantan, A Proposed Method to Speed up the Filtering Packets Header and Save Memory, Prosiding capaian maklumat & Pengurusan Pengetahuan 2008.
* Adnan A. Hnaif et al, Parallel Quick Search Algorithm to speed Packet Payload Filtering in NIDS, International conference on Network Applications, Protocols and Services (NetApps, 2008).

Contact

Please don’t hesitate to contact me for more information about my work.

Tel: +962-6-4291511
Fax: +962-6-4291432

No more, where are you going?

Go back to top or use the menu to your left to navigate.

Thanks for downloading!

Top