Issa Alo’tom
About University
Al-Zaytoonah Private University of Jordan (henceforth, Al-Zaytoonah) was established in 1993 after receiving its license and general accreditation by Decision No. 848 on March 6, 1993. Instruction began on September 6, 1993, and since then Al-Zaytoonah has witnessed ... Read more
Academic & Administrative Staff
There are 300 faculty members of various ranks distributed among the six faculties of the University, and 80 teaching and research assistants and lab technicians. In addition, there are 210 administrative employees and 260 workers.

Al Zaytoonah University of Jordan

Blog

COMPUTER-AIDED STUDENTS REGISTRATION SYSTEM

ABSTRACT

This paper aims to contribute to computerization of counseling and registration procedures in universities

where students are free to choose subjects for the next semester within the limits of a study plan. A typical

university student information system does not provide enough support for students counseling in their choice

of subjects to register and for registration itself. This

paper discusses computer data and procedures that are required for computer-aided counseling and registration service for students. The proposed procedures provide additional freedom and convenience for students in registration for subjects of a next semester. Academic staff (counselors) and administrative staff could be relieved of compulsory involvement in counseling and registration process.

 

DYNAMIC ROTATING LOAD BALANCING ALGORITHM IN DISTRIBUTED SYSTEMS

ABSTRACT

 

Load Balancing in a distributed system is an important process to reduce delays and improve response times in order to speed up applications and results. Different approaches to Load Balancing have different advantages and disadvantages.

 

‘Classical’ approaches to load balancing are quite good and mostly efficient, but in many circumstances, the overheads incurred from load balancing are too high and therefore become ineffective.

 

Dynamic Rotating Load Balancing Algorithm in Distributed Systems is proposed in this paper.

 

This new algorithm has much lower overheads and faster response times when compared to the classical approaches, as shown in the data obtained from the simulations done to test this approach. It is also scalable and efficient regardless of the size of the network used.

 

 

Lunching E-Government in Jordan – Jordanian Experience

World of Computer Science and Information Technology Journal (WCSIT)

 

 

Abstract— Most of governments in developed countries implement E-government model to ease the interaction between citizens and their governments to conduct the standard citizen services such as renewing a passport or a driver license. Despite the maturity of the E-government in some developed countries, it is considered fairly new in Jordan. This paper addresses the method for building and launching the E-government in Jordan in four sections. The first section addresses an overview of the current information technology structure in Jordan. The second section addresses the problems facing information technology utilities to build the Jordan’s E-government model. The third section addresses, the current status of e-government based on Jordan’s experience, and finally the last section progress in launching E- Government in Jordan, and some suggestions are addressed to speed up the implementation of E-government in Jordan.

C.V

C.V.

 

Name: Issa Suleiman Issa Ottoum
Age : 64 years.

Social Status : Married – Seven children.

Qualifications:

 

 

 

 

 

 

 

1- BSc degree in electrical and communications engineering – Peshawar University 1 Pakistan;
very good grade average.

 

2- Masters degree in Management- University of Jordan; very good grade average.
3- Ph.D. in Computer Science – University of Khartoum – Excellent grade average.

Experience: -

* Communications and Information Technology experience 10/3/1976 until currently.

* 18 years – District Manager in many of the local Governorates of Telecom Corp of Jordan (TCC).

* General Director for the Department of Information Center at the Prime Ministry of Jordan
1/4/1994 until 2001.

* Chief Supervisor for inspection and follow up project (Ministerial committee Prime Ministry
of Jordan).

* University lecturer of computer science ( All subjects concerned computer science & computer
information systems including Microsoft office) .

Computer Networks experience:-

* Member of the board of directors of the national information center.

* Part time lecturer – Jordan University, Zaytoonah University & Arab Academy of Financial

Sciences.(Petra University & Aqsa University)

* Assistant professor – Zaytoonah University – 2001 until currently.

* Member of the First Royal committee For E-Government National Project / year 2000

* Member of the faculty board of King Abdullah the second for information technology /
University of Jordan

* General Director of Information Technology Program for The Neelain University.

* Member of the faculty board of the Computer Sciences and Information Technology of The
Neelain University.

 

 

 

 

 

 

 

 

Employment Class:

Higher Class ( General Secretary and General Director Class  درجه عليا )- General Director of the Information Center at the Prime Ministry of Jordan for 8 years.

Technical and managerial courses : –

* Technical course on Communication networks – Japan – 4 months.
* Technical course on Traffic Communication / Jordan – 2 months.

* Course on Higher and operational management – Sweden – 2 months.
* Technical course on Satellite communication – USA – 1 month.

* Technical course on advanced information technology networking-
France & Germany

* Participation in many conferences: including:-

- Oman International Conference for E-Commerce. 2000

- Zaytoonah University Conference for Information Technology

(ICIT)-2003, 2005, 2007, 2009 Jordan.


* Exploratory visits:

  1. Two visits to Decision Support Center at the Prime Ministry of Egypt.

2.Two visits to various public and private sectors – Germany.
3. A visit to The Information Center in Malaysia.

3. Visit to IBM Company in USA.

4.Visit to Pay Network ( France And Germany )

! Hobbiesandsocialactivities:

* Formerly a member of:

Jordan Volley Ball Association; Jordan Boxing Association & Jordan
Wrestling Association.

* Active member of many charitable organizations.

 

Research and Publication

1- Computer – AIDED Students Registration System-2005 (Through ICITNS- International Conference On Information Technology & Natural Science)

2- Dynamic Rotating Load Balancing Algorithm In Distributed systems – 2003 (Through ICITNS – International Conference On Information Technology & Natural Science).

3- Terrorism & Information Technology – 2005 (Through Youth High Council)

 

4- Terrorism Concept – 2005 (Through Youth High Council)

 

5- E-Government – The Jordanian Experience – 2011 (Through 5th ICITNS –      International Conference On Information Technology & Natural Science).

 

 

 

 

Research Areas:

 

Research and Publications:

 

1- Computer – AIDED Students Registration System – 2005 (Through ICITNS – International Conference On Information Technology & Natural Science)

 

     2- Dynamic Rotating Load Balancing Algorithm In Distributed systems – 2003 (Through ICITNS – International Conference On Information Technology & Natural Science)

 

     3- Terrorism & Information Technology – 2005(Through Youth High Council)

 

4- Terrorism Concept – 2005(Through Youth High Council Research Projects and Research Grants.

5- E-Government – The Jordanian Experience – 2011 (Through 5th ICITNS -      International Conference On Information Technology & Natural Science).

6-The analysis of time table structure within a student information system ( SIS )

7-  Secure Network Communication Based on Text-to-Image Encryption

8-  Software Support For Programming Language Tutorials

9-  A Novel Approach To Enhance a University Information System

 Teaching and Supervision

 

1- Supervise ( 195 BSc Projects For Computer science
Student

2- Supervise ( 65 MSc projects For Computer Science Student


3- CO- Adviser For 5 PhD Researches

 

 

  Contact Address:

 

Jordan – Marj Al-Hamam – -P.O. Box 112- Post Code
117-32

 

Phone Numbers:

Mobile: 00962776505666 / 00962795505666.

Home : 00962-6-5712712 .

 

 

Secure Network Communication Based on Text-to-Image Encryption

International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271

 

ABSTRACT
Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its IP address. Unfortunately, an IP address is attacked by hackers; this is where one host claims to have the IP address of another host and thus sends packets to a certain machine causing it to take some sort of action. In order to overcome this problem cryptography is used. In cryptographic application, the data sent are encrypted first at the source machine using an encryption key then the encrypted data are sent to the destination machine. This way the attacker will not have the encryption key which is required to get the original data and thus the hacker is unable to do anything with the session. In this paper, we propose a novel method for data encryption. Our method is based on private key encryption. We call our method Text-To-Image Encryption (TTIE).

A Novel Approach To Enhance a University Information System

World of Computer Science and Information Technology Journal (WCSIT

 

Abstract— A new approach is presented for helping a student to go ahead in his\her progress to reach its final aim “Obtaining a Bachelor Degree”. This approach based on an algorithm that enforces and enables a student to follow the curriculum (Advising Plan) when he\she wants to register subjects for a next semester. The proposed algorithm relies upon many factors, such as specifying the subject(s) level, distribution subjects on time table for five days a week, and others. The proposed algorithm will enhance the efficiency of the timetable for both students and administration. It gives a student space for choosing the subjects which in turn enforces a student to go ahead with respect to his study plan that will affect his success in reaching a final goal. For administration it is a good idea to make a student commits his self to respect his suggested curriculum.

E-Government – The Jordanian Experience

ICITNS -2003

 

Abstract— A method for building an E government in Jordan is addressed. The first step of the method takes into account the current status of the information technology in Jordan. The second step is achieved by using the information technology utilities to build the e government. Finally, some suggestions are addressed to speed up the e government in Jordan.

Secure Network Communication Based on Text-to-Image Encryption

International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271

ABSTRACT
Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its IP address. Unfortunately, an IP address is attacked by hackers; this is where one host claims to have the IP address of another host and thus sends packets to a certain machine causing it to take some sort of action. In order to overcome this problem cryptography is used. In cryptographic application, the data sent are encrypted first at the source machine using an encryption key then the encrypted data are sent to the destination machine. This way the attacker will not have the encryption key which is required to get the original data and thus the hacker is unable to do anything with the session. In this paper, we propose a novel method for data encryption. Our method is based on private key encryption. We call our method Text-To-Image Encryption (TTIE).

Software Support For Programming Language Tutorials

World of Computer Science and Information Technology Journal (WCSIT)

 

Abstract— Tutorials are indispensible for many university courses, such as computer programming. The paper con-tributes to the shift from the tutorial organization with one student solving a problem and others watching to the set-ting when each student solves his/her individual problems assisted by a computer and the instructor. The research resulted in creation of a computer-assisted tutorial system for the course of programming languages. The system uses a database of programming problems. It aids an instructor in preparing and delivering tutorials. It provides each stu-dent with an environment for problem selection, its solution and solution verification. The system has some special features. A problem requires writing a programming code. A student has to write only a fragment of the complete program. The context of the fragment is added by the system automatically. The system operates in a local network which connects personal computers of students and the instructor’s portable computer. The first version of this com-puter system was successfully tested at the Kharkov National University of Radio Electronics.

The Analysis of the Time Table Structure within a Student Information System (SIS)

International Journal Of Computer Science and Information Technology ( IJCSIT )

 

Abstract.

This paper will show the result of the analysis and synthesis processes that take place when making a time table for a University Information System (UIS), especially for SIS.This proposed paper does the comparison between two methods of designing a time table, shows the advantages and disadvantages of these methods and more precisely how to implement each of them using programming languages.

Contact

Please don’t hesitate to contact me for more information about my work.

Tel: +962-6-4291511
Fax: +962-6-4291432

No more, where are you going?

Go back to top or use the menu to your left to navigate.

Thanks for downloading!

Top