Maher Al-nabulsi
About University
Al-Zaytoonah Private University of Jordan (henceforth, Al-Zaytoonah) was established in 1993 after receiving its license and general accreditation by Decision No. 848 on March 6, 1993. Instruction began on September 6, 1993, and since then Al-Zaytoonah has witnessed ... Read more
Academic & Administrative Staff
There are 300 faculty members of various ranks distributed among the six faculties of the University, and 80 teaching and research assistants and lab technicians. In addition, there are 210 administrative employees and 260 workers.

Al Zaytoonah University of Jordan

Blog

Book-2005

 

Textbook:  Maher  A . Nabulsi  “Fundamentals of computer

design ,Organization and architecture”  , Published in Arabic

language , Dar Al-Manahej , Jordan , 2005 .

Conference-2003

A study of the relationship between Exclusive-oR and Equivalence, rnhibition
and Implication Operations
Maher A. Nabulsi
Dept of Computer science, Collage of science
Al-Zaytoonah Private University of Jordan, Amman
E-mail: olnabulsi@next jo
Abstract:
Some logic operations in digital design are still not deeply explored or
researched. There are several relationships, such as the invene (complement)
reiafionship, between the different logic operations. In this paper the inverse
relationship between some logic operations will be demonstrated and completely
discussed. This will pave the way for a better underbtanding of the logic operations
and lay the foundation for developing new computer related algorithms.

International Conference on  Information Technology & Natural Science ( ICITNS )

Research-2000

Some Propositions, Quantified Assertions and their Uses in Computer Hardwadre Design .
Maher A. Nabulsi Dept. of Math & Computer Science, Collage of Science. Al_Za’toona-tr Jordanian
Abstract
UniversiW. Amman, Jordan.
Received: (3/4/2000), Accepted: (l 3/3/200t )
Mathematics and computer science are crosery linked with each other, and in many respects, the frrnctions of computer related elements might be interpreted usini mathematical approaches. In this paper the strong correlition that e;i$ betweei computer software and hardware elements Qogic devices, digital circuits and logical processing) and discrete mathematics (proposiiions and quanified asr.rtion.j *iiit” demonsfiated. This will pave tre way for a better understanding ofthe operations oi basic computer circuits ald lay the foundation for developing ni.* .o.put”..”htJ algorithms.

 

www.najah.edu/index.php?page=2172&lang=ar&

Research-2008-2

A Method of Deductive Logical Inference Proofs
Maher A. Nabulsi and Ayman M. Abdalla Department of Computer Science, Al-Zaytoonah University of Jordan, Amman 11733, Jordan
Abstract: A method of proof is presented and used in proving theorems in logic and set theory. Many commonly used methods of proof are rigid and not easy to apply in proving different theorems. This study deductively draws conclusions from rules of logical inference and then, it generalizes the deduction methods to be applied to logic and set theory. Then, it shows how this method of logical inference can be used to prove implications involving conjunction or disjunction of premises and to prove some identities in set theory involving implication or containment.

 

www.scipub.org/scipub/c4p.php?j_id=JCS

Research-2008-1

The Relationship between Exclusive-Or and the Unique Existential Quantifier
Maher A. Nabulsi and Ayman M. Abdalla Department of Computer Science, Al-Zaytoonah University of Jordan, Amman 11733, Jordan
Abstract: Problem Statement: The efficiency of computer architecture design is affected by the components used. Establishing a relationship between exclusive-or (XOR) and the unique existential quantifier provides alternative system implementations. Approach: Applications of XOR and the unique existential quantifier were explained. Then, prepositional logic was used to establish the relationship between them. Results: Different quantified assertions with two variables that use the unique existential quantifier were represented without quantifiers by using XOR. Conclusions: The unique existential quantifier and XOR were helpful in some computer architecture systems such as multiplexers, decoders and bus systems. The unique existential quantifier and XOR may be used interchangeably in some situations, but not always.

 

www.scipub.org/scipub/c4p.php?j_id=JCS

Research-2009

Using Combinational Circuits for Control Purposes
Maher A. Nabulsi and Mohammed A.F. Al-Husainy Department of Computer Science, Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Amman, Jordan
Abstract: Problem statement: Combinational circuits are used in computers for generating binary control decisions and for providing digital components for data processing. Approach: The use of combinational circuits and logic gates to control other circuits was discussed. Different systems that use logic gates, multiplexers, decoders and encoders to control different circuits were presented. This study presented a design and implementation of some combinational circuits such as a decoder, an encoder, a multiplexer, a bus system and read/write memory operations. Results: When we connected some types of combinational circuits to the inputs/outputs of digital circuit, these combinational circuits can help us to manage and flow a different types of control signals through a large digital circuit. Conclusion: Many combinational circuits had a good function which can be used for controlling different parts of any digital system and they produce a suitable way to transfer a control signals between different digital components of any large digital system.

www.scipub.org/scipub/c4p.php?j_id=JCS

Research-2012

Analyzing the Efficiency of Text-to-Image Encryption Algorithm
Ahmad Abusukhon Computer Network Department Al-Zaytoonah University of Jordan Amman, Jordan
Mohammad Talib Department of Computer Science University of Botswana Gaborone, BOTSWANA
Maher A. Nabulsi Department of Computer Science Al-Zaytoonah University of Jordan Amman, Jordan

Abstract—Today many of the activities are performed online through the Internet. One of the methods used to protect the data while sending it through the Internet is cryptography. In a previous work we proposed the Text-to-Image Encryption algorithm (TTIE) as a novel algorithm for network security. In this paper we investigate the efficiency of (TTIE) for large scale collection.

 

www.ijacsa.thesai.org/Publications/IJACSA

Research-2013

AN INVESTIGATION INTO THE RELATIONSHIPS BETWEEN LOGICAL OPERATIONS
Maher A. Nabulsi1 and Ahmad Abusukhon2
ABSTRACT
Boolean algebra (logical operations) is the backbone of computer software and hardware systems. Investigating new relationships between logical operations may help designing new computer algorithms. In this paper we propose to investigate the inverse relationships between the Exclusive-OR and Equivalence functions for three, four and five- variable functions. In addition, we propose to investigate the inverse relationships between the Inhibition and Implication functions for three and four-variable functions.

http://airccse.org/journal/vlsi/vlsics.html

C.V

 

                                                                                CURRICULUM VITAE

PERSONAL DETAILS :

Name: Dr .Maher A .  Nabulsi
Date of Birth : 17 – 12 – 1 9 6 2
Nationality : Jordanian
Marital Status : Married With 4 Children
Permanent Address :  P.O.Box : 921729  – 11192 , Jordan

Mobile : 079 – 6 6 2 7 3 1 1

E-mail : olnabulsi@yahoo.com

ACADEMIC QUALIFICATION :

  1. M.SC ,B.SC: Computer Engineering from Polytechnical  Institute / Azerbaijan-  Russia ,1989 .
  2. Ph.D: In Automatic control Engineering , from st. Bitruspurg technical university / Lineengrad-Russia,1993 .

 

POSITION :   Associate Professor  .

 

ACADEMIC   EXPERIENCE  :

  1. Twenty years of under graduate teaching in the Dep. Of  Computer  Science, College of Science and  I T , Al-Zaytoonah University-Jordan .
  2. Head of Dep. Of Computer Science 1998 / 1999 .
  3. Head  of Academic Advising, Equivalency and Training Committee .

 

COURSES TAUGHT:

  1. Computer skills and  Quick basic programming .
  2. Discrete structures.
  3. Logic design .
  4. Computer organization and Assembly language programming.
  5. Computer Architecture .
  6. Microprocessors and micro-programming.

 PUBLISHED WORKS :

 1 ) Paper:  Maher  A . Nabulsi  ” Some Propositions, Quantified

Assertions and their uses  in computer  hardware Design “  ,

An-NajahUniversity Journal for Research – A , Palestine ,

Volume (14) : 157 – 168 , Dec . 2000 .

 2 Paper : Maher  A . Nabulsi  ”Study of the relationship between

Exclusive – OR and Equivalence, Inhibition and Implication

operations” , Al-Zaytoonah University of Jordan , ICITNS , 2003 .

 3 )  Textbook:  Maher  A . Nabulsi  “Fundamentals of computer

design ,Organization and architecture”  , Published in Arabic

language , Dar Al-Manahej , Jordan , 2005 .

  4 )  Paper  :  Maher  A . Nabulsi  and  Ayman M . Abdalla

” A  Method of Deductive Logical Inference Proofs ” , Journal of

Computer Science  4 ( 4 ) : 345 – 348 , 2008 .

  5)  Paper  :  Maher  A . Nabulsi  and  Ayman M . Abdalla ” The

relationship between Exclusive- or and the Unique Existential

Quantifier ” , Journal of Computer Science  4 ( 9 ) : 741 – 743 ,

2008 .

 6)  Paper  :  Maher  A . Nabulsi  and  Mohammed A . F . Al-Husainy

” Using Combinational Circuits for Control Purposes ” , Journal of Computer

Science  5 ( 7 ) : 507 – 510 , 2009 .

7)  Paper : Ahmad Abusukhon, Mohammad Talib, and Maher A. Nabulsi

“ Analyzing the Efficiency of Text – to – Image Encryption Algorithm “ ,

International Journal of Advanced Computer Science and Applications

(IJACSA) 3 ( 11 ) : 35 – 38 ,  2012 .

8) Paper : Maher A. Nabulsi and Ahmad Abusukhon “An Investigation into the

Relationships Between Logical Operations “,  International Journal of

VLSI design & Communication Systems (VLSICS) 4 ( 2 ) : 1 – 9, April

2013.

 

 

RESEARCH  FIELDS :

Computer Architecture, Logic Design, Discrete Structures, Microprogramming,

Automatic control, Robotics, and others .

 

LANGUAGES :

Arabic

:

Excellent
English

:

v. good
Russian

:

v. good

 

 

 

 

PROFESSIONAL  REFERENCES :

 

1. Dr. Ali Al-

Dahoud

 

:

 

 

 

Full  Prof.

 

aldahoud@zuj.edu.jo

2. Dr. Afif  Al-

Mghawish

:

Associate  Prof. amghawish@yahoo.com
       
3. Dr. Ahmad

Abusukhon

:  Assistant  Prof. ce4aab@student.sunderland.ac.uk                    

 

 

 

 

 

 

Contact

Please don’t hesitate to contact me for more information about my work.

Tel: +962-6-4291511
Fax: +962-6-4291432

No more, where are you going?

Go back to top or use the menu to your left to navigate.

Thanks for downloading!

Top