Prof. Dr. Mohammed Al-Husainy

Professor

Major: Computer Science

Department: Networks and Cybersecurity Department

Faculty: Faculty of Information Technology


Email:

m.alhusainy@ammanu.edu.jo

Extention: -

Profiles:



COURSES TAUGHT

  • Programming Languages Design
  • Network Security and Its Applications and Monitoring
  • Cryptography and Computer Security
  • Cloud Computing Security
  • Advanced Cryptography
  • Network Security
  • Secure Communication Protocols
  • Programming Language (C++, JAVA, Python)
  • Object Oriented Programming (C#, C++, JAVA, Python)
  • Data Structure
  • Computer Organization & Computer Architecture
  • Operating Systems
  • Digital Logic Design
  • Discrete Mathematics
  • Computer Networks
  • Distributed Systems
  • Design and Analysis of Algorithms

ACADEMIC RANKS

Rank University Country Date
Professor Middle East University Jordan 2019
Associate Professor Al-Zaytoonah University Jordan 2013
Assistant Professor Al-Zaytoonah University Jordan 2002

QUALIFICATION

Degree Institute Specialization Country Date
ماجستير Saddam University Computer Science العراق February / 1997
دكتوراة University of Technology Computer Science العراق July / 2002
بكالوريوس University of Mosul Computer Science العراق June / 1994

WORK EXPERIENCE

Job Title Institute Time Period
Academic Staff Al-Ahliyya Amman University October / 2025 - January / Present
Academic Staff Irbid National University October / 2022 - August / 2025
Academic Staff AlMaaqal University September / 2021 - September / 2022
Academic Staff Middle East University September / 2019 - August / 2020
Academic Staff Al-Zaytoonah University September / 2002 - August / 2014
Academic Staff Al-Hadba’a University College September / 1997 - August / 2002

RESEARCH INTERESTS

  • Information Security, Cryptography, Steganography, User Authentication
  • Artificial Intelligence, Expert Systems, Machine Learning, Robotics, Microcontroller
  • Distributed Database Systems, Computer Network, System Analysis and Design
  • Image and Signal Processing, Multi-Media Data Processing
  • Microprocessor Programming with Assembly Language

RESEARCHES AND PUBLICATIONS

  • Mohammad Bani-Hani, Mohammed Al-Husainy*, Ala’eddin Al-Zu’bi, Ghayth AlAsad, Sara Albatienh and Hazem Abuoliem (2025) Robust Multilayer Encryption for Protecting Healthcare Data in Cloud Computing IAENG International Journal of Computer Science, Vol. 52, No. 9, September 2025, pp. 3035-3042
  • Hazem Abuoliem1 , Mohammed Abbas Fadhil Al-Husainy2* , Sara Albatienh1, Mohammad Bani-Hani3, Ghayth Al-Asad4, Ala’eddin Al-Zu’bi5 (2025) DNA‑Enhanced Dual‑Layer Encryption and LSB Steganography for Data Security Israa University Journal of Applied Science (IUJAS), Vol. 8, No. 2, October 2025
  • Sara Albatienh1, Mohammed Al-Husainy2, Muhannad A. Abu-Hashem*3, Hazem Abuoliem1, Mohammad Bani-Hani4, Ghayth Al-Asad5 (2025) Securing Healthcare Data by Combining Cryptography and Steganography to Enhance Confidentiality Israa University Journal of Applied Science (IUJAS), Vol. 8, No. 2, October 2025
  • Ghayth Al-Asad, Mohammed Al-Husainy, Mohammad Bani-Hani, Ala’eddin Al-Zu'bi, Sara Albatienh , Hazem Abuoliem (2024) Comparative Assessment of Hash Functions in Securing Encrypted Images Engineering, Technology & Applied Science Research, Vol. 14, No. 6, pp. 18750-18755, 2024
  • Bassam Al-Shargabi, Rame Jamil Al-Dwairi, Mohammed Abbas Fadhil Al-Husainy (2024) Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices Int. J. Electronic Security and Digital Forensics, Vol. 16, No. 2, pp. 173-189, 2024

CONFERENCES AND WORKSHOPS

Conference Title Type of Participation Location Date
Conference on Communication Engineering and Computer Science (CIC-COCOS’2024) Participate in the organization of Conference Iraq April / 2024
ICIT2013: The 6th International Conference on Information Technology (Cloud Computing) Participate in the organization of Conference Jordan May / 2013

THESIS SUPERVISION

Title Location Date
DNA-Based Encryption Method for Strengthening Biometric Image Security Against Cyber Threats Irbid National University, Jordan 2025
A Secure QR Code Authentication System for Patient Portals Using Dual-Layer Encryption Irbid National University, Jordan 2025
Highly Secure System Based on DNA Key with Two Layers of Protection Using Cryptography & Steganography Irbid National University, Jordan 2024
Secure Communication in IoT Networks: Utilizing Variable-Length SHA Hash Functions for Lightweight Cryptography Irbid National University, Jordan 2024
A Multilayer Encryption to Protect Healthcare Data in the Cloud Irbid National University, Jordan 2024
Secure Image: A Comparative Study of the Performance of Different Hash Functions on Image Encryption Irbid National University, Jordan 2024
Improving Confidentiality in Healthcare Systems: Integrating Cryptography and Steganography for Medical Record Security Irbid National University, Jordan 2024
Secure Biometric Data Concealment: An Image-based Approach Using Hash Function and User Password Irbid National University, Jordan 2024
A New Approach to Securing Sensitive Documents Using QR Code-Based Encryption in E-Government Systems Irbid National University, Jordan 2024
Secure Dynamic Steganography for Embedding Medical Records in Radiological Images Irbid National University, Jordan 2024
A Hybrid Model for Strengthening Security in Fingerprint Authentication with SHA-256 and Cipher Techniques Irbid National University, Jordan 2023
A Method for Static Video Summarization to Reducing Power Consumption and its Impact on Bandwidth Middle East University, Jordan 2016
Image Encryption System by Generating Chains from the Secret Key Middle East University, Jordan 2016
Task Scheduling Using Best-Level-Job-First on Private Cloud Computing Middle East University, Jordan 2016
User Authentication System Using Emoji Pictures Passwords Middle East University, Jordan 2015
Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes Model Middle East University, Jordan 2015
Image Steganography Technique Based on Predetermined Pattern and Histogram Analysis Middle East University, Jordan 2015

AWARDS AND SCHOLARSHIP

Title Location Date
Several letters of thanks and appreciation for following up on students with academic difficulties Middle East University, Jordan 2018
Several letters of thanks for providing additional free lectures to students facing difficulties in some courses Middle East University, Jordan 2017
Several letters of thanks for outstanding performance in carrying out the tasks of several committees formed within the college Middle East University, Jordan 2017
Certificate of appreciation as one of the most active reviewers in the IAJIT Technical Committee IAJIT 2011
Certificate of thanks and appreciation for preparing the “Learning Systems Exhibition” held during the ICIT 2011 Conference Al-Zaytoonah University, Jordan 2011

Al-Ahliyya Amman University

Email: Public@ammanu.edu.jo

 

© Copyright Al-Ahliyya Amman University. Amman, Jordan 19111.