Ramzi A. Haraty

Lebanese American University

P.O. Box 13-5053 Chouran

Beirut, Lebanon 1102 2801

Phone: 03/782010; Fax: 01/867098

Email: rharaty@lau.edu.lb; URL: http://ramzi-haraty.lau.edu.lb

 

I. Education

 

Doctorate of Philosophy, Computer Science, North Dakota State University, December 1992

Title of Dissertation: Transaction Management in Multilevel Secure Database Management

                                  Systems

  

Master of Science, Computer Science, Minnesota State University, July 1989

Title of Thesis: Optical Fiber Communication Systems, Theory and Practice

 

Bachelor of Science, Computer Science, Minnesota State University, June 1988

Minor: Electronic Engineering Technology

 

 

II. Professional Experience

 

October 2003 - present

Assistant Dean, Lebanese American University

Duties include assisting the Dean of the School of Arts and Sciences in administering school affairs, supporting the NEASC accreditation work, and monitoring the execution of the academic excellence initiatives of the University’s strategic plan.

 

October 2003 – September 2005

Chairperson, Lebanese American University

Duties include chairing the Division of Computer Science and Mathematics. During my tenure, I served on the strategic planning committee as the champion of academic excellence.

 

June 1998 - present

            Associate Professor, Lebanese American University

Duties include teaching a variety of computer science courses, conducting research in the area of asynchronous transfer mode networks and computer security, serving on university committees, and advising undergraduate and graduate students.

 

March 1993 - May 1998

Senior Member of Technical Staff, The Aerospace Corporation

Duties included analysing and evaluating various trusted commercial systems (operating systems and database management systems), performing security testing and evaluation, supporting various space programs in the area of secure system design, development and system integration, and conducting research in the area of multilevel secure systems engineering.

 

March 1992 - February 1993

Assistant Professor, Moorhead State University

Duties included teaching a variety of computer science and computer information systems courses, conducting research in the area of concurrency control and query processing, serving on university committees, and advising graduate students.

 

September 1989 -February 1992

Research Assistant, North Dakota State University 

Duties included conducting research in the area of transaction management in multilevel secure database management systems, administrating an IBM AS/400 system, and serving as a graduate assistant for several graduate courses.

 

August 1988 -August 1989

Software Engineer, Minnesota State University

Duties included developing test plans and executing test procedures on the various licensed products of the IBM AS /400 systems.

 

 

III. Publications

Books and book chapters

  1. Bind but Dynamic Technique: The Ultimate Protection against SQL Injections.  Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2009.
  1. Kernelized Database Systems Security. Information Security and Ethics: Concepts, Methodologies, Tools and Applications. Information Science Reference – an imprint of IGI Global. Library of Congress Cataloguing-in-Publication Data. 2008.
  1. Kernelized Database Systems Security. Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2006.
  1. Security Issues in Distributed Transaction Processing Systems. Encyclopedia of Information Science and Technology. Idea Group Publishing. 2005.
  1. Informatics – Secondary Education – First Year (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.
  1. Informatics – Secondary Education – First Year – Teacher’s Guide (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.
  1. Informatics – Secondary Education – Second Year (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.
  1. Informatics – Secondary Education – Second Year – Teacher’s Guide (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.
  1. Regression Test Selection for Database Applications. Advanced Topics in Database Research. Volume 3.Idea Group Publishing. 2004.
  1. Informatics – Basic Education - Grade Twelve (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2002.
  1. Informatics – Basic Education – Teacher’s Guide - Grade Twelve (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2002.
  1. Evaluation Guide – Informatics. Grades 7, 8, 9, 10, and 11. Ministry of Education, Youth, and Sports. 2000.
  1. Informatics – Basic Education - Grade Nine (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2000.
  1. Informatics – Basic Education – Teacher’s Guide - Grade Nine. National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2000.
  1. Accelerating Queries in Multilevel Secure Database Systems.  Lecture Notes in Computer Science. Springer-Verlag. 2000.

 

Journals

 

  1. Indexing Arabic Text. Journal of Computational Methods in Sciences and Engineering (JCMSE): Intelligent Systems. ISSN: 1472-7978. 2008.
  1. Damage Assessment and Recovery from Malicious Transactions using Data Dependency.International Journal of Computer Science and Engineering. 2007.
  1. Modelling and Automated Blackbox Regression Testing of Web Applications. Submitted to the International Journal of Theoretical and Applied Computer Sciences. Volume 2, Number 2. 2007.
  1. CASRA+: A Colloquial Arabic Speech Recognition Application. American Journal of Applied Sciences. ISSN: 1546-9239. 4(1): 23-32, 2007.

 

  1. Multigrid Solvers in Reconfigurable Hardware. Journal of Applied and Computational Mathematics. ISSN: 0377-0427. 2006.
  1. A Hybrid Cryptosystem Based on WEP for 802.11 Networks. Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472-7978. Volume 6, Numbers 5,6. Supplement 2. IOS Press. 2006.
  1. A Comparative Study of El Gamal-based Digital Signature Algorithms. Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472-7978. Volume 6, Numbers 5,6. Supplement 1. IOS Press. 2006.
  1. A Comparative Study of RSA-based Digital Signature Algorithms. Journal of Mathematics and Statistics. ISSN: 1549-3644. Volume 2, Number 1. 2006.
  1. Regression Test Selection for Trusted Database Applications. International Arab Journal of Information Technology. ISSN: 1683-3198. Volume 3, Number 4. October 2006.
  1. Towards a Temporal Multilevel Secure Database. Journal of Computer Science. ISSN: 1549-3636. Volume 2, Number 1. 2006.
  1. RSA-Based Cryptographic Algorithms. International Journal of Infonomics. ISSN: 1742-4712. November 2005.
  1. T-Stem - A Superior Stemmer and Temporal Extractor for Arabic Texts. Journal of Digital Information Management. Volume 3, Number 3. September 2005.
  1. El Gamal Public-Key Cryptosystem in Multiplicative Groups of Quotient Rings of Polynomials over Finite Fields. Journal of Computer Science and Information Systems. Volume 2, Number 1. June 2005.
  1. A Comparative Study of El Gamal Based Cryptographic Algorithms. Journal of Theoretical and Applied Computing. ISSN: 0103-3408. Volume 12, Number 1. June 2005..
  1. Abjad Hawwaz: An Off-line Arabic Handwriting Recognition System. International Journal of Computers and Applications. ACTA Press/IASTED. Volume 27, Number 3. 2005.

 

  1. Arabic Character Recognition. International Arab Journal of Information Technology. Volume 1, Number 2. July 2004.

 

  1. Segmenting Handwritten Arabic Text. ACIS International Journal of Computer and Information Science (IJCIS), Volume 3, Number 4. December, 2002.

 

  1. Regression Testing of Database Applications. Journal of Database Management. Vol. 13, No. 2. 2002.

 

  1. Query Acceleration in Distributed Database Systems. Colombian Journal of Computation. Volume 2, Number 1. June 2001.

 

  1. Software Metrics for Database Applications. International Journal of Computers and Their Application A Publication of the International Society for Computers and Their Applications. Volume 8, Number 1. March 2001.

 

  1. A Concurrency Control Model for Multilevel Secure Object-Oriented Databases. International Journal for Mini and Microcomputer Applications. Volume 14, No. 3 Alberta, Canada. 1995.

 

  1. KB - HYDRO: A Heterogeneous Distributed System Integrating Data and Knowledge Bases. International Journal for Mini and Microcomputer Application. Volume 13, No. 1. 1994.

 

 

International Refereed Conferences

 

 

  1. A Synchronous/Asynchronous Multi-master Replication Method. Proceedings of the. International Conference on Computers and Their Applications (CATA-2008). Cancun, Mexico. April 2008.

 

  1. IRS: An Intelligent Recruitment System. Proceedings of the 20th International Conference on Computer Applications in Industry and Engineering (CAINE 2007). San Francisco, California USA. November 2007.

 

  1. BIRP: Bank Intra Routing Protocol. Proceedings of the IEEE Electro/Information Technology Conference. Chicago, USA. May 2007.

 

  1. The Successive Over Relaxation Method in Reconfigurable Hardware.. Proceedings of the IAENG International MultiConference of Engineers and Computer Scientists. Hong Kong, China. March 2007.

 

  1. Accurate High-Performance Multigrid Solvers in Reconfigurable Hardware. Book of Abstract of the Society of Applied Mathematics Conference on Computational Science and Engineering. Costa Mesa, USA. February 2007.

 

  1. Securing Wireless Networks with Enhanced WEP. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.

 

  1. A Comparative Study of Replacement Algorithms used in the Scalable Asynchronous Cache Consistency Scheme. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.

 

  1. A Three Poled Model for Web Applications. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.

 

  1. SDDSR: Sequence Driven Dynamic Source Routing for Ad Hoc Mobile Networks. Proceedings of the World Automation Congress - International Symposium on Soft Computing for Industry. Budapest, Hungary. July 2006.

 

  1. Improving the Secure Socket Layer by Modifying its Authentication Function. World Automation Congress - International Forum on Multimedia and Image Processing. Budapest, Hungary. July 2006.

 

  1. A Comparative Study of El Gamal Based Digital Signature Algorithms. World Automation Congress - International Symposium on Intelligent Automation and Control. Budapest, Hungary. July 2006.

 

  1. An Evaluation of a Visual Query Language for Information Systems. Proceedings of the International Conference on Enterprise Information Systems (ICEIS 2006) Conference. Paphos, Cyprus. May 2006.

 

  1. Towards a New Visual Language for GIS. Proceedings of the IASTED Database Applications (DBA 2006) Conference. Innsbruck, Austria. February 2006.

 

  1. Lebanese Colloquial Arabic Speech Recognition. Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering (CAINE-2005). Hawaii, USA. November 2005.

 

  1. Modified RSA in the Domains of Gaussian Integers and Polynomials Over Finite Fields. Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering (CAINE-2005). Hawaii, USA. November 2005.

 

  1. Regression Testing for Trusted Database Applications. Proceedings of the IBIMA 2005 Conference on Information Management in Modern Enterprise. Lisbon, Portugal. July 2005.

 

  1. Towards a Temporal Multilevel Secure Relational Database Model. Proceedings of the IBIMA 2005 Conference on Information Management in Modern Enterprise. Lisbon, Portugal. July 2005.

 

  1. Attacking El Gamal Based Cryptographic Algorithms Using Pollard's Rho Algorithm. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2005). Cairo, Egypt. January 2005.

 

  1. TREX: A Temporal Reference Extractor for Arabic Texts. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2005). Cairo, Egypt. January 2005.

 

  1. Al-Monakkeb - A Superior Indexer for Arabic Texts. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. Modified RSA in the Domain of Gaussian Integers. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. Rabin Public Key Cryptosystem in Rings of Polynomials over Finite Fields. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. Ternary and Quaternary Decision Diagrams. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. A Comparative Study of RSA Based Cryptographic Algorithms. Proceedings of the 13th International Conference on Intelligent and Adaptive Systems and Software Engineering (IASSE-2004). Nice, France. July 2004.

 

  1. ElGamal Public-key Cryptosystem Using Reducible Polynomials over a Finite Field. Proceedings of the 13th International Conference on Intelligent & Adaptive Systems and Software Engineering (IASSE-2004). Nice, France. July 2004.

 

  1. A Comparative Study of ElGamal Based Cryptographic Algorithms. Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004). Porto, Portugal. April 2004.

 

  1. BVA+ - A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004). Porto, Portugal. April 2004.

 

  1. ADD: Arabic Duplicate Detector – A Duplicate Detection Data Cleansing Tool. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July 2003.

 

  1. Neuro-Classification for Handwritten Arabic Text. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July 2003.

 

  1. An Auto-Indexing System for Arabic Information Retrieval. Proceedings of the IASTED International Conference on Applied Informatics (AI 2003). Innsbruck, Austria. February 2003.

 

  1. ABJAD:An Off-Line Arabic Handwritten Recognition System. Proceedings of the 2002 International Arab Conference on Information Technology (ACIT'2002). Doha, Qatar. December 2002. 

 

  1. Segmenting Handwritten Arabic Text. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.

 

  1. A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.

 

  1. Iterative Querying in Web-Based Database Applications. Proceedings of the 17th ACM Symposium on Applied Computing (SAC 2002). Madrid, Spain. March 2002.

 

  1. A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2001). Beirut, Lebanon. June 2001.

 

  1. Regression Testing of Database Applications. Proceedings of the 16th ACM Symposium on Applied Computing (SAC 2001). Las Vegas, USA. March 2001.

 

  1. Transaction Acceleration in Secure Database Systems. Proceedings of the 13th National Conference on Computer Applications in Industry and Engineering (CAINE-2000). Honolulu, Hawaii, USA. November 2000.

 

  1. Accelerating Queries in Multilevel Secure Database Systems. Proceedings of the 10th International Conference on Computing and Information ICCI ‘2000, Kuwait, November 18-21, 2000. (Proceedings not published yet!)

 

  1. A PERF Solution for Distributed Query Optimization. Proceedings of the ISCA 15th International Conference on Computers and Their Applications. Louisiana, USA. March 2000.

 

  1. Database Software Metrics for Small Database Applications. Proceedings of the 15th ACM Symposium on Applied Computing. Como, Italy. March 2000.

 

  1. Distributed Query Optimization Using PERF Joins. Proceedings of the 15th ACM Symposium on Applied Computing. Como, Italy. March 2000.

 

  1. A Security Policy Manager for Multilevel Secure Object Oriented Database Management Systems. Proceedings of the International Conference on Applied Modelling and Simulation. Cairns - Queensland, Australia. September 1999.

 

  1. C2 Secure Database Management Systems – A Comparative Study. Proceedings of the ACM Symposium on Applied Computing. San Antonio, Texas. March 1999.  

 

  1. A Concurrency Control Model for Multilevel Secure Object-Oriented Databases. Proceedings of the Mid-Content Conference on Information and Database Systems. Fargo, ND. May 1994.

 

  1. Secure Transaction Management and Query Processing in Multilevel Secure Database Systems. Proceedings of the Symposium on Applied Computing. Phoenix, AZ. April 1994.

 

  1. Transaction Processing in Multilevel Secure Replicated Databases. Proceedings of the Mid-Continent Information Systems Conference. Fargo, ND. May 1993.

 

  1. OOHYDRO: A Heterogeneous Distributed Database System for Object-Base and Database Interoperability. Proceedings of the Mid-Continent Information Systems Conference. Fargo, ND. May 1993.

 

  1. Multilevel Security in Multidatabase Systems. Proceedings of the Small College Computing Symposium. Cedar Rapids, IA. April 1993.

 

  1. Integrating Knowledge Based Systems in Heterogeneous Distributed Databases. Proceeding of the International Conference on Computer Applications in Design, Simulation and Analysis. Washington, DC. March 1993.

 

  1. Transaction Management in Multilevel Secure Database Management Systems. International Conference on Mathematical Modelling and Scientific Computing in Science and Technology. College Park, MD. April 1993.

 

  1. Concurrency Control and Recovery in Multilevel Secure Replicated Databases (short paper). AAAI-IEEE-ACM-ISMM-International Conference of Information and Knowledge Management. Baltimore, MD. November 1992

 

Local Conferences

 

 

  1. Eye2See: A Mobile Surveillance System for Pocket PCs. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2005.

 

  1. GISMO: A Geographical Information System for a Municipality Office. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2002.

 

  1. MLS/ERD: A Tool for Building Multilevel Secure Entity Relationship Diagrams. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2002.

 

  1. Factory Simulation. Proceedings of the 14th Science Meeting (Book of Abstracts) – 2000 – organized by the National Council for Scientific Research and the Lebanese Association for the Advancement of Science. Beirut, Lebanon. November 2000.

 

  1. Routing Journal Operations on Disk using Striping with Parity. Proceedings of the International Conference on Research Trends in Science and Technology (RTST). Lebanese American University. Beirut, Lebanon. March 2000.

 

  1. Query Optimization in Distributed Databases. Proceedings of the 13th Science Meeting (Book of Abstracts) – 1999 – organized by the National Council for Scientific Research and the Lebanese Association for the Advancement of Science. Beirut, Lebanon. November 1999.

 

  1. Using WebSQL to Query the World Wide Web. Proceedings of the International Conference on Scientific Computations – Beirut, Lebanon. March 1999.

Technical Reports 

1.      Final Evaluation Report Novell Incorporated Netware 4 Trusted Network System Design. National Computer Security Centre. CSC-EPL-98/XX. 1998.

 

2.      Final Evaluation Report - Sybase SQL Server and Secure SQL Server. National Computer Security Centre. CSC-EPL-97/01. 1997.

 

3.      Security Testing and Evaluation Report of the Operational Flight Program Build System for the F-22 Weapon System. July 1997.

 

4.      Security Testing and Evaluation Report of the Integrated Maintenance Information System for the F-22 Weapon. May 1997.

 

5.      Final Evaluation Report - Informix Online/Secure. National Computer Security Centre CSC-EPL-96/xx. 1996.

 

6.      Technical Assessment of the IBM OS/2 Warp Operating System. August 1996.

 

7.      Final Evaluation Report - IBM AS/400 System.  National Computer Security Centre CSC-EPL-95/13. 1995.

 

8.      Transaction Management in Multilevel Secure Database Management Systems. (NDSU-CS-TR-92-07). 1992.

 

9.      Concurrency Control and Recovery in Multilevel Secure Replicated Databases. (NDSU-CS-TR-92-15). 1992.

 

10.  MLS-ROLL: Concurrency Control Object for Multilevel Secure Replicated Databases. (NDSU-CS-TR-92-16). 1992.

 

11.  Optimal Transaction Processing in Replicated Multilevel Secure Databases. (NDSU-CS-TR-91-17). 1991.

 

Others

 

  1. Issues in Integrating Trusted Products in Real-Word Applications. Data Security Letter June 1995.

 

  1. Multilevel Secure System Engineering. Data Security Letter. September 1994.

 

  1. An Optimal Transaction Processing Protocol for Multilevel Secure Replicated  Databases. Poster Session at the 1992 IEEE Symposium in Security and Privacy. Oakland, CA. May 1992.

 

  1. Transaction Management in Multilevel Secure Database Management Systems. Ph.D. Dissertation. North Dakota State University. November 1992.

 

  1. Optical Fibre Communication Systems: Theory and Practice. M.S. Thesis. Minnesota State University. July 1989.

 

 

IV. Courses Taught

 

Course Title: Computer Security
            Level: Graduate
            Textbook: Computer Security: Art and Science M. Bishop, (Addison-Wesley, 2003)

Course Title: Distributed Systems
           Level: Graduate
           Textbook: Distributed Systems: Principles and Paradigms, A. Tanenbaum and M. van
                              Steen (Prentice Hall, 2002)

Course Title: Transaction Processing Systems
           Level: Graduate
           Textbook: Principles of Distributed Database Systems, T. Ozsu and P. Valduriez
                             (Prentice Hall, 1999)

Course Title: Computer Simulation
            Level: Graduate
            Textbook: Introduction to Simulation Using GPSS, T. Schriber (McGraw-Hill 1991)

Course Title: Advanced Database Systems
            Level: Graduate
            Textbook: Concurrency Control and Recovery in Database Systems, P.A. Bernstein, V.
                              Hadzilacos and N. Goodman (Addison-Wesley 1987)

Course Title: Knowledge-Based Expert Systems
            Level: Graduate
            Textbook: Artificial Intelligence, P. H. Winston (Addison-Wesley 1993)

Course Title: Foundations of Programming
            Level: Graduate
            Textbook: The Science of Programming, D. Gries (Springer-Verlag 1981)

Course Title: Advanced Topics in Databases
            Level: Senior
            Textbook: Fundamentals of Database Systems, R. Elmasri and S. Navathe (Benjamin
                             2004)

Course Title: Computer Security
            Level: Senior
            Textbook: Computer Security, D. Gollmann (John Wiley and Sons, 2006)

Course Title: Computer Architecture
            Level: Senior
            Textbook: Computer Organization and Architecture – Designing for Performance,
                              William Stallings, Prentice Hall. Sixth Edition. 2003.

Course Title: Ethical Issues in Computing
            Level: Senior
            Textbook: A Gift of Fire, S. Baase (Prentice Hall 2003)

Course Title: Artificial Intelligence
            Level: Senior
            Textbook: Artificial Intelligence – A Modern Approach, S. Russel and P. Norvig
                               (Prentice Hall 1995)

Course Title: Computer Networks
            Level: Senior
            Textbook: Computer Networks and Internets, D. Comer (Prentice Hall 2002)

Course Title: Database Management Systems
            Level: Senior
            Textbook: Fundamentals of Database Systems, R. Elmasri and S. Navathe (Benjamin
                             2002)

Course Title: Software Engineering
            Level: Senior
            Textbook: Software Engineering, R. S. Pressman (McGraw- Hill 1992)

Course Title: Programming Languages
            Level: Senior
            Textbook: Programming Languages Design and Implementation, T. W. Pratt and M.
                             Zelkowitz (Prentice Hall 2001)

Course Title: File Systems
            Level: Junior
            Textbook: File Structures – An Object Oriented Approach with C++, M. Folk, B.
                              Zoellick, and G. Riccardi (Addison Wesley 1998)

Course Title: Systems Analysis and Design
            Level: Junior
            Textbook: Systems Analysis and Design, S. Wu and M. Wu (West Publishing 1994)

Course Title: Introduction to C/UNIX
            Level: Sophomore
            Textbook: A Book on C, A. Kelley & I. Phol (Benjamin 1990)
            Textbook: A Practical Guide to the UNIX System, M.G. Sobell (Benjamin 1989)

Course Title: Computer Programming I
            Level: Sophomore
            Textbook: C How to Program, H. Deitel and P. Deitel (Prentice Hall 2003)

Course Title: Microcomputer Applications to Pharmacy
            Level: Sophomore
            Textbook: Handouts.

Course Title: Computer Literacy
            Level: Sophomore
            Textbook: Computing Essentials, T. O’Leary and L. O’Leary (McGraw-Hill 2000)

Course Title: Business Data Processing
            Level: Freshman
            Textbook: Microcomputing, T. O’Leary and B. Williams (McGraw-Hill 1993)

Course Title: Introduction to Microcomputer
             Level: Freshman
             Textbook: Microcomputer Applications, W. T.  Price (Dryden 1989)

 

VI. Dissertation, Thesis and Projects Supervised

 

1.   Design and Implementation of a Visual Query Language for Spatio-Temporal Databases. Kingston University - London. Ph.D. Dissertation. (in progress). With Haifa Ariss.

 

2.   Ant-DSR: A New Approach to Dynamic Source Routing using Ant Colony Optimization. Lebanese American University. (in progress). With Hassan Abou-Jerji.

 

3.   A Greedy Approach to Solve the Container Loading Problem. Lebanese American University. (in progress). With Omar Makarem (Primary Advisor).

 

4.   Avoiding Traffic Analysis and Assuring Data Integrity using a Distributed Quorum Based Approach. Lebanese American University. (in progress). With Bassam Zantout (Primary Advisor).

 

5.   An Improved Quorum Selection Algorithm (IQSA). Lebanese American University. September 2007. With Samer Younes (Primary Advisor).

 

6.   New Multi-Master Database Replication Architecture. Lebanese American University. August 2007. With Amer Chahine (Primary Advisor).

 

7.   IRS: An Intelligent Recruitment System. Lebanese American University. June 2007. With Samah Rifaii (Primary Advisor).

 

8.   Linear Representations of Braid Group are Unitary. Beirut Arab University. June 2007. With Shorouk M. Al-Issa.

 

9.   Mobile Dentist. Lebanese American University. May 2007. With Jack El-Nar (Primary Advisor).

 

10.   Paperless Clinics. Lebanese American University. March 2007. With Ali Awada (Primary Advisor).

 

11.   Damage Assessment and Recovery from Malicious Transactions using Data Dependency for Defensive Information Warfare. Lebanese American University. October 2006. With Arda Zeitunlian (Primary Advisor).

 

12.   Securing Web Applications – Countermeasures for Developers to Overcome Worst Web Application Vulnerabilities. Lebanese American University. September 2006. With Ahmad Hammoud (Primary Advisor).

 

13.   Bank Intra Routing Protocol. Lebanese American University. August 2006. With Rabie Sadek (Primary Advisor).

 

14.   PrivateTutor: An Intelligent and Adaptive Coach. Lebanese American University. June 2006. With Abbass Sharif (Primary Advisor).

 

15.   Multigrid Solvers in Reconfigurable Hardware. Lebanese American University. June 2006. With Safaa Kasbeh (Primary Advisor).

 

16.   Digital Clinics. Lebanese American University. May 2006. With Abbas Bassam (Primary Advisor).

 

17.   Effective Implementations of Feedback Vertex Set Algorithms. Lebanese American University. June 2006. With Nada Awar.

 

18.   Scatter Search Algorithms for Exam Scheduling. Lebanese American University. May 2006. With Vatche Isahakian.

 

19.   A Comparative Study between Cache Replacement Algorithms used in the Scalable Asynchronous Cache Consistency Scheme. Lebanese American University. May 2006. With Lana Turk (Primary Advisor).

 

20.   Modelling, Testing, and Regression Testing of Web Applications. Lebanese American University. May 2006. With Hamzah El Shaar (Primary Advisor).

 

21.   A Multimedia Temporal Database Model. Lebanese American University. April 2006. With Nasrat Dernaika (Primary Advisor).

 

22.   A Hybrid Cryptosystem based on WEP for 802.11 Networks. Lebanese American University. March 2006. With Walid Horr (Primary Advisor).

 

23.   Testing and Evaluating Digital Signature Algorithms in Principal Ideal Domains. Lebanese American University. November 2005. With Bilal Shebaro (Primary Advisor).

 

24.   Mapping XML DTDs to Relational Schema. Cairo University. September 2005. With Abd El-Aziz Ahmed Abd El-Aziz.

 

25.   SDDSR: Sequence Driven Dynamic Source Routing for Ad Hoc Mobile Networks. Lebanese American University. August 2005. With Wael Kdouh (Primary Advisor).

 

26.   The National Social Security Fund: Assessment and Strategic Recommendations for a Secure Future. Lebanese American University. June 2005. With Mona Zhgaib.

 

27.   The Executive MBA Classroom in the New Millennium. Lebanese American University. June 2005. With Shirine Khalife.

 

28.   Number Theoretic Equations Involving the Number of Elements of the Generalized Group of Units. Beirut Arab University. June 2005. With Dani Abou Khalil.

 

29.   An Improved Procedure for Performance Evaluation of Routers in Communication Networks. Beirut Arab University. June 2005. With Badih Kodieh.

 

30.   Towards a Temporal Multilevel Secure Database Model. Lebanese American University. June 2005. With Natalie Bekaii. (Primary Advisor).

 

31. CASRA – Colloquial Arabic Speech Recognition Application. Lebanese American University. June 2005. With Omar El-Ariss. (Primary Advisor).

 

32.     Eye2See – A Mobile Surveillance System for Pocket PCs. Lebanese American University. August 2004. (Primary Advisor).

 

33.      Testing Web Applications. Lebanese American University. July 2004. With Manal Houri.

 

34.    Measuring Ripple Effect for Object-Oriented Programs. Lebanese American University. July 2004. With Hani Salem.

 

35.      Mutation Testing of Web Services. Lebanese American University. February 2004. With Reda Siblini.

 

36.  Routing and Security Algorithms on Reconfigurable Computing Systems. American University of Beirut. February 2004. With Mohammad Al-Khalidy.

 

37.    Security Testing and Evaluation of Cryptographic Algorithms. Lebanese American University. June 2003. With Hadi Otrok (Primary Advisor).

 

38.      XSP: A New Technology for J2EE Development. Lebanese American University. June 2003. With Elias Mouchantaf.

 

39.  Modelling and Testing of Web Systems using SDL. Lebanese American University. June 2003. With Joe Abboud Syriani.

 

40.  Performance Analysis of Parallel Computing Using Reconfigurable Computing. American University of Beirut. January 2003. With Soheib Mazoub.

 

41.  Comparative Empirical Evaluation of Distributed Object Computing Technologies. Lebanese American University. January 2003. With Fadi Nammur.

 

42.  ADD: A Duplicate Detection Tool for Arabic Data Warehouses. Lebanese American University. July 2002. With Ralph Varjabedian (Primary Advisor).

 

43.  Online Banking Models and Implementations. Lebanese American University. July 2002. With Najib Nasreddine.

 

44.  Corporate Portal Design and Framework. Lebanese American University. June 2002. With Mohammad Wazan.

 

45.  Neuro-Classification for Handwritten Arabic Text. Lebanese American University. June 2002. With Catherine Ghaddar (Primary Advisor).

 

46.  ABJAD – An Off-Line Arabic Handwritten Recognition System. Lebanese American University. May 2002. With Hisham Zabadani (Primary Advisor).

 

47.  Constructing School Timetabling Using Simulated Annealing. Lebanese American University. April 2002. With Nazih Faraj.

 

48.  A Study of RSA Cryptography Algorithms. Lebanese American University. March 2002. With Nabil Semaan.

 

49.  An Application Framework for the Distance Learning Domain. Lebanese American University. January 2002. With Ahmed Natafgi.

 

50.  An Auto-Indexing Module for Arabic Information Retrieval. Lebanese American University. January 2002. With Walid Daher (Primary Advisor).

 

51.  GISMO – A Geographic Information System for a Municipality Office. Lebanese American University. September 2001. With Yousef Kaddoura (Primary Advisor).

 

52.  Final Exam Scheduling for Universities. Lebanese American University. July 2001. With Mazen Timani.

 

53.  Incremental and Classical Genetic Algorithms. Lebanese American University. July 2001. With Mohammad Awad.

 

54.  Web Application Testing. Lebanese American University. July 2001. With Wael Ukaily.

 

55.  Synthesis with VHDL. Lebanese American University. July 2001. With Hatem Halawi.

 

56.  Implementation of a Regression Test Selection Technique for C++ Software. Lebanese American University. July 2001. With Rania Hajjar.

 

57.  Performance Analysis of Linear Algebraic Functions Using Re-configurable Computing. American University of Beirut. May 2001. With Issam Damaj.

 

58.  A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text. Lebanese American University. February 2001. With Alaa Hamid (Primary Advisor) 

 

59.  Weighted Ternary Trees as Data Structures for Dendritic Molecules. Lebanese American University. December 2000. With Dany Doughan.  

 

60.  CareerHunter.com: Hunts Your Career! Lebanese American University. August 2000. With Samer Eid.      

 

61.  Reduction Based Methods and Metrics for Selective Regression Testing. Lebanese American University. July 2000. With Rami Bahsoon.

 

62.  Impact Analysis and Regression Testing of Database Applications. Lebanese American University. July 2000. With Bassel Dauo.

 

63.  Test Case Generation for Path Coverage. Lebanese American University. June 2000. With Miran Salame.

 

64.  Software Quality Improvement Model for Small Organizations. Lebanese American University. June 2000. With Rabih Zeineddine.

 

65.  An Improved Apriori for Mining Association Rules – “Apriori+”. Lebanese American University. December 1999.

 

66.  Artificial Neural Network Algorithms. Lebanese American University. November 1999. With Samer Ramadan.

 

67.  PERF Solutions for Distributed Query Optimization. Lebanese American University. September 1999. With Rola Fany (Primary Advisor).

 

68.  A Natural Language Interface to Relational Databases – The Mild System. Lebanese American University. June 1999. With Malda Tabbaa.

 

69.  Exam Scheduling Algorithms. Lebanese American University. June 1999. With Ziad Mikati.

 

70.  Complexity Metrics for Small Business Software Applications in MS-ACCESS Environment. Lebanese American University. June 1999. With Sana Abiad.

 

71.  School Timetabling Support System. Lebanese American University. February 1999. With Ahmed Solh.

 

72.  Lebanese Standards for Software Development Process. Lebanese American University. February 1998. With Ihab Shallah.

 

73.  Tourism in Lebanon: An Intelligent Geographic Information System Interactive Multimedia Hypermap Tool. Lebanese American University. February 1998. With Diana Nahle.

 

74.  Software Quality System for Lebanese Companies. Lebanese American University.  August 1997. With Badia Fidaoui.

 

75. Simulated Annealing and Genetic Algorithms for Exam Scheduling. Lebanese American University. June 1997. With Abbas Tarhini.

 

76.  A Tabu Search Algorithm for Mapping Data to Multicomputers. Lebanese American University. June 1997. With Kamel Diab.

 

 

VII. Conference and Journal Activities

   

1.  2003 – Present: Technical Committee - The International Arab Journal of Information Technology.

 

2. 2002 – Present: Member of the Program Committee – International Conference on Software and Engineering Applications.

 

3.    2002 – Present: Member of the Program Committee – Information Resources Management Association (IRMA) International Conference.

 

4.    2002 – 2002: Local Organizing Committee – the First Middle East/North Africa Summer School on Parallel, Distributed, Mobile, and Internet Computing – Theory, Methods, Applications, and Research Directions.

 

5.      2001 – Present: Member of the International Program Committee - Software Engineering and Application Conference. The International Association of Science and Technology for Development.

 

6. 2001 – Present: Member of the International Program Committee – International Conference in Computer Science, Software Engineering, Information Technology, E-business and Applications.

 

7.      2001 – 2002: Webmaster and Publicity Chair – Research Trends in Science and Technology (RTST).

 

8.    2000 – Present: Finance and Registration Chair - The ACS/IEEE International Conference on Computer Systems and Applications.

 

18. 1999 – Present: Paper Referee - The Computer Security Applications Conference.

 

19.  1998 – Present: Member of the Organizing Committee - ACM Symposium on Applied Computing and Track Chair - Database Theory, Technology, and Applications.

 

20.  1998 – Present: Member of the Editorial Board of the Association of Computing Machinery Applied Computing Review.

 

21.  1998 – 1999: General Secretary and Member of the Organizing Committee of the International Conference on Scientific Computations.

 

22.  1996 – 1997: Member of the Program Committee - The Computer Security Applications Conference.

 

23.  1993 – 1997: Member of the Advisory Board - Symposium on Applied Computing Special Track on Scientific Computing.

 

24.  1993 – 1995: Member of the Organizing Committee. The International Conference on Mathematical and Computing Modelling.

 

25.  1993 – 1995: Member of the Steering Committee. The Mid-Continent Conference on Information Management.

 


VIII. Memberships and Societies

  1. Arab Computing Society.
  1. Association of Computing Machinery.
  1. International Society of Computers and Their Applications.

X. Research Grants

  1. 2007 – 2008, Grant for “Mobility in the Middle East.” Submitted to TEMPUS.
  1. 2006 – 2008, Grant for “A Policy-Driven Security Protocol for Safeguarding Transactional and Fixed-Content Entities in the Banking and Healthcare Sectors.” National Council for Scientific Research. Lebanon.
  1. 2003 – 2005, Grant for “CASRA – Colloquial Arabic Speech Recognition Application.” National Council for Scientific Research. Lebanon.
  1. 2000 – 2002, Grant for “Data Cleansing in Large Data Warehouse.” National Council for Scientific Research. Lebanon.
  1. 1993 - 1995, Grant for “Multilevel Secure Systems Engineering.” The Aerospace Corporation. USA.
  1. 1992 - 1993, Grant for “Multilevel Security in Database Systems.” Moorhead State University. USA.

X. Achievements and Awards

  1. “Certificate of Recognition” for outstanding service in the Editorial Board.The International Arab Journal of Information Technology. 2006.
  1. “Recognition of Service Award”. Association of Computing Machinery. March 2000 through March 2007.
  1. Spot Award”. The Advanced Tactical Fighter (F-22) Project. The Aerospace Corporation. January 1, 1995.
  1. Certificate of Achievement”. Total Quality Management. The Aerospace Corporation.         June 1, 1994.
  1. Certificate of Achievement”. The IBM-Mankato Project. IBM and Minnesota State University. May 18, 1990.

XII. Magazines, Newspaper, and Television Interviews

  1. Featured in an article in IT News in issue number 33 – June 2003. The article discussed how computer education is a pillar of arts and sciences education.
  1. Featured in an article in the April 12-18, 2002 issue of Assayad Magazine discussing the state of the Lebanese computer sector.
  1. Featured in an article in the March 31, 2002 issue of An-Nahar newspaper discussing the RTST 2002 conference.
  1. Featured in a radio program on Radio of Lebanon on Thursday, December 14, 2000.
  1. Featured in an article in the December 29, 1999 issue of Ad-Diyar newspaper discussing Y2K related issues.
  1. Spotlighted in the evening news program on Tele-Liban on Saturday February 13, 1999 discussing The Year 2000 Problem.
  1. Featured in an article in the Issue No: 5, December 1997 of Academy - The Universities News Magazine.

XII. References

 

1.      Dr. Samira Aghacy

Dean, School of Arts and Sciences

            Lebanese American University, P. O. Box 13-5053 Beirut, Lebanon

Phone: (01) 867622 ext. 1171     Fax: (01) 867098

Email: saghacy@lau.edu.lb

 

2.      Mrs. Mona Bou-Azza Bawarchi

President

Gezairi Transport P.O. Box 11/1402 Beirut, Lebanon

           Phone:  (01) 783783                   Fax: (01) 581-157

            Telex: 20871-42478

 

3.   Mr. Anis Balaa

Co-founder and Manager

            Engineering Design and Management, Mar Elias Street, Helou Building

Beirut, Lebanon

            Phone: (01) 818071                    Fax: (01) 306556

 

4.   Dr. William Perrizo

            Dean of Graduate Studies

            North Dakota State University. Fargo, ND 58105

           Phone: (701) 237-7248               Fax: (701) 237-8562

           Email: perrizo@plains.nodak.edu

    

5.   Dr. Hussein Hakimzadeh

            Chairperson of the Department of Mathematics and Computer Science

            Indiana University. South Bend, IN 46634

            Phone: (219) 237-4517               Fax: (219) 237-4538

            Email: hossein@natasha.iusb.indiana.edu