66 / 100

Mohammad Eyadat | Cybersecurity Models / Higher Education | Best Researcher Award

Mohammad Eyadat California States University, Dominguez Hills, United States

He is currently a full professor at California State University Dominguez Hills, with an extensive academic background spanning various institutions. He holds a Ph.D. in Computer Science/Engineering Mathematics from Claremont Graduate School, a Master of Science Degree in Mathematics from the same institution, a Master of Science Degree in Computer Science from the University of Southern California, and a Bachelor of Science Degree in Computer Science from Yarmouk University in Jordan. Throughout his career, he has taught courses in Computer Science, Computer Information Systems, Information Technology, and Mathematics at both graduate and undergraduate levels. His professional experience ranges from Software Designer and developer to Business Consultant. Additionally, he has contributed as a collaborator in organizing numerous research activities and professional conferences. His research interests encompass multimedia software security, watermarking algorithms for images and video data, software engineering, software reliability models, systems performance evaluation, Education and Information Technology, and Web accessibility.

Education:

He earned his Ph.D. in Computer Science/Engineering Mathematics from Claremont Graduate University in California in 2003, following a Master of Science Degree in Engineering Mathematics from Claremont Graduate School in 1997. Prior to this, he completed a Master of Science Degree in Computer Science at the University of Southern California (USC) in California in 1994. In 1993, he obtained a Programming Certificate of Completion from the International College of Success in Studio City, CA. He began his academic journey with a Bachelor of Science Degree in Computer Science from Yarmouk University in Jordan in 1984. Throughout his educational pursuits, he has displayed a dedication to advancing his knowledge and expertise in computer science and engineering mathematics.

Profile:

Experience:

He has been self-employed as a Programmer/Contractor in California since 1990, demonstrating his entrepreneurial spirit and expertise in software development. From August 1998 to July 2000, he served as a Consultant for a research grant awarded to El Camino College, where he played a vital role in revitalizing the ESL Placement Process, overseeing testing and validation processes. Prior to this, from May 1996 to November 1996, he worked as a Software Designer and Business Consultant at KB Computer in California, showcasing his skills in software design and his ability to provide valuable business insights. His experience also includes a role as a Software Developer and Software Consultant at 3COM in California from August 1995 to May 1996, where he further honed his technical skills. Additionally, he served as a Computer Programmer at Mu’tah University in Jordan from 1985 to 1988, laying the foundation for his career in computer programming. Throughout his career, he has demonstrated versatility, innovation, and a commitment to excellence in the field of software development and consulting.

Publication:

  1. Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model Cited By : 33, Published By : 2015
  2. Deploying bioinformatics workflows on clouds with galaxy and globus provision Cited By : 32, Published By : 2012
  3. Factors that affect the performance of the DCT-block based image watermarking algorithms Cited By : 22, Published By : 2004
  4. Routing protocol for low power and lossy network–load balancing time-based Cited By : 17, Published By : 2021
  5. Compression standards roles in image processing: case study Cited By : 12, Published By : 2005
  6. Web accessibility factor a key focus for serving students Cited By : 11, Published By : 2011
  7. Information security: SETA program status at jordanian universities Cited By : 5, Published By : 2015
  8. Web accessibility in information systems Cited By : 5, Published By : 2007
  9. Javascript and Perl Combo in On-line Examinations Cited By : 5, Published By : 2004
  10. Higher education administrators roles in fortification of information security program. Cited By : 4, Published By : 2015
Mohammad Eyadat | Cybersecurity Models / Higher Education | Best Researcher Award

You May Also Like