Skip Ribbon Commands
Skip to main content
A Bridge Towards Knowledge
Skip Navigation Links Home : Details
Name : Dr. Huda Saadeh

Academic Rank: Assistant Professor

Administrative Position : Faculty Academic Member

Office 7309       Ext No 7309

Email :

Specialization: Computer Science

Graduate Of: Jordan University

Download CV






    Jordan University
    Jordan University
    Jordan University

Academic Experience
  • Coordinator of Innovation and entrepreneurship center
  • Assistant Prof. at Information Security Department, Petra University, 2018-present
  • Faculty Academic Member –Lecturer- Faculty of Information Technology, Petra University, 2006-2018
  • Teaching Assistant, Faculty of Information Technology, Petra University, 2001-2006
  • (Summer 2009/2010) Teaching Computer Skills II course at KASIT - Jordan University.
  • (Summer 2006/2007) Teaching Network Programming course at KASIT - Jordan University.
  • (Summer 2005/2006) Teaching Network Programming course at KASIT - Jordan University.

Non-Academic Experience

  • ASP/VB developer (Developing ASP projects for the USA market), Integrant Inc., 2000-2001


  • Journal Paper

      Amjad Hudaib, Fawaz Fawaz Al-Zaghoul, Maha Saadeh, Huda Saadeh, " ADTEM-Architecture Design Testability Evaluation Model to Assess Software " , "Journal of Software Engineering and Applications (JSEA)",Vol.8,No., Scientific Research Publishing, Irvine, Calif, 04/14/2015 Abstract:
      Architectural design is a crucial issue in software engineering. It makes testing more effective as it contribute to carry out the testing in an early stage of the software development. To improve software testability, the software architect should consider different testability metrics while buildi Download

      Maha Saadeh, Huda Saadeh, Mohammad Qatawne, " Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer " , "International Journal of Advanced Science and Technology",Vol.95,No., Science and Engineering Research Support Society, Sandy Bay TAS ,Australia, 10/30/2016 Abstract:
      Many sorting algorithms have been proposed and implemented in previous years. These algorithms are usually judged by their performance in term of algorithm growth rate according to the input size. Efficient sorting algorithm implementation is important for optimizing the use of other algorithms such Download

      Huda K Saadeh, Wesam Almobaideen, Khair Eddin Sabri, " PPUSTMAN: Privacy-Aware PUblish/Subscribe IoT MVC Architecture Using Information Centric Networking " , "Modern Applied Science",Vol.12,No., Canadian Center of Science and Education, Ontario, Canada, 04/29/2018 Abstract:
      IoT applications have been evolved in relation to every aspect of human life. The design of the applications adds new challenges such as mobility, scalability, and privacy to the current networking architecture design. For that reason, it is mandatory to investigate new solutions and paradigms suc Download

      Mohammed Abu-Arqoub, Ghassan Issa, Abed Elkareem Banna, Huda Saadeh, " Interactive Multimedia-Based Educational System for Children Using Interactive Book with Augmented Reality " , "Journal of Computer Science",Vol.15,No., Science Publications, Dubai, UAE, 11/01/2019 Abstract:
      his paper describes a system's model for Augmented Reality Learning in which a traditional book is converted to an interactive book using Glyphs (TAGs) and multimedia. The interactive book can be used by a child, parent, or by a teacher to make learning an enjoyable experience. As the child goes thr Download

      Shakir Al-Farraji, Huda Saadeh, " One Time Password Generation based on Random Permutation using User Identity with Timestamp " , "International Journal of Engineering and Advanced Technology (IJEAT)",Vol.9,No., Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India, 04/30/2020 Abstract:
      A password is a string of alphanumeric elements that is used mainly to authenticate user identity in order to give permission gaining access to the computer resources that should be secured from any unauthorized access. For this reason, password need to be kept secure among different types of attack Download

      Shakir Al-Farraji, Huda Saadeh, " A Novel Transposition Encryption Emerging DNA Strand with Random Permutation " , "International Journal of Recent Technology and Engineering (IJRTE)",Vol.8,No., Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India, 01/15/2020 Abstract:
      The fast and wide development in information technology and data handling has made researchers to be interested in the data confidentiality and to think about finding new and complex methods in data encryption. In this paper, a novel method for encryption is introduced. The idea beyond this Download

  • Conference paper

      Huda Saadeh, Wesam Almobaideen, Khair Eddin Sabri, " Internet of Things: A review to support IoT architecture's design " , "2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS)",Vol.2nd,No., IEEE, Amman, Jordan, 12/07/2017 Abstract:
      Internet of Things (IoT) is a state-of-the-art field that is affecting every aspect of human life. This paper presents a state-of-the-art overview of IoT challenges, available standards, and popular architectures. The aim is to guide future researchers in the field of IoT by highlighting the main re

      Huda Saadeh, Wesam Almobaideen, Khair Eddin Sabri, Maha Saadeh, " Hybrid SDN-ICN Architecture Design for the Internet of Things " , "2019 IEEE Sixth International Conference on Software Defined Systems (SDS)",Vol.6th,No., IEEE, Rome, Italy, 06/10/2019 Abstract:
      Internet of Things (IoT) impacts the current network with many challenges due to the variation, heterogeneity of its devices and running technologies. For those reasons, monitoring and controlling network efficiently can rise the performance of the network and adapts network techniques according to
  • Event Calendar
    <July 2022>