20 results on '"Tariq Alwada’n"'
Search Results
2. Bio-inspired Hybrid Feature Selection Model for Intrusion Detection
- Author
-
Adel Hamdan Mohammad, Tariq Alwada’n, Omar Almomani, Sami Smadi, and Nidhal ElOmari
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
3. Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System
- Author
-
Mohammed Al Masarweh, Tariq Alwada’n, and Waleed Afandi
- Subjects
Control and Optimization ,cloud service broker ,quality of service ,round robin ,weighted fair queuing ,fog computing ,constrained application protocol ,simple network management protocol ,Computer Networks and Communications ,Instrumentation - Abstract
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud computing models may have difficulty dealing with challenges caused by IoT applications, such as network failure, latency, and capacity constraints. One of the introduced methods to solve these challenges is fog computing which makes the cloud closer to IoT devices. A system for dynamic congestion management brokerage is presented in this paper. With this proposed system, the IoT quality of service (QoS) requirements as defined by the service-level agreement (SLA) can be met as the massive amount of cloud requests come from the fog broker layer. In addition, a forwarding policy is introduced which helps the cloud service broker to select and forward the high-priority requests to the appropriate cloud resources from fog brokers and cloud users. This proposed idea is influenced by the weighted fair queuing (WFQ) Cisco queuing mechanism to simplify the management and control of the congestion that may possibly take place at the cloud service broker side. The system proposed in this paper is evaluated using iFogSim and CloudSim tools, and the results demonstrate that it improves IoT (QoS) compliance, while also avoiding cloud SLA violations.
- Published
- 2022
- Full Text
- View/download PDF
4. Machine learning for Autopsy reports Forensic using Text Classification Techniques
- Author
-
Muhammad Rehman Shahid, Asim Munir, Layeba Ifraheem, Hamza Aldabbas, Abdul Wadood, and Tariq Alwada'n
- Published
- 2022
- Full Text
- View/download PDF
5. Enhanced Power Utilization for Grid Resource Providers
- Author
-
Thair Alkhdour, Tariq Alwada'n, Abdulsalam Alarabeyyat, and Ali Rodan
- Subjects
Physics and Astronomy (miscellaneous) ,Computer science ,Management of Technology and Innovation ,Distributed computing ,Grid resources ,Engineering (miscellaneous) ,Power (physics) - Published
- 2020
- Full Text
- View/download PDF
6. Enhanced Graphical Representation of Data in Web Application (Case Study: Covid-19 in the UK)
- Author
-
Tariq Alwada'n, Mohammed Al Masarweh, and Rockson Adomah
- Subjects
Web server ,Information retrieval ,General Computer Science ,Application programming interface ,Process (engineering) ,Computer science ,business.industry ,Scalable Vector Graphics ,Representation (systemics) ,computer.file_format ,External Data Representation ,computer.software_genre ,Data visualization ,Web application ,business ,computer - Abstract
This paper describes the analysis, design, and implementation of responsive data representation in the web application that can render data asynchronously to users by making an Application Programming Interface (API) request from a webserver. At the same time, provides high-quality downloadable Scalable Vector Graphics (SVG) images for journals, magazines, and other printed media. For this issue, large-scale data that uses open-source Covid-19 data was used to improve the Covid-19 data visualization and the other improvements that can be done for proper representation of such vital data to the general public. During the development process, qualitative research into data representation with responsive charts and/or Scalable Vector Graphics images file has been conducted in contrast of each other to answer questions like what tools and technologies are often used, what are the alternative tools and technology, when, where, and why developers make use of certain approach to data representation. © 2021. All Rights Reserved.
- Published
- 2021
- Full Text
- View/download PDF
7. High Priority Requests in Grid Environment
- Author
-
Salah Alghyaline, Tariq Alwada'n, and Azmi Alazzam
- Subjects
Service (systems architecture) ,General Computer Science ,business.industry ,Computer science ,Distributed computing ,JADE (programming language) ,Service provider ,computer.software_genre ,Grid ,Software ,Grid computing ,business ,computer ,computer.programming_language - Abstract
Grid computing is an enhanced technology consisting of a pool of connected machines that belong to multiple organizations in different sites to form a distributed system. This system can be used to deal with complex scientific or business problems. It is developed to help share distributed resources that may be diverted in nature and solve many computing problems. The typical decentralized grid computing model faces many challenges, such as; different systems and software architectures, quickly handling the enormous amount of grid requesters, and finding the appropriate resources for the grid users. Some of the grid requests might need to get significant attention and fast response to the other requests. Usually, the Grid Broker (GB) works as a third party or mediator between grid service providers and grid service requesters. This paper introduced a new automated system that can help exploit the grid power, improve its functionality, and enhance its performance. This research presents a new architecture for the Grid Broker that can assist with high priority requests and be processed first. This system is also used to monitor and provision the grid providers' work during the job running. It uses a multi-agent system to facilitates its work and accomplish its tasks. The proposed approach is evaluated using the Jade simulator. The results show that using the proposed approach can enhance the way of dealing with high priority requests coming to the grid.
- Published
- 2020
- Full Text
- View/download PDF
8. Utilizing Multi-Agent Systems in Grid Environments
- Author
-
Ali Rodan, Abdulsalam Alarabeyyat, Tariq Alwada'n, and Thair Khdour
- Subjects
Computer science ,020209 energy ,media_common.quotation_subject ,Multi-agent system ,Distributed computing ,02 engineering and technology ,computer.software_genre ,Grid ,Set (abstract data type) ,Negotiation ,Intelligent agent ,Grid computing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Architecture ,Protocol (object-oriented programming) ,computer ,media_common - Abstract
Grid Computing refers to systems and applications that incorporate and control distributed services and resources to resolve systematic or industrial issues. Over the past few years, developers have realized the need for an automatic mechanism that can be used in employing the grid power, improving its operating and enhancing its production. Multi-Agents Systems are generally employed to solve problems by using decentralized techniques by a set of agents collaborate to resolve a challenge. Hence, it is considered suitable solutions for open systems that change frequently. In this paper, we propose a modern architecture that utilizes a Multi Agent System not only to help in choosing the best resources but also to generate the negotiation protocol between the grid users and providers to fully deploy the capacity of grid computing. Moreover, the proposed architecture can play the main role in monitoring the list of users' jobs as they are being handled.
- Published
- 2019
- Full Text
- View/download PDF
9. ENHANCE BROKER TOPOLOGY FOR COMPUTATIONAL GRID SYSTEM
- Author
-
Bilal Zahran, Tariq Alwada'n, Thair Khdour, and Adel Hamdan Mohammad
- Subjects
Computer science ,Topology (electrical circuits) ,Grid system ,Topology - Published
- 2016
- Full Text
- View/download PDF
10. Cloud Computing: Privacy, Mobility and Resources Utilization
- Author
-
Jalal Omer Atoum, Omar Al-zitawi, and Tariq Alwada'n
- Subjects
World Wide Web ,Cloud computing security ,Utility computing ,Computer science ,business.industry ,Cloud computing ,Computer security ,computer.software_genre ,business ,computer - Published
- 2016
- Full Text
- View/download PDF
11. Privacy and Control in Mobile Cloud Systems
- Author
-
Sufian Khawaldeh, Mohammed Almasarweh, Omar Al-zitawi, and Tariq Alwada'n
- Subjects
Privacy software ,Computer science ,business.industry ,Control (management) ,Cloud computing ,Application software ,computer.software_genre ,Computer security ,Shared resource ,Work (electrical) ,Server ,The Internet ,business ,computer ,Computer network - Abstract
computing is a huge amount of distributed and dynamic sharing resources that are provided on request to clients over the Internet instead of having a local server or personal devices to deal with applications. Usually, cloud servers don't work at full power; means there's some processing power will be unused. To make use of this wasted power, it's possible to use the mobility which is used to migrate application software, data or jobs among cloud servers. The problem with such technology is the privacy. In this paper we proposed a policy management framework to protect the privacy while applying the mobility method in the cloud environment.
- Published
- 2015
- Full Text
- View/download PDF
12. Mobility in Cloud Systems
- Author
-
Tariq Alwada'n
- Subjects
Computer science ,Cloud systems ,Distributed computing - Published
- 2014
- Full Text
- View/download PDF
13. Early fault prediction and detection of hydrocephalus shunting system
- Author
-
Waleed Al-Nuaimy, Abdel Raman Alkharabsheh, Abeer Hawatmeh, Tariq Alwada'n, Jafar Ababneh, and Lina Momani
- Subjects
Shunting ,medicine.medical_specialty ,Computer science ,High pressure ,medicine ,Hardware_PERFORMANCEANDRELIABILITY ,medicine.disease ,human activities ,Shunt (electrical) ,Simulation ,Surgery ,Intracranial pressure ,Hydrocephalus - Abstract
Trends of various intracranial pressure (ICP) parameters for high pressure hydrocephalus patients are utilized to detect various shunt faults in their early stages, as well as, to monitor the effect of such faults on shunt performance. A method was proposed to predict the time required for ICP to be abnormal and for the valve to reach full blockage condition. Furthermore, an auto valve schedule updating method is proposed and used to temporarily deal with detected faults until the patient is checked up by his/her physician. The proposed algorithms were evaluated using numerical simulation.
- Published
- 2013
- Full Text
- View/download PDF
14. Comparison Between Cloud and Grid Computing: Review Paper
- Author
-
Hosam Alhakami, Hamza Aldabbas, and Tariq Alwada'n
- Subjects
Grid computing ,Computer science ,business.industry ,Cloud testing ,Distributed computing ,Cloud computing ,business ,computer.software_genre ,computer - Published
- 2012
- Full Text
- View/download PDF
15. Data Confidentiality in Mobile Ad hoc Networks
- Author
-
Helge Janicke, Ali H. Al-Bayatti, Hamza Aldabbas, and Tariq Alwada'n
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Policy Enforcement Point(PEP) ,Computer science ,Wireless ad hoc network ,business.industry ,Network packet ,MANETs ,Mobile ad hoc network ,Computer security ,computer.software_genre ,Network simulation ,Policy decision Point(PDP) ,Node (computer science) ,Wireless ,Confidentiality ,business ,Discretionary Access Control (DAC) ,Cryptography and Security (cs.CR) ,computer ,Dissemination - Abstract
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET., Comment: 12 pages
- Published
- 2012
- Full Text
- View/download PDF
16. Dynamic policy management in mobile grid environments
- Author
-
T. Khdou, Helge Janicke, Omar Aldabbas, Hamza Aldabbas, and Tariq Alwada'n
- Subjects
Service (systems architecture) ,Data grid ,Computer Networks and Communications ,Computer science ,Grid Resource Broker ,security ,Computer security ,computer.software_genre ,Application software ,Grid ,Mobile Grid Services ,grid ,DRMAA ,Resource (project management) ,Semantic grid ,Grid computing ,Hardware and Architecture ,computer ,policy management - Abstract
Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs execution in the grid environment. These migrations depend on the grid’s users and the grid’s nodes policies. The heterogeneity, diversity of policies and attributes leads to a need for policy management tools that can handle these problems. Also, before the users can submit their jobs or run their applications on a certain resource or system they may need to guarantee that this resource or system has not been compromised, which could result in their own application or data being stolen or asking for certain users to be allowed to access the service. To date, not enough attention has been paid to policies that deal with such concerns. Most existing grid systems have support only limited types of policies (e.g. CPU resources). A few designs consider enforcing data policies in their architecture. Therefore, we propose a dynamic policy framework that addresses these issues (user-submitted policy, data policy and multiple Virtual Organizations (VOs).
- Published
- 2012
17. Ensuring data confidentiality and privacy in mobile ad hoc networks
- Author
-
Tariq Alwada'n, Hamza Aldabbas, Radwan S. Abujassar, and Helge Janicke
- Subjects
business.industry ,Computer science ,Network packet ,Privacy policy ,Mobile ad hoc network ,Computer security ,computer.software_genre ,Base station ,Node (computer science) ,Wireless ,Confidentiality ,business ,computer ,Dissemination ,Computer network - Abstract
Mobile ad hoc networks (MANETs) are autonomous systems which are comprised of a number of mobile nodes that communicate between themselves by wireless communication in a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. Nodes can communicate with each other without any pre-planned or a base station. Disseminating information securely between these nodes in such networks however is a challenging task, particularly when the information is confidential. Revealing such information to anyone else other than the intended nodes could be highly damaging, especially in military applications where keeping the message secret from adversaries is essential. In this paper we present our novel framework for privacy control in mobile ad hoc networks in which privacy policies are attached to messages as they are send between peers. We evaluate our framework using the Network Simulator (NS-2) to provide and check whether the privacy and confidentiality of the originator are met. For this we implemented the privacy enforcement as an NS2 agent that manages and enforces the policies attached to packets at every node in the MANET.
- Published
- 2012
- Full Text
- View/download PDF
18. New framework for policy support for Mobile Grid Services
- Author
-
Omer Aldabbas, Tariq Alwada'n, Mai Alfawair, and Helge Janicke
- Subjects
business.industry ,Computer science ,Distributed computing ,Mobile computing ,Application software ,computer.software_genre ,Grid ,Mobile grid ,Semantic grid ,Grid computing ,Server ,Mobile telephony ,business ,computer - Abstract
In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utlized by other institutes. A disagreement between the multi-Virtual Organizations (VOs) might happen in the security aspect for the policy framework. Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs execution in the grid environment. It has also solved some of the lack in finding suitable resources for the jobs, but not a lot of attention was given to the policy in this solution. This paper presents a new framework for dynamic policy management to support mobility services in the grid environment.
- Published
- 2011
- Full Text
- View/download PDF
19. New framework for dynamic policy management in grid environments
- Author
-
Helge Janicke, Tariq Alwada'n, Hamza Aldabbas, and Omer Aldabbas
- Subjects
Knowledge management ,Risk analysis (engineering) ,business.industry ,Computer science ,Ask price ,Grid system ,business ,Grid ,Security policy ,Active networking - Abstract
In a multi-organization environment like the GRID, each institute might want to implement limits on how its resources are being used by other institutes. The problem in most traditional policy frameworks lies in the fact that it concentrates on the policy management inside the VO rather than on the management between multiple VOs. The external users, who want to utilize resources in the GRID, ask for guarantees for their jobs and data which most recent policy frameworks do not take into consideration. To date, not enough attention has been paid to policies that deal with such concerns since most existing Grid systems have supported only limited types of policies. This paper introduces a new dynamic framework that supports the management of security policies within the VOs along with the support for the data policies with addressing external users’ policies when making decisions.
- Published
- 2011
- Full Text
- View/download PDF
20. Review of Security in VANETs and MANETs
- Author
-
Helge Janicke, Tariq Alwada'n, al-balqa Alfawair, Mai Abu Baqar, and Hamza Aldabbas
- Subjects
Computer science - Abstract
Mobile Ad Hoc Network (MANET) and Vehicular Ad Hoc Network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured, and self-controlled infrastructure-less networks. These kinds of networks have the advantage of being able to be set-up and deployed anywhere and anytime because it has a simple infrastructure set-up and no central administration. Distributing information between these nodes over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it, especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging. They are explored in this chapter.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.