-
A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective
Authors:
Abdallah Moubayed,
MohammadNoor Injadat,
Nouh Alhindawi,
Ghassan Samara,
Sara Abuasal,
Raed Alazaidah
Abstract:
Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods. This is further exasperated by the increasing number of students due to the shift of focus toward integrating the Internet technologies in education and the focus of academic institutions on moving toward e-Learning, blended, or online learning models.…
▽ More
Analyzing and evaluating students' progress in any learning environment is stressful and time consuming if done using traditional analysis methods. This is further exasperated by the increasing number of students due to the shift of focus toward integrating the Internet technologies in education and the focus of academic institutions on moving toward e-Learning, blended, or online learning models. As a result, the topic of student performance prediction has become a vibrant research area in recent years. To address this, machine learning and data mining techniques have emerged as a viable solution. To that end, this work proposes the use of deep learning techniques (CNN and RNN-LSTM) to predict the students' performance at the midpoint stage of the online course delivery using three distinct datasets collected from three different regions of the world. Experimental results show that deep learning models have promising performance as they outperform other optimized traditional ML models in two of the three considered datasets while also having comparable performance for the third dataset.
△ Less
Submitted 10 January, 2024;
originally announced February 2024.
-
Internet of Robotic Things: Current Technologies and Applications
Authors:
Ghassan Samara,
Abla Hussein,
Israa Abdullah Matarneh,
Mohammed Alrefai,
Maram Y Al-Safarini
Abstract:
The Internet of Robotic Things (IoRT) is a new domain that aims to link the IoT environment with robotic systems and technologies. IoRT connects robotic systems, connects them to the cloud, and transfers critical information as well as knowledge exchange to conduct complicated and intricate activities that a human cannot readily perform. The pertinent notion of IoRT has been discussed in this pape…
▽ More
The Internet of Robotic Things (IoRT) is a new domain that aims to link the IoT environment with robotic systems and technologies. IoRT connects robotic systems, connects them to the cloud, and transfers critical information as well as knowledge exchange to conduct complicated and intricate activities that a human cannot readily perform. The pertinent notion of IoRT has been discussed in this paper, along with the issues that this area faces on a daily basis. Furthermore, technological applications have been examined in order to provide a better understanding of IoRT and its current development phenomenon. The study describes three layers of IoRT infrastructure: network and control, physical, and service and application layer. In the next section, IoRT problems have been presented, with a focus on data processing and the security and safety of IoRT technological systems. In addition to discussing the difficulties, appropriate solutions have been offered and recommended. IoRT is regarded as an essential technology with the ability to bring about a plethora of benefits in smart society upon adoption, contributing to the generation and development of smart cities and industries in the near future.
△ Less
Submitted 30 March, 2022;
originally announced April 2022.
-
Internet of Things Protection and Encryption: A Survey
Authors:
Ghassan Samara,
Ruzayn Quaddoura,
Mooad Imad Al-Shalout,
AL-Qawasmi Khaled,
Ghadeer Al Besani
Abstract:
The Internet of Things (IoT) has enabled a wide range of sectors to interact effectively with their consumers in order to deliver seamless services and products. Despite the widespread availability of (IoT) devices and their Internet connectivity, they have a low level of information security integrity. A number of security methods were proposed and evaluated in our research, and comparisons were…
▽ More
The Internet of Things (IoT) has enabled a wide range of sectors to interact effectively with their consumers in order to deliver seamless services and products. Despite the widespread availability of (IoT) devices and their Internet connectivity, they have a low level of information security integrity. A number of security methods were proposed and evaluated in our research, and comparisons were made in terms of energy and time in the encryption and decryption processes. A ratification procedure is also performed on the devices in the main manager, which is regarded as a full firewall for IoT devices. The suggested algorithm's success has been shown utilizing low-cost Adriano Uno and Raspberry Pi devices. Arduous Uno has been used to demonstrate the encryption process in low-energy devices using a variety of algorithms, including Enhanced Algorithm for Data Integrity and Authentication (EDAI) and raspberry, which serves as a safety manager in low-energy device molecules. A variety of enhanced algorithms used in conjunction with Blockchain software have also assured the security and integrity of the information. These findings and discussions are presented at the conclusion of the paper.
△ Less
Submitted 30 March, 2022;
originally announced April 2022.
-
Improving VANET's Performance by Incorporated Fog-Cloud Layer (FCL)
Authors:
Ghassan Samara,
Mohammed Rasmi,
Nael A Sweerky,
Essam Al Daoud,
Amer Abu Salem
Abstract:
Because of its usefulness in various fields including as safety applications, traffic control applications, and entertainment applications, VANET is an essential topic that is now being investigated intensively. VANET confronts numerous challenges in terms of reaction time, storage capacity, and reliability, particularly in real-time applications. As a result, merging cloud computing and cloud com…
▽ More
Because of its usefulness in various fields including as safety applications, traffic control applications, and entertainment applications, VANET is an essential topic that is now being investigated intensively. VANET confronts numerous challenges in terms of reaction time, storage capacity, and reliability, particularly in real-time applications. As a result, merging cloud computing and cloud computing has recently been researched. The goal of this study is to develop a system that merges the fog and cloud layers into a single layer known as the included fog-cloud layer. To lower the time it takes for real-time applications on VANETs to respond while also improving data flow management over the Internet and achieving an efficient perception service while avoiding the high cost of cloud connectivity.
△ Less
Submitted 30 March, 2022;
originally announced April 2022.
-
Energy Balancing Algorithm for Wireless Sensor Network
Authors:
Ghassan Samara,
Mohammad A. Hassan,
Munir Al-Okour
Abstract:
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy efficiency is a critical issue with WSNs. As a result,…
▽ More
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy efficiency is a critical issue with WSNs. As a result, develo** a routing protocol that decreases energy consumption in sensor nodes to extend the lifetime of the WSN using an intelligence algorithm has become difficult. LEACH is the first hierarchical routing protocol that divides the WSN into clusters to reduce energy usage. However, it has reached its limit in selecting a suitable cluster head and the sensor nodes to be joined, as well as their quantity. Thus, this research proposes an algorithm called Wireless Energy Balancing algorithm (WEB) that works on energy balancing distribution by identifying a suitable cluster head with minimum distance and high energy. Then it uses the knapsack-problem as a novel algorithm to design the cluster members. The simulation results demonstrate that the WEB algorithm outperforms LEACH by 31% in terms of energy conservation and WSN lifetime extension.
△ Less
Submitted 17 March, 2022;
originally announced March 2022.
-
Scheduling UET-UCT DAGs of Depth Two on Two Processors
Authors:
Ruzayn Quaddoura,
Gassan Samara
Abstract:
Given unit execution time (UET) tasks whose precedence constraints form a directed acyclic graph (DAG), the arcs are associated with unit communication time (UCT) delays. The problem is to schedule the tasks on two processors in order to minimize the makespan. Several polynomial algorithms in the literature are proposed for special classes of digraphs, but the complexity of solving this problem in…
▽ More
Given unit execution time (UET) tasks whose precedence constraints form a directed acyclic graph (DAG), the arcs are associated with unit communication time (UCT) delays. The problem is to schedule the tasks on two processors in order to minimize the makespan. Several polynomial algorithms in the literature are proposed for special classes of digraphs, but the complexity of solving this problem in general case stills a challenging open question. We propose in this paper a linear time algorithm to compute an optimal schedule for the class of DAGs of depth two.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
IoT Forensic Frameworks (DFIF, IoTDOTS,FSAIoT): A Comprehensive Study
Authors:
Mohammad A. Hassan,
Ghassan Samara,
Mohammad Abu Fadda
Abstract:
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of pr…
▽ More
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of privacy and security in this connection, especially given the rapid increase in the number of existing and new IoT devices. Concerns, threats, and assaults related to IoT security have been regarded as a potential and problematic area of research. This necessitates the quick development or creation of suitable technologies with the nature of crimes in the IoT environment. On the other hand, criminal investigation specialists encounter difficulties and hurdles due to various locations, data types, instruments used, and device recognition. This paper provides an in-depth explanation of the criminal content of the Internet of Things. It compares its stages to the detailed stages of traditional digital forensics in terms of similarities and differences, the frameworks used in dealing with electronic crimes, and the techniques used in both types. This paper presents previous discussions of researchers in the field of digital forensics. For the IoT, which brings us to the most important parts of this paper, which is a comprehensive study of the IoT criminal frameworks that are used to protect communication in the field of IoT, such as Digital Forensic Investigation Framework (DFIF), Digital Forensic Framework for Smart Environments (IoTDOTS), Forensic State Acquisition from the Internet of Things (FSAIoT), and discusses the challenges in their general frameworks and provides solutions and strategies.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
An Intelligent Vice Cluster Head Election Protocol in WSN
Authors:
Ghassan Samara,
Mohammad A. Hassan,
Yahya Zayed
Abstract:
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide r…
▽ More
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide range of fields. This includes maintaining network stability and extending network life. In a wireless network, sensors are the most essential component. Sensors are powered by a battery that has a finite amount of power. The battery is prone to power loss, and the sensor is therefore rendered inoperative as a result. In addition, the growing number of sensor nodes off-site affects the network's stability. The transmission and reception of information between the sensors and the base consumes the most energy in the sensor. An Intelligent Vice Cluster Head Selection Protocol is proposed in this study (IVC LEACH). In order to achieve the best performance with the least amount of energy consumption, the proposed hierarchical protocol relies on a fuzzy logic algorithm using four parameters to calculate the value of each node in the network and divides them into three hierarchical levels based on their value. This improves network efficiency and reliability while extending network life by 50 percent more than the original Low Energy Adaptive Clustering Hierarchy protocol
△ Less
Submitted 26 November, 2021;
originally announced December 2021.
-
Wireless Sensor Network MAC Energy -- efficiency Protocols: A Survey
Authors:
Ghassan Samara
Abstract:
Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protoco…
▽ More
Energy Efficiency in wireless sensor networks is an important topic in which the nodes rely on battery power, and efficient energy usage is a key issue for sensitive applications that require long working times. This stimulates many scientists at all levels of communication protocols Medium Access Control (MAC) who control the use of the wireless transmitter and receiver unit to create new protocols. Many protocols were suggested that primarily take energy efficiency as the primary objective of sustaining the function of the network for as long as possible into account with different objectives for wireless sensor networks. This paper will look at some of these energy efficiency protocols.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Lane prediction optimization in VANET
Authors:
Ghassan Samara
Abstract:
Among the current advanced driver assistance systems, Vehicle-to-Vehicle (V2V) technology has great potential to increase Vehicular Ad Hoc Network (VANET) performance in terms of security, energy efficiency, and comfortable driving. In reality, vehicle drivers regularly change lanes depending on their assumptions regarding visual distances. However, many systems are not quite well-designed, becaus…
▽ More
Among the current advanced driver assistance systems, Vehicle-to-Vehicle (V2V) technology has great potential to increase Vehicular Ad Hoc Network (VANET) performance in terms of security, energy efficiency, and comfortable driving. In reality, vehicle drivers regularly change lanes depending on their assumptions regarding visual distances. However, many systems are not quite well-designed, because the visible range is limited, making it difficult to achieve such a task. V2V technology offers high potential for VANET to increase safety, energy efficiency, and driver convenience. Drivers can make more intelligent options in terms of lane selection using predicted information of downstream lane traffic, which is essential for obtaining mobility benefits.
△ Less
Submitted 5 January, 2021;
originally announced February 2021.
-
Intelligent Reputation System for Safety Messages in VANET
Authors:
Ghassan Samara
Abstract:
Nowadays, Vehicle Ad - hoc Nets (VANET) applications have become very important in our lives because VANET provides drivers with safety messages, warnings, and instructions to ensure drivers have a safe and enjoyable journey. VANET Security is one of the hottest topics in computer networks research, Falsifying VANET system information violates VANET safety objectives and may lead to hazardous situ…
▽ More
Nowadays, Vehicle Ad - hoc Nets (VANET) applications have become very important in our lives because VANET provides drivers with safety messages, warnings, and instructions to ensure drivers have a safe and enjoyable journey. VANET Security is one of the hottest topics in computer networks research, Falsifying VANET system information violates VANET safety objectives and may lead to hazardous situations and loss of life. In this paper, an Intelligent Reputation System (IRS) aims to identify attacking vehicles will be proposed; the proposed system will rely on opinion generation, trust value collection, traffic analysis, position based, data collection, and intelligent decision making by utilizing the multi-parameter Greedy Best First algorithm. The results of this research will enhance VANET's safety level and will facilitate the identification of misbehaving vehicles and their messages. The results of the proposed system have also proven to be superior to other reputational systems.
△ Less
Submitted 12 June, 2020;
originally announced July 2020.
-
Optimal Number of Cluster Heads in Wireless Sensors Networks Based on LEACH
Authors:
Ghassan Samara,
Munir Al-okour
Abstract:
The Wireless Sensor Network (WSN) has been one of the leading research fields of wireless networks, particularly in recent year. Sensors are randomly positioned in the region, every node senses the surroundings and sends the data collected to the cluster head (CH), which aggregates and transmits obtained information to the Base Station (BS). A non-rechargeable battery is included on each WSN node.…
▽ More
The Wireless Sensor Network (WSN) has been one of the leading research fields of wireless networks, particularly in recent year. Sensors are randomly positioned in the region, every node senses the surroundings and sends the data collected to the cluster head (CH), which aggregates and transmits obtained information to the Base Station (BS). A non-rechargeable battery is included on each WSN node. The sensor energy and network life extension of WSN are the most important considerations in the academia and industry. And thus, many routing protocols have been proposed to solve this issue, one of these is LEACH, the early protocol that introduced the clustering idea to extend the life of the WSN. LEACH is affected by the number of heads of the Clusters as it is randomly selected, and this has an impact on network lifetime, furthermore, the nodes are randomly joined in each cluster, this means that some of the cluster heads work more than others with fewer cluster nodes. In this paper, it is proposed an algorithm Maximum Optimal Number of Cluster Heads (MONCH) to identify the optimum cluster heads in WSN and to find which is the nearest one to BS and helps to integrate nodes with the most appropriate cluster. The results show improved energy consumption performance for the LEACH algorithm.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey
Authors:
Ghassan Samara,
Ghadeer Al Besani,
Mohammad Alauthman,
Mohammad Al Khaldy
Abstract:
A Wireless Sensor Network (WSN) is a collection of tiny nodes that have low energy levels and have become an essential component of the modern communication infrastructure and very important in industry and academia. Energy is crucial in WSN, and thus the design of WSN in the research community is based on energy efficiency, and node energy consumption is a great challenge to enhance WSN's lifetim…
▽ More
A Wireless Sensor Network (WSN) is a collection of tiny nodes that have low energy levels and have become an essential component of the modern communication infrastructure and very important in industry and academia. Energy is crucial in WSN, and thus the design of WSN in the research community is based on energy efficiency, and node energy consumption is a great challenge to enhance WSN's lifetime. It may be costly or even impossible to charge or replace consumed batteries because of the difficult environment. Many energy efficiency methods are introduced in this article to decrease energy consumption, improve network performance and increase network lifetime.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
An Improved CF-MAC Protocol for VANET
Authors:
Ghassan Samara
Abstract:
Vehicular Ad hoc Network (VANET) is one of the emerging research areas in the mobile computing field which is considered as a future technology and promising topic in the computer science and computer networks. Which provides road safety, updated traffic information, and infotainment. VANET consists of a large number of vehicles moving in high speeds while broadcasting important information like s…
▽ More
Vehicular Ad hoc Network (VANET) is one of the emerging research areas in the mobile computing field which is considered as a future technology and promising topic in the computer science and computer networks. Which provides road safety, updated traffic information, and infotainment. VANET consists of a large number of vehicles moving in high speeds while broadcasting important information like safety and control information which must be sent with high priority. Crowded networks like VANET having many vehicles competing to reserve the channel to send critical information which may lead to high collision scenarios, and therefore, there must be a protocol to send this kind of information with high reliability, low data loss and with no collision. In this research a collision-free protocol will be proposed to manage the channel access among competing vehicles to eliminate the collisions which occur rapidly in VANET especially in dense situations, the proposed protocol hereinafter will be called (I-MAC) protocol expected to enhance the channel performance, achieve load balancing, fairness, and decrease message loss and enhance reliability, The evaluation criteria will examine the channel throughput, message delay, and message loss; the results show that the overall channel performance with regard to collision and packet loss ratio is improved.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks
Authors:
Ghassan Samara,
Mohammad Aljaidi
Abstract:
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing an…
▽ More
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficiently with best-effort traffic processing. The protocol aims to maximize the lifetime of the network out of balancing energy consumption across multiple nodes, by using the concept of service differentiation, finding lower cost by finding the shortest path using nearest neighbor algorithm (NN), also put certain constraints on the delay of the path for real-time data from where link cost that captures energy nodes reserve, energy of the transmission, error rate and other parameters. The results show that the proposed protocol improves the network lifetime and low power consumption.
△ Less
Submitted 23 March, 2019;
originally announced March 2019.
-
Performance Analysis of Dynamic Source Routing Protocol
Authors:
Amer O. Abu Salem,
Ghassan Samara,
Tareq Alhmiedat
Abstract:
Dynamic Source Routing (DSR) is an efficient on-demand routing protocol for mobile ad-hoc networks (MANET). It depends on two main procedures: Route Discovery and Route Maintenance. Route discovery is the procedure used at the source of the packets to discover a route to the destination. Route Maintenance is the procedure that discovers link failures and repairs them. Route caching is the sub proc…
▽ More
Dynamic Source Routing (DSR) is an efficient on-demand routing protocol for mobile ad-hoc networks (MANET). It depends on two main procedures: Route Discovery and Route Maintenance. Route discovery is the procedure used at the source of the packets to discover a route to the destination. Route Maintenance is the procedure that discovers link failures and repairs them. Route caching is the sub procedure serviceable to avoid the demand for discovering a route or to reduce route discovery delay before every data packet is sent. The goal of this paper is to evaluate the performance of DSR. Different performance expressions are investigated including, delivery ratio, end to-end delay, and throughput, depending on different cache sizes and different speeds. All of that as a study to develop a new caching strategy as a future work.
△ Less
Submitted 13 December, 2017;
originally announced December 2017.
-
Security Issues in Vehicular Ad Hoc Networks (VANET): a survey
Authors:
Ghassan Samara,
Yousef Al-Raba'nah
Abstract:
Vehicular Ad Hoc Networks (VANET) is a technology that has been recently emerged, and bring a lot of interests. VANET can be used to improve road safety, reduce road traffic, serve interests of its users, and provide emergency services. The security is one of the most important issues in VANET, it is considered a critical point in the development of robust VANET systems. In this paper, a diverse t…
▽ More
Vehicular Ad Hoc Networks (VANET) is a technology that has been recently emerged, and bring a lot of interests. VANET can be used to improve road safety, reduce road traffic, serve interests of its users, and provide emergency services. The security is one of the most important issues in VANET, it is considered a critical point in the development of robust VANET systems. In this paper, a diverse types of security challenges and requirements of VANET will be discussed, and a set of possible solutions for VANET security problems and attacks will be presented and analyzed. Also this paper will propose a new protocol that is called the reply protocol, this protocol aims to protect VANET against several attacks.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Congestion Control Approach based on Effective Random Early Detection and Fuzzy Logic
Authors:
Maimuna Khatari,
Ghassan Samara
Abstract:
Congestion in router buffer increases the delay and packet loss. Active Queue Management (AQM) methods are able to detect congestion in early stage and control it by packet drop**. Effective Random Early Detection (ERED) method, among many other AQM methods, gives a good performance in detect and control congestion and preserve packet loss. However, the ERED neglect the delay factor, which is ef…
▽ More
Congestion in router buffer increases the delay and packet loss. Active Queue Management (AQM) methods are able to detect congestion in early stage and control it by packet drop**. Effective Random Early Detection (ERED) method, among many other AQM methods, gives a good performance in detect and control congestion and preserve packet loss. However, the ERED neglect the delay factor, which is effect the performance of the network. Moreover, ERED has a real parameterization problem. Several parameters have to be initialized to optimal values to obtain satisfactory results. This paper proposed an extended ERED method that considers the delay in its process and combines the extended ERED method with a Fuzzy Inference Process that eases the problem of parameter initialization. The results show that the parametric-based form of the proposed work gives a better performance results, according to the performance measures, delay, drop** and packet loss. The loss has been enhanced by 10-100%. Delay has been enhanced by 30-60%. The performance of the fuzzy-based form of the proposed method is better than the parametric-based form and ERED in terms of delay and packet loss.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Coordinator Location Effects in AODV Routing Protocol in ZigBee Mesh Network
Authors:
Abla Hussein,
Ghassan Samara
Abstract:
ZigBee mesh network is very important research field in computer networks. However, the location of ZigBee coordinator plays a significant role in design and routing performance. In this paper, an extensive study on the factors that influence the performance of AODV routing protocol had been performed through the study of battery voltage decaying of nodes, neighboring tables, time delay and networ…
▽ More
ZigBee mesh network is very important research field in computer networks. However, the location of ZigBee coordinator plays a significant role in design and routing performance. In this paper, an extensive study on the factors that influence the performance of AODV routing protocol had been performed through the study of battery voltage decaying of nodes, neighboring tables, time delay and network topology structure. Simulation results reveal that the location of the coordinator within approximate equal distances to all nodes is more appropriate for lifelong batteries and AODV routing performance.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring
Authors:
Tareq Alhmiedat,
Ghassan Samara
Abstract:
This paper presents a low-cost system architecture that has been proposed for automatically monitoring air quality indoors and continuously in real-time. The designed system is in pilot phase where 4 sensor nodes are deployed in indoor environment, and data over 4 weeks has been collected and performance analysis and assessment are performed. Environmental data from sensor nodes are sent through Z…
▽ More
This paper presents a low-cost system architecture that has been proposed for automatically monitoring air quality indoors and continuously in real-time. The designed system is in pilot phase where 4 sensor nodes are deployed in indoor environment, and data over 4 weeks has been collected and performance analysis and assessment are performed. Environmental data from sensor nodes are sent through ZigBee communication protocol. The proposed system is low in cost, and achieves low power consumption. Hardware and network architecture are presented in addition to real-world deployment.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
A Practical Approach for Detecting Logical Error in Object Oriented Environment
Authors:
Ghassan Samara
Abstract:
A programming language is a formally constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. Most programs that are written by programmers are often compiled correctly with no syntax or semantic errors. However, some other errors appear after…
▽ More
A programming language is a formally constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. Most programs that are written by programmers are often compiled correctly with no syntax or semantic errors. However, some other errors appear after the execution of the program (logical error). Logical Errors (LE) are errors that remain after all syntax errors have been removed. Usually, the compiler does not detect LE, so the produced results are different from what the programmer is expecting. For this reason, discovering and fixing the logical error is very hard and proposes a good topic for research and practice. Some LE are resulted from the misuse of classes' objects, and in Software Development Life Cycle (SDLC), it is considered that the software with LE is low-quality software with high maintenance cost. In this paper, an object-oriented environment that allows the programmer to detect and discover LE to avoid it. This environment will be called Object Behavior Environment (OBEnvironment) will enforce the correct use of objects according to their predefined behaviors by using tools like Xceed Component (that appeal .Net windows form developers for building better applications), Alsing Component (that provides an area to programmer that allows writing correct syntax code by C# language) and, Mind Fusion Component (that provides an area to programmer that allows drawing State Diagrams to show object state).
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Mathematical Modeling and Analysis of ZigBee Node Battery Characteristics and Operation
Authors:
Abla Hussein,
Ghassan Samara
Abstract:
ZigBee network technology has been used widely in different commercial, medical and industrial applications, and the importance of kee** the network operating at a longer time was the main objective of ZigBee manufacturers. In this paper, ZigBee battery characteristics and operation has been researched extensively and a mathematical modeling has been applied on existed practical data provided by…
▽ More
ZigBee network technology has been used widely in different commercial, medical and industrial applications, and the importance of kee** the network operating at a longer time was the main objective of ZigBee manufacturers. In this paper, ZigBee battery characteristics and operation has been researched extensively and a mathematical modeling has been applied on existed practical data provided by Freescale semiconductors Inc [1], and Farnell [2]. As a result a mathematical optimized formula has been established which describes battery characteristic and voltage behavior as a function of time, and since ZigBee node batteries has been the core objective of this research work, a decline in battery voltage below 50% of battery capacity could influence and degrade ZigBee network performance.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Applying Ontological Modeling on Quranic Nature Domain
Authors:
A. B. M. Shamsuzzaman Sadi,
Towfique Anam,
Mohamed Abdirazak,
Abdillahi Hasan Adnan,
Sazid Zaman Khan,
Mohamed Mahmudur Rahman,
Ghassan Samara
Abstract:
The holy Quran is the holy book of the Muslims. It contains information about many domains. Often people search for particular concepts of holy Quran based on the relations among concepts. An ontological modeling of holy Quran can be useful in such a scenario. In this paper, we have modeled nature related concepts of holy Quran using OWL (Web Ontology Language) / RDF (Resource Description Framewor…
▽ More
The holy Quran is the holy book of the Muslims. It contains information about many domains. Often people search for particular concepts of holy Quran based on the relations among concepts. An ontological modeling of holy Quran can be useful in such a scenario. In this paper, we have modeled nature related concepts of holy Quran using OWL (Web Ontology Language) / RDF (Resource Description Framework). Our methodology involves identifying nature related concepts mentioned in holy Quran and identifying relations among those concepts. These concepts and relations are represented as classes/instances and properties of an OWL ontology. Later, in the result section it is shown that, using the Ontological model, SPARQL queries can retrieve verses and concepts of interest. Thus, this modeling helps semantic search and query on the holy Quran. In this work, we have used English translation of the holy Quran by Sahih International, Protege OWL Editor and for querying we have used SPARQL.
△ Less
Submitted 12 April, 2016;
originally announced April 2016.
-
Intelligent Emergency Message Broadcasting in VANET Using PSO
Authors:
Ghassan Samara,
Tareq Alhmiedat
Abstract:
The new type of Mobile Ad hoc Network which is called Vehicular Ad hoc Networks (VANET) created a fertile environment for research. In this research, a protocol Particle Swarm Optimization Contention Based Broadcast (PCBB) is proposed, for fast andeffective dissemination of emergency messages within a geographical area to distribute the emergency message and achieve the safety system, this researc…
▽ More
The new type of Mobile Ad hoc Network which is called Vehicular Ad hoc Networks (VANET) created a fertile environment for research. In this research, a protocol Particle Swarm Optimization Contention Based Broadcast (PCBB) is proposed, for fast andeffective dissemination of emergency messages within a geographical area to distribute the emergency message and achieve the safety system, this research will help the VANET system to achieve its safety goals in intelligent and efficient way.
△ Less
Submitted 28 June, 2014;
originally announced June 2014.
-
Dynamic Safety Message Power Control in VANET Using PSO
Authors:
Ghassan Samara,
Tareq Alhmiedat,
Amer O. Abu Salem
Abstract:
In the recent years Vehicular Ad hoc Networks (VANET) became one of the most challenging research area in the field of Mobile Ad hoc Networks (MANET). Vehicles in VANET send emergency and safety periodic messages through one control channel having a limited bandwidth, which causes a growing collision to the channel especially in dense traffic situations. In this paper a protocol Particle swarm opt…
▽ More
In the recent years Vehicular Ad hoc Networks (VANET) became one of the most challenging research area in the field of Mobile Ad hoc Networks (MANET). Vehicles in VANET send emergency and safety periodic messages through one control channel having a limited bandwidth, which causes a growing collision to the channel especially in dense traffic situations. In this paper a protocol Particle swarm optimization Beacon Power Control (PBPC) is proposed, which makes dynamic transmission power control to adjust the transmission power of the safety periodic messages that have been aggressively sent by all vehicles on the road 10 times per a second, the proposed protocol aims to decrease the packet collision resulted from periodic safety messages, which leads to control the load on the channel while ensuring a high probability of message reception within the safety distance of the sender vehicle.
△ Less
Submitted 21 January, 2014; v1 submitted 10 January, 2014;
originally announced January 2014.
-
Power Control Protocols in VANET
Authors:
Ghassan Samara,
Amer O Abu Salem,
Tareq Alhmiedat
Abstract:
Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated…
▽ More
Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.
△ Less
Submitted 11 November, 2013;
originally announced November 2013.
-
Cache Discovery Policies of MANET
Authors:
Amer O. Abu Salem,
Tareq Alhmiedat,
Ghassan Samara
Abstract:
In situations where establishing a network infrastructure is impossible, Ad-hoc networks are considered particularly important. Most of the previous research in Ad-hoc networks concentrated on the development and enhancement of dynamic routing protocols, which could efficiently discover routes between two communicating nodes. Although routing strategies is an important topic in MANETs, other topic…
▽ More
In situations where establishing a network infrastructure is impossible, Ad-hoc networks are considered particularly important. Most of the previous research in Ad-hoc networks concentrated on the development and enhancement of dynamic routing protocols, which could efficiently discover routes between two communicating nodes. Although routing strategies is an important topic in MANETs, other topics such as data access are also crucial since the final goal of using Ad-hoc networks is to provide data access to mobile nodes. One of the most attractive techniques used to improve the data access performance in MANET environment is cooperative caching; which means multiple caching nodes share and cooperatively manage the cached contents. It is lead the research to important questions, what data should be cached, where, when, and how? A cooperative caching addressed into two basic issues: cache discovery and cache management, in other words, how to find requested data efficiently and how to manage an individual cache to improve the overall capacity of a cooperated cache. In this paper we have made a review of the existing cache discovery algorithms to address four stages after application request and before server response, using an historical file to record the previous data requests, and proposed cluster architecture with data cluster head election to store efficient information for future use and reducing the cost of flooding. In addition, this paper suggests some alternative techniques for cache discovery. Finally, the paper concludes with a discussion on future research directions.
△ Less
Submitted 6 October, 2013;
originally announced October 2013.
-
An Indoor Fingerprinting Localization Approach for ZigBee Wireless Sensor Networks
Authors:
Tareq Alhmiedat,
Ghassan Samara,
Amer O. Abu Salem
Abstract:
Location tracking systems are increasingly becoming the focus of research in the field of Wireless Sensor Network (WSN). Received Signal Strength (RSS)-based localization systems are at the forefront of tracking research applications. Radio location fingerprinting is one of the most promising indoor positioning approaches due to its powerful in terms of accuracy and cost. However, fingerprinting s…
▽ More
Location tracking systems are increasingly becoming the focus of research in the field of Wireless Sensor Network (WSN). Received Signal Strength (RSS)-based localization systems are at the forefront of tracking research applications. Radio location fingerprinting is one of the most promising indoor positioning approaches due to its powerful in terms of accuracy and cost. However, fingerprinting systems require the collection of a large number of reference points in the tracking area to achieve reasonable localization accuracy. In this paper, we propose a fingerprinting localization approach based on a RSS technique. The proposed system does not require gathering a large number of reference points and offers good localization accuracy indoors. The implemented approach is based on dividing the tracking area into subareas and assigning a unique feature to each subarea through ranging the RSS values from different reference points. In order to test the proposed system's efficiency, a number of real experiments have been conducted using Jennic sensor nodes.
△ Less
Submitted 8 August, 2013;
originally announced August 2013.
-
Increasing Network Visibility Using Coded Repetition Beacon Piggybacking
Authors:
Ghassan Samara
Abstract:
Vehicular Ad hoc Networks (VANET) is one of the most challenging research areas in the field of Mobile Ad Hoc Networks. In this research, we propose a new mechanism for increasing network visibility, by taking the information gained from periodic safety messages (beacons), and inserting it into a 'neighbor' table. The table will be propagated to all neighbors giving a wider vision for each vehicle…
▽ More
Vehicular Ad hoc Networks (VANET) is one of the most challenging research areas in the field of Mobile Ad Hoc Networks. In this research, we propose a new mechanism for increasing network visibility, by taking the information gained from periodic safety messages (beacons), and inserting it into a 'neighbor' table. The table will be propagated to all neighbors giving a wider vision for each vehicle belonging to the network. It will also decrease the risk of collision at road junctions as each vehicle will have prior knowledge oncoming vehicles before reaching the junction.
△ Less
Submitted 30 January, 2013;
originally announced January 2013.
-
A New Security Mechanism for Vehicular Communication Networks
Authors:
Ghassan Samara
Abstract:
Vehicular communication networks is a promising and emerging technology to facilitat road safety, Safety of life, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this research new security mechanisms are proposed to achieve secure certificate revo…
▽ More
Vehicular communication networks is a promising and emerging technology to facilitat road safety, Safety of life, traffic management, and infotainment dissemination for drivers and passengers. One of the ultimate goals in the design of such networking is to resist various malicious abuses and security attacks. In this research new security mechanisms are proposed to achieve secure certificate revocation, which is considered among the most challenging design objective in vehicular ad hoc networks.
△ Less
Submitted 4 July, 2012;
originally announced July 2012.
-
Security Analysis of Vehicular Ad Hoc Networks (VANET)
Authors:
Ghassan Samara
Abstract:
Vehicular Ad Hoc Networks (VANET) has mostly gained the attention of today's research efforts, while current solutions to achieve secure VANET, to protect the network from adversary and attacks still not enough, trying to reach a satisfactory level, for the driver and manufacturer to achieve safety of life and infotainment. The need for a robust VANET networks is strongly dependent on their securi…
▽ More
Vehicular Ad Hoc Networks (VANET) has mostly gained the attention of today's research efforts, while current solutions to achieve secure VANET, to protect the network from adversary and attacks still not enough, trying to reach a satisfactory level, for the driver and manufacturer to achieve safety of life and infotainment. The need for a robust VANET networks is strongly dependent on their security and privacy features, which will be discussed in this paper. In this paper a various types of security problems and challenges of VANET been analyzed and discussed; we also discuss a set of solutions presented to solve these challenges and problems.
△ Less
Submitted 6 June, 2012;
originally announced June 2012.
-
Efficient Certificate Management in VANET
Authors:
Ghassan Samara
Abstract:
Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research We propose a flexible, simple, and scalable design for VANET certificates, and new methods for efficient certificate management, which will Reduce channel overhead by eliminating the use of CRL, and make Better certificate Revocation Management. Also it will increase the…
▽ More
Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research We propose a flexible, simple, and scalable design for VANET certificates, and new methods for efficient certificate management, which will Reduce channel overhead by eliminating the use of CRL, and make Better certificate Revocation Management. Also it will increase the security of the network and helps in identifying the adversary vehicle.
△ Less
Submitted 1 June, 2012;
originally announced June 2012.
-
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
Authors:
Ghassan Samara,
Sureswaran Ramadas,
Wafaa A. H. Al-Salihy
Abstract:
Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. In this research we proposed a dynamic power adjustment protocol that will be used for sending the periodical safety message. (Beacon)based on the analysis of the channel status depending on the channel congestion and the power used for transmission. The Beacon Power Control (BPC)…
▽ More
Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. In this research we proposed a dynamic power adjustment protocol that will be used for sending the periodical safety message. (Beacon)based on the analysis of the channel status depending on the channel congestion and the power used for transmission. The Beacon Power Control (BPC) protocol first sensed and examined the percentage of the channel congestion, the result obtained was used to adjust the transmission power for the safety message to reach the optimal power. This will lead to decrease the congestion in the channel and achieve good channel performance and beacon dissemination.
△ Less
Submitted 18 July, 2010;
originally announced July 2010.
-
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's
Authors:
Ghassan Samara,
Sureswaran Ramadas,
Wafaa A. H. Al-Salihy
Abstract:
Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research we propose a flexible, simple, and scalable design for revocation list distribution in VANET, which will reduce channel overhead and eliminate the use of CRL. Also it will increase the security of the network and helps in identifying the adversary vehicles.
Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research we propose a flexible, simple, and scalable design for revocation list distribution in VANET, which will reduce channel overhead and eliminate the use of CRL. Also it will increase the security of the network and helps in identifying the adversary vehicles.
△ Less
Submitted 26 June, 2010;
originally announced June 2010.
-
The effect of local dipole moments on the structure and lattice dynamics of K0.98Li0.02TaO3
Authors:
**sheng Wen,
Guangyong Xu,
C. Stock,
P. M. Gehring,
Z. Zhong,
L. A. Boatner,
E. L. Venturini,
G. A. Samara
Abstract:
We present high energy x-ray (67 keV) and neutron scattering measurements on a single crystal of K$_{1-x}$Li$_x$TaO$_3$ for which the Li content ($x=0.02$) is less than $x_c = 0.022$, the critical value below which no structural phase transitions have been reported in zero field. While the crystal lattice does remain cubic down to T=10 K under both zero-field and field-cooled ($E \le 4$ kV/cm) c…
▽ More
We present high energy x-ray (67 keV) and neutron scattering measurements on a single crystal of K$_{1-x}$Li$_x$TaO$_3$ for which the Li content ($x=0.02$) is less than $x_c = 0.022$, the critical value below which no structural phase transitions have been reported in zero field. While the crystal lattice does remain cubic down to T=10 K under both zero-field and field-cooled ($E \le 4$ kV/cm) conditions, indications of crystal symmetry lowering are seen at $T_C=63$ K where the Bragg peak intensity changes significantly. A strong and frequency-dependent dielectric permittivity is observed at ambient pressure, a defining characteristic of relaxors. However an extensive search for static polar nanoregions, which is also widely associated with relaxor materials, detected no evidence of elastic neutron diffuse scattering between 300 K and 10 K. Neutron inelastic scattering methods were used to characterize the transverse acoustic and optic phonons (TA1 and TO1 modes) near the (200) and (002) Bragg peaks. The zone center TO1 mode softens monotonically with cooling but never reaches zero energy in either zero field or in external electric fields of up to 4 kV/cm. These results are consistent with the behavior expected for a dipolar glass in which the local polar moments are frozen and exhibit no long-range order at low temperatures.
△ Less
Submitted 9 October, 2008; v1 submitted 30 June, 2008;
originally announced June 2008.
-
Dielectric properties and lattice dynamics of Ca-doped K$_{0.95}$Li$_{0.05}$TaO$_{3}$
Authors:
S. Wakimoto,
G. A. Samara,
R. K. Grubbs,
E. L. Venturini,
L. A. Boatner,
G. Xu,
G. Shirane,
S. -H. Lee
Abstract:
Relaxor behavior and lattice dynamics have been studied for a single crystal of K$_{1-x}$Li$_x$TaO$_3$ $(x=0.05)$, where a small amount of a Ca impurity ($\sim 15$~ppm) was incorporated. The dielectric measurements revealed Debye-like relaxations with Arrhenius activation energies of 80 and 240 meV that are assigned to Li$^+$ dipoles and the Li$^+$-Li$^+$ dipolar pairs, respectively. In the neut…
▽ More
Relaxor behavior and lattice dynamics have been studied for a single crystal of K$_{1-x}$Li$_x$TaO$_3$ $(x=0.05)$, where a small amount of a Ca impurity ($\sim 15$~ppm) was incorporated. The dielectric measurements revealed Debye-like relaxations with Arrhenius activation energies of 80 and 240 meV that are assigned to Li$^+$ dipoles and the Li$^+$-Li$^+$ dipolar pairs, respectively. In the neutron scattering results, diffuse scattering ridges appear around the nuclear Bragg peaks below $\sim 150$ K and phonon line broadening features start to appear at even higher temperatures suggesting that polar nano-regions (PNR's) start to form at these temperatures. These results are supported by the dielectric data that reveal relaxor behavior starting at $\sim 200$ K on cooling. From analyses of the diffuse intensities, the displacements include a uniform phase shift of all of the atoms in addition to the atomic displacements corresponding to a polarization vector of the transverse optic soft ferroelectric mode, a finding that is analogous to that in the prototypical relaxor material Pb(Mg$_{1/3}$Nb$_{2/3}$)O$_3$.
△ Less
Submitted 3 August, 2006;
originally announced August 2006.