2019 International Conference on Promising Electronic Technologies (ICPET)
This paper reports on the basic findings and future perspectives of a capacity building project f... more This paper reports on the basic findings and future perspectives of a capacity building project funded by the European Union. The International Master of Science on Cyber Physical Systems (MS@CPS) is a collaborative project that aims to establish a master program in cyber physical systems (CPS). A consortium composed of nine partners proposed the project. Three partners are European and from Germany, UK and Sweden; while the other six partners are from the South Mediterranean region and include: Palestine, Jordan and Tunisia. The consortium is led by the University of Siegen in Germany who also manages the implementation of the work packages. CPS is an emerging engineering subject with significant economic and societal implications, which motivated the consortium to propose the establishment of a master program to offer educational and training opportunities at graduate level in the fields of CPS. In this paper, CPS as a field of study is introduced with an emphasis on its importance, especially with regard to meeting local needs. A brief description of the project is presented in conjunction with the methodology for developing the courses and their learning outcomes.
Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and endin... more Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an "Abstract User Interface" using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.
Service Identification Framework for Systems of Systems Based on MPLS Technology
Advances in Computer Science and Ubiquitous Computing
Systems of Systems (SoS) are collections of autonomous systems that share their resources in orde... more Systems of Systems (SoS) are collections of autonomous systems that share their resources in order to form a new larger system with more capabilities and enhanced performance. A fundamental challenge of service identification in SoS arises when constituent systems are dynamically composed. This paper proposes a new framework for SoS service identification and allocation based on MPLS technology.
— MPLS security is an evolving issue which has been raised by many researchers and service provid... more — MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services such as encryption. Therefore, MPLS does not protect the confidentiality of data transmitted. This paper provides a mechanism to enhance the security in MPLS networks by proposing a modified (k, n) Threshold Secret Sharing scheme where the n shares obtained are send over multiple disjoint paths. We have implemented our approach to measure its time overhead on packet transmission.
2016 7th International Conference on Intelligent Systems, Modelling and Simulation (ISMS)
The need of processing medical data services is rapidly growing. However, the current local data ... more The need of processing medical data services is rapidly growing. However, the current local data health centers and systems have a shortage to manage this data proliferation and users' needs. Mobile applications can work in dynamic wireless networks that cover wide geographical areas, thus it can enhance the medical data services. In this paper, we design a mobile application method that supports e-health data services, performs remote data transactions and determines patient's location and the nearby health centers. This approach is built on interface components, cloud virtual machines, and e-health databases. The main contribution of this paper is building an integrated e-health data services from independent mobile and wireless devices. This will facilitate the development of large number of different mobile e-health applications and facilitate the application's maintaining processes.
The need for effective approaches to handle big data that is characterized by its large volume, d... more The need for effective approaches to handle big data that is characterized by its large volume, different types, and high velocity is vital and hence has recently attracted the attention of several research groups. This is especially the case when traditional data processing techniques and capabilities proved to be insufficient in that regard. Another aspect that is equally important while processing big data is its security, as emphasized in this paper. Accordingly, we propose to process big data in two different tiers. The first tier classifies the data based on its structure and on whether security is required or not. In contrast, the second tier analyzes and processes the data based on volume, variety, and velocity factors. Simulation results demonstrated that using classification feedback from a MPLS/GMPLS core network proved to be key in reducing the data evaluation and processing time.
Service Identification Framework for Systems of Systems Based on MPLS Technology
Systems of Systems (SoS) are collections of autonomous systems that share their resources in orde... more Systems of Systems (SoS) are collections of autonomous systems that share their resources in order to form a new larger system with more capabilities and enhanced performance. A fundamental challenge of service identification in SoS arises when constituent systems are dynamically composed. This paper proposes a new framework for SoS service identification and allocation based on MPLS technology.
Optimization of Migration Cost for Network Function Virtualization Replacement
2020 21st International Arab Conference on Information Technology (ACIT)
Today's networks are concerned about making the control of communication flexible and improvi... more Today's networks are concerned about making the control of communication flexible and improving the existing management systems in such a manner that reduces the Capital expenditures (CAPEX) and operating expenses (OPEX), through reducing equipment costs and energy efficiency. Along with the benefits of decreasing the time to promote new services to the clients, service providers' attention has gradually moved to Network Function Virtualization (NFV), which is a potential technology decoupling network functionalities from hardware and is a promise of high performance service provision with optimizing resource utilization across various infrastructures. However, to simultaneously achieve these goals, sometimes it is necessary to instantiate a new function depending on the traffic pattern of high-bandwidth characteristics and Quality of Service (QoS) measures. Due to the limited resources at the node, other functions in the node may need to be migrated to other nodes in order to provide resources for the new functions. Existing works related to the Virtual Network Function (VNF) deployment and migration usually focus on proposing new deployment strategies and migration mechanisms. However, reducing migration cost restricted to memory, CPU, and bandwidth capacities is not considered in those studies. In this work, the problem of virtual network functions migration is formulated as an Integer Linear Program (ILP) with the objective of minimizing the migration cost while satisfying computing and network resource capacities constraints and selecting the minimum cost path from the source to the destination node. Since the ILP is NP-complete, we propose a greedy minimum migration cost (GMMC) algorithm. Simulation results show that the proposed GMMC algorithm can reduce the total migration cost by up to 61% and the number of migrations by up to 52% when compared to the state-of-the-art schemes.
Optimization of Migration Cost for Network Function Virtualization Replacement
2020 21st International Arab Conference on Information Technology (ACIT), 2020
Today's networks are concerned about making the control of communication flexible and improvi... more Today's networks are concerned about making the control of communication flexible and improving the existing management systems in such a manner that reduces the Capital expenditures (CAPEX) and operating expenses (OPEX), through reducing equipment costs and energy efficiency. Along with the benefits of decreasing the time to promote new services to the clients, service providers' attention has gradually moved to Network Function Virtualization (NFV), which is a potential technology decoupling network functionalities from hardware and is a promise of high performance service provision with optimizing resource utilization across various infrastructures. However, to simultaneously achieve these goals, sometimes it is necessary to instantiate a new function depending on the traffic pattern of high-bandwidth characteristics and Quality of Service (QoS) measures. Due to the limited resources at the node, other functions in the node may need to be migrated to other nodes in order ...
The need of processing medical data services is rapidly growing. However, the current local data ... more The need of processing medical data services is rapidly growing. However, the current local data health centers and systems have a shortage to manage this data proliferation and users' needs. Mobile applications can work in dynamic wireless networks that cover wide geographical areas, thus it can enhance the medical data services. In this paper, we design a mobile application method that supports e-health data services, performs remote data transactions and determines patient's location and the nearby health centers. This approach is built on interface components, cloud virtual machines, and e-health databases. The main contribution of this paper is building an integrated e-health data services from independent mobile and wireless devices. This will facilitate the development of large number of different mobile e-health applications and facilitate the application's maintaining processes.
A Cost Effective Information Display System Based on Open Source Technologies
2017 International Conference on New Trends in Computing Sciences (ICTCS)
The design and development of an information display system are discussed in this paper. This sys... more The design and development of an information display system are discussed in this paper. This system is used to display dynamic content (e.g., announcements, news, slideshows, and other information) on HD TV screens that are distributed across the university campus. The low cost and small size raspberry pi devices running a Linux-based OS are utilized to open a dynamic web page in web browsers and then transfer the views to the corresponding screens for display. To cut costs further, the management software to update the displayed content is developed in-house and deployed using free open source software technologies such as the Apache server, PHP engine, and MySQL database management system. Furthermore, users may interactively scan a QR code on a screen using a reader running on their smartphones to easily access the offered services.
With the ever increasing demand for higher speed internet connectivity that can fulfil the applic... more With the ever increasing demand for higher speed internet connectivity that can fulfil the application continuous need for higher bandwidth Google being the pioneer in many web-based services has launched a new UDP-based protocol named quick UDP internet connections (QUIC), which aims at providing faster data delivery without requiring upgrades or modifications to the network infrastructure. The goal of this paper is to provide an overview about QUIC protocol, propose the design and implementation of a test-bed, that is used experimentally to evaluate QUIC protocol under different network conditions and scenarios. In particular, the performance advantage of QUIC in terms of delay and throughput are examined taking into account different network conditions that resemble the real internet environment. Two scenarios are proposed, the first one investigates the protocol performance under a controlled network environment, while the second one tests the protocol in a real uncontrolled net...
Incremental, Distributed, and Concurrent Service Coordination for Reliable and Deterministic Systems-of-Systems
IEEE Systems Journal
Systems-of-systems (SoS) are gaining increasing attention for the realization of safety-relevant ... more Systems-of-systems (SoS) are gaining increasing attention for the realization of safety-relevant applications with reliability and real-time requirements, by coordinating autonomous constituent systems from different application areas. For a given application that is initiated at a constituent system, the provision and use of services between constituent systems must be coordinated. This involves identifying constituent systems that can provide the services, optimizing the use of the services driven by extra-functional properties, performing admission control for service provision, reserving resources for provided services, and recursively using services from subcontracted constituent systems to realize service provisions. In this article, new conceptual models with service provisioning for reliable and deterministic SoS applications, as well as, distributed algorithms for the discovery, optimized selection, and admission of service provisions are introduced. The proposed models will result in a two-step admission control algorithm with short- and long-term admissions based on schedulabiliy tests, resulting in service provisions between constituent systems. Furthermore, this article will investigate the integration of cloud resources for the on-demand instantiation of services. The models and the service coordination are evaluated in a use case from the health-care domain, which investigates the execution time and the scalability of the service coordination.
The need for effective approaches to handle big data that is characterized by its large volume, d... more The need for effective approaches to handle big data that is characterized by its large volume, different types, and high velocity is vital and hence has recently attracted the attention of several research groups. This is especially the case when traditional data processing techniques and capabilities proved to be insufficient in that regard. Another aspect that is equally important while processing big data is its security, as emphasized in this paper. Accordingly, we propose to process big data in two different tiers. The first tier classifies the data based on its structure and on whether security is required or not. In contrast, the second tier analyzes and processes the data based on volume, variety, and velocity factors. Simulation results demonstrated that using classification feedback from a MPLS/GMPLS core network proved to be key in reducing the data evaluation and processing time.
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers
Future Generation Computer Systems
With the rapidly increasing number of cloud-based services, selecting a service provider is becom... more With the rapidly increasing number of cloud-based services, selecting a service provider is becoming more and more difficult. Among the many factors to be considered, trust in a given service and in a service provider is often critical. Appraisal of trust is a complex process, information about the offered service's quality needs to be collected from a number of sources, while user requirements may place different emphasis on the various quality indicators. Several frameworks have been proposed to facilitate service provider selection, however, only very few of them are built on existing cloud standards, and adaptability to different contexts is still a challenge. This paper proposes a new trust framework, called Context-Aware Multifaceted Trust Framework (CAMFT), to assist in evaluating trust in cloud service providers. CAMTF is flexible and context aware: it considers trust factors, users and services. When making recommendations, CAMFT employs a combination of mathematical methods that depend on the type of trust factors, and it takes both service characteristics and user perspective into account. A case study is also presented to demonstrate CAMFT's applicability to practical cases.
A practical three-phase ILP approach for solving the examination timetabling problem
International Transactions in Operational Research
A practical mathematical programming based approach is introduced for solving the examination tim... more A practical mathematical programming based approach is introduced for solving the examination timetabling problem at the German Jordanian University (GJU), whereby the complex process of acquiring a feasible examination timetable is simplified by subdividing it into three smaller sub-problems (phases). Accordingly, the exams are initially allocated to time slots in phase one, the time slots are then allotted to days in phase two, and finally in phase three the exams are assigned to rooms based on the number of students taking each exam and capacities of the rooms. The solution for each phase is acquired based on an integer linear programming (ILP) formulation, while satisfying a set of hard constraints that ensure comfortable exam timetables for all students and meet the desired requirements set by GJU administrative staff. Furthermore, the solver can be controlled and launched from a student information system named MyGJU Admin, which enabled registrars at the university to easily, quickly, and accurately generate final exam timetables in several standard formats. Moreover, the approach was validated based on recent GJU registration information as well as real-world benchmark data.
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
Artificial Intelligence Review
Boolean satisfiability (SAT) has been studied for the last twenty years. Advances have been made ... more Boolean satisfiability (SAT) has been studied for the last twenty years. Advances have been made allowing SAT solvers to be used in many applications including formal verification of digital designs. However, performance and capacity of SAT solvers are still limited. From the practical side, many of the existing applications based on SAT solvers use them as blackboxes in which the problem is translated into a monolithic conjunctive normal form instance and then throw it to the SAT solver with no interaction between the application and the SAT solver. This paper presents a comprehensive study and analysis of the latest developments in SAT-solver and new approaches that used in branching heuristics, Boolean constraint propagation and conflict analysis techniques during the last two decade. In addition, the paper provides the most effective techniques in using SAT solvers as verification techniques, mainly model checkers, to enhance the SAT solver performance, efficiency and productivity. Moreover, the paper presents the remarkable accomplishments and the main challenges facing SAT-solver techniques and contrasts between different techniques according to their efficiency, algorithms, usage and feasibility.
The purpose of this study is to report on the industry’s perspectives and opinions on cross-platf... more The purpose of this study is to report on the industry’s perspectives and opinions on cross-platform mobile development, with an emphasis on the popularity, adoption, and arising issues related to the use of technical development frameworks and tools. We designed and conducted an online survey questionnaire, for which 101 participants were recruited from various developer-oriented online forums and websites. A total of five questions are reported in this study, of which two employed a Likert scale instrument, while three were based on multiple choice. In terms of technical frameworks, we find that PhoneGap, the Ionic Framework, and React Native were the most popular in use, both in hobby projects and in professional settings. The participants report an awareness of trade-offs when embracing cross-platform technologies and consider penalties in performance and user experience to be expected. This is also in line with what is reported in academic research. We find patterns in the repo...
The early days of voice over IP (VoIP) adoption were characterized by a lack of concern and aware... more The early days of voice over IP (VoIP) adoption were characterized by a lack of concern and awareness about security issues related to its use. Indeed, service providers and users were mostly preoccupied with issues related to its quality, functionality, and cost. Now that VoIP is a mainstream communication technology, security has become a major issue. This paper investigates the major security threats for VoIP communications and proposes a multipath approach solution, especially targeted for low bandwidth networks. Results show that security has an effect on VoIP quality especially for a large distance between communicating nodes and packet size. Results also show that our proposed multipath solution reduces significantly packet losses and performs better than single routing techniques in networks with low bandwidth capacities.
Uploads
Papers by sahel alouneh