كتابة النص: الأستاذ الدكتور يوسف أبو العدوس - جامعة جرش قراءة النص: الدكتور أحمد أبو دلو - جامعة اليرموك مونتاج وإخراج : الدكتور محمد أبوشقير، حمزة الناطور، علي ميّاس تصوير : الأستاذ أحمد الصمادي الإشراف العام: الأستاذ الدكتور يوسف أبو العدوس
فيديو بمناسبة الإسراء والمعراج - إحتفال كلية الشريعة بجامعة جرش 2019 - 1440
فيديو بمناسبة ذكرى المولد النبوي الشريف- مونتاج وإخراج الدكتور محمد أبوشقير- كلية تكنولوجيا المعلومات
التميز في مجالات التعليم والبحث العلمي، وخدمة المجتمع، والارتقاء لمصاف الجامعات المرموقة محليا واقليميا وعالميا.
المساهمة في بناء مجتمع المعرفة وتطوره من خلال إيجاد بيئة جامعية، وشراكة مجتمعية محفزة للابداع، وحرية الفكر والتعبير، ومواكبة التطورات التقنية في مجال التعليم، ومن ثم رفد المجتمع بما يحتاجه من موارد بشرية مؤهلة وملائمة لاحتياجات سوق العمل.
تلتزم الجامعة بترسيخ القيم الجوهرية التالية: الإلتزام الإجتماعي والأخلاقي، الإنتماء،العدالة والمساواة، الإبداع، الجودة والتميّز، الشفافية والمحاسبة، الحرية المنظبطة والمستقبلية.
Mahmoud Ali Al Shugran is assistant professor at the Department of computer science/networking in the Faculty of Computer Science and Information Technology, Jerash University
Mahmoud's research focuses on Wireless and Mobile Networks, routing protocols design, Internet of Things. Mahmoud is the author of several articles and coauthor of other articles in the area of interest. He is currently working in designing a new position-based routing protocol for VANET
Mahmoud obtained his Ph.D. degree from UUM (Universiti Utara Malaysia) in 2014. He has more than 7 years of experience in teaching and researching, in the field of networking. Prior coming to Jerash university, Mahmoud was member of Inter-Networks Research Group, College of Arts and Sciences, Universiti Utara Malaysia, Malaysia. Further, he was member of 3ed International Conference On Network Application, Protocols & Services (NetAPPS 2012)
Ph.D. College of Arts and Sciences, School of Computing, University Utara Malaysia, Malaysia, 2009-2014
M.S. College of Arts and Sciences, School of Computing, University Utara Malaysia, Malaysia, 2008-2009
B.Sc. Physics Department, The College of Science, Mu’tah University, 1984-1989
-present-Jerash Universityا-3/2015
Assistant Professor, Faculty of Computer Science and Information Technology
Lecturer– Faculty of Computer Science and Information Technology
-present-Universiti Utara Malaysia -UUMا-12/2009
Adjunct Researcher with Universiti Utara Malaysia (UUM) – InterNetWorks Research Lab, School of Computing, Universiti Utara Malays
03/30/2016
Mobile Ad-hoc Network (MANET) is characterized by high mobility and very limited resources. Such a network requires a very high reliable routing protocol to be compatible with its limitations. In position-based routing protocols for MANET, each node chooses the next relay node for packet routing solely from the neighborhood stored in its neighbor matrix (NLM). The lifetime of neighbors’ entry in NLM matrix relates to beacon interval and timeout interval. Inaccurate information of the NLM matrix may lead to a wrong selection decision, which can have devastating consequences on MANET resources. Thus, the freshness of the information in a node’s NLM matrix is in high demand. This paper presents an intelligent dynamic fuzzy logic controller refreshment period of entries in neighborhood matrices ( IFPE) scheme. The IFPE algorithm utilizes the neighbor’s Residual Lifetime of Links (RLT) in the fuzzy logic controller as an input, and the called neighbour expires entry lifetime (ELT) as an output. Simulation results show that the IFPE algorithm keeps neighbourhood matrices consistent, which achieve considerable improvement for position-basedrouting protocols performance.
Current greedy routing protocol (GFS) designed to find shortest path as a single routing objective. Considering only one routing objective is insufficient for the computation of a reliable rout, and can severely compromise network performance on the remaining overlooked objectives. This paper introduces the Dynamic and Reactive Reliability Estimation with Selective Metrics Mechanism (DRESM). The intended DRESM is constructed of two coherent techniques; the Fuzzy Logic Dynamic Nodes’ Reliability Estimation (FLDRE) and the Status Information Distribution and Outgoing Traffic Control Management (IDOTM). FLDRE introduce the notion of multi-criteria next relay node selection using fuzzy weighted logic multi-objectives. IDOTM provides the sender node with fresh information about its neighbour and control the outgoing traffic. The simulation results show that DRESM outperforms GFS in terms of packet delivery ratio, average end-to-end delay. Moreover, DRESM can find routs whose cost is close to the optimum.
A Vehicular Ad hoc Network (VANET) is a distinctive situation of wireless ad hoc networks. The designing of the routing protocol considers a critical role in communication in VANET. VANET has specific features compared to other types of wireless ad hoc networks that impose special characteristics for designing efficient routing protocols. The challenging factor in designing efficient routing protocols for VANET is the high movement of vehicles that incurs a rapid change in the network topology that causes frequent link breakage. This paper presents and evaluates different position-based routing protocols associated with VANETs. The evaluation aiming to determine appropriate specifications for optimal routing protocols’ features achieving best performance within different environmental conditions. The performance comparison is carried out in terms of Packet Delivery Rate (PDR), Void Problem Occurrence Rate (VPOR), and Average Hops Count (AHC).
A Vehicular ad hoc network (VANET) is a sort of wireless ad hoc network which are used to provide communications between nodes. The frequent topology change is considered a unique feature of VANET nature due to the high movement of its participating vehicles. Thus, the design of a routing protocol that could cope with VANET characteristics is very challenging. Position-based routing protocols are the most suitable approaches for VANET. In this paper researcher broadly discussed Beacon-based Non-Delay Tolerant Geographical-based routing protocols for VANET. The main concern is to discuss the characteristics disadvantages of those protocols. Finally, several research directions relevant to the focus of this survey are identified that define preferred features of the appropriate routing protocol that can cope with VANET challenges.
Quality assurance is one major concern for the faculty of Computer Science and Information Technology (FCSIT) at Jerash University. It involves eight standards including the strategic planning. SWOT analysis is a method meant for assisting the formulation of strategy and planning. An application to strategic planning process formulation for the FCSIT is described. This research studies the SWOT analysis with a major concern of drawing more conclusions using machine learning methods. Data mining is a subfield of machine learning, which focuses on exploratory data analysis using supervised or unsupervised learning. Data mining techniques help fetching required knowledge from raw data to make decisions more confidently interpreted and automated. In this study, regression, classification, clustering, association rules, attributes selection techniques are used to mine data from the SWOT analysis. Using Weka workbench, results of each technique is obtained and interpreted with the favor of the factors that have impact on the success of the strategic plan. The outcome presents a high level of satisfaction regarding employee, and a vibrant level of satisfaction regarding students. Therefore, the developed quality assurance framework is stable but needs more improvements to overcome the dissatisfaction of many students regarding services, supervision, awards and activities.
Vehicular Ad hoc Networks (VANETs) is new sort in wireless ad-hoc networks. Vehicle-to-Vehicle (V2V) communication is one of the main communication paradigms that provide a level of safety and convenience to drivers and passengers on the road. In such environment, routing data packet is challenging due to frequently changed of network topology because of highly dynamic nature of vehicles. Thus, routing in VANETs in require for efficient protocols that guarantee message transmission among vehicles. Numerous routing protocols and algorithms have been proposed or enhanced to solve the aforementioned problems. Many position based routing protocols have been developed for routing messages that have been identified to be appropriate for VANETs. This work explores the performances of selected unicast non-delay tolerant overlay position-based routing protocols. The evaluation has been conducted in highway and urban environment in two different scenarios. The evaluation metrics that are used are Packet Delivery Ratio (PDR), Void Problem Occurrence (VPO), and Average Hop Count (AHC).
The diversity and quality of high-quality and diverse-solution external memory of the hybrid Elitist-Ant System is examined in this study. The Elitist-Ant System incorporates an external memory for preserving search diversity while exploiting the solution space. Using this procedure, the effectiveness and efficiency of the search may be guaranteed which could consequently improve the performance of the algorithm and it could be well generalized across diverse problems of combinatorial optimization. The generality of this algorithm through its consistency and efficiency is tested using a Nurse-Rostering Problem. The outcomes demonstrate the competitiveness of the hybrid Elitist-Ant System’s performance within numerous datasets as opposed to those by other systems. The effectiveness of the external memory usage in search diversification is evidenced in this work. Subsequently, such usage improves the performance of the hybrid Elitist-Ant System over diverse datasets and problems.
Mobile Ad-hoc Network (MANET) is the guiding technology of the ubiquitous era and a cornerstone in the 4G communication architecture. MANET has limited resources and is characterized by high mobility and frequent topology change. Routing in MANET should follow these constraints, otherwise, it can severely degrade the performance of MANET. Owing to the Greedy routing (GFS) nature in MANET, a certain part of the MANET becomes congested before other parts. In such areas, the nodes have failed to forward packets in a timely manner or drop them, thus such nodes are called Network Holes. This paper presents a simple and efficient enhanced GFS routing algorithm called Intelligent Fuzzy logic Greedy forwarding Scheme (IFGFS). IFGFS considers the De-congestion level of each mobile node as another selective metric besides distance. In order to validate our algorithm, we rely on wide simulation experiments. The evaluation results showed the correctness of our new proposed algorithm the adaptive- congestion IFGFS which maximize the performance of the network
Mobile Ad hoc Networks (MANETs) are considered as a reunion of wireless mobile devices (nodes) that form a temporary wireless network. In order to facilitate communication in MANET, every node has to participate in the routing process. Reaching an optimal route is a fundamental task in MANET, because routes are multi-hoped and susceptible. Several routing protocols exist and can be categorized into; topology-based and position-based routing protocols. However, the efficiency of these protocols in highly dynamic and dense environments is a challenging task to be considered for increasing perceived Quality of Service (QoS) in MANET. This paper focuses on the presentation and basic operation of each category. A performance evaluation study was conducted comparing both categories in terms of End-to-End delay, packet delivery ratio, and routing overhead. Results analysis show that position-based protocols outperform topology-based protocols in dense and high dynamic environments. Recommendations for implementing future efficient position-based protocols were presented.
A Mobile Ad hoc network (MANET) is a dynamic self-organizing multi-hop wireless network. Owing the random and unpredictable movement of the mobile nodes, the topology is changing rapidly and frequently. In MANET, where is no routing infrastructure like fixed routers and routing backbones, all MNs participate in the routing process. Recently, position-aware routing protocols, and because of their simplicity, position awareness, and scalability, are the most routing protocols used with MANET. In recent years, a variety of position-aware routing protocols have been developed. The efficiency of such protocol affects by the used underlying mobility model. Thus, wrong selection of the Mobility model may has devastating consequences on the performance MANET. Research efforts haven't focused much in evaluating their performance when applied to different mobility models. In this paper, we have studied the effect of two different mobility models; Random Waypoint mobility model (RWP) and Boundless Mobility Model (BDM) on the performance of selected group of position-based routing protocols. The performance analysis was carried out by using the network simulator, Ns2. The simulation results clarify the performance of the selected routing protocols with three performance metrics.
Al-Shugran, Mahmoud, Osman Ghazali, and Shoaib Hassan. "Performance Comparison of Position-Based Routing Protocols in the Context of Solving Greedy Failure." In Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, pp. 355-359. IEEE, 2012
Al-Shugran, Mahmoud, Osman Ghazali, and Shoaib Hassan. "A General Framework for Greedy Routing in Mobile Ad-hoc Networks." In Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, pp. 349-354. IEEE, 2012
M. A. Al-shugran, M. M. A. Shqier and G. M. Jaradat, "Adaptive Dynamic Update for Greedy Routing Protocol Using Fuzzy Logic Controller and Mobility Prediction," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, 2018, pp. 0852-0857.
27/05/2021
Building
Day
Time
courses
EN-611
Sunday/Monday
9:00 - 8:00
Wireless Networks
Networks Adminstration
10:00 - 9:00
Network Forensics
Networks Protocols
All Rights Reseved © 2023 - Developed by: Prof. Mohammed M. Abu Shquier Editor: Ali Mayyas