This page has only limited features, please log in for full access.
Despite the fact that several studies have been conducted to study the adoption of smart-government services, little consideration has been paid to exploring the main factors that influence the adoption of smart-government services at the three main stages of smart-government services (the static, interaction, and transaction stages). Based on the results of this study, each of these three stages has different requirements in terms of system compatibility, security, information quality, awareness, perceived functional benefit, self-efficacy, perceived image, perceived uncertainty, availability of resources, and perceived trust. In addition, the results demonstrate that the requirements and perceptions of users towards the adoption and use of smart-government services in the three stages significantly differ. This study makes a unique contribution to the existing research by examining the perceptions and needs of consumers, in terms of adoption throughout the three stages.
Ahmad Althunibat; Muhammad Binsawad; Mohammed Almaiah; Omar Almomani; Adeeb Alsaaidah; Waleed Al-Rahmi; Mohamed Seliaman. Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability 2021, 13, 3028 .
AMA StyleAhmad Althunibat, Muhammad Binsawad, Mohammed Almaiah, Omar Almomani, Adeeb Alsaaidah, Waleed Al-Rahmi, Mohamed Seliaman. Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability. 2021; 13 (6):3028.
Chicago/Turabian StyleAhmad Althunibat; Muhammad Binsawad; Mohammed Almaiah; Omar Almomani; Adeeb Alsaaidah; Waleed Al-Rahmi; Mohamed Seliaman. 2021. "Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption." Sustainability 13, no. 6: 3028.
Omar Almomani. A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System. Computers, Materials & Continua 2021, 68, 409 -429.
AMA StyleOmar Almomani. A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System. Computers, Materials & Continua. 2021; 68 (1):409-429.
Chicago/Turabian StyleOmar Almomani. 2021. "A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System." Computers, Materials & Continua 68, no. 1: 409-429.
Wireless Sensor Networks (WSNs) have revolutionized the era of conventional computing into a digitized world, commonly known as “The Internet of Things”. WSN consists of tiny low-cost sensing devices, having computation, communication and sensing capabilities. These networks are always debatable for their limited resources and the most arguable and critical issue in WSNs is energy efficiency. Sensors utilize energy in broadcasting, routing, clustering, on-board calculations, localization, and maintenance, etc. However, primary domains of energy consumption at node level are three i.e. sensing by sensing-module, processing by microprocessor and communication by radio link. Extensive sensing, over-costs processing and frequent communication not only minimize the network life-time, but also affects the availability of these resources for other tasks. To increase life-time and provide an energy-efficient WSN, here we have proposed a new scheme called “A Content-based Adaptive and Dynamic Scheduling (CADS) using two ways communication model in WSNs”. CADS dynamically changes a node states during data aggregation and each node adapts a new state based on contents of the sensed data packets. Analyzer module at the Base-Station investigates contents of sensed data packets and regulates functions of a node by transmitting control messages in a backward direction. CADS minimizes energy consumption by reducing unnecessary network traffic and avoid redundant message-forwarding. Simulation results have been shown that it increases energy-efficiency in terms of network life-time by 9.65% in 100 nodes-network, 11.36% in 150 nodes-network and 0.94% in 300 nodes. The proposed scheme is also showing stability in terms of increasing cluster life by 87.5% for a network of 100 nodes, 94.73% for 150 nodes and 53.9% in 300 nodes.
Muhammad Nawaz Khan; Haseeb Ur Rahman; Mohammed Amin Almaiah; Ajab Khan; Mushtaq Raza; Mohammed Al-Zahrani; Omar Almomani; Rahim Khan. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access 2020, 8, 176495 -176520.
AMA StyleMuhammad Nawaz Khan, Haseeb Ur Rahman, Mohammed Amin Almaiah, Ajab Khan, Mushtaq Raza, Mohammed Al-Zahrani, Omar Almomani, Rahim Khan. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access. 2020; 8 (99):176495-176520.
Chicago/Turabian StyleMuhammad Nawaz Khan; Haseeb Ur Rahman; Mohammed Amin Almaiah; Ajab Khan; Mushtaq Raza; Mohammed Al-Zahrani; Omar Almomani; Rahim Khan. 2020. "Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks." IEEE Access 8, no. 99: 176495-176520.
The network intrusion detection system (NIDS) aims to identify virulent action in a network. It aims to do that through investigating the traffic network behavior. The approaches of data mining and machine learning (ML) are extensively used in the NIDS to discover anomalies. Regarding feature selection, it plays a significant role in improving the performance of NIDSs. That is because anomaly detection employs a great number of features that require much time. Therefore, the feature selection approach affects the time needed to investigate the traffic behavior and improve the accuracy level. The researcher of the present study aimed to propose a feature selection model for NIDSs. This model is based on the particle swarm optimization (PSO), grey wolf optimizer (GWO), firefly optimization (FFA) and genetic algorithm (GA). The proposed model aims at improving the performance of NIDSs. The proposed model deploys wrapper-based methods with the GA, PSO, GWO and FFA algorithms for selecting features using Anaconda Python Open Source, and deploys filtering-based methods for the mutual information (MI) of the GA, PSO, GWO and FFA algorithms that produced 13 sets of rules. The features derived from the proposed model are evaluated based on the support vector machine (SVM) and J48 ML classifiers and the UNSW-NB15 dataset. Based on the experiment, Rule 13 (R13) reduces the features into 30 features. Rule 12 (R12) reduces the features into 13 features. Rule 13 and Rule 12 offer the best results in terms of F-measure, accuracy and sensitivity. The genetic algorithm (GA) shows good results in terms of True Positive Rate (TPR) and False Negative Rate (FNR). As for Rules 11, 9 and 8, they show good results in terms of False Positive Rate (FPR), while PSO shows good results in terms of precision and True Negative Rate (TNR). It was found that the intrusion detection system with fewer features will increase accuracy. The proposed feature selection model for NIDS is rule-based pattern recognition to discover computer network attack which is in the scope of Symmetry journal.
Omar Almomani. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry 2020, 12, 1046 .
AMA StyleOmar Almomani. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry. 2020; 12 (6):1046.
Chicago/Turabian StyleOmar Almomani. 2020. "A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms." Symmetry 12, no. 6: 1046.
Mohammed Madi; Fidaa Jarghon; Yousef Fazea; Omar Almomani; Adeeb Saaidah. Comparative analysis of classification techniques for network fault management. TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2020, 28, 1442 -1457.
AMA StyleMohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah. Comparative analysis of classification techniques for network fault management. TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES. 2020; 28 (3):1442-1457.
Chicago/Turabian StyleMohammed Madi; Fidaa Jarghon; Yousef Fazea; Omar Almomani; Adeeb Saaidah. 2020. "Comparative analysis of classification techniques for network fault management." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 28, no. 3: 1442-1457.
Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.
Muhammad Adil; Mohammed Amin Almaiah; Alhuseen Omar Alsayed; Omar Almomani. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 2020, 20, 2311 .
AMA StyleMuhammad Adil, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, Omar Almomani. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors. 2020; 20 (8):2311.
Chicago/Turabian StyleMuhammad Adil; Mohammed Amin Almaiah; Alhuseen Omar Alsayed; Omar Almomani. 2020. "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks." Sensors 20, no. 8: 2311.
Wireless sensor networks have recently been widely used in several applications and scenarios, especially because they have the ability and flexibility for establishing a scalable and reliable wireless network. Cooperative multi-robotic systems (CMRS) are one example of these applications where establishing a wireless network between robots is essential and paramount to their operation. Further, these robots can utilize their mobility to provide sensing functionality for areas that are not covered by the static sensor. This can be achieved by equipping the robots with specific sensors to sense the area of interest (AoI) and report the sensed data to a remote monitoring center for further processing and decision-making. However, the nodes that form the sensor network have limited energy, and, as such, efficient algorithms in clusters’ formation, packets’ routing, and energy and mobility management are paramount. In this paper, a literature survey is presented containing the most related works that have been proposed to solve these challenges utilizing fuzzy logic. Most of the literature work attempted to utilize a de-centralized approach, where certain input parameters such as the residual energy, communication link quality, network congestion status, the nodes’ distance to the sink node and its location with respect to the other nodes, and the data and their sampling rate are all used as inputs to the fuzzy logic controller. These input parameters are used to determine several performance vital factors such as the cluster formation and its cluster head, best route to the sink node, optimal power management policies in terms of sleep/awake times needed to maximize the network lifetime, nodes’ mobility management policies to maintain network connectivity, and best route in terms of packet loss and delay.
Ala Khalifeh; Kishore Rajendiran; Khalid A. Darabkh; Ahmad M. Khasawneh; Omar Almomani; Zinon Zinonos. On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks. Electronics 2019, 8, 1513 .
AMA StyleAla Khalifeh, Kishore Rajendiran, Khalid A. Darabkh, Ahmad M. Khasawneh, Omar Almomani, Zinon Zinonos. On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks. Electronics. 2019; 8 (12):1513.
Chicago/Turabian StyleAla Khalifeh; Kishore Rajendiran; Khalid A. Darabkh; Ahmad M. Khasawneh; Omar Almomani; Zinon Zinonos. 2019. "On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks." Electronics 8, no. 12: 1513.
Internet of Things (IOT) system often consists of thousands of constrained connected devices. Resource-constrained devices one of critical issues in a low- power and lossy network LLNs. RPL is IPv6 routing protocol. It’s designed by IETF to be simple and inter-operable networking protocol to overcome these resource limitations. The RPL carries out Objective Functions (OFs) in the aim of finding the best path. The OFs chooses the best parent nodes aiming to build the route and optimize it. The metrics used to build the OF must be selected in an effective and accurate manner for finding the optimal path and meets all constraints. A survey about node metrics which can be utilized in OFs of RPL is presented, and node metrics calculations are explained then discussed thoroughly. The researcher displays the most relevant research efforts regarding the RPL OFs existing in literature.
Adeeb Saaidah; Omar Almomani; Laila Al-Qaisi.; Nesreen Alsharman; Faisal Alzyoud. A Comprehensive Survey on Node Metrics of RPL Protocol for IoT. Modern Applied Science 2019, 13, p1 .
AMA StyleAdeeb Saaidah, Omar Almomani, Laila Al-Qaisi., Nesreen Alsharman, Faisal Alzyoud. A Comprehensive Survey on Node Metrics of RPL Protocol for IoT. Modern Applied Science. 2019; 13 (12):p1.
Chicago/Turabian StyleAdeeb Saaidah; Omar Almomani; Laila Al-Qaisi.; Nesreen Alsharman; Faisal Alzyoud. 2019. "A Comprehensive Survey on Node Metrics of RPL Protocol for IoT." Modern Applied Science 13, no. 12: p1.
The purpose of this study is to construct a near capacity Irregular Turbo Code and to evaluate its performance over Gaussian channel. The methodology used to evaluate and measure the performance of the new design is by simulating the system by developing a software platform using Matlab. The simulation carried out by implementing the system over different modulation schemes, different frame sizes, and different code rates in order to achieve a fair comparison between irregular turbo code and regular Turbo Code. The simulation results showed that the Irregular Turbo Code with 64QAM modulation is capable of achieving a coding gain of 1.29 dB over its corresponding Turbo Code for a low Bit Error Rate 10 to 5, when used in a Gaussian noisy channel. Also, the Irregular Turbo Code designed in this paper, utilizes a single recursive Convolution encoder with short frame size of 5012 bits. The new designed codec can play an important role in many commercial applications such as Third-Generation wireless phones, Digital Video Broadcasting systems, or Wireless Metropolitan Area Networks, etc.
Abiodun Sholiyi; Jafar A. Alzubi; Omar A. Alzubi; Omar Almomani; Tim O'farrell. Near Capacity Irregular Turbo Code. 2016, 1 .
AMA StyleAbiodun Sholiyi, Jafar A. Alzubi, Omar A. Alzubi, Omar Almomani, Tim O'farrell. Near Capacity Irregular Turbo Code. . 2016; ():1.
Chicago/Turabian StyleAbiodun Sholiyi; Jafar A. Alzubi; Omar A. Alzubi; Omar Almomani; Tim O'farrell. 2016. "Near Capacity Irregular Turbo Code." , no. : 1.
Abiodun Sholiyi; Jafar A. Alzubi; Omar Alzubi; Omar Almomani; Tim O'farrell. Near Capacity Irregular Turbo Code. Indian Journal of Science and Technology 2015, 8, 1 .
AMA StyleAbiodun Sholiyi, Jafar A. Alzubi, Omar Alzubi, Omar Almomani, Tim O'farrell. Near Capacity Irregular Turbo Code. Indian Journal of Science and Technology. 2015; 8 (23):1.
Chicago/Turabian StyleAbiodun Sholiyi; Jafar A. Alzubi; Omar Alzubi; Omar Almomani; Tim O'farrell. 2015. "Near Capacity Irregular Turbo Code." Indian Journal of Science and Technology 8, no. 23: 1.
Omar Almomani; Mahmoud Al-Shugran; Jafar A. Alzubi; Omar A. Alzubi. Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET. International Journal of Computer Applications 2015, 119, 43 -48.
AMA StyleOmar Almomani, Mahmoud Al-Shugran, Jafar A. Alzubi, Omar A. Alzubi. Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET. International Journal of Computer Applications. 2015; 119 (3):43-48.
Chicago/Turabian StyleOmar Almomani; Mahmoud Al-Shugran; Jafar A. Alzubi; Omar A. Alzubi. 2015. "Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET." International Journal of Computer Applications 119, no. 3: 43-48.
Omar Almomani; Mohammad Madi. A GA-Based Replica Placement Mechanism for Data Grid. International Journal of Advanced Computer Science and Applications 2014, 5, 1 .
AMA StyleOmar Almomani, Mohammad Madi. A GA-Based Replica Placement Mechanism for Data Grid. International Journal of Advanced Computer Science and Applications. 2014; 5 (10):1.
Chicago/Turabian StyleOmar Almomani; Mohammad Madi. 2014. "A GA-Based Replica Placement Mechanism for Data Grid." International Journal of Advanced Computer Science and Applications 5, no. 10: 1.
Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. To increase resource availability and to ease resource sharing in such environment, there is a need for replication services. Data replication is one of the methods used to improve the performance of data access in distributed systems. However, it is bounded by two factors: size of available storage and bandwidth of sites within the Data Grid. Hence, there is a need for replica replacement strategy. In this paper, we propose an exponential based replica replacement strategy (ERRS). OptorSim is used to evaluate the performance of this dynamic replication strategy. The simulation results show that ERRS successfully increases data grid performance.
Mohammed Madi; Yuhanis Yusof; Suhaidi Hassan; Omar Almomani. A Novel Replica Replacement Strategy for Data Grid Environment. Communications in Computer and Information Science 2011, 717 -727.
AMA StyleMohammed Madi, Yuhanis Yusof, Suhaidi Hassan, Omar Almomani. A Novel Replica Replacement Strategy for Data Grid Environment. Communications in Computer and Information Science. 2011; ():717-727.
Chicago/Turabian StyleMohammed Madi; Yuhanis Yusof; Suhaidi Hassan; Omar Almomani. 2011. "A Novel Replica Replacement Strategy for Data Grid Environment." Communications in Computer and Information Science , no. : 717-727.
In this paper, we report an investigation on the impact of large block Forward Error Correction (FEC) with Drop Tail (DT) and Random Early Detection (RED) queue policies on network performance and quality of video streaming. FEC is a technique that uses redundant packets to reconstruct dropped packets, while DT and RED are the most popular queue management policies used in network routers. DT mainly depends on the size of the queue buffer to decide on whether to drop a packet or not. RED monitors the average queue size and drops arriving packets probabilistically. The probability of dropping a packet increases as the estimated average queue size grows. In the investigation, we consider simulation settings with varying size of queue buffers. Results obtained from the simulation experiments show that large block FEC and queue size affect the performance the network. Consequently, the qualities of multimedia applications are also affected.
Omar Almomani; Osman Ghazali; Suhaidi Hassan; Shahrudin Awang Nor; Mohammad Madi. Impact of Large Block FEC with Different Queue Sizes of Drop Tail and RED Queue Policy on Video Streaming Quality over Internet. 2010 Second International Conference on Network Applications, Protocols and Services 2010, 26 -30.
AMA StyleOmar Almomani, Osman Ghazali, Suhaidi Hassan, Shahrudin Awang Nor, Mohammad Madi. Impact of Large Block FEC with Different Queue Sizes of Drop Tail and RED Queue Policy on Video Streaming Quality over Internet. 2010 Second International Conference on Network Applications, Protocols and Services. 2010; ():26-30.
Chicago/Turabian StyleOmar Almomani; Osman Ghazali; Suhaidi Hassan; Shahrudin Awang Nor; Mohammad Madi. 2010. "Impact of Large Block FEC with Different Queue Sizes of Drop Tail and RED Queue Policy on Video Streaming Quality over Internet." 2010 Second International Conference on Network Applications, Protocols and Services , no. : 26-30.
In this paper, we report an investigation on performance of the forward error correction (FEC) with random early detection (RED) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. It monitors the average queue size and drops arriving packets probabilistically, the probability of drop increases as the estimated average queue size grows. In the investigation we consider simulation settings with varies size of the queue buffer. Results obtained from the simulation experiments show that FEC and queue size affect the performance the network. Consequently, the qualities of multimedia applications are also affected.
Omar Almomani; Osman Ghazali; Suhaidi Hassan. Performance study of large block forward error correction with random early detection queue policy. 2009 IEEE Symposium on Industrial Electronics & Applications 2009, 1, 457 -462.
AMA StyleOmar Almomani, Osman Ghazali, Suhaidi Hassan. Performance study of large block forward error correction with random early detection queue policy. 2009 IEEE Symposium on Industrial Electronics & Applications. 2009; 1 ():457-462.
Chicago/Turabian StyleOmar Almomani; Osman Ghazali; Suhaidi Hassan. 2009. "Performance study of large block forward error correction with random early detection queue policy." 2009 IEEE Symposium on Industrial Electronics & Applications 1, no. : 457-462.
This paper, showed an investigation on performance of the large block forward errors correction (FEC) with drop tail (DT) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while Drop Tail is the most popular queue management policies used in network routers. Since the Drop Tail mainly depends on the size of the queue buffer to decide on whether to drop a packet or not, the investigation considered simulation settings with varies size of the queue buffer. Results obtained from the simulation experiments show that FEC and queue size affect the performance the network. Consequently, the qualities of multimedia applications are also affected.
Omar Almomani; Osman Ghazali; Suhaidi Hassan. Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. 2009 First International Conference on Networks & Communications 2009, 109 -112.
AMA StyleOmar Almomani, Osman Ghazali, Suhaidi Hassan. Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. 2009 First International Conference on Networks & Communications. 2009; ():109-112.
Chicago/Turabian StyleOmar Almomani; Osman Ghazali; Suhaidi Hassan. 2009. "Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet." 2009 First International Conference on Networks & Communications , no. : 109-112.
As an alternative to UDP, DCCP is gaining popularity as a new transport protocol for sending streaming multimedia contents in the Internet nowadays. DCCP is a new unreliable transport protocol which has built-in congestion control unlike UDP. With this feature, DCCP ensures that there is no bandwidth monopoly by certain transport protocol like UDP did for years. UDP has been proven that can eat up all the available bandwidth in the Internet while competing with other transport protocols such as TCP in carrying streaming audio and multimedia traffic in many situations. In this paper, we show that initial slow-start threshold (ssthresh) size has a significant effect to the performance of DCCP carrying VoIP traffic over large delay link. Slow-start threshold is used by congestion control implemented in DCCP's TCP-like congestion control (CCID2) where all TCP congestion control implementations are required to support it. From our experiments, we found out that too small initial slow-start threshold value for large delay link makes the traffic throughput sent using DCCP requires longer time to become stable. The selection of suitable value of initial slow-start threshold is then vital to the stability of the network carrying streaming audio data over DCCP.
Shahrudin Awang Nor; Suhaidi Hassan; Omar Almomani. The effect of initial slow-start threshold size in DCCP over large delay link networks. 2008 International Conference on Electronic Design 2008, 1 -7.
AMA StyleShahrudin Awang Nor, Suhaidi Hassan, Omar Almomani. The effect of initial slow-start threshold size in DCCP over large delay link networks. 2008 International Conference on Electronic Design. 2008; ():1-7.
Chicago/Turabian StyleShahrudin Awang Nor; Suhaidi Hassan; Omar Almomani. 2008. "The effect of initial slow-start threshold size in DCCP over large delay link networks." 2008 International Conference on Electronic Design , no. : 1-7.