Tariq Alwada‘n

ORCID: 0000-0002-1826-1247
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Cloud Computing and Resource Management
  • Peer-to-Peer Network Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Text and Document Classification Technologies
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Smart Grid Security and Resilience
  • IoT and Edge/Fog Computing
  • Advanced Text Analysis Techniques
  • Anomaly Detection Techniques and Applications
  • Distributed systems and fault tolerance
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Data Visualization and Analytics
  • Cloud Data Security Solutions
  • Topic Modeling
  • Microgrid Control and Optimization
  • Advanced Malware Detection Techniques
  • Intracerebral and Subarachnoid Hemorrhage Research
  • Hydrological Forecasting Using AI
  • Digital and Cyber Forensics
  • Software System Performance and Reliability

Teesside University
2020-2023

World Islamic Sciences and Education University
2013-2020

Higher Colleges of Technology
2019-2020

De Montfort University
2011-2012

Abstract Text classification is a very important area in information retrieval. techniques used to classify documents into set of predefined categories. There are several and methods data fact there many researches talks about English text classification. Unfortunately, few Arabic This paper three well-known data. These applied on set. A comparative study made between these techniques. Also this fixed number for all categories training testing phase. The result shows that the Support Vector...

10.7603/s40601-016-0016-9 article EN cc-by GSTF international journal on computing/GSTF unternational journal on computing 2016-09-16

10.14569/ijacsa.2025.0160146 article EN International Journal of Advanced Computer Science and Applications 2025-01-01

Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud models may have difficulty dealing with challenges caused by IoT applications, such as network failure, latency, and capacity constraints. One introduced methods solve these fog which makes closer devices. A system for congestion management brokerage presented in this paper. With proposed system, quality service (QoS) requirements...

10.3390/jsan11040084 article EN cc-by Journal of Sensor and Actuator Networks 2022-12-09

Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual act as routers to forward both their own data and also neighbours' by sending receiving packets from other in the network.The relatively easy configuration quick deployment make suitable emergency situations (such human or natural disasters) for military units enemy territory.Securing...

10.5121/ijwmn.2012.4117 article EN International Journal of Wireless & Mobile Networks 2012-02-29

Intrusion detection is a serious and complex problem. Undoubtedly due to large number of attacks around the world, concept intrusion has become very important. This research proposes multilayer bio-inspired feature selection model for using an optimized genetic algorithm. Furthermore, proposed consists two layers (layers 1 2). At layer 1, three algorithms are used selection. The Particle Swarm Optimization (PSO), Grey Wolf (GWO), Firefly Algorithm (FFA). end priority value will be assigned...

10.32604/cmc.2022.027475 article EN Computers, materials & continua/Computers, materials & continua (Print) 2022-01-01

<span lang="EN-US">The cloud computing model offers a shared pool of resources and services with diverse models presented to the clients through internet by an on-demand scalable dynamic pay-per-use model. The developers have identified need for automated system (cloud service broker (CSB)) that can contribute exploiting capability, enhancing its functionality, improving performance. This research presents congestion management (DCM) which manage massive amount requests while...

10.11591/ijece.v13i1.pp872-883 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2022-10-25

In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utlized by other institutes. A disagreement between multi-Virtual Organizations (VOs) happen in security aspect for policy framework. Mobile Grid Services has given ability move jobs, data and application software from nodes during jobs execution grid environment. It also solved of lack finding suitable but not lot attention was this solution. This paper...

10.1109/crisis.2011.6061826 article EN 2011-09-01

Trends of various intracranial pressure (ICP) parameters for high hydrocephalus patients are utilized to detect shunt faults in their early stages, as well as, monitor the effect such on performance. A method was proposed predict time required ICP be abnormal and valve reach full blockage condition. Furthermore, an auto schedule updating is used temporarily deal with detected until patient checked up by his/her physician. The algorithms were evaluated using numerical simulation.

10.4236/jbise.2013.63036 article EN Journal of Biomedical Science and Engineering 2013-01-01

Grid Computing refers to systems and applications that incorporate control distributed services resources resolve systematic or industrial issues. Over the past few years, developers have realized need for an automatic mechanism can be used in employing grid power, improving its operating enhancing production. Multi-Agents Systems are generally employed solve problems by using decentralized techniques a set of agents collaborate challenge. Hence, it is considered suitable solutions open...

10.1109/itt48889.2019.9075099 article EN 2019-11-01

In Jordan, agriculture and irrigation depend highly on rainfalls. Rainfall prediction is a challenging area of investigation for scientists. this paper, precipitation model using artificial neural networks (ANNs) proposed. The seasonal amount rainfall in several areas Jordan predicted rate time-series data, these data has been recorded from 26 stations located different Jordan. A feed forward ANN based backpropagation (BP) designed trained to predict the future rainfalls Results are...

10.15866/irea.v3i6.8529 article EN International Journal of Engineering 2015-11-30

Phishing could be considered a worldwide problem; undoubtedly, the number of illegal websites has increased quickly. Besides that, phishing is security attack that several purposes, such as personal information, credit card numbers, and other information. look like legitimate ones, which makes it difficult to differentiate between them. There are techniques methods for detection. The authors present two machine-learning algorithms employed XGBoost random forest. Also, this study uses...

10.11591/ijece.v14i5.pp5961-5969 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2024-08-09

10.14569/ijacsa.2024.0151112 article EN International Journal of Advanced Computer Science and Applications 2024-01-01

10.14445/22312803/ijctt-v41p106 article EN International Journal of Computer Trends and Technology 2016-11-25

10.14445/22312803/ijctt-v11p143 article EN International Journal of Computer Trends and Technology 2014-05-25

Grid computing is an enhanced technology consisting of a pool connected machines that belong to multiple organizations in different sites form distributed system. This system can be used deal with complex scientific or business problems. It developed help share resources may diverted nature and solve many The typical decentralized grid model faces challenges, such as; systems software architectures, quickly handling the enormous amount requesters, finding appropriate for users. Some requests...

10.14569/ijacsa.2020.0111032 article EN International Journal of Advanced Computer Science and Applications 2020-01-01
Coming Soon ...