- Distributed and Parallel Computing Systems
- Cloud Computing and Resource Management
- Peer-to-Peer Network Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Text and Document Classification Technologies
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Smart Grid Security and Resilience
- IoT and Edge/Fog Computing
- Advanced Text Analysis Techniques
- Anomaly Detection Techniques and Applications
- Distributed systems and fault tolerance
- Blockchain Technology Applications and Security
- Caching and Content Delivery
- Data Visualization and Analytics
- Cloud Data Security Solutions
- Topic Modeling
- Microgrid Control and Optimization
- Advanced Malware Detection Techniques
- Intracerebral and Subarachnoid Hemorrhage Research
- Hydrological Forecasting Using AI
- Digital and Cyber Forensics
- Software System Performance and Reliability
Teesside University
2020-2023
World Islamic Sciences and Education University
2013-2020
Higher Colleges of Technology
2019-2020
De Montfort University
2011-2012
Abstract Text classification is a very important area in information retrieval. techniques used to classify documents into set of predefined categories. There are several and methods data fact there many researches talks about English text classification. Unfortunately, few Arabic This paper three well-known data. These applied on set. A comparative study made between these techniques. Also this fixed number for all categories training testing phase. The result shows that the Support Vector...
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud models may have difficulty dealing with challenges caused by IoT applications, such as network failure, latency, and capacity constraints. One introduced methods solve these fog which makes closer devices. A system for congestion management brokerage presented in this paper. With proposed system, quality service (QoS) requirements...
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual act as routers to forward both their own data and also neighbours' by sending receiving packets from other in the network.The relatively easy configuration quick deployment make suitable emergency situations (such human or natural disasters) for military units enemy territory.Securing...
Intrusion detection is a serious and complex problem. Undoubtedly due to large number of attacks around the world, concept intrusion has become very important. This research proposes multilayer bio-inspired feature selection model for using an optimized genetic algorithm. Furthermore, proposed consists two layers (layers 1 2). At layer 1, three algorithms are used selection. The Particle Swarm Optimization (PSO), Grey Wolf (GWO), Firefly Algorithm (FFA). end priority value will be assigned...
<span lang="EN-US">The cloud computing model offers a shared pool of resources and services with diverse models presented to the clients through internet by an on-demand scalable dynamic pay-per-use model. The developers have identified need for automated system (cloud service broker (CSB)) that can contribute exploiting capability, enhancing its functionality, improving performance. This research presents congestion management (DCM) which manage massive amount requests while...
In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utlized by other institutes. A disagreement between multi-Virtual Organizations (VOs) happen in security aspect for policy framework. Mobile Grid Services has given ability move jobs, data and application software from nodes during jobs execution grid environment. It also solved of lack finding suitable but not lot attention was this solution. This paper...
Trends of various intracranial pressure (ICP) parameters for high hydrocephalus patients are utilized to detect shunt faults in their early stages, as well as, monitor the effect such on performance. A method was proposed predict time required ICP be abnormal and valve reach full blockage condition. Furthermore, an auto schedule updating is used temporarily deal with detected until patient checked up by his/her physician. The algorithms were evaluated using numerical simulation.
Grid Computing refers to systems and applications that incorporate control distributed services resources resolve systematic or industrial issues. Over the past few years, developers have realized need for an automatic mechanism can be used in employing grid power, improving its operating enhancing production. Multi-Agents Systems are generally employed solve problems by using decentralized techniques a set of agents collaborate challenge. Hence, it is considered suitable solutions open...
In Jordan, agriculture and irrigation depend highly on rainfalls. Rainfall prediction is a challenging area of investigation for scientists. this paper, precipitation model using artificial neural networks (ANNs) proposed. The seasonal amount rainfall in several areas Jordan predicted rate time-series data, these data has been recorded from 26 stations located different Jordan. A feed forward ANN based backpropagation (BP) designed trained to predict the future rainfalls Results are...
Phishing could be considered a worldwide problem; undoubtedly, the number of illegal websites has increased quickly. Besides that, phishing is security attack that several purposes, such as personal information, credit card numbers, and other information. look like legitimate ones, which makes it difficult to differentiate between them. There are techniques methods for detection. The authors present two machine-learning algorithms employed XGBoost random forest. Also, this study uses...
Grid computing is an enhanced technology consisting of a pool connected machines that belong to multiple organizations in different sites form distributed system. This system can be used deal with complex scientific or business problems. It developed help share resources may diverted nature and solve many The typical decentralized grid model faces challenges, such as; systems software architectures, quickly handling the enormous amount requesters, finding appropriate for users. Some requests...