Jordan University of Science and Technology

Displaying 1-18 of 18 results

  • White Papers // May 2013

    Contextual Adaptation of a Security Framework

    This paper presents a conceptual framework which has been adapted to use location based service and Wi-Fi technology. This paper will therefore consider and define the issues with the use of the technologies and models by introducing the context of the conceptual framework in Section 1, the exploratory investigation in...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2012

    Cognitive Radio Based Bandwidth Allocation Scheme for WiMAX Networks

    In WiMAX networks managing the uplink access is an important issue as it deals not only with the available bandwidth but also with the QoS requirements of different traffic classes. This paper proposes a new scheme for bandwidth allocation in WiMAX systems, named WiMAX Dual Cognitive Radio Scheme (WDCRS). The...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2012

    C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol

    Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless...

    Provided By Jordan University of Science and Technology

  • White Papers // Jul 2012

    An Efficient Overhead-Aware Leader Election Algorithm for Distributed Systems

    In the area of distributed computing, the leader election process is meant with selecting a single node as a leader or a coordinator for a particular task that is distributed among other members. In such environments, if the leader got crashed, all other nodes have to elect another leader. In...

    Provided By Jordan University of Science and Technology

  • White Papers // Jan 2012

    Enhance Rule Based Detection for Software Fault Prone Modules

    Software quality assurance is necessary to increase the level of confidence in the developed software and reduce the overall cost for developing software projects. The problem addressed in this research is the prediction of fault prone modules using data mining techniques. Predicting fault prone modules allows the software managers to...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2011

    Updatable Queue Protocol Based on TCP for Virtual Reality Environment

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2011

    Performance Evaluation of Different Scheduling Algorithms in WIMAX

    Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2011

    An Empirical Assessment of Refactoring Impact on Software Quality Using a Hierarchical Quality Model

    Software refactoring is a collection of re-engineering activities that aims to improve software quality. Refactorings are commonly used in agile software processes to improve software quality after a significant software development or evolution. There is belief that refactoring improves quality factors such as understandability, flexibility, and reusability. However, there is...

    Provided By Jordan University of Science and Technology

  • White Papers // Jul 2011

    Choices on Designing Gf (p) Elliptic Curve Coprocessor Benefiting From Mapping Homogeneous Curves in Parallel Multiplications

    Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different factors that affect the design of ECC such as area, hardware utilization, cost (AT2) and performance factors...

    Provided By Jordan University of Science and Technology

  • White Papers // Apr 2011

    An End-to-End Support for Short-Lived TCP Flows in Heterogeneous Wired-Cum-Wireless Networks

    Transmission control protocol has been adapted to various types of wireless networks (e.g., IEEE 802.11 WLAN, 3G cellular and ad hoc networks). However, wireless transmission control protocol flows are much shorter than wired flows due to the time varying characteristics of wireless networks. Hence, transmission control protocol performance in these...

    Provided By Jordan University of Science and Technology

  • White Papers // Apr 2011

    Survivability and Reliability Analysis of the Trusted Link State Routing Protocol for Wireless Ad Hoc Networks

    The nodes in a wireless network are responsible for both sending their traffic as well as relaying the traffic of other nodes in the network. This form of collaboration between the nodes is essential for the proper delivery of data. Without fair participation of all nodes in the routing process,...

    Provided By Jordan University of Science and Technology

  • White Papers // Sep 2010

    A Modeling and Simulation-Based Methodology to Support Dynamic Negotiation for Web Service Applications

    Different negotiation engineering domains require from the system designer to tailor the negotiation framework according to the domain under which it will be used. This process of system design is timely consuming when supporting different geographically distributed and dynamic environments. Here, the authors show a methodology to design negotiation systems...

    Provided By Jordan University of Science and Technology

  • White Papers // Nov 2009

    Network Error Correction for Unit-Delay, Memory-Free Networks Using Convolutional Codes

    The core of a parallel processing system is the interconnection network by which the system's processors are linked. Due to the great role played by the interconnection network's topology in improving the parallel processing system's performance, various topologies have been proposed in the literature. This paper proposes a new interconnection...

    Provided By Jordan University of Science and Technology

  • White Papers // Nov 2009

    The Chained-Cubic Tree Interconnection Network

    The core of a parallel processing system is the interconnection network by which the system's processors are linked. Due to the great role played by the interconnection network's topology in improving the parallel processing system's performance, various topologies have been proposed in the literature. This paper proposes a new interconnection...

    Provided By Jordan University of Science and Technology

  • White Papers // Sep 2009

    Improvement of Metropolitan Wireless Networking Using Wireless Optical Mesh Networks

    Many wireless networking systems were established to manipulate metropolitan networks in order to provide internet, voice, data, video and TV services in large cities. Two major systems were used for such services; Local Multipoint Distribution Service (LMDS) and Multi-channel Multipoint Distribution Service (MMDS). Both of these systems are fixed broadband...

    Provided By Jordan University of Science and Technology

  • White Papers // Jun 2009

    A New Approach for Recoverable Timestamp Ordering Schedule

    A new approach for timestamp ordering problem in serializable schedules is presented. Since the number of users using databases is increasing rapidly, the accuracy and needing high throughput are main topics in database area. Strict 2PL does not allow all possible serializable schedules and so does not result high throughput....

    Provided By Jordan University of Science and Technology

  • White Papers // Jun 2009

    A Performance Comparison of Smart Probabilistic Broadcasting of Ad Hoc Distance Vector (AODV)

    Broadcast is a common operation used in Mobile Ad hoc NETworks (MANETs) for many services, such as, rout discovery and sending an information messages. The direct method to perform broadcast is simple flooding, which it can dramatically affect the performance of MANET. Recently, a probabilistic approach to flooding has been...

    Provided By Jordan University of Science and Technology

  • White Papers // Feb 2008

    Entrepreneurship Promotion at Educational Institutions: A Model Suitable for Emerging Economies

    This paper discusses the role of educational institutions in promoting entrepreneurship and risk taking, particularly in conservative communities and cultures. Two main topics are discussed in this paper. The first is tailoring the academic program and all activities supporting it to serve the goal of promoting entrepreneurship. The second topic...

    Provided By Jordan University of Science and Technology

  • White Papers // Jul 2012

    An Efficient Overhead-Aware Leader Election Algorithm for Distributed Systems

    In the area of distributed computing, the leader election process is meant with selecting a single node as a leader or a coordinator for a particular task that is distributed among other members. In such environments, if the leader got crashed, all other nodes have to elect another leader. In...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2012

    Cognitive Radio Based Bandwidth Allocation Scheme for WiMAX Networks

    In WiMAX networks managing the uplink access is an important issue as it deals not only with the available bandwidth but also with the QoS requirements of different traffic classes. This paper proposes a new scheme for bandwidth allocation in WiMAX systems, named WiMAX Dual Cognitive Radio Scheme (WDCRS). The...

    Provided By Jordan University of Science and Technology

  • White Papers // Nov 2009

    Network Error Correction for Unit-Delay, Memory-Free Networks Using Convolutional Codes

    The core of a parallel processing system is the interconnection network by which the system's processors are linked. Due to the great role played by the interconnection network's topology in improving the parallel processing system's performance, various topologies have been proposed in the literature. This paper proposes a new interconnection...

    Provided By Jordan University of Science and Technology

  • White Papers // Nov 2009

    The Chained-Cubic Tree Interconnection Network

    The core of a parallel processing system is the interconnection network by which the system's processors are linked. Due to the great role played by the interconnection network's topology in improving the parallel processing system's performance, various topologies have been proposed in the literature. This paper proposes a new interconnection...

    Provided By Jordan University of Science and Technology

  • White Papers // Apr 2011

    An End-to-End Support for Short-Lived TCP Flows in Heterogeneous Wired-Cum-Wireless Networks

    Transmission control protocol has been adapted to various types of wireless networks (e.g., IEEE 802.11 WLAN, 3G cellular and ad hoc networks). However, wireless transmission control protocol flows are much shorter than wired flows due to the time varying characteristics of wireless networks. Hence, transmission control protocol performance in these...

    Provided By Jordan University of Science and Technology

  • White Papers // Apr 2011

    Survivability and Reliability Analysis of the Trusted Link State Routing Protocol for Wireless Ad Hoc Networks

    The nodes in a wireless network are responsible for both sending their traffic as well as relaying the traffic of other nodes in the network. This form of collaboration between the nodes is essential for the proper delivery of data. Without fair participation of all nodes in the routing process,...

    Provided By Jordan University of Science and Technology

  • White Papers // Jun 2009

    A New Approach for Recoverable Timestamp Ordering Schedule

    A new approach for timestamp ordering problem in serializable schedules is presented. Since the number of users using databases is increasing rapidly, the accuracy and needing high throughput are main topics in database area. Strict 2PL does not allow all possible serializable schedules and so does not result high throughput....

    Provided By Jordan University of Science and Technology

  • White Papers // Sep 2009

    Improvement of Metropolitan Wireless Networking Using Wireless Optical Mesh Networks

    Many wireless networking systems were established to manipulate metropolitan networks in order to provide internet, voice, data, video and TV services in large cities. Two major systems were used for such services; Local Multipoint Distribution Service (LMDS) and Multi-channel Multipoint Distribution Service (MMDS). Both of these systems are fixed broadband...

    Provided By Jordan University of Science and Technology

  • White Papers // Jun 2009

    A Performance Comparison of Smart Probabilistic Broadcasting of Ad Hoc Distance Vector (AODV)

    Broadcast is a common operation used in Mobile Ad hoc NETworks (MANETs) for many services, such as, rout discovery and sending an information messages. The direct method to perform broadcast is simple flooding, which it can dramatically affect the performance of MANET. Recently, a probabilistic approach to flooding has been...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2011

    Updatable Queue Protocol Based on TCP for Virtual Reality Environment

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2011

    Performance Evaluation of Different Scheduling Algorithms in WIMAX

    Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2011

    An Empirical Assessment of Refactoring Impact on Software Quality Using a Hierarchical Quality Model

    Software refactoring is a collection of re-engineering activities that aims to improve software quality. Refactorings are commonly used in agile software processes to improve software quality after a significant software development or evolution. There is belief that refactoring improves quality factors such as understandability, flexibility, and reusability. However, there is...

    Provided By Jordan University of Science and Technology

  • White Papers // Jan 2012

    Enhance Rule Based Detection for Software Fault Prone Modules

    Software quality assurance is necessary to increase the level of confidence in the developed software and reduce the overall cost for developing software projects. The problem addressed in this research is the prediction of fault prone modules using data mining techniques. Predicting fault prone modules allows the software managers to...

    Provided By Jordan University of Science and Technology

  • White Papers // Sep 2010

    A Modeling and Simulation-Based Methodology to Support Dynamic Negotiation for Web Service Applications

    Different negotiation engineering domains require from the system designer to tailor the negotiation framework according to the domain under which it will be used. This process of system design is timely consuming when supporting different geographically distributed and dynamic environments. Here, the authors show a methodology to design negotiation systems...

    Provided By Jordan University of Science and Technology

  • White Papers // Jul 2011

    Choices on Designing Gf (p) Elliptic Curve Coprocessor Benefiting From Mapping Homogeneous Curves in Parallel Multiplications

    Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different factors that affect the design of ECC such as area, hardware utilization, cost (AT2) and performance factors...

    Provided By Jordan University of Science and Technology

  • White Papers // May 2013

    Contextual Adaptation of a Security Framework

    This paper presents a conceptual framework which has been adapted to use location based service and Wi-Fi technology. This paper will therefore consider and define the issues with the use of the technologies and models by introducing the context of the conceptual framework in Section 1, the exploratory investigation in...

    Provided By Jordan University of Science and Technology

  • White Papers // Oct 2012

    C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol

    Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless...

    Provided By Jordan University of Science and Technology

  • White Papers // Feb 2008

    Entrepreneurship Promotion at Educational Institutions: A Model Suitable for Emerging Economies

    This paper discusses the role of educational institutions in promoting entrepreneurship and risk taking, particularly in conservative communities and cultures. Two main topics are discussed in this paper. The first is tailoring the academic program and all activities supporting it to serve the goal of promoting entrepreneurship. The second topic...

    Provided By Jordan University of Science and Technology