Muder Almi'ani

Muder Almi'ani
Al-Hussein Bin Talal University | AHU

PhD

About

63
Publications
12,424
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
349
Citations
Additional affiliations
August 2010 - July 2013
University of Bridgeport
Position
  • PhD Student
Education
September 2009 - July 2013
University of Bridgeport
Field of study
  • Computer Science and Engineering

Publications

Publications (63)
Article
Full-text available
The vehicle routing problem (VRP) is one of the challenging problems in optimization and can be described as combinatorial optimization and NP-hard problem. Researchers have used many artificial intelligence techniques in order to try to solve this problem. Among these techniques, metaheuristic algorithms that can perform random search are the most...
Article
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and...
Article
Full-text available
The use of current data management technologies for the Internet of Things (IoT) is not straightforward due to interface heterogeneity, highly complex and potentially unprotected conditions, and the huge scale of the network. A vast number of devices and sensors around the world are connected to wireless networks, making the data transmitted to and...
Article
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on cloud servers without additional waiting time. However, the limited battery power of mobile devices limits access to ample data. To address this problem, job scheduling algorithms based on completion time constraints are introduced to reduce energy consump...
Article
Cyber-physical systems (CPSs) have greatly contributed to many applications. A CPS is capable of integrating physical and computational capabilities to interact with individuals through various new modalities. However, there is a need for such a paradigm to focus on the human central nervous system to provide faster data access. This paper introduc...
Article
Full-text available
The fifth-generation (5G) wireless communication systems associating with the high achievable data-transfer speeds will significantly affect the performance of IoT networks. On one hand, the internet goes through a dramatic transaction period that shapes every aspect of our lives, industry, and business where cloud computing, smart cities, and the...
Preprint
Full-text available
The vehicle routing problem (VRP) is one of the challenging problems in optimization and can be described as combinatorial optimization and NP-hard problem. Researchers have used many artificial intelligence techniques in order to try to solve this problem. Among these techniques, metaheuristic algorithms that can perform random search are the most...
Article
Full-text available
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is highly suitable for obtaining virtualized data without additional waiting time. However, the limited battery power of mobile devices limits access to abundant data. To address this problem, an energy-efficient and secure algorithm should be introduced to re...
Article
Full-text available
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have succe...
Article
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to...
Article
Full-text available
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations p...
Chapter
Full-text available
One desired aspect of a self-adapting microservices architecture is the ability to continuously monitor the operational environment, detect and observe anomalous behaviour as well as implement a reasonable policy for self-scaling, self-healing, and self-tuning the computational resources in order to dynamically respond to a sudden change in its ope...
Article
One desired aspect of microservice architecture is the ability to self‐adapt its own architecture and behavior in response to changes in the operational environment. To achieve the desired high levels of self‐adaptability, this research implements distributed microservice architecture model running a swarm cluster, as informed by the Monitor, Analy...
Article
As a results of the large scale development of the Internet of Things (IoT), cloud computing capabilities including networking, data storage, management, and analytics are brought very close to the edge of networks forming Fog computing and enhancing transferring and processing of tremendous amount of data. As the Internet becomes more deeply integ...
Article
Full-text available
With the development of information society and network technology, people increasingly depend on information found on the Internet. At the same time, the models of information diffusion on the Internet are changing as well. However, these models experience the problem due to the fast development of network technologies. There is no thorough resear...
Article
Full-text available
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling and load balancing approaches, we propose a novel approach that uses dom...
Article
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling and load balancing approaches, we propose a novel approach that uses dom...
Article
Cybercriminal activities over computer network systems are considered one of the preponderant issues that humanity will face in the coming two decades. The development steps in the design of intrusion detection systems must be carried out in analogous manner to sophistication levels of intrusions developed by hackers. This work proposes a layered h...
Article
Full-text available
Significant research has been conducted for maintaining a high standard of communication and good coverage in wireless sensor networks (WSNs), but extra power consumption and mobility issues are not yet fully resolved. This paper introduces a memory-less location mobility-aware Lattice Mobility Model (LMM) for WSNs. LMM is capable of concurrently d...
Article
Security is one of the biggest challenges for secure data communication. As the need of mobile phones increased, people started using several mobile applications to handle the internet of things. On the other hand, the frequent use of mobile phones in business caught the attention of researchers to protect the manufacturers and customers. Handling...
Article
Full-text available
Given their importance in assessing the objectives of computing programs, capstone projects have been included in the present curriculum. Through these projects, the issues in software development practice are directly experienced by the students. This paper provided students with a full picture of these issues by using concept maps. To present a c...
Article
Given their importance in assessing the objectives of computing programs, capstone projects have been included in the present curriculum. Through these projects, the issues in software development practice are directly experienced by the students. This paper provided students with a full picture of these issues by using concept maps. To present a c...
Conference Paper
A wireless modem is a device which is used to transmit and receive data over a network. Power consumption for wireless devices becomes a challenge for researchers, causing the entire research environment to shift their focus to the power usage of wireless devices. Presently, by using a class A power amplifier, a power efficient wireless modem can b...
Conference Paper
Full-text available
With emergence of the latest technology, need for digital documents, images and medias has greatly increased. On the other hand, there has been great demand of protecting those documents. The researchers proposed several approaches to protect those valuable documents. The two most exciting available approaches are to remove the devices and online s...
Article
Full-text available
With dramatic increase in the mobile technology, the mobile cellular phones have played a significant role in the several fields particularly, education, military, business and health. The deployment of mobile phone in the Government has been of high interest of research community to improve fundamental functions, efficient information provision an...
Conference Paper
Full-text available
Cloud computing is a model for delivering information technology services, wherein resources are retrieved from the Internet through web-based tools and applications instead of a direct connection to a server. The capability to provision and release cloud computing resources with minimal management effort or service provider interaction led to the...
Conference Paper
E-government plays an increasingly significant role in our day-to-day lives. Mobile government (m-Government) is a subset and extension of electronic government e-Government comprising of an alternative channel for governments to improve governments' fundamental functions and providing information and services. This paper introduces an interactive...
Article
The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make i...
Conference Paper
Using mobile gateway as mechanical data carrier has emerged as a promising approach to prolong the network lifetime and relaying information in partition networks. This mobile gateway periodically travels the network to gather the sensor data, where the gateway tour start and end at the sink. The gateway’s tour length must be bounded by pre-defined...
Conference Paper
In this paper, we investigate the problem of designing the minimum number of required mobile elements tours such that each sensor node is either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined value L. To address this problem, we propose heuristic-based solution. This solution works by direct...
Article
Full-text available
In this paper, we investigate the problem of designing the mobile elements tours such that the length of each tour is below a per-determined length and the distance between nodes not included in the tour and the tour is minimized. The path of the mobile element is designed to visit subset of the nodes (caching points). These caching points store ot...
Conference Paper
A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of...
Article
In this work, we have developed an automatic segmentation algorithm for brain Magnetic Resonance Angiography (MRA) images to extract the vascular structure based on region-growing method. Intensity information is used as a criterion of homogeneity. MRA was introduced into clinical practice about two decades ago and it provides a variety of signific...
Article
Full-text available
Wireless Sensor Networks, referred to as WSNs, are made up of various types of sensor nodes. Recentdevelopments in micro electro-mechanical technology have given rise to new integrated circuitry,microprocessor hardware and nano technology, wireless technology, and advanced networking routingprotocols. Hospitals and health service facilities, the ar...

Network

Cited By