• Home
  • Mutaz Al-Tarawneh
Mutaz Al-Tarawneh

Mutaz Al-Tarawneh
Mutah University

PhD

About

32
Publications
10,041
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
107
Citations
Introduction
Mutaz Al-Tarawneh is a Professor of Computer Engineering at Mutah University. He has obtained his PhD in Computer Engineering from Southern Illinois University Carbondale (SIUC), USA in 2010. His research interests include Computer Architecture, Real-Time/Embedded Systems, Cloud Computing and Machine Learning applications.
Additional affiliations
February 2016 - October 2016
Mutah University
Position
  • Professor (Associate)

Publications

Publications (32)
Article
Full-text available
Service migration plays a vital role in continuous service delivery in Internet of Things (IoT) systems. This paper presents a mobility-aware container migration algorithm for Cloudlet-enabled IoT systems. The proposed algorithm is based on an integrated multicriteria decision making (MCDM) approach. It has been implemented using a specialized simu...
Article
Full-text available
The quality of customer service emphasizes support tickets. An excellent support ticket system qualifies businesses to provide clients with the finest level of customer support. This enables enterprises to guarantee the consistency of quality customer service delivered successfully, ensuring all clients have a good experience regardless of the natu...
Article
Full-text available
Electricity theft-induced power loss is a pressing issue in both traditional and smart grid environments. In smart grids, smart meters can be used to track power consumption behaviour and detect any suspicious activity. However, smart meter readings can be compromised by deploying intrusion tactics or launching cyber attacks. In this regard, machin...
Poster
Full-text available
https://eportal.mutah.edu.jo/etcea2022/
Article
Full-text available
Quantum dot-cellular automata (QCA) technology has recently emerged as a potential candidate for the design of nanometer-scale computational circuits. In digital logic circuits, the comparator is the basic building block for comparing two binary values. This paper presents and implements two 1-bit QCA-based comparator designs. The proposed QCA impl...
Article
Full-text available
In current decades, the size and complexity of network traffic data have risen significantly, which increases the likelihood of network penetration. One of today's largest advanced security concerns is the botnet. They are the mechanisms behind several online assaults, including Distribute Denial of Service (DDoS), spams, rebate fraudulence, phishi...
Article
Full-text available
Fog computing has been recently introduced to complement the cloud computing paradigm and offer application services at the edge of the network. The heterogeneity of fog computational nodes makes application placement in fog infrastructures a challenging task that requires proper management in order to satisfy application requirements. This paper p...
Article
Full-text available
Recently, Quantum-dot Cellular Automata (QCA) technology has shown great potential over current CMOS technology as it offers energy and area-efficient digital nano-scale circuits. In this article, various full adder/subtractor QCA implementations are presented and compared with recently published designs. The proposed designs include dedicated full...
Article
Full-text available
Recent advances in the microprocessors industry have introduced a plethora of processor models with diverse microarchitectural characteristics. Such diversity would normally complicate the decision on choosing the best processor model for a particular application class. Hence, an efficient tool is required to estimate and compare the performance of...
Article
Full-text available
Nano-scale Physical Unclonable Functions (PUFs) have recently emerged as promising hardware solutions for next-generation secure digital systems. In this context, the utilization of nano-scale Quantum dot Cellular Automata (QCA) technology provides power-efficient and high-performance implementations of digital systems relative to their CMOS counte...
Article
Full-text available
Recent advances in machine learning techniques have significantly influenced the development of early diabetes detection systems. In this paper, different machine learning (ML) algorithms are employed for diabetes detection based on hand movement. The spatial and temporal information for horizontal and vertical hand movement deviations for both dia...
Article
Full-text available
The development of nano-scale Quantum-dot Cellular Automata (QCA) has been driven by the immense need for high-performance and energy-efficient computational systems. In this paper, 2-and 3-input QCA-based asynchronous arbiter designs are presented and investigated. A number of 2-input arbiter structures are introduced and compared with their major...
Article
Full-text available
This paper reports on the use of online data stream classification algorithms to support workload orchestration in vehicular edge computing environments. These algorithms can be used to predict the ability of available computational nodes to successfully handle computational tasks generated from vehicular applications. Several online data stream cl...
Article
Full-text available
Vehicular Edge Computing (VEC) systems have recently become an essential computing infrastructure to support a plethora of applications entailed by smart and connected vehicles. These systems integrate the computing resources of edge and cloud servers and utilize them to execute computational tasks offloaded from various vehicular applications. How...
Article
Full-text available
The continuous market demand for high-performance and energy-efficient computing systems has steered the computational paradigm and technologies towards nano-scale quantum dot cellular automata (QCA). This paper presents novel simple and complex QCA-based C-element structures. The proposed structures were thoroughly analyzed based on key design par...
Article
Full-text available
Vehicular Edge Computing (VEC) systems have recently become an essential computing infrastructure to support a plethora of applications entailed by smart and connected vehicles. These systems integrate the computing resources of edge and cloud servers and utilize them to execute computational tasks offloaded from various vehicular applications. How...
Article
Full-text available
This paper presents an adaptive fuzzy-based cloud service brokering algorithm (AFBSB). The proposed algorithm employs an adaptive fuzzy-based engine to select the most appropriate data center for user cloud service requests considering user preferences in terms of cost and performance. The algorithm is implemented using an open-source cloud computi...
Article
Full-text available
Architectural time-predictability (ATP) is a major component in the design of real-time systems (RTS). In these systems, it is imperative to maintain temporal and logical accuracy. Hence, designers need to estimate the worst-case behavior of such systems before deploying them in real-life applications. This paper presents an experimental framework...
Article
Full-text available
This paper proposes a fuzzy logic based service broker algorithm for cloud computing environments. The proposed algorithm employs a hierarchical fuzzy inference system (FIS) to rate data centers based on their cost and performance characteristics. Incoming user requests are distributed among available data centers in accordance with their ratings s...
Article
Full-text available
This paper proposes a dynamic voltage and frequency scaling (DVFS) technique for off-chip buses in multicore processors with identical processing cores. The proposed technique captures application’s sensitivity to off-chip access latency and dynamically tunes power parameters of the off-chip bus accordingly. Full system simulation has been used to...
Article
Full-text available
This paper presents a multidisciplinary study that aims at designing a time-predictable low-leakage cache memory for real-time embedded systems. Both state-preserving and state-destroying leakage-saving mechanisms have been tested on a superscalar processor with two-level cache hierarchy. Full system simulation has been used to examine leakage-savi...
Article
Full-text available
This paper provides a quantitative evaluation of the performance of Very Long Instruction Word (VLIW) and Superscalar (SS) processors on Digital Signal Processing (DSP) and Multimedia applications. The VLIW configuration has been evaluated using Trimaran, an integrated compilation and performance monitoring infrastructure, while the Superscalar arc...
Article
Full-text available
This paper aims at identifying the optimal Multicore processor configuration for cryptographic applications. The RSA encryption algorithm has been taken as a case study and a comprehensive design space exploration (DSE) has been performed to obtain the optimal processor configuration that can serve as either a standalone or a coprocessor for securi...
Article
Full-text available
This paper investigates the impact of different instruction cache (I-Cache) organizations on the power-performance trade-offs of scalar processors with a two-level cache hierarchy. Each cache organization is a combination of cache size, cache associativity and replacement policy and defines a unique processor configuration. A cycle-accurate full-sy...
Article
Full-text available
This dissertation aims at improving the off-chip bandwidth utilization and energy efficiency in chip multiprocessor (CMP) architectures. This work consists of two main parts. The first part investigates the early write-back technique for a two-level cache hierarchy in a CMP with four processor cores. Early write-back can be viewed as a modified cac...

Questions

Questions (3)
Question
The International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA2022) is a venue for scientists, engineers, and practitioners to share their most recent research findings, ideas, advances, and applications in all fields of computer science and engineering. Artificial Intelligence, Data Science, Machine learning, Computer vision, NLP, Big data analytics, Health informatics, Industry 4.0, Networking, Cyber Security, cryptography Digital Forensics, Privacy, Biometrics Hardware security, wireless network, Software engineering, web engineering, Information Systems Analysis and Specification, IT Applications, Database Technology, Systems Integration, IoT, Fog and Edge computing, are just a few of the topics that will be covered at the ETCEA 2022.ETCEA 2022 is organized jointly by the faculty of Engineering and the faculty of Information Technology at Mutah University in collaboration with Jordanian Engineers Association (JEA). The conference will include distinguished keynote addresses with speakers from both industry and academia. All submitted papers will be judged based on their quality and relevance through blind reviewing. The conference is technically co-sponsored by the IEEE Jordan Section. Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements. Authors of selected papers will be invited to prepare extended papers for possible publication in the following journals:International Arab Journal of Information Technology: indexed in the Science citation index expanded (Thomson Reuters) and Scopus (www.iajit.org). The Jordanian Journal of Computer and Information Technology JJCIT : Indexed In Scopus (http://www.jjcit.org) Researchers are welcome to submit unique research contributions in any of the key topics of computer science and engineering, including but not limited to:Artificial Intelligence, Data Science, Machine learning, Computer vision, NLP, Big data analytics, Health informatics, Industry 4.0, and related topics. Cyber Security and Networking, cryptography, Digital Forensics, Privacy, Biometrics Hardware security, wireless network, and related topics. Software engineering, web engineering, Information Systems Analysis and Specification, IT Applications, Database Technology, Systems Integration, and related topics. IoT, Fog and Edge computing, and related topics Industrial Track Authors are encouraged to submit complete papers in accordance with the guidelines stated on the conference website. Submitted papers will be peer-reviewed, and prospective authors are required to deliver their papers during the conference (IEEE no show policy will be applied). The papers that are accepted and presented during the conference will be included in the CD proceedings, which will be submitted to IEEE. The best paper in each track will be chosen by peer review and announced at the conference's social event. The submission page may be found here (https://easychair.org/conferences/?conf=etcea2022).The online presentation is allowed for a specific number of papers (to be determined later), and these will be allowed on the basis of first-in first serve.
Call for Papers The first International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA2022) is a venue for scientists, engineers, and practitioners to share their most recent research findings, ideas, advances, and applications in all fields of computer science .and engineering. Artificial Intelligence, Data Science, Machine learning, Computer vision, NLP, Big data analytics, Health informatics, Industry 4.0, Networking, Cyber Security, cryptography Digital Forensics, Privacy, Biometrics Hardware security, wireless network, Software engineering, web engineering, Information Systems Analysis and Specification, IT Applications, Database Technology, Systems Integration, IoT, Fog and Edge computing, are just a few of the topics that will be covered at the ETCEA2022.We cordially encourage you to submit original papers to ETCEA2022 through the official submission system at https://easychair.org/conferences/?conf=ETCEA2022Technical and experimental, theoretical and conceptual, or a review are all examples of this. All contributions will be peer-reviewed for relevance, originality, significance, and clarity.
Question
I am running experiments to measure the standard deviation of the time required to execute individual instructions. I need to use Design of Experiments to identify the vital few design factors where the response variable is the computed standard deviation.

Network

Cited By