oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 233 )

2018 ( 338 )

2017 ( 366 )

2016 ( 588 )

Custom range...

Search Results: 1 - 10 of 204967 matches for " Dr. Tariq Alwada’n "
All listed articles are free for downloading (OA Articles)
Page 1 /204967
Display every page Item
Agile Software Methodologies: Strength and Weakness
Dr. Adel Hamdan Mohammad,Dr. Tariq Alwadan,Dr. Jafar "M.Ali" Ababneh
International Journal of Engineering Science and Technology , 2013,
Abstract: Agile methodologies are great software development methodologies. No doubt that these methodologies have widespread reputation. The core of agile methodologies is people. Customer and each team member in agiledevelopment teams are the key success or failure factor in agile process. In this paper authors demonstrate strength and weakness points in agile methodologies. Also authors demonstrate how strength and weakness factors can affect the overall results of agile development process.
Early fault prediction and detection of hydrocephalus shunting system  [PDF]
Abdel Rahman Alkharabsheh, Lina Momani, Waleed Al-Nuaimy, Jafar Ababneh, Tariq Alwadan, Abeer Hawatmeh
Journal of Biomedical Science and Engineering (JBiSE) , 2013, DOI: 10.4236/jbise.2013.63036
Abstract:

Trends of various intracranial pressure (ICP) parameters for high pressure hydrocephalus patients are utilized to detect various shunt faults in their early stages, as well as, to monitor the effect of such faults on shunt performance. A method was proposed to predict the time required for ICP to be abnormal and for the valve to reach full blockage condition. Furthermore, an auto valve schedule updating method is proposed and used to temporarily deal with detected faults until the patient is checked up by his/her physician. The proposed algorithms were evaluated using numerical simulation.

Policy-Based Support for Mobile Grid Services
Tariq Alwada'n,Thair Khdour,Helge Janicke,Abdulsalam Alarabeyyat
International Journal of Computer Science Issues , 2013,
Abstract: In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utilized by other institutes. A disagreement between the multi-Virtual Organizations (VOs) might happen in the security aspect for the policy framework. Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs execution in the grid environment. It has also solved some of the lack in finding suitable resources for the jobs. To facilitate the ability to support mobile resource sharing between multiple heterogeneous VOs, an authorization policy management framework is needed to support authorization for heterogeneous authorization systems. Traditional authorization policy management frameworks act well in authorization policy for a single VO where the contributing hosts grant the permission to follow a global authorization system. However most of policy management tools do not provide a clear support for sharing mobile resources between multiple heterogeneous VOs. To solve this problem, we present a dynamic and heterogeneous policy management framework that can give a clear policy definition about the ability to move jobs, data and application software from nodes to nodes during jobs execution in the grid environment. We introduce an architecture for policy based resource management in the case of mobile sharing, and a scenario that explain the advantages of mobility mechanism and the role of policy in the grid systems. To check the performance of this architecture, a set of experiments had conducted. The results, analysis and the overheads estimation are presented in this journal
Dynamic Policy Management in Mobile Grid Environments
Tariq Alwada'n,Hamza Aldabbas,Helge Janicke,Thair Khdour
International Journal of Computer Networks & Communications , 2012,
Abstract: Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs execution in the grid environment. These migrations depend on the grid’s users and the grid’s nodes policies. The heterogeneity, diversity of policies and attributes leads to a need for policy management tools that can handle these problems. Also, before the users can submit their jobs or run their applications on a certain resource or system they may need to guarantee that this resource or system has not been compromised, which could result in their own application or data being stolen or asking for certain users to be allowed to access the service. To date, not enough attention has been paid to policies that deal with such concerns. Most existing grid systems have support only limited types of policies (e.g. CPU resources). A few designs consider enforcing data policies in their architecture. Therefore, we propose a dynamic policy framework that addresses these issues (user-submitted policy, data policy and multiple Virtual Organizations (VOs).
Data Confidentiality in Mobile Ad hoc Networks
Hamza Aldabbas,Tariq Alwada'n,Helge Janicke,Ali Al-Bayatti
International Journal of Wireless & Mobile Networks , 2012,
Abstract: Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.
Data Confidentiality in Mobile Ad hoc Networks
Hamza Aldabbas,Tariq Alwada'n,Helge Janicke,Ali Al-Bayatti
Computer Science , 2012, DOI: 10.5121/ijwmn.2012.4117
Abstract: Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.
Managing Knowledge Repository in Kashmir: Leap towards a Knowledge Based Society
Dr. Sumeer Gul,Tariq Ahmad Shah
Trends in Information Management , 2011,
Abstract: Purpose:Knowledge is considered as the lifeline of global economy and its proper management leads to successful knowledge economies. Knowledge based society calls for effective knowledge management and a great need is felt in Kashmir, where it is in its teething stage. Times immemorial, knowledge in different forms has emancipated from Kashmir valley but due to number of reasons it couldn’t find its judicious use. So, a need to develop a knowledge based repository to enable collaboration among different societal organizations across the barriers of time and space is felt. The paper discusses the strategies to be adopted for managing a knowledge based repository that can provide the ability to connect end-users to a single gateway of customized, personalized, consolidated, integrated, and enhanced knowledge. Methodology:Documentary analysis is used to engineer a well managed knowledge based repository. Findings:The study found that a well managed interplay of men, money and material are the influential factors for nurturing a successful knowledge based platform. Research Implications:The study does not include all the knowledge management tools/services that can help in building a future vision knowledge repository for Kashmir but includes the ones that can lay down a fundamental platform for the same. Originality/Value:The study provides the suggestive measures to be implemented to achieve well knitted and effective management processes for the development of a knowledge based repository for a conflict zone-Kashmir.
EFFECTS OF SOCIOECONOMIC STATUS ON STUDENTS ACHIEVEMENT
Dr.Saifullah Saifi,Tariq Mehmood
International Journal of Social Sciences and Education , 2011,
Abstract: Socioeconomic status (SES) is a combined measure of an individual's or family’s economic and social position relative to others, based on income, education, and occupation. When analyzing a family’s SES, the mother's and father’s education and occupation are examined, as well as combined income, versus with an individual, when their own attributes are assessed (GOP,2008). The article is based on a study, which is an attempt to explore the various factors that have an impact on achievement, depending upon different socioeconomic status in the society and how does it effect the academic achievement of students. The study also examines the literature that reveals that the socioeconomic status of the parents can significantly contribute in the achievement of good grades at colleges. The paper illustrates the impact of income, occupation on educational attainment of students. The paper delineates the effect of many socioeconomic indicators on individual student achievement.
STUDENT SUPPORT SERVICES OF ALLAMA IQBAL OPEN UNIVERSITY, PAKISTAN
Dr.Saifullah Saifi,Tariq Mehmood
International Journal of Social Sciences and Education , 2011,
Abstract: The objective of the Study was to investigate the Student Support Services provided by Allama Iqbal Open University, Pakistan and its deficiencies. All the officers of BPS-17 and above of Directorate of Regional Services and Directorate of Student Advisory and Counseling Services and 50% of 100 tutors for the semesters Spring and Autumn 2008 were included in the study. For the purpose of collection of data, three questionnaires were developed, separate for each sample. Data collected through questionnaires were tabulated, analyzed and calculated using mean scores. Major findings of the study reveal that (1) Tutors received intimation letters from the region about tutorship in time; (2) Tutors discourage late submission of assignments; (3) Regional heads occasionally visit the tutorials; (4) DRS plans, coordinates and monitors the work of regional centers; (5) Regions were equipped with modern A.V. aids; (6) DRS was provided sufficient funds; (7) Students Advisory and Counseling facilitates the learners. It was concluded that tutors discourage late submission of assignments, regions solved the problems of students, Student Advisory Service facilitates the distance learners and the staff of Students Advisory was trained. The recommendations made are included; assignments may be returned under postal cover; regional centers should respond to the queries of tutors; DRS should be provided trained staff; there should be transport facilities at the DRS; and the staff of Students Advisory and Counseling may be trained in their work.
ATTRIBUTION OF MOTIVATIONAL LEVEL OF SECONDARY SCHOOL TEACHER’S, PERFORMANCE TO THEIR TEACHING EXPERIENCE
Amna Ghulam Nabi,Dr Tariq Mehmood Khan
International Journal of Social Sciences and Education , 2011,
Abstract: This study intends to identify the effects of teaching experience on the motivation level of secondary school teacher’s performance. The objectives of the study were to explore the motivation level of secondary school teacher’s performance and to find out the effects of teaching experience on the motivation levels of secondary school teacher’s performance and to give recommendations in the light of study. This empirical study was conducted through a standardized questionnaire for finding out motivation levels of teacher’s performance during three stages of their teaching experience. Cluster and random sampling technique was used to select schools and then teachers. Analysis of variance and post hoc test of significance were used to compare the teaching experience groups. It was concluded that the secondary school teachers are more motivated at the beginning of their job and gradually lose their motivation levels of performance.
Page 1 /204967
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.