Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Feras Al-Hawari is active.

Publication


Featured researches published by Feras Al-Hawari.


IEEE Transactions on Components, Packaging and Manufacturing Technology | 2011

Partitioned Latency Insertion Method With a Generalized Stability Criteria

Patrick Goh; Jose E. Schutt-Aine; Dmitri Klokotov; Jilin Tan; Ping Liu; Wenliang Dai; Feras Al-Hawari

This paper presents a modular approach to the high-frequency simulation of large networks. By utilizing the latency insertion method (LIM) and by studying the stability criteria of partitions of different latencies in the circuit, a robust method is formulated that is able to perform transient simulations significantly faster than the conventional LIM method. The LIM method is also extended to handle dependent sources, and a general stability criterion for selecting the time step, independent of the topology of the circuit, is proposed. The new method is verified with existing commercial tools for circuit simulations, and the improvement in run time is also depicted.


IEEE Transactions on Components, Packaging and Manufacturing Technology | 2011

Comparative Study of Convolution and Order Reduction Techniques for Blackbox Macromodeling Using Scattering Parameters

Jose E. Schutt-Aine; Patrick Goh; Yidnekachew S. Mekonnen; Jilin Tan; Feras Al-Hawari; Ping Liu; Wenliang Dai

In this paper, a fast convolution method using scattering parameters is presented for the macromodeling of blackbox multiport networks. The method is compared to model-order reduction passive macromodeling techniques in terms of robustness and computational efficiency. When scattering parameters are used as the transfer functions, convolution calculations can be accelerated to achieve superior performance and the resulting procedure leads to a robust, accurate, and efficient macromodel generation scheme. This paper examines the formulation of the convolution method. Model-order reduction techniques are reviewed and benchmark comparisons are performed.


workshop on signal propagation on interconnects | 2011

Partitioned latency insertion method (PLIM) with stability considerations

Patrick Goh; Jose E. Schutt-Aine; Dmitri Klokotov; Jilin Tan; Ping Liu; Wenliang Dai; Feras Al-Hawari

In this paper, we present a modular approach to the high frequency simulation of large networks by utilizing the latency insertion method (LIM) and considering the stability criteria of partitions of different latencies in the circuit. This results in a robust algorithm that is able to preserve the stability condition while improving the runtime of the overall transient simulation. An extension to the LIM to handle dependent sources is also presented, along with a generalized stability criteria for selecting a maximum stable time step.


workshop on signal propagation on interconnects | 2008

Blackbox Macromodel with S-Parameters and Fast Convolution

Jose E. Schutt-Aine; Jilin Tan; C. Kumar; Feras Al-Hawari

In this paper, the scattering parameters of blackbox multi-port networks are pre-processed in the frequency domain to satisfy causality. Next, they are approximated to yield weighted delta functions in the time domain thus allowing the fast simulation. The resulting procedure leads to a robust, accurate and efficient macromodel generation scheme.


electronics packaging technology conference | 2009

Application of the latency insertion method to circuits with blackbox macromodel representation

Jose E. Schutt-Aine; Dmitri Klokotov; Patrick Goh; Jilin Tan; Feras Al-Hawari; Ping Liu; Wenliang Dai

In this work the latency insertion method (LIM) is applied to the treatment of blackbox networks described by their frequency-domain scattering parameters. The method allows the simulation of passive macromodels in the LIM environment. This generalization allows LIM to simulate subnetworks with frequency-dependent parameters describing phenomena such as skin effect and substrate loss. The derivation of the algorithms is presented as well as simulation results to validate the method.


Computer Applications in Engineering Education | 2017

The software engineering of a three-tier web-based student information system MyGJU

Feras Al-Hawari; Anoud Alufeishat; Mai Alshawabkeh; Hala Barham; Mohammad Habahbeh

This paper discusses how the software development team at the German Jordanian University (GJU) adopted the project management and software development processes in the ISO/IEC 29110 series to implement a complex Student Information System (SIS). Specifically, it identifies the key points to be taken into consideration in the analysis, design, implementation, testing, and deployment phases during the iterative and incremental SIS development process. The SIS is a distributed three‐tier web‐based application that enables registrars to perform various tasks such as system setup, admission, registration, grades processing, graduation, and reporting. It was launched in the first 2015/2016 semester and enabled administration to maintain a comfortable learning environment, assess instructor performance, enhance teaching practices, and improve course content. The results of the system measurements and user survey assert that the SIS is feature rich, easy to use, fast, reliable, stable, highly available, and scalable.


Security and Communication Networks | 2018

An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks

Sahel Alouneh; Feras Al-Hawari; Ismail Hababeh; Gheorghita Ghinea

The need for effective approaches to handle big data that is characterized by its large volume, different types, and high velocity is vital and hence has recently attracted the attention of several research groups. This is especially the case when traditional data processing techniques and capabilities proved to be insufficient in that regard. Another aspect that is equally important while processing big data is its security, as emphasized in this paper. Accordingly, we propose to process big data in two different tiers. The first tier classifies the data based on its structure and on whether security is required or not. In contrast, the second tier analyzes and processes the data based on volume, variety, and velocity factors. Simulation results demonstrated that using classification feedback from a MPLS/GMPLS core network proved to be key in reducing the data evaluation and processing time.


2016 2nd International Conference on Open Source Software Computing (OSSCOM) | 2016

Innovative methodology for elevating big data analysis and security

Sahel Alouneh; Ismail Hababeh; Feras Al-Hawari; Tamer Alajrami

big amount of data and information transfer among, within, and through organizations all over the globe. This big data information may include sensitive, confidential and restricted data, like financial, legal or private information. Any loss, threat, or leakage of information may trigger high-security risk on such data. Securing big data during analysis phase is still a challenge, especially in cloud systems. This paper proposes a methodology to protect big data during analysis, by classifying data before any action such as moving, copying or processing can take place. Based on big data classification, the security procedures will be activated according to data level criticality.


Archive | 2009

Method and system for adaptive modeling and simulation of lossy transmission lines

Feras Al-Hawari; Jilin Tan; Jose Schutt-Aine


Archive | 2010

System and method for adapting electrical integrity analysis to parametrically integrated environment

Taranjit Singh Kukal; Feras Al-Hawari; Dennis Nagle; Raymond Komow; Jilin Tan

Collaboration


Dive into the Feras Al-Hawari's collaboration.

Top Co-Authors

Avatar

Jilin Tan

Cadence Design Systems

View shared research outputs
Top Co-Authors

Avatar

Ping Liu

Cadence Design Systems

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sahel Alouneh

German-Jordanian University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ismail Hababeh

German-Jordanian University

View shared research outputs
Researchain Logo
Decentralizing Knowledge