Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammed Hawa is active.

Publication


Featured researches published by Mohammed Hawa.


The Computer Journal | 2014

Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs

Raed T. Al-Zubi; Mohammed Hawa; Ghazi M. Al-Sukkar; Khalid A. Darabkh

IEEE 802.22 wireless regional area network (WRAN) is a cognitive radio-based network. WRANs are intended to be deployed by different service providers and designed to opportunistically utilize the unused TV bands. WRANs have to self-coexist with other overlapped WRANs in a distributed manner. Therefore, every service provider tries to acquire a band free of interference from others to satisfy a required quality of service. This self-coexistence problem is one of the major challenges in WRAN. In this paper, we propose a Markov-based distributed approach for mitigating this problem. We model the problem as an absorbing discrete-time Markov chain. In this model, if two or more overlapped WRANs select the same band, then each one should either stay or switch to another band according to a certain switching probability. This process continues until each one of the WRANs finds an interference-free band. In this case, the Markov chain reaches the absorbing state. This model is employed to find the optimal switching probability, which in turn minimizes the time required to reach the absorbing state. The switching probability is numerically found as a function of the number of overlapped WRANs and available bands. Extensive simulation has been conducted to validate our numerical results.


Wireless Personal Communications | 2014

Packet Recycling and Delayed ACK for Improving the Performance of TCP over MANETs

Raed T. Al-Zubi; Marwan Krunz; Ghazi M. Al-Sukkar; Mohammed Hawa; Khalid A. Darabkh

Most of the schemes that were proposed to improve the performance of transmission control protocol (TCP) over mobile ad hoc networks (MANETs) are based on a feedback from the network, which can be expensive (require extra bandwidth) and unreliable. Moreover, most of these schemes consider only one cause of packet loss. They also resume operation based on the same stand-by parameters that might vary in the new route. Therefore, we propose two techniques for improving the performance of TCP over MANETs. The first one, called TCP with packet recycling (TCP-PR), allows the nodes to recycle the packets instead of dropping them after reaching the retransmission limit at the MAC layer. In the second technique, which is called TCP with adaptive delay window (TCP-ADW), the receiver delays sending TCP ACK for a certain time that is dynamically changed according to the congestion window and the trip time of the received packet. TCP-PR and TCP-ADW are simple, easy to implement, do not require network feedback, compatible with the standard TCP, and do not require distinguishing between the causes of packet loss. Our thorough simulations show that the integration of our two techniques improves the performance of TCP over MANETs.


Journal of Sensors | 2016

A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks

Mohammed Hawa; Khalid A. Darabkh; Raed T. Al-Zubi; Ghazi M. Al-Sukkar

The fusion of Wireless Sensor Networks (WSNs) and Cognitive Radio Networks (CRNs) into Cognitive Radio Sensor Networks (CRSNs) is quite an attractive proposal, because it allows a distributed set of low-powered sensor nodes to opportunistically access spectrum bands that are underutilized by their licensed owners (called primary users (PUs)). In addition, when the PUs are actively transmitting in their own bands, sensor nodes can switch to energy harvesting mode to obtain their energy needs (for free), to achieve almost perpetual life. In this work, we present a novel and fully distributed MAC protocol, called S-LEARN, that allows sensor nodes in a CRSN to entwine their RF energy harvesting and data transmission activities, while intelligently addressing the issue of disproportionate difference between the high power necessary for the node to transmit data packets and the small amount of power it can harvest wirelessly from the environment. The presented MAC protocol can improve both the network throughput and total harvested energy, while being robust to changes in the network configuration. Moreover, S-LEARN can keep the cost of the system low, and it avoids the pitfalls from which centralized systems suffer.


international convention on information and communication technology electronics and microelectronics | 2014

An improved image least significant bit replacement method

Khalid A. Darabkh; Iyad F. Jafar; Raed T. Al-Zubi; Mohammed Hawa

With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of the researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape. The dimensions of the geometric shape are variable pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR). The contribution of our approach was immensely impressive.


Peer-to-peer Networking and Applications | 2013

On enhancing reputation management using Peer-to-Peer interaction history

Mohammed Hawa; Loqman As-Sayid-Ahmad; Loay D. Khalaf

Cooperation incentive mechanisms are an essential ingredient to the success of Peer-to-Peer (P2P) systems as they restraint the phenomenon of free-riding. We introduce an enhancement on reputation-based cooperation incentives used by the eDonkey2000 (ED2K) P2P file sharing network. This enhancement, called History-based Reputation System (HRS), can achieve better detection and control of free-riders, and by doing so enhances the scalability and fairness of the P2P system. HRS does not need the help of dedicated servers and/or central authorities, thus avoiding a single-point of failure. In addition, simulation results show that HRS achieves higher average download rate and smaller average download time for altruistic peers in a file sharing P2P system.


international test conference | 2015

A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method

Khalid A. Darabkh; Iyad F. Jafar; Raed T. Al-Zubi; Mohammed Hawa

With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive. DOI: http://dx.doi.org/10.5755/j01.itc.44.3.8949


International Journal of Communication Systems | 2017

Distributed opportunistic spectrum sharing in cognitiveradio networks

Mohammed Hawa; Ahmad AlAmmouri; Ala Alhiary; Nidal Alhamad

Summary In cases where the licensed radio spectrum is underutilized, cognitive radio technology enables cognitive devices to sense and then dynamically access this scarce resource making the most out of it. In this work, we introduce a simple and intuitive, yet powerful and efficient, technique that allows opportunistic channel access in cognitive radio systems in a completely distributed fashion. Our proposed method achieves very high values of spectrum utilization and throughput. It also minimizes interference between cognitive base stations and the primary users licensed to use the spectrum. The algorithm responds quickly and efficiently to variations in the network parameters and also achieves a high degree of fairness between cognitive base stations. Copyright


Engineering Applications of Artificial Intelligence | 2013

Light-assisted A* path planning

Mohammed Hawa

This paper introduces a novel variant of the A^@? path planning algorithm, which we call Light-assisted A^@? (or LA^@? for short). The LA^@? algorithm expands less nodes than A^@? during the search process, especially in scenarios where there are complex-shaped obstacles in the path between the start and goal nodes. This is achieved using the concept of (virtual) light which identifies and demotes dead-end paths blocked by obstacles, thus ensuring that the search stays focused on promising paths. Three path planning problems are used to test the performance of LA^@?. These include path finding in a grid cluttered by randomly placed obstacles, robot navigation in a map containing multiple solid walls, and finally mazes. The results of these experiments show that LA^@? can achieve orders of magnitude improvement in performance over A^@?. In addition, LA^@? results in near-optimal solutions that are very close to the optimal path obtained by the conventional A^@? algorithm.


Computers & Electrical Engineering | 2018

MT-CHR: A modified threshold-based cluster head replacement protocol for wireless sensor networks

Khalid A. Darabkh; Wala'a S. Al-Rawashdeh; Mohammed Hawa; Ramzi Saifan

Abstract The Threshold-based Low-energy Adaptive Clustering Hierarchy (T-LEACH) protocol declares that cluster heads do not have to turn over every round but rather every batch of rounds. In other words, nodes keep serving as cluster heads as long as their energy is higher than a threshold energy. This article imposes upon major drawbacks of T-LEACH protocol and presents a Modified Threshold-based Cluster Head Replacement (MT-CHR) protocol. In the MT-CHR protocol, a new probability of being a cluster head, for any node in any round, has been proposed which agrees fairly with the assumptions introduced in LEACH protocol. Moreover, a new expression for threshold energy is proposed in which delaying the first node death and avoiding any data loss are taken into consideration. The performance of MT-CHR is evaluated using alive nodes, network lifetime, as well as network utilization performance metrics. The results are further compared with those obtained importantly from LEACH and T-LEACH protocols and the contributions of MT-CHR protocol are extremely impressive. As far as the real sensor network is concerned, the MT-CHR protocol is highly applicable and very effective as long-lasting networks are ascertained.


Computer Applications in Engineering Education | 2018

An efficient speech recognition system for arm‐disabled students based on isolated words

Khalid A. Darabkh; Laila Haddad; Saadeh Z. Sweidan; Mohammed Hawa; Ramzi Saifan; Sharhabeel H. Alnabelsi

Over the previous decades, a need has emerged to empower human‐machine communication systems, which are essential to not only perform actions, but also obtain information especially in education applications. Moreover, any communication system has to introduce an efficient and easy way for interaction with a minimum possible error rate. The keyboard, mouse, trackball, touch‐screen, and joystick are all examples of tools which were built to provide mechanical human‐to‐machine interaction. However, a system with the ability to use oral speech, which is the natural form of communication between humans instead of mechanical communication systems, can be more practical for normal students and even a necessity for arm‐disabled students who cannot use their arms to handle traditional education tools like pens and notebooks. In this paper, we present a speech recognition system that allows arm‐disabled students to control computers by voice as a helping tool in the educational process. When a student speaks through a microphone, the speech is divided into isolated words which are compared with a predefined database of huge number of spoken words to find a match. After that, each recognized word is translated into its related tasks which will be performed by the computer like opening a teaching application or renaming a file. The speech recognition process discussed in this paper involves two separate approaches; the first approach is based on double thresholds voice activity detection and improved Mel‐frequency cepstral coefficients (MFCC), while the second approach is based on discrete wavelet transform along with modified MFCC algorithm. Utilizing the best values for all parameters in just mentioned techniques, our proposed system achieved a recognition rate of 98.7% using the first approach, and 98.86% using the second approach of which is better in ratio than the first one but slower in processing which is a critical point for a real time system. Both proposed approaches were compared with other relevant approaches and their recognition rates were noticeably higher.

Collaboration


Dive into the Mohammed Hawa's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge