Raed T. Al-Zubi
University of Jordan
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Raed T. Al-Zubi.
The Computer Journal | 2014
Raed T. Al-Zubi; Mohammed Hawa; Ghazi M. Al-Sukkar; Khalid A. Darabkh
IEEE 802.22 wireless regional area network (WRAN) is a cognitive radio-based network. WRANs are intended to be deployed by different service providers and designed to opportunistically utilize the unused TV bands. WRANs have to self-coexist with other overlapped WRANs in a distributed manner. Therefore, every service provider tries to acquire a band free of interference from others to satisfy a required quality of service. This self-coexistence problem is one of the major challenges in WRAN. In this paper, we propose a Markov-based distributed approach for mitigating this problem. We model the problem as an absorbing discrete-time Markov chain. In this model, if two or more overlapped WRANs select the same band, then each one should either stay or switch to another band according to a certain switching probability. This process continues until each one of the WRANs finds an interference-free band. In this case, the Markov chain reaches the absorbing state. This model is employed to find the optimal switching probability, which in turn minimizes the time required to reach the absorbing state. The switching probability is numerically found as a function of the number of overlapped WRANs and available bands. Extensive simulation has been conducted to validate our numerical results.
global communications conference | 2009
Raed T. Al-Zubi; Mohammad Z. Siam; Marwan Krunz
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sensing and data transmission for multiple adjacent WRAN cells. This challenge is known as coexistence problem. In this paper, we propose four schemes that aim at reducing the coexistence-problem effect. These schemes are based on a well-known operation mode of IEEE 802.22, namely dynamic frequency hopping (DFH). The first and second schemes are based on using omni-directional antennas at the base stations (BSs), whereas the BSs in the other two schemes use directional antennas. The first scheme, coined fixed-scheduling DFH (FDFH), bases upon a fixed scheduling of working channels for adjacent WRAN cells. The second scheme, called cooperative DFH (CDFH), cooperatively selects working channels. The third scheme, namely sectoral DFH (SDFH), is proposed to reduce the coordination overhead of CDFH via dividing a WRAN cell into sectors to decrease the chances of collisions between adjacent cells. Finally, we integrate FDFH and SDFH into a new scheme, called fixed-scheduling sectoral DFH (FSDFH), which exploits the advantages of both schemes with no additional overhead. Computer simulations are used to demonstrate the performance gain of the proposed schemes.
Wireless Personal Communications | 2014
Raed T. Al-Zubi; Marwan Krunz; Ghazi M. Al-Sukkar; Mohammed Hawa; Khalid A. Darabkh
Most of the schemes that were proposed to improve the performance of transmission control protocol (TCP) over mobile ad hoc networks (MANETs) are based on a feedback from the network, which can be expensive (require extra bandwidth) and unreliable. Moreover, most of these schemes consider only one cause of packet loss. They also resume operation based on the same stand-by parameters that might vary in the new route. Therefore, we propose two techniques for improving the performance of TCP over MANETs. The first one, called TCP with packet recycling (TCP-PR), allows the nodes to recycle the packets instead of dropping them after reaching the retransmission limit at the MAC layer. In the second technique, which is called TCP with adaptive delay window (TCP-ADW), the receiver delays sending TCP ACK for a certain time that is dynamically changed according to the congestion window and the trip time of the received packet. TCP-PR and TCP-ADW are simple, easy to implement, do not require network feedback, compatible with the standard TCP, and do not require distinguishing between the causes of packet loss. Our thorough simulations show that the integration of our two techniques improves the performance of TCP over MANETs.
Journal of Sensors | 2016
Mohammed Hawa; Khalid A. Darabkh; Raed T. Al-Zubi; Ghazi M. Al-Sukkar
The fusion of Wireless Sensor Networks (WSNs) and Cognitive Radio Networks (CRNs) into Cognitive Radio Sensor Networks (CRSNs) is quite an attractive proposal, because it allows a distributed set of low-powered sensor nodes to opportunistically access spectrum bands that are underutilized by their licensed owners (called primary users (PUs)). In addition, when the PUs are actively transmitting in their own bands, sensor nodes can switch to energy harvesting mode to obtain their energy needs (for free), to achieve almost perpetual life. In this work, we present a novel and fully distributed MAC protocol, called S-LEARN, that allows sensor nodes in a CRSN to entwine their RF energy harvesting and data transmission activities, while intelligently addressing the issue of disproportionate difference between the high power necessary for the node to transmit data packets and the small amount of power it can harvest wirelessly from the environment. The presented MAC protocol can improve both the network throughput and total harvested energy, while being robust to changes in the network configuration. Moreover, S-LEARN can keep the cost of the system low, and it avoids the pitfalls from which centralized systems suffer.
Iet Communications | 2012
Khalid A. Darabkh; Iyad F. Jafar; G.A. Sukkar; Gheith A. Abandah; Raed T. Al-Zubi
The convolutional coding is a very popular channel coding technique for the major reason of mitigating the probability of having many retransmissions because of difficult (noisy) communication channels. Sequential decoding is a type of convolutional codes that becomes of interest in wireless communication since it affords a decoding time that can be adaptive to channel state. In this study, the authors propose an improved queuing model, using discrete-time semi-Markov chain, which represents a modified packet retransmission policy over previously proposed queuing model. The authors queuing model mainly describes the behaviour of the buffer, which belongs to intermediate hops, when sequential decoding is implemented and concerns also about packets being transmitted over erroneous channels. The authors aim after conducting queuing analysis to find a real mathematical form for the average buffer occupancy as a network performance metric. Although the improved queuing model when incorporating the new policy for retransmission is very complicated, we are finally able to derive an expression for that performance metric considering practical assumptions. They further illustrate how the modified queuing model has a better impact on the end-to-end delay of messages, being transmitted without any extra buffering requirements needed, than the other relevant proposed queuing model. They conduct a simulation study using computer programming with the same assumptions used for queuing analysis to validate their analytical explanations and results. Furthermore, they validate the correctness of their closed-form expression through comparing its results with those obtained from expression related to a queuing model which discarded employing any retransmission policy.
international convention on information and communication technology electronics and microelectronics | 2014
Khalid A. Darabkh; Iyad F. Jafar; Raed T. Al-Zubi; Mohammed Hawa
With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of the researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape. The dimensions of the geometric shape are variable pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR). The contribution of our approach was immensely impressive.
Signal Processing | 2016
Iyad F. Jafar; Khalid A. Darabkh; Raed T. Al-Zubi; Ramzi Saifan
Reversible data hiding (RDH) algorithms are concerned with concealing data within images such that the original image can be fully recovered upon the extraction of hidden data. A substantial interest has grown recently in RDH algorithms that are based on using dual images in order to increase the embedding capacity. In this paper, we propose a RDH algorithm that is based on this concept. Effectively, embedding and extraction of data in the proposed algorithm is performed in three successive phases. In the first phase, four simple rules are used to embed about one bit in each pixel in the two images. On the other hand, the other two phases employ the concept of prediction for embedding secret data bits but without using any complex predictors. Specifically, these phases use one image as the prediction of the other image. Performance evaluation of the proposed algorithm showed its ability to embed around 1.23 bits per pixel with stego image quality above 48dB. Moreover, the proposed algorithm is of low computational complexity and requires no communication of overhead information. A novel dual-image reversible data hiding algorithm is proposed.Three consecutive stages that exploit the similarity between the two images to embed data are used.Significant increase in the embedding capacity with excellent stego image quality is achieved.
IEEE Transactions on Mobile Computing | 2010
Raed T. Al-Zubi; Marwan Krunz
Ultrawideband (UWB) communications has emerged as a promising technology for high data rate wireless personal area networks (WPANs). Several proposals for UWB-based WPANs have been made. One widely popular proposal was standardized by ECMA-368, and is based on OFDM. In this paper, we address one of the important aspects that impact the performance of this standard, namely interference management between different uncooperative beacon groups that operate simultaneously over the same area. We first propose an interference management distributed reservation protocol (IM-DRP) for OFDM-based UWB communications. IM-DRP aims at improving the throughput of an UWB WPAN by reducing interference between uncooperative beacon groups. We then integrate IM-DRP into the design of a rate adaptation strategy that exploits the multirate capability of OFDM-based UWB systems. Besides maintaining a target packet error rate, our proposed strategy attempts to reduce the required reservation time over a link, hence allowing more links to be simultaneously activated. This improves the overall network throughput. Simulations are used to demonstrate the performance gain of our proposed schemes.
Telecommunication Systems | 2016
Khalid A. Darabkh; Huda Ibeid; Iyad F. Jafar; Raed T. Al-Zubi
Recently, there has been a rapid progress in the field of wireless networks and mobile communications which makes the constraints on the used links clearly unconcealed. Wireless links are characterized by limited bandwidth and high latencies. Moreover, the bit-error-rate (BER) is very high in such environments for various reasons out of which weather conditions, cross-link interference, and mobility. High BER causes corruption in the data being transmitted over these channels. Therefore, convolutional encoding has been originated to be a professional means of communication over noisy environments. Sequential decoding, a category of convolutional codes, represents an efficient error detection and correction mechanism which attracts the attention for most of current researchers as for having a complexity that is dependent to the channel condition. In this paper, we propose a new queuing study over networking systems that make use of sequential decoders. Hence, the adopted flow and error control refer to stop-and-wait hybrid automatic repeat request. However, our queuing study is a novel extension to our prior work in which the lowest decoding complexity was fixed and did not account for the channel state. In other words, our proposed closed-form expression of the average buffer occupancy is totally generic and parameterized by not only channel condition and packet incoming rate, but also those that are automatically adapted to the channel conditions which include lower and upper bound decoding limits.
The Journal of Supercomputing | 2017
Khalid A. Darabkh; Wala’a S. Al-Rawashdeh; Raed T. Al-Zubi; Sharhabeel H. Alnabelsi
Advances introduced to electronics and electromagnetics leverage the production of low-cost and small wireless sensors. Wireless sensor networks (WSNs) consist of large amount of sensors equipped with radio frequency capabilities. In WSNs, data routing algorithms can be classified based on the network architecture into flat, direct, and hierarchal algorithms. In hierarchal (clustering) protocols, network is divided into sub-networks in which a node acts as a cluster head, while the rest behave as member nodes. It is worth mentioning that the sensor nodes have limited processing, storage, bandwidth, and energy capabilities. Hence, providing energy-efficient clustering protocol is a substantial research subject for many researchers. Among proposed cluster-based protocols, low-energy adaptive clustering hierarchy (LEACH) and threshold LEACH (T-LEACH), as well as modified threshold-based cluster head replacement (MT-CHR) protocols are of a great interest as of being energy optimized. In this article, we propose two protocols to cluster a WSN through taking advantage of the shortcomings of these protocols (i.e., LEACH, T-LEACH, and MT-CHR), namely centralized density- and threshold-based cluster head replacement (C-DTB-CHR) and C-DTB-CHR with adaptive data distribution (C-DTB-CHR-ADD) protocols that mainly aim at optimizing energy through minimizing the number of re-clustering operations, precluding cluster heads nodes premature death, deactivating some nodes located at dense areas from cluster’s participation, as well as reducing long-distance communications. In particular, in C-DTB-CHR protocol, some nodes belong to dense clusters are put in the sleeping mode based on a certain node active probability, thereby reducing the communications with the cluster heads and consequently prolonging the network lifetime. Moreover, the base station is concerned about setting up the required clusters and accordingly informing sensor nodes along with their corresponding active probability. C-DTB-CHR-ADD protocol provides more energy optimization through adaptive data distribution where direct and multi-hoping communications are possible. Interestingly, our simulation results show impressive improvements over what are closely related in the literature in relation to network lifetime, utilization, and network performance degradation period.