Skip Navigation Links Home : Details
             
Name : Ali Younis Maqousi

Academic Rank: Assistant Professor

Administrative Position : Faculty Academic Member

Office 7304       Ext No 1999

Email : amaqousi@uop.edu.jo

Specialization: Computer Science/Networking

Graduate Of: Oxford Brookes University / Oxford

Qualification

    Qualification

    University

    Country

    Year

    Ph.D
    Oxford Brookes University / Oxford
    United Kingdom
    2003



  • Journal Paper





      T. Balikhina, A. Maq, " The Evaluation of an Active Networking Approach for Supporting the QOS Requirements of Distributed Virtual Environments " , "International Journal of Simulation, Systems, Science & Technology",Vol.7,No.1, United Kingdom Simulation Society, UK, 03/10/2006 Abstract:
      This paper describes work that is part of a more general investigation into how Active Network ideas might benefit large scale Distributed-Virtual-Environments (DVEs). Active Network approaches have been shown to offer improved solutions to the Scalable Reliable Multicast problem, and this is in a sense the lowest level at which Active Networks might benefit DVEs in supporting the peer-to-peer architectures considered most promising for large scale DVEs. To go further than this, the key benefit of Active Networking is the ability to take away from the application the need to understand the network topology and delegate the execution of certain actions, for example intelligent message pruning, to the network itself. The need to exchange geometrical information results in a type of traffic that can place occasional, short-lived, but heavy loads on the network. However, the Level of Detail (LoD) concept provides the potential to reduce this loading in certain circumstances. This paper introduces the performance modelling approach being used to evaluate the effectiveness of active network approaches for supporting DVEs and presents an evaluation of messages filtering mechanisms, which are based on the (LoD) concept. It describes the simulation experiment used to carry out the evaluation, presents its results and discusses plans for future work. Download




      A. Maqousi, F. Ball, " The Development and Evaluation of a Monitoring Technique for M-FAC " , "International Journal of Simulation, Systems, Science & Technology ",Vol.3,No.1-2, United Kingdom Simulation Society, UK, 06/02/2003 Abstract:
      Abstract: This paper presents the development of a measurement based flow admission control (M-FAC) mechanism, which is used in conjunction with Class Based Queuing (CBQ) to support guaranteed services in multiservice packet switched networks. M-FAC uses an analytical queuing model to decide if a new flow may be admitted into a particular class, and bases this decision on the parameters provided by the flow’s source. However, once the new flow has been accepted, M-FAC continually monitors the arrival process in order to determine the true load on the class’ queue. This true load is then used in subsequent admission tests. The analytical model was developed in previous work, and this paper focuses on the development of the monitoring process. Download




      Hussein Al-Bahadili , " PERFORMANCE EVALUATION OF THE LAR-1P ROUTE DISCOVERY ALGORITHM " , "The International Journal of Computer Network and Communications (IJCNC)",Vol.3,No.6, AIRCC, Victoria, Australia, 11/20/2011 Abstract:
      The location-aided routing scheme 1 (LAR-1) and probabilistic algorithms were combined together into a new algorithm for route discovery in mobile ad hoc networks (MANETs) called (LAR-1P) [1]. Simulation results demonstrated that, on network scale, for a uniform random node distribution and for a specific simulation setup (time); the LAR-1P algorithm reduces the number of retransmissions as compared to LAR-1 at a cost of insignificant reduction in the average network reachability. However, on zone scale, the algorithm provides an excellent performance in high-density zones, while in low-density zones; it almost preserves the performance of LAR-1. This paper provides a detail analysis of the performance of the LAR-1P algorithm through various simulations, where the actual numerical values for the number of retransmissions and reachability in high- and low-density zones are estimated to demonstrate the effectiveness and significance of the algorithm and how it provides better performance than LAR-1 in high-density zones. Furthermore, the effect of the total number of nodes on the average network performance is also investigated. Download




      Hussein Al-Bahadili,, " Analyzing the Effect of Nodes Density on the Performance of the LAR-1P Algorithm " , "Journal of Information Technology and Web Engineering (IJITWE)",Vol.7,No.2, IGI-Global, USA, 08/13/2012 Abstract:
      The location-aided routing scheme 1 (LAR-1) and probabilistic algorithms are combined together into a new algorithm for route discovery in mobile ad hoc networks (MANETs) called LAR-1P. Simulation results demonstrated that the LAR-1P algorithm reduces the number of retransmissions as compared to LAR-1 without sacrificing network reachability. Furthermore, on a sub-network (zone) scale, the algorithm provides an excellent performance in high-density zones, while in low-density zones; it preserves the performance of LAR-1. This paper provides a detailed analysis of the performance of the LAR-1P algorithm through various simulations, where the actual numerical values for the number of retransmissions and reachability in high- and low-density zones were computed to demonstrate the effectiveness and significance of the algorithm and how it provides better performance than LAR-1 in high-density zones. In addition, the effect of the total number of nodes on the average network performance is also investigated.




      Ali Maqousi, Tatiana, " An Effective Method for Information Security Awareness Raising Initiatives " , "International Journal of Comuter Science & Information Technology (IJCSIT)",Vol.5,No.2, AIRCC, Victoria, Australia, 04/30/2013 Abstract:
      Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their activities and provide E-Services for their customers. In the process, whether they know it or not, those organizations are also opening themselves up to the risk of information security breaches. Therefore protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often underestimated. Research has shown that one of the most significant threats to information security comes not from external attack but rather from the system's users, because they are familiar with the infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only technological solutions to protect an organization’s assets is not enough; there is a need to consider the human factor by raising users’ security awareness. Our contribution to this problem is to propose an Information Security Awareness Program that aims at raising and maintaining the level of users’ security awareness. This paper puts forward a general model for an information security awareness program and describes how it could be incorporated into an organization’s website through the process of development life cycle.




      Ali Maqousi, Tatiana, " A REFERENCE MODEL OF SECURITY REQUIREMENTS FOR EARLY IDENTIFICATION AND MEASUREMENT OF SECURITY AWARENESS PROGRAM " , "Journal of Theoretical and Applied Information Technology",Vol.63,No.1, Little Lion Scientific Islamabad Pakistan, Islamabad. PAKISTAN, 05/10/2014 Abstract:
      In practice, at software/system requirements assembly stages, the focus is regularly on the software security requirements as usually described at the system level this may lead to explicit security-related product which may be implemented as both in system and software. According to the ECSS standards internal security awareness is restricted to avoid illegal access to the software system and confidential data while the external security requirements related awareness is failing to put off the leak of secure output data awareness and illegal processes. In European, ISO 25021 a amount of terms are afforded to describe many types of aspirant security awareness requirements. This paper accumulates and systematizes these security awareness-related requirements into a standards-based reference model of the software security awareness; In the absence of such a model, such security awareness requirements are definitively assigned at software system testing time, stakeholders find out that a number of Security awareness requirements are neglected and additional efforts should be added to implement such awareness’s. Moreover, the proposed model may also be used for identify the functional size of security awareness programs using the ISO 19761 standard. This size may be used for estimation purposes.


  • Chapter in a Book





      Ali Maqousi, and Tat, " Building Security Awareness Culture to Serve E-Government Initiative " , "E-Services in the Public Sector: E-Government Strategies and Advancements",Vol.,No., Information Science Reference (an imprint of IGI Global), Pennsylvania, USA, 01/10/2009 Abstract:
      Recently, many countries have adopted E-Government initiatives for providing public E-Services to their citizens. These initiatives, together with the existing and emerging private initiatives which offer E-Services, lead to a dramatic increase in the number of Internet users. This will form what is now known as E-Society. All E-Government initiatives consider citizen-centered approach, where user’s security and privacy is a major issue. The level of citizen’s engagement in these initiatives will depend on the extent of his/her confidence in the security system used by these initiatives. This imposes the need for developing computer security packages. These packages are intended to help users protect their assets such as information, databases, programs, and computer services from any harm or damage. The level of harm or damage that could happen to assets varies from one user to another. This variation depends on: users’ awareness of possible threats, their knowledge of the source of threats, and if they are applying security controls or not. This paper aims to analyze current users’ level of awareness and to propose possible methods in order to increase the level of users’ awareness i.e. education, continues education, and training. This chapter is organized as follows: the first section presents an introduction, where the importance of security awareness to E-Government initiatives is highlighted and also it presents a research idea, the second section introduces the experimental design for a more comprehensive research that we are looking to carry on in later stages and specifies the objective of this stage, the third section presents results and discussions where we provide our own proposal of methods to increase the level of users awareness; finally, a conclusion is presented. Download




      A. Maqousi and T. Ba, " Wire and Wireless Local Area Networks Simulation: OPNET Tutorial " , "Simulation in Computer Network Design and Modeling: Use and Analysis",Vol.,No., , Hershey-New York, USA, 02/01/2012 Abstract:
      There has been a tremendous increase in the use of wire/wireless local area networks (LAN) with different network configurations. Therefore, it is so vital to have an accurate and a reliable generic platform to enable network developers, managers, security mangers, researchers, and students evaluating and investigating the performance of LANs of different technologies and configurations. Many network simulators have been developed throughout the years, such as: the optimized network engineering tool (OPNET), the network simulator (NS), the global mobile simulator (GloMoSim), etc. One of the most widely-used and powerful general-purpose network simulators is OPNET, which is an object-oriented simulation environment. This chapter provides two walk through tutorials on using OPNET IT Guru (Academic Edition of OPNET) for wire/wireless LANs simulations. These tutorials demonstrate in step-by-step fashion, the procedures of initiating new simulation, setting up the simulation parameters, running the simulation, and viewing the results. The first tutorial (Tutorial #1) simulates a wired LAN of 10 computers and one server connected to a single switch, and the second tutorial (Tutorial #2) simulates a wireless ad hoc network of 10 mobile nodes and one server. This chapter demonstrates that OPNET IT Guru is a powerful tool that can be used by a range of professional users to simulate, evaluate, and investigate the performance of wire and wireless LANs. Moreover, it encourages and helps students to easily perform network simulation for better understanding to the network performance under different network conditions. Download


  • Conference paper





      Ali Maqousi, and Tat, " User Security Awareness in E-Society " , "International Arab Conference of e-Technology, IACeT 2008",Vol.,No., Arab Open University, Amman, Jordan, 10/15/2008 Abstract:
      Recently, the growth in using computers and the Internet, forming what is now known as E-Society. This imposes the need for developing computer security packages. These packages are intended to help users protect their assets such as information, databases, programs, and computer services from any harm or damage. The level of harm or damage that could happen to assets varies from one user to another. This variation depends on: users’ awareness of possible threats, their knowledge of the source of threats, and if they are applying security controls or not. This paper aims to analyze current users’ level of awareness and to propose possible methods in order to increase the level of users’ awareness i.e. education, continues education, and training. The paper is organized as follows: first section presents an introduction, where the importance of security awareness is highlighted and also it presents a research idea, the second section introduces the experimental design for a more comprehensive research that we are looking to carry on in later stages and specifies the objective of this stage, third section presents results and discussions where we provide our own proposal of methods to increase level of users awareness; finally, conclusion is presented




      T. Balikhina, D. Duc, " Level of Detail Filtering in Active Networks to Support Distributed Virtual Environments " , "20th UK Performance Engineering Workshop",Vol.,No., University of Bradford, Bradford, UK, 07/01/2004 Abstract:
      T. Balikhina, D. Duce, A. Maqousi, and F. Ball, "Level of Detail Filtering in Active Networks to Support Distributed Virtual Environments, 20th UK Performance Engineering Workshop", July 2004, University of Bradford, UK.




      Suleiman Almasri, Al, " Assessment of 3.5G Network and Wireless Broadband in Developing World: Jordan as a case Study " , "International Conference on Information Society (i-Society 2011), IEEE UK/RI Computer Chapter",Vol.,No., , London, UK, 06/27/2011 Abstract:
      The number of 3.5G (beyond third generation) users was emerged throughout the world during the last few years. This is because it provides very advanced services such as Wireless Internet broadband and good quality video/voice telephone calls. In developing countries, this service is still at the initial phase. There are still some obstacles facing people of these countries to use this new service. This paper provides an overview about 3.5G in these countries: Jordan as a case study. It also discusses people’s expectations about this service via conducting a questionnaire targeted Internet users. The paper also presents a network assessment experimental test carried out to evaluate the network QoS at selected places of the area where this service is provided. The test was performed on three main network performance metrics: throughput, delay and packet loss.




      Maher Rantisi, Ali M, " The Development of a Dynamic and Robust Event-Based Routing Protocol in Wireless Sensor Networks for Environmental Monitoring " , "The IEEE Conference on Communication, science, & Information Engineering CCSIE 2011",Vol.,No., , London, UK, 07/25/2011 Abstract:
      Wireless Sensor Network (WSN) technology promises to allow users to monitor fine-grained, dynamic changes in an outdoor landscape. Such systems can be used to improve the local environment but there are significant problems to be overcome in translating this vision into working systems. This paper outlines the challenges and describes the issues involved in the design of a reactive and robust, event-driven routing protocol for environmental monitoring of soil moisture: when the rain falls and soil moisture is changing rapidly, measurements are collected frequently, whereas during dry periods between rainfall events, measurements are collected much less often. Hence any proposed solution must be reactive yet robust in these wireless environments. This paper outlines the challenges in supporting such an environment and demonstrates a solution approach based on the modification of a well known reactive routing protocol, AODV, as well as different routing algorithms that are able to adapt to changes in part or all of the sensor network. Proposals to build a testbed to evaluate the proposed solutions are outlined




      A. Maqousi, T. Balik, " Trustworthy Online Research Community System " , "International Conference on Science Communication, JHC 2012",Vol.,No., University of Lorraine, Nancy, France, 09/04/2012 Abstract:
      Research community faced many challenges to utilize social networking. This community is interested in sharing and disseminating its ideas and findings with special requirements such as privacy, trust, and communicating with the right audience. We proposed our approach to build trustworthy online system that enables researchers to communicate and disseminate their findings securely and to their audience.




      Ali Maqousi, Tatiana, " Towards an Open Architecture for Smart Grid Communications " , "the 1st International Conference on the Applications of Information Technology in the Development of Renewable Energy Processes & Systems (IT-DREPS)",Vol.,No., IEEEXplore, Amman, 05/30/2013 Abstract:
      This paper addresses the challenge of developing communications architecture for the Smart Grid. It considers the similarity between the QoS requirements for Smart Grid communication and those addressed by previous work into multiservice networks and QoS Architectures. It discusses this previous work within the context of Smart Grid requirements and identifies the contribution it could make to the development of Smart Grid communications architecture




      F.Ball, K.Basu, A.Ma, " Smart Grid Communications: A Renewed Challenge to Multiservice Networking " , "Proceedings of the Tenth International Network Conference (INC 2014)",Vol.,No., Plymouth University, Plymouth, UK, 06/10/2014 Abstract:
      This paper focuses on the multiservice aspects of the Smart Grid communications system with particular emphasis on the real time requirements of its control system. A general outline of the Smart Grid is presented and its general communications requirements are identified. The stringent real-time requirements of substation and transmission line control are discussed in greater detail. An overview of previous and current research into multiservice networking is given with the aim of identifying areas that need to be revisited, and extended, in order to meet the real time needs of the Smart Grid. The paper then presents proposals for future research into number of specific areas relevant to meeting these requirements.




      Abstract:
      this paper presents the work to build a software system that could be used to monitor and control home appliances. The main objective of the system is to reduce the electricity bill of residential buildings while preserving user's comfort. In addition to describing the system design authors present
  • Event Calendar
    <October 2017>
    SunMonTueWedThuFriSat
    1234567
    891011121314
    15161718192021
    22232425262728
    293031