scispace - formally typeset
Search or ask a question
Author

Nidal A. Al-Dmour

Other affiliations: Mutah University
Bio: Nidal A. Al-Dmour is an academic researcher from Ajman University of Science and Technology. The author has contributed to research in topics: Computer science & Artificial intelligence. The author has an hindex of 3, co-authored 6 publications receiving 38 citations. Previous affiliations of Nidal A. Al-Dmour include Mutah University.

Papers
More filters
Proceedings ArticleDOI
06 Oct 2022
TL;DR: In this article , a fuzzy expert system was used for skin cancer detection using asymmetry, color, border, evolving, and diameter features, and simulation results showed better results than earlier published results.
Abstract: Skin cancer is a widespread and fatal disease in developing countries nowadays. Hence initial phase medication is possible. Skin cancer arose due to the aberrant expansion of skin cells. There could be many other feasible causes for skin cancer. It is so difficult to detect skin cancer. Melanoma and non-melanoma are frequent categories of skin cancer. It is anticipated that virtually 2000 people die due to non-melanoma lesions. In this paper proposed skin cancer detection technique is applied using a fuzzy expert system established on asymmetry, color, border, evolving, and diameter. Simulation results show better results than earlier published results.

57 citations

Journal Article
TL;DR: Two P2P protocols for resource discovery are presented: the Query Resource Discovery Mechanism (QRDM), and the Seeking Resource Discovery mechanism (SRDM), based on the main characteristics of P1P systems: decentralization and selforganization.
Abstract: One of the basic services in the Grid is resource discovery. When a user request services, he gives a set of attributes that should be satisfied by a candidate resource. The resource discovery mechanism returns a set of best resources for the given set of attributes. We present two P2P protocols for resource discovery: the Query Resource Discovery Mechanism (QRDM), and the Seeking Resource Discovery Mechanism (SRDM). They are based on the main characteristics of P2P systems: decentralization and selforganization.

21 citations

Proceedings ArticleDOI
24 May 2022
TL;DR: The research has found that cyber security threats are a major problem in digital banking and has used a theoretical analysis method involving secondary information sources.
Abstract: Digital banking is the new form of banking that involves using the internet and mobile applications and excludes the use of pen and paper. One of the main issues that are associated with the form of banking is the presence of several forms of security risks. These risks are caused due to criminal activities of hackers and fraudsters who aim to steal people's money. Therefore, an efficient security system that involves multiple verifications, authentication processes, and data encryption are needed to combat such a threat. There has been much other work about this topic by other authors. By analyzing the finding from all of these sources, the STUDY has found that cyber security threats are a major problem in digital banking. Most people are not even aware or concerned about this matter. The research has used a theoretical analysis method involving secondary information sources. The research has also been able to bring out some hypotheses about this topic which it has also been able to support by using the statements and graphical charts given by other authors in their previous works about this topic. The research topic is interesting and can be used to do further research in the future.

20 citations

Proceedings ArticleDOI
05 Jul 2004
TL;DR: ParCop uses the P2P model to guard against common problems that other systems suffer from, such as server failure and connection bottleneck, and supports the master/worker style of application.
Abstract: We present ParCop, a decentralized peer-to-peer (P2P) computing system. In ParCop, the data and tasks are mobilized and flow freely between the computational resources (peers). ParCop allows each peer to utilize as well as to offer computing resources. ParCop uses the P2P model to guard against common problems that other systems suffer from, such as server failure and connection bottleneck. ParCop supports the master/worker style of application, which can be broken down into non-communicating and independent tasks.

18 citations

Proceedings ArticleDOI
12 Jan 2020
TL;DR: Two real-life cases were analyzed to show how modern businesses in the music industry implement big data and Internet technologies to ensure their success in the market and the benefits and drawbacks of implementing the modern digital business model.
Abstract: This research discusses the effect of big data and Internet technologies on the music industry. Specifically, this paper addresses two research questions; (1) how do modern businesses in the music industry implement the use of Internet technologies and big data to ensure their success in the market, and (2) what are the advantages and drawbacks of implementing digital business models in the music industry? To answer the research questions, two real-life cases (i.e. Shazam and Spotify) were analyzed to show how modern businesses in the music industry implement big data and Internet technologies to ensure their success in the market. Furthermore, previous literature and secondary resources were used to explain the development of traditional business models into digital business models in the music industry. In addition to discussing the benefits and drawbacks of implementing the modern digital business model.

13 citations


Cited by
More filters
Proceedings Article
01 Jan 2001
TL;DR: The Compute Power Market (CPM) as mentioned in this paper is a market-based resource management and job scheduling system for grid computing on Internet-wide computational resources, particularly low-end personal computing devices.
Abstract: The Compute Power Market (CPM) is a market-based resource management and job scheduling system for grid computing on Internet-wide computational resources, particularly low-end personal computing devices. It transforms the metacomputing environment into a computational market, wherein one can solve problems by renting computational power, storage, and special services from idle resources (computers). The CPM primarily comprises markets, resource consumers, resource providers and their interactions. It supports various economic models (commodity market model, contract-net/tendering, and auction) for resource pricing and mapping between service consumers and providers. The paper proposes a decentralized computation market with multiple markets and numerous consumers and providers spread across the grid environment. The paper further discusses the basic architecture and the components involved in markets, consumers and providers, namely: a Market Server, a Market Resource Agent, a Market Resource Broker and Market Trader and scheduler used for negotiation and job deployment.

132 citations

Proceedings ArticleDOI
10 Jul 2006
TL;DR: A novel, extensible user-level decentralized technique to discover, establish and maintain overlay links to tunnel IP packets over different transports (including UDP and TCP) and across firewalls is described.
Abstract: This paper describes WOW, a distributed system that combines virtual machine, overlay networking and peer-to-peer techniques to create scalable wide-area networks of virtual workstations for high-throughput computing. The system is architected to: facilitate the addition of nodes to a pool of resources through the use of system virtual machines (VMs) and self-organizing virtual network links; to maintain IP connectivity even if VMs migrate across network domains; and to present to end-users and applications an environment that is functionally identical to a local-area network or cluster of workstations. We describe a novel, extensible user-level decentralized technique to discover, establish and maintain overlay links to tunnel IP packets over different transports (including UDP and TCP) and across firewalls. We also report on several experiments conducted on a testbed WOW deployment with 118 P2P router nodes over PlanetLab and 33 VMware-based VM nodes distributed across six firewalled domains. Experiments show that the latency in joining a WOW network is of the order of seconds: in a set of 300 trials, 90% of the nodes self-configured P2P routes within 10 seconds, and more than 99% established direct connections to other nodes within 200 seconds. Experiments also show that the testbed delivers good performance for two unmodified, representative benchmarks drawn from the life-sciences domain. The testbed WOW achieves an overall throughput of 53 jobs/minute for PBS-scheduled executions of the MEME application (with average single-job sequential running time of 24.1s) and a parallel speedup of 13.5 for the PVM-based fastDNAml application. Experiments also demonstrate that the system is capable of seamlessly maintaining connectivity at the virtual IP layer for typical client/server applications (NFS, SSH, PBS) when VMs migrate across a WAN

97 citations

Journal ArticleDOI
TL;DR: The algorithm is compared with previous algorithms using simulations and results and it is shown that the number of nodes visited in the resource discovery algorithm is less than that for other algorithms, and the difference would be significant with an increase in thenumber of nodes.

30 citations

Journal ArticleDOI
TL;DR: This paper presents the performance evaluation of the proposed trust-aware resource discovery mechanism by providing a number of simulation tests in Grid systems of different sizes.

28 citations

Journal ArticleDOI
TL;DR: IPOP, a network virtualization technique that builds upon a novel, extensible user-level decentralized technique to discover, establish and maintain overlay links to tunnel IP packets over different transports (including UDP and TCP) and across firewalls is described.
Abstract: This paper describes WOW, a distributed system that combines virtual machine, overlay networking and peer-to-peer techniques to create scalable wide-area networks of virtual workstations for high-throughput computing. The system is architected to: facilitate the addition of nodes to a pool of resources through the use of system virtual machines (VMs) and self-organizing virtual network links; to maintain IP connectivity even if VMs migrate across network domains; and to present to end-users and applications an environment that is functionally identical to a local-area network or cluster of workstations. We describe IPOP, a network virtualization technique that builds upon a novel, extensible user-level decentralized technique to discover, establish and maintain overlay links to tunnel IP packets over different transports (including UDP and TCP) and across firewalls. We evaluate latency and bandwidth overheads of IPOP and also time taken for a new node to become fully-routable over the virtual network. We also report on several experiments conducted on a testbed WOW deployment with 118 P2P router nodes over PlanetLab and 33 VMware-based VM nodes distributed across six firewalled domains. Experiments show that the testbed delivers good performance for two unmodified, representative benchmarks drawn from the life-sciences domain. We also demonstrate that the system is capable of seamlessly maintaining connectivity at the virtual IP layer for typical client/server applications (NFS, SSH, PBS) when VMs migrate across a WAN.

28 citations