Claim Missing Document
Check
Articles

Found 4 Documents
Search

An innovative approach for enhancing capacity utilization in point-to-point voice over internet protocol calls M. Abualhaj, Mosleh; Abu-Shareha, Ahmad Adel; Al-Khatib, Sumaya Nabil; O. Hiari, Mohammad; Al-Mahadeen, Layth
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i1.pp488-496

Abstract

Voice over internet protocol (VoIP) calls are increasingly transported over computer-based networking due to several factors, such as low call rates. However, point-to-point (P-P) calls, as a division of VoIP, are encountering a capacity utilization issue. The main reason for that is the giant packet header, especially when compared to the runt P-P calls packet payload. Therefore, this research article introduced a method to solve the liability of the giant packet header of the P-P calls. The introduced method is named voice segment compaction (VSC). The VSC method employs the unneeded P-P calls packet header elements to carry the voice packet payload. This, in turn, reduces the size of the voice payload and improves network capacity utilization. The preliminary results demonstrated the importance of the introduced VSC method, while network capacity improved by up to 38.33%.
Tuning the K value in K-nearest neighbors for malware detection M. Abualhaj, Mosleh; Abu-Shareha, Ahmad Adel; Shambour, Qusai Y.; Al-Khatib, Sumaya N.; Hiari, Mohammad O.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 2: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i2.pp2275-2282

Abstract

Malicious software, also referred to as malware, poses a serious threat to computer networks, user privacy, and user systems. Effective cybersecurity depends on the correct detection and classification of malware. In order to improve its effectiveness, the K-nearest neighbors (KNN) method is applied systematically in this study to the task of malware detection. The study investigates the effect of the number of neighbors (K) parameter on the KNN's performance. MalMem-2022 malware datasets and relevant evaluation criteria like accuracy, precision, recall, and F1-score will be used to assess the efficacy of the suggested technique. The experiments evaluate how parameter tuning affects the accuracy of malware detection by comparing the performance of various parameter setups. The study findings show that careful parameter adjustment considerably boosts the KNN method's malware detection capability. The research also highlights the potential of KNN with parameter adjustment as a useful tool for malware detection in real-world circumstances, allowing for prompt and precise identification of malware.
Tel-MPLS: a new method for maximizing the utilization of IP telephony over MPLS networks M. Abualhaj, Mosleh; M. Al-Zyoud, Mahran; Abu-Shareha, Ahmad Adel; O. Hiari, Mohammad; Y. Shambour, Qusai
Bulletin of Electrical Engineering and Informatics Vol 12, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i6.6117

Abstract

Currently, the multiprotocol label switching (MPLS) standard is extremely prevalent. By exploiting the features provided by MPLS technology, a range of services, including IP telephony, have enhanced their overall performance. However, due to the size of the packet header, the IP telephony service consumes a significant portion of the MPLS network's available bandwidth. For instance, in IP telephony over MPLS networks, the packet header might account for as much as 80% of lost time and bandwidth. Designers working on IP telephony are making substantial efforts to address this issue. This study contributes to current efforts by proposing a novel approach called Tel-MPLS, which involves IP telephony over MPLS. TelMPLS approach uses the superfluous fields in the IP telephony packet's header to retain the packet data, therefore lowering or zeroing the IP telephony packet's payload. Tel-MPLS is an approach that significantly reduces the bandwidth of IP telephony MPLS networks. According to the findings, the Tel-MPLS approach is capable of reducing the amount of bandwidth that is lost by 12% when using the G.729 codec.
Exploring the dynamics of providing cognition using a computational model of cognitive insomnia Rateb, Roqia; M. Abualhaj, Mosleh; Alsaaidah, Adeeb; A. Alsharaiah, Mohammad; Shorman, Amaal; Jaber Thalji, Nisrean
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp92-101

Abstract

Insomnia is a common sleep-related neuropsychological disorder that can lead to a range of problems, including cognitive deficits, emotional distress, negative thoughts, and a sense of insufficient sleep. This study proposes a providing computational dynamic cognitive model (PCDCM) insight into providing cognitive mechanisms of insomnia and consequent cognitive deficits. Since the support providing is significantly dynamic and it includes substantial changes as demanding condition happen. From this perspective the underlying model covers integrating of both coping strategies, provision preferences and adaptation concepts. The model was found to produce realistic behavior that could clarify conditions for providing support to handle insomnia individuals, which was done by employing simulation experiments under various negative events, personality resources, altruistic attitude and personality attributes. Simulation results show that, a person with bonadaptation and either problem focused or emotion focused coping can provide different social support based on his personality resources, personality attributes, and knowledge level, whereas a person with maladaptation regardless the coping strategies cannot provide any type of social support. Moreover, person with close tie tends to provide instrumental, emotional, and companionship support than from weak tie. Finally, a mathematical analysis was used to examine the possible equilibria of the model.