Papers by Jameela Al-jaroodi
The International Arab Journal of Information Technology, 2007
2016 2nd International Conference on Intelligent Green Building and Smart Grid (IGBSG), 2016
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 2016
2015 IEEE 8th International Conference on Cloud Computing, 2015
2015 International Conference on Industrial Engineering and Operations Management (IEOM), 2015
... 15 What Is Available for Routing? ➢Limit discussion to Open/Dynamic MANETs (MOST CHALLENGING)... more ... 15 What Is Available for Routing? ➢Limit discussion to Open/Dynamic MANETs (MOST CHALLENGING) ... techniques Requires distributed CA Cannot prevent tunneling (wormhole)attacks Page 20. 09/29/2003 Security Issues in Wireless Mobile Ad Hoc Networks 20 ...
The International Arab Journal of Information …, 2007
Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'05), 2000
One of the problems with Java for real-time systems is the unpredictable behavior of garbage coll... more One of the problems with Java for real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-time applications. In this paper, we propose a technique that reduces and bounds the memory requirements for real-time Java programs. This technique can eliminate or reduce the need for GC and allows for a more predictable execution behavior and efficient utilization of the available memory. A theoretical model is presented and a number of benchmark tests are used to evaluate this technique in PERC, NewMonics' realtime JVM, and Sun's JVM. The results show that in some cases GC can be eliminated and an application's execution time decreases and becomes more predictable.

Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005., 2005
In this paper, we introduce a collaborative resource discovery mechanism to enhance system resour... more In this paper, we introduce a collaborative resource discovery mechanism to enhance system resource allocation and utilization by the distributed applications. The mechanism involves the collaboration of the software agents to collect, organize and efficiently exchange resources information. The main goal is to provide an accurate single system image for all the resources. The concept of virtual clusters is used to enhance localization of information and minimize exchanged messages. This mechanism is introduced as a part of the run-time support layer in Delmon. Delmon is a three-layer middleware framework for distributed systems, which includes the run-time support layer. This layer utilizes agents that reside on the participating machines and communicate with one another to perform the required functions. The agents hide the details of scheduling, controlling, monitoring, and executing user jobs, while the management of system resources is made transparent to the user. The proposed mechanism for collaborative resource discovery is based on the hierarchical structure of the agents and the organization and update protocols.

2011 44th Hawaii International Conference on System Sciences, 2011
While Wireless Sensor Networks (WSN) are starting to become more popular and used for many applic... more While Wireless Sensor Networks (WSN) are starting to become more popular and used for many applications, developing these applications is still not a trivial task due to many technical challenges such as limited hardware capabilities, communication, and energy resources; high heterogeneity; security; and quality of service (QoS) issues. Recently Service-Oriented Middleware (SOM) has become a preferred platform for developing WSN applications over the more traditional development platforms to help address these challenges. SOM logically views WSN as a service provider for user applications. The SOM provides abstractions for the complex underlying WSN infrastructure through a set of services needed by the WSN applications. These services can be data aggregation, adaptation, security, self-organization, reliability, and management services. This paper surveys the current SOM solutions for WSN. The paper discusses the trends and challenges of designing and developing these solutions for WSN.
Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications, 2000
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016

One of the problems facing the use of Java for real-time environments with limited memory such as... more One of the problems facing the use of Java for real-time environments with limited memory such as embedded systems is the unpredictability of running garbage collection. This introduces unexpected load on the system and causes undesirable delay for the real-time applications. In this paper, we study the realtime Java (RTJ) specification and some of the available implementations of RTJ such as PERC and Jbed. The main objective of the study is to determine the memory management tools provided for real-time applications that require frequent object creation. Based on this study, we propose an object-reuse technique to reduce memory requirements of intensive object creation in Java programs. This technique eliminates the need for using garbage collection and allows for a more deterministic task execution and efficient utilization of the available memory. A theoretical model is discussed and a number of benchmark tests are used to measure the different aspects of this technique. The benchmark results show that garbage collection can be eliminated and the execution time of the applications has improved. The results obtained motivated introducing a framework for enhancing and automating the object reuse technique.
1 Abstract: In this paper, we investigate the requirements and challenges of introducing mobility... more 1 Abstract: In this paper, we investigate the requirements and challenges of introducing mobility in large distributed systems . One major obstacle is resource discovery in the presence of mobile nodes. Collaborative resource discovery mechanisms are available to handle static to semi-static resources. However, incorporating mobile users introduces a different set of problems. First, how do we know when a resource becomes available? How do we identify the resource, its current location and its moving patterns? A middleware framework to conceptualize the mobile environment and the associated issues is introduced. It involves the collaboration of software agents residing on the group members' nodes to collect, organize and efficiently exchange resources information.

Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003, 2003
This paper introduces an object-passing model for parallel and distributed application developmen... more This paper introduces an object-passing model for parallel and distributed application development. Object passing provides the object-oriented application developer with powerful yet simple methods to distribute and exchange data and logic (objects) among processes. The model extends message passing, while exploiting the advantages of the object-oriented paradigm. In addition, the model provides a portable framework for executing applications across multiple platforms, thus effectively exploiting available resources to gain more processing power. A number of advantageous aspects of adopting object passing are discussed, in addition to highlighting the differences between message passing, represented by MPI, and object passing. Another advantage is the model's suitability for heterogeneous systems. When implemented with a portable language like Java, it can support parallel and distributed applications spanning a collection of heterogeneous platforms. This form of execution will eventually allow for full utilization of available resources for any given application written using this model.

Wireless sensor and ad hoc networks are gaining a lot of attention in research lately due to thei... more Wireless sensor and ad hoc networks are gaining a lot of attention in research lately due to their importance in enabling mobile wireless nodes to communicate without any predetermined infrastructure. Routing protocol in wireless sensor and ad hoc networks discover a multi-hop route between source and destination nodes. This paper presents RAS: a Reliable routing protocol for wireless Ad hoc and Sensor networks. In the RAS protocol, increased reliability isachieved by the maintenance of a reliability factor by the nodes. The value of this factor is increased when nodes participate successfully in data transmissions. This is determined through the use of positive and passive acknowledgements. During the path discovery process, an intermediate node only extends the request message to nodes that have a minimal reliability factor which is specified by the source. Additional optimizations are included in order to increase the efficiency and performance of the network. Full Text at Spring...
2015 International Conference on Unmanned Aircraft Systems (ICUAS), 2015

IFIP – The International Federation for Information Processing, 2008
Wireless sensor and ad hoc networks are gaining a lot of attention in research lately due to thei... more Wireless sensor and ad hoc networks are gaining a lot of attention in research lately due to their importance in enabling mobile wireless nodes to communicate without any predetermined infrastructure. Routing protocol in wireless sensor and ad hoc networks discover a multi-hop route between source and destination nodes. This paper presents RAS: a Reliable routing protocol for wireless Ad hoc and Sensor networks. In the RAS protocol, increased reliability is achieved by the maintenance of a reliability factor by the nodes. The value of this factor is increased when nodes participate successfully in data transmissions. This is determined through the use of positive and passive acknowledgements. During the path discovery process, an intermediate node only extends the request message to nodes that have a minimal reliability factor which is specified by the source. Additional optimizations are included in order to increase the efficiency and performance of the network.
Uploads
Papers by Jameela Al-jaroodi