- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Advanced Software Engineering Methodologies
- Software Engineering Research
- Blockchain Technology Applications and Security
- Service-Oriented Architecture and Web Services
- IoT and Edge/Fog Computing
- Software Engineering Techniques and Practices
- Distributed and Parallel Computing Systems
- Distributed systems and fault tolerance
- Software Reliability and Analysis Research
- Capital Investment and Risk Analysis
- Digital Transformation in Industry
- Big Data and Business Intelligence
- Data Stream Mining Techniques
- Scientific Computing and Data Management
- Software Testing and Debugging Techniques
- Auction Theory and Applications
- Advanced Database Systems and Queries
- Peer-to-Peer Network Technologies
- Advanced Malware Detection Techniques
- Data Quality and Management
- Open Source Software Innovations
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
University of Birmingham
2016-2025
The Edgbaston Hospital
2016-2023
Chelsea and Westminster Hospital NHS Foundation Trust
2021
Queen Mary University of London
2021
Indian Institute of Tropical Meteorology
2021
The University of Texas at Austin
2021
Imperial College London
2021
Association for Computing Machinery
2019
University of Turku
2016
University College Birmingham
2009-2014
ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes data. In this article, leading scientists, researchers engineers discuss the transformative effects ChatGPT modern education. This research seeks improve our knowledge capabilities its use in education sector, identifying potential concerns challenges. Our preliminary evaluation concludes that performed differently each subject area including finance, coding maths. While has...
Novel computing systems are increasingly being composed of large numbers heterogeneous components, each with potentially different goals or local perspectives, and connected in networks which change over time. Management such quickly becomes infeasible for humans. As such, future should be able to achieve advanced levels autonomous behaviour. In this context, the system's ability self-aware self-express important. This paper surveys definitions current understanding self-awareness...
In the presence of scale, dynamism, uncertainty and elasticity, cloud software engineers faces several challenges when modeling Quality Service (QoS) for cloud-based services. These can be best managed through self-adaptivity because engineers' intervention is difficult, if not impossible, given dynamic uncertain QoS sensitivity to environment control knobs in cloud. This especially true shared infrastructure cloud, where unexpected interference caused by co-located services running on same...
Cloud computing, with its promise of (almost) unlimited computation, storage, and bandwidth, is increasingly becoming the infrastructure choice for many organizations. As cloud offerings mature, service-based applications need to dynamically recompose themselves self-adapt changing QoS requirements. In this paper, we present a decentralized mechanism such self-adaptation, using market-based heuristics. We use continuous double-auction allow decide which services choose, among on offer. view...
Migrating to microservices (microservitization) enables optimising the autonomy, replaceability, decentralised governance and traceability of software architectures. Despite hype for microservitization , state art still lacks consensus on definition microservices, their properties modelling techniques. This paper summarises views from informal literature reflect foundational context this paradigm shift. A strong can advance our understanding help guide architects in addressing its design...
Self-Adaptive Software (SAS) can reconfigure itself to adapt the changing environment at runtime, aiming continually optimize conflicted nonfunctional objectives (e.g., response time, energy consumption, throughput, cost, etc.). In this article, we present Feature-guided and knEe-driven Multi-Objective optimization for softwAre (FEMOSAA), a novel framework that automatically synergizes feature model Evolutionary Algorithm (MOEA) SAS runtime. FEMOSAA operates in two phases: design transposes...
Isolating fine-grained business functionalities byboundaries into entities called microservices is a core activityunderlying microservitization. We define microservitization asthe paradigm shift towards microservices. Determining theoptimal microservice boundaries (i.e. granularity) among the key design decisions thatinfluence Quality of Service (QoS) applicationat runtime. In this paper, we provide an architecturecentricapproach to model decision problem. build onambients - modelling...
The use of Internet Things (IoT) has introduced genuine concerns regarding data security and its privacy when are in collection, exchange, use. Meanwhile, blockchain offers a distributed encrypted ledger designed to allow the creation immutable tamper-proof records at different locations. While may enhance IoT with innate security, integrity, autonomous governance, management allocation still remain an architectural concern. In this article, we propose novel context-aware mechanism for...
Summary Microservices have gained wide recognition and acceptance in software industries as an emerging architectural style for autonomic, scalable, more reliable computing. The transition to microservices has been highly motivated by the need better alignment of technical design decisions with improving value potentials architectures. Despite microservices' popularity, research still lacks disciplined understanding consensus on principles activities underlying that transition. In this...
We motivate the need for a new requirements engineering methodology systematically helping businesses and users to adopt cloud services mitigating risks in such transition. The is grounded goal oriented approaches engineering. argue that Goal Oriented Requirements Engineering (GORE) promising paradigm goals are generic flexible statements of users' requirements, which could be refined, elaborated, negotiated, mitigated analysed economics considerations. describe steps proposed process...
Work on human self-awareness is the basis for a framework to develop computational systems that can adaptively manage complex dynamic tradeoffs at runtime. An architectural case study in cloud computing illustrates framework's potential benefits.
Software project scheduling in dynamic and uncertain environments is of significant importance to real-world software development. Yet most studies schedule projects by considering static deterministic scenarios only, which may cause performance deterioration or even infeasibility when facing disruptions. In order capture more features than the previous work, this paper formulates problem uncertainties events that often occur during development, constructs a mathematical model for resulting...
The Cloud computing paradigm has revolutionised the computer science horizon during past decade and enabled emergence of as fifth utility. It captured significant attention academia, industries, government bodies. Now, it emerged backbone modern economy by offering subscription-based services anytime, anywhere following a pay-as-you-go model. This instigated (1) shorter establishment times for start-ups, (2) creation scalable global enterprise applications, (3) better cost-to-value...
Elasticity in the cloud is often achieved by on-demand autoscaling. In such context, goal to optimize Quality of Service (QoS) and cost objectives for cloud-based services. However, difficulty lies facts that these objectives, e.g., throughput cost, can be naturally conflicted, QoS services interfere due shared infrastructure cloud. Consequently, dynamic effective trade-off decision making autoscaling necessary, yet challenging. particular, it even harder achieve well-compromised trade-offs,...
To address the privacy and security related challenges in Internet of Things (IoT) environment, we proposed a biometric method called BioSec to provide authentication IoT integrated with edge consumer electronics fingerprint authentication. Further, ensured data both transmission channel database standard encryption method. In this way, ensures secure private communication among devices Industry 4.0. Finally, have compared three methods used protect templates terms processing times...
Blockchain technology has gained recognition in industrial, financial, and various technological domains for its potential decentralizing trust peer-to-peer systems. A core component of blockchain is a consensus algorithm, most commonly Proof Work (PoW). PoW used blockchain-based systems to establish among peers; however, it does require the expenditure an enormous amount energy that affects environmental sustainability Energy minimization, whilst ensuring within use PoW, challenging...
Smart contracts on the blockchain play an important role in decentralised systems by automating and executing agreements without need for intermediaries. As these become integral to various domains, ensuring users’ understanding of their functioning is paramount. This article investigates explanations smart contracts, drawing inspiration from contract law principles established practices Explainable Artificial intelligence (XAI). It introduces key purposes—justification, clarification,...