- Cloud Computing and Resource Management
- Software Engineering Research
- Advanced Software Engineering Methodologies
- Software Engineering Techniques and Practices
- Big Data and Business Intelligence
- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- Cloud Data Security Solutions
- Business Process Modeling and Analysis
- Blockchain Technology Applications and Security
- Software System Performance and Reliability
- Software Reliability and Analysis Research
- Fuzzy and Soft Set Theory
- Information and Cyber Security
- Data Quality and Management
- E-Government and Public Services
- Distributed and Parallel Computing Systems
- Advanced Database Systems and Queries
- Software Testing and Debugging Techniques
- Multi-Criteria Decision Making
- Distributed systems and fault tolerance
- Information Technology Governance and Strategy
- Technology Adoption and User Behaviour
- Scientific Computing and Data Management
- Model-Driven Software Engineering Techniques
Tech4i2
2023-2024
University of South Africa
2024
Institute of Development Studies
2023
University of Southampton
2023
Leeds Beckett University
2012-2022
Integrated Environmental Solutions (United Kingdom)
2021
Sathyabama Institute of Science and Technology
2018
Indian Space Research Organisation
2005-2016
Philips (United Kingdom)
1995-2002
Liverpool John Moores University
2002
Offering real-time data security for petabytes of is important cloud computing. A recent survey on states that the users' has highest priority as well concern. We believe this can only be able to achieve with an approach systematic, adoptable and well-structured. Therefore, paper developed a framework known Cloud Computing Adoption Framework (CCAF) which been customized securing data. This explains overview, rationale components in CCAF protect security. illustrated by system design based...
Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating (OPEX), improving the flexibility scalability of an entire network. In contrast to traditional dispatching, NFV can separate network functions from proprietary infrastructure gather these into resource pool that efficiently modify adjust service chains (SFCs). However, this emerging has some challenges. A major problem reliability, which involves ensuring availability...
Financialization has contributed to economic growth but caused scandals, misselling, rogue trading, tax evasion, and market speculation. To a certain extent, it also created problems in social instability. It is an important aspect of Enterprise Security, Privacy, Risk (ESPR), particularly risk research analysis. In order minimize the damaging impacts by lack regulatory compliance, governance, ethical responsibilities, trust, we propose Business Integrity Modeling Analysis (BIMA) framework...
This paper describes an ongoing process to define a suitable improvement model for story cards based requirement engineering and practices at agile software development environments. Key features of the SMM (Story card Maturity Model) are: solves problems related like requirements conflicts, missing requirements, ambiguous standard structure cards, address nonfunctional from exploration phase, use simplified tailored assessment method on CMM, which is poorly addressed CMM. CMM does not cover...
The offshore/onsite teams' effectiveness of knowledge transfer is significantly measured by various kinds factors. In this paper, we propose a (KT) assessment framework which integrates four criteria for evaluating the KT GSD teams. These are: knowledge, team, technology, and organisation context, present fuzzy DEMATEL approach assessing teams based on intuitionistic numbers (IFNs). approach, decision makers provide their subjective judgments criteria, characterised basis sets. Moreover,...
Artificial Intelligence (AI) has impacted global economy, workforce productivity, smart health, cities, transport, and much more to come. Large Language Models (LLM) such as ChatGPT Google?s Gemini, have been widely adopted in various applications. Blockchain Technology stands a towering disruptor today's tech landscape, offering assurances of enhanced security scalability for Within the realm healthcare, its adoption surged, spanning from streamlined recordkeeping bolstered clinical trials,...
The paper describes an ongoing project to define a suitable process model for software improvement in small medium organizations. This is being carried out as collaborative between Leeds Metropolitan University and four companies who are currently implementing SP1 programs. Key features of the PRISMS are: explicitly relating goals business goals, which used choose prioritize key areas improvement; use simplified tailorable assessment method based on CMM (Paulk et al., 1995); definition...
Blockchain applications in healthcare have grown rapidly and it includes record keeping, clinical trials, medical supply chains, patient monitoring, etc. where characteristics are needed to improve safety, privacy, security. Technology is one of the biggest disruptive technologies today. However, Porru, et. al (2017) reported lacks processes, tools, techniques. Therefore, this paper provides a systematic framework for secure sustainable software engineering blockchain applications. Secure...