- Service-Oriented Architecture and Web Services
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Distributed systems and fault tolerance
- Mobile Agent-Based Network Management
- Distributed and Parallel Computing Systems
- Advanced Software Engineering Methodologies
- IoT and Edge/Fog Computing
- Business Process Modeling and Analysis
- Peer-to-Peer Network Technologies
- Software-Defined Networks and 5G
- Access Control and Trust
- Caching and Content Delivery
- Smart Grid Energy Management
- Cloud Data Security Solutions
- Advanced Database Systems and Queries
- Opportunistic and Delay-Tolerant Networks
- Network Traffic and Congestion Control
- Mobile Ad Hoc Networks
- Cryptography and Data Security
- Building Energy and Comfort Optimization
- Context-Aware Activity Recognition Systems
- Advanced Data Storage Technologies
- Software Engineering Research
- Parallel Computing and Optimization Techniques
Western University
2015-2024
Mississippi State University
2020
The University of Texas at Dallas
2020
Université de Toulouse
2020
Universidad de Salamanca
2020
Institut national de recherche en informatique et en automatique
2020
Dalhousie University
2019
Universidade Estadual de Campinas (UNICAMP)
2019
Interface (United Kingdom)
2013
Missouri University of Science and Technology
1992
ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes data. In this article, leading scientists, researchers engineers discuss the transformative effects ChatGPT modern education. This research seeks improve our knowledge capabilities its use in education sector, identifying potential concerns challenges. Our preliminary evaluation concludes that performed differently each subject area including finance, coding maths. While has...
E-learning platforms and processes face several challenges, among which is the idea of personalizing e-learning experience to keep students motivated engaged. This work part a larger study that aims tackle these two challenges using variety machine learning techniques. To end, this paper proposes use k-means algorithm cluster based on 12 engagement metrics divided into categories: interaction-related effort-related. Quantitative analysis performed identify are not engaged who may need help....
Over the past six decades, computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as Internet and commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving adapting to cover multifaceted societal niches. This led new paradigms cloud, fog, edge computing, Things (IoT), which offer fresh economic creative opportunities....
With the proliferation of technology, field e-learning has garnered significant attention in recent times. This is because it allowed users from around world to learn and access new information. added growing amount collected data that already being generated through different devices sensors employed world. led need analyze extract useful information it. Machine learning (ML) analytics (DA) are proposed techniques can help find valuable patterns within data. In this paper, investigated...
Wireless resource virtualization is a potential solution for meeting the increasing demand mobile data services. Virtualization allows more efficient utilization of spectrum, reduces capital expenditures and operating expenditures, can support higher peak rates. Device-to-device (D2D) communication as an underlay to cellular networks also satisfy demand. Due proximity devices thus signal-to-interference noise ratio, rates be achieved using D2D communication. This beneficial in cases...
The field of e-learning has emerged as a topic interest in academia due to the increased ease accessing Internet using smart-phones and wireless devices. One challenges facing platforms is how keep students motivated engaged. Moreover, it also crucial identify that might need help order make sure their academic performance doesn't suffer. To end, this paper tries investigate relationship between student engagement performance. Apriori association rules algorithm used derive set relate...
Context-aware applications are able to use context, which refers information about the surrounding environment, provide relevant and/or services user. A context-aware application may need make of existing (e.g., a print service). There be several possible choices services. The should discover and select service that considers context current user location). Existing architectures protocols for discovery, however, not suitable doing so. Contextual information, by its very nature, is dynamic,...
Domain Name System (DNS) is a crucial component of current IP-based networks as it the standard mechanism for name to IP resolution. However, due its lack data integrity and origin authentication processes, vulnerable variety attacks. One such attack Typosquatting. Detecting this particularly important can be threat corporate secrets used steal information or commit fraud. In paper, machine learning-based approach proposed tackle typosquatting vulnerability. To that end, exploratory...
Designing survivable communication networks to achieve carrier-grade five-nines reliability is of paramount importance for the network operators. This article addresses service and its related aspects such as nodal reachability, connectivity, edge-disjoint routing in both traditional software defined (SDNs). The proposed roadmap based on two phases: Fundamental analytical phase performance evaluation phase. In first phase, a graph operator analyze characteristics metric associated...
Operational profiles are a quantification of usage patterns for software application. These used to measure reliability by testing the in manner that represents actual use. The current definition an operational profile states it is set operations available application, and probabilities occurrence customer scenarios. This too limited. In most industrial applications, focusing on alone does not offer adequate representation use software. limited can restrict their applicability hence analysis...
This paper describes a location positioning system called Herecast. Herecast addresses many of the current weaknesses found in systems. architecture and how it has been used to develop several location-aware applications
To meet the increasing mobile data services demand, several solutions have been proposed such as wireless resource virtualization and device-to-device (D2D) communication. Virtualization allows for more efficient utilization of spectrum, reduces expenditures, can support higher peak rates. D2D communication achieve rates due to proximity devices while controlling interference it causes cellular However, increase in rate multimedia demand has led an global energy consumption. Thus, is crucial...
While technology advancements are continuously improving, the energy efficiency of household appliances, consumption analysis, and providing feedback to consumers on this analysis remains a critical issue in ensuring effectiveness such improvements. Visual is promising technique for promoting conservation by applying demand response (DR) smart home management systems (SHEMSs). In article, we propose visualization (SHEV) system, an SHEMS that comprises three components: Appliance Profile...
This paper presents a strategy of extending Web server to be able differentiate between requests in different classes. is required because most servers are unable do this by themselves. We present our and its design along with some initial performance results.
Research activities in the mobile computing field aim to find solutions for achieving smoother access remote online resources, such as cloud services, from client application found on devices. The limited capabilities of devices and also unreliable condition wireless environment are sources challenges mentioned goal. We have proposed a proxy-based system that offloads compute-intensive tasks proxies. Additionally, handle variation connection quality, proxies chosen changed dynamically...