Hanan Lutfiyya

ORCID: 0000-0002-5341-9388
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Service-Oriented Architecture and Web Services
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Distributed and Parallel Computing Systems
  • Advanced Software Engineering Methodologies
  • IoT and Edge/Fog Computing
  • Business Process Modeling and Analysis
  • Peer-to-Peer Network Technologies
  • Software-Defined Networks and 5G
  • Access Control and Trust
  • Caching and Content Delivery
  • Smart Grid Energy Management
  • Cloud Data Security Solutions
  • Advanced Database Systems and Queries
  • Opportunistic and Delay-Tolerant Networks
  • Network Traffic and Congestion Control
  • Mobile Ad Hoc Networks
  • Cryptography and Data Security
  • Building Energy and Comfort Optimization
  • Context-Aware Activity Recognition Systems
  • Advanced Data Storage Technologies
  • Software Engineering Research
  • Parallel Computing and Optimization Techniques

Western University
2015-2024

Mississippi State University
2020

The University of Texas at Dallas
2020

Université de Toulouse
2020

Universidad de Salamanca
2020

Institut national de recherche en informatique et en automatique
2020

Dalhousie University
2019

Universidade Estadual de Campinas (UNICAMP)
2019

Interface (United Kingdom)
2013

Missouri University of Science and Technology
1992

ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes data. In this article, leading scientists, researchers engineers discuss the transformative effects ChatGPT modern education. This research seeks improve our knowledge capabilities its use in education sector, identifying potential concerns challenges. Our preliminary evaluation concludes that performed differently each subject area including finance, coding maths. While has...

10.1016/j.iotcps.2023.06.002 article EN cc-by Internet of Things and Cyber-Physical Systems 2023-06-19

E-learning platforms and processes face several challenges, among which is the idea of personalizing e-learning experience to keep students motivated engaged. This work part a larger study that aims tackle these two challenges using variety machine learning techniques. To end, this paper proposes use k-means algorithm cluster based on 12 engagement metrics divided into categories: interaction-related effort-related. Quantitative analysis performed identify are not engaged who may need help....

10.1080/08923647.2020.1696140 article EN American Journal of Distance Education 2020-03-16

Over the past six decades, computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as Internet and commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving adapting to cover multifaceted societal niches. This led new paradigms cloud, fog, edge computing, Things (IoT), which offer fresh economic creative opportunities....

10.48550/arxiv.2401.02469 preprint EN cc-by arXiv (Cornell University) 2024-01-01

With the proliferation of technology, field e-learning has garnered significant attention in recent times. This is because it allowed users from around world to learn and access new information. added growing amount collected data that already being generated through different devices sensors employed world. led need analyze extract useful information it. Machine learning (ML) analytics (DA) are proposed techniques can help find valuable patterns within data. In this paper, investigated...

10.1109/access.2018.2851790 article EN cc-by-nc-nd IEEE Access 2018-01-01

Wireless resource virtualization is a potential solution for meeting the increasing demand mobile data services. Virtualization allows more efficient utilization of spectrum, reduces capital expenditures and operating expenditures, can support higher peak rates. Device-to-device (D2D) communication as an underlay to cellular networks also satisfy demand. Due proximity devices thus signal-to-interference noise ratio, rates be achieved using D2D communication. This beneficial in cases...

10.1109/tbc.2015.2492458 article EN IEEE Transactions on Broadcasting 2015-11-06

The field of e-learning has emerged as a topic interest in academia due to the increased ease accessing Internet using smart-phones and wireless devices. One challenges facing platforms is how keep students motivated engaged. Moreover, it also crucial identify that might need help order make sure their academic performance doesn't suffer. To end, this paper tries investigate relationship between student engagement performance. Apriori association rules algorithm used derive set relate...

10.1109/edunine.2018.8451005 preprint EN 2018-03-01

Context-aware applications are able to use context, which refers information about the surrounding environment, provide relevant and/or services user. A context-aware application may need make of existing (e.g., a print service). There be several possible choices services. The should discover and select service that considers context current user location). Existing architectures protocols for discovery, however, not suitable doing so. Contextual information, by its very nature, is dynamic,...

10.1109/wimob.2005.1512944 article EN 2006-10-04

Domain Name System (DNS) is a crucial component of current IP-based networks as it the standard mechanism for name to IP resolution. However, due its lack data integrity and origin authentication processes, vulnerable variety attacks. One such attack Typosquatting. Detecting this particularly important can be threat corporate secrets used steal information or commit fraud. In paper, machine learning-based approach proposed tackle typosquatting vulnerability. To that end, exploratory...

10.1109/glocom.2018.8647679 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

Designing survivable communication networks to achieve carrier-grade five-nines reliability is of paramount importance for the network operators. This article addresses service and its related aspects such as nodal reachability, connectivity, edge-disjoint routing in both traditional software defined (SDNs). The proposed roadmap based on two phases: Fundamental analytical phase performance evaluation phase. In first phase, a graph operator analyze characteristics metric associated...

10.1109/tr.2021.3066526 article EN cc-by IEEE Transactions on Reliability 2021-04-13

10.1016/0895-7177(92)90078-y article EN publisher-specific-oa Mathematical and Computer Modelling 1992-01-01

Operational profiles are a quantification of usage patterns for software application. These used to measure reliability by testing the in manner that represents actual use. The current definition an operational profile states it is set operations available application, and probabilities occurrence customer scenarios. This too limited. In most industrial applications, focusing on alone does not offer adequate representation use software. limited can restrict their applicability hence analysis...

10.1109/issre.2004.8 article EN 2005-04-06

This paper describes a location positioning system called Herecast. Herecast addresses many of the current weaknesses found in systems. architecture and how it has been used to develop several location-aware applications

10.1109/wimob.2005.1512945 article EN 2006-10-04

To meet the increasing mobile data services demand, several solutions have been proposed such as wireless resource virtualization and device-to-device (D2D) communication. Virtualization allows for more efficient utilization of spectrum, reduces expenditures, can support higher peak rates. D2D communication achieve rates due to proximity devices while controlling interference it causes cellular However, increase in rate multimedia demand has led an global energy consumption. Thus, is crucial...

10.1109/glocom.2016.7842159 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

While technology advancements are continuously improving, the energy efficiency of household appliances, consumption analysis, and providing feedback to consumers on this analysis remains a critical issue in ensuring effectiveness such improvements. Visual is promising technique for promoting conservation by applying demand response (DR) smart home management systems (SHEMSs). In article, we propose visualization (SHEV) system, an SHEMS that comprises three components: Appliance Profile...

10.1109/icjece.2021.3134499 article EN Canadian Journal of Electrical and Computer Engineering 2022-01-01

This paper presents a strategy of extending Web server to be able differentiate between requests in different classes. is required because most servers are unable do this by themselves. We present our and its design along with some initial performance results.

10.1145/362883.362903 article EN ACM SIGMETRICS Performance Evaluation Review 2000-09-01

Research activities in the mobile computing field aim to find solutions for achieving smoother access remote online resources, such as cloud services, from client application found on devices. The limited capabilities of devices and also unreliable condition wireless environment are sources challenges mentioned goal. We have proposed a proxy-based system that offloads compute-intensive tasks proxies. Additionally, handle variation connection quality, proxies chosen changed dynamically...

10.1109/mobilware.2013.15 article EN 2013-11-01
Coming Soon ...