- Service-Oriented Architecture and Web Services
- Business Process Modeling and Analysis
- Privacy, Security, and Data Protection
- IoT and Edge/Fog Computing
- Access Control and Trust
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Semantic Web and Ontologies
- Multi-Agent Systems and Negotiation
- Advanced Software Engineering Methodologies
- Cloud Data Security Solutions
- Mobile Agent-Based Network Management
- Caching and Content Delivery
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Peer-to-Peer Network Technologies
- Cryptography and Data Security
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Context-Aware Activity Recognition Systems
- Distributed and Parallel Computing Systems
- Opportunistic and Delay-Tolerant Networks
- Green IT and Sustainability
- Augmented Reality Applications
- Innovative Human-Technology Interaction
University of Ontario Institute of Technology
2016-2025
First Technical University
2022-2024
City University of Hong Kong
2023
Google (United States)
2022
The University of Sydney
2021-2022
Shizuoka University
2021
Universidade Federal de Pernambuco
2021
Information Technology University
2007-2019
Tianjin University
2019
Queen's University
2019
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive microsensor nodes in their regions, and these are important parts Internet Things (IoT). In WSN-assisted IoT, the resource constrained many ways, such as storage resources, computing energy so on. Robust routing protocols required maintain a long network lifetime achieve higher utilization. this paper, we propose new energy-efficient centroid-based protocol (EECRP) for IoT improve performance network. The...
The amount of CO <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$_{2}$</tex-math></inline-formula> emitted per kilowatt-hour on an electricity grid varies by time day and substantially location due to the types generation. Networked collections warehouse scale computers, sometimes called Hyperscale Computing, emit more carbon than needed if operated without regard these variations in intensity. This paper...
This paper is based on the theory of Finite State Automata (FSA's), models a web service as FSA, extends WSDL for conceptually describing behaviors Web services, and introduces concept Temporal Logic Actions (short TLA) to describe specify behavior in formal way.
Due to the rapid development of Internet technologies and social media, sentiment analysis has become an important opinion mining technique. Recent research work described effectiveness different classification techniques ranging from simple rule-based lexicon-based approaches more complex machine learning algorithms. While have suffered lack dictionaries labeled data, fallen short in terms accuracy. This paper proposes integrated framework which bridges gap between achieve better accuracy...
Sharing healthcare data has become a vital requirement in system management; however, inappropriate sharing and usage of could threaten patients’ privacy. In this article, we study the privacy concerns patient information between Hong Kong Red Cross Blood Transfusion Service (BTS) public hospitals. We generalize their requirements to problems centralized anonymization distributed , identify major challenges that make traditional methods not applicable. Furthermore, propose new model called...
Quality of service (QoS) guarantee is an important component recommendation. Generally, some QoS values a are unknown to its users who has never invoked it before, and therefore the accurate prediction significant for successful deployment web service-based applications. Collaborative filtering method predicting missing values, thus been widely adopted in values. However, collaborative originated from processing subjective data, such as movie scores. The data services usually objective,...
In cyber-physical systems (CPS), service organizers (SOs) aim to collect from entities at lower price and provide better combined services users. However, each entity receives payoffs when providing services, which leads competition between SOs or within internal entities. this paper, we first formulate the model of where dynamically increase decrease their prices periodically according number collected A game based decision (GSPD) depicts process decisions is proposed in paper. GSPD model,...
The deployment of datasets in the heterogeneous edge-cloud computing paradigm has received increasing attention state-of-the-art research. However, due to their large sizes and existence private scientific datasets, finding an optimal data placement strategy that can minimize transmission as well improve performance, remains a persistent problem. In this study, advantages both edge cloud are combined construct model works for multiple workflows. Apparently, most difficult research challenge...
In Industry 4.0 and Internet of Things (IoT) environments, the heterogeneous edge-cloud computing paradigm can provide a more proper solution to deploy scientific workflows compared cloud or other traditional distributed computing. Owing different sizes datasets privacy issue concerning some these datasets, it is essential find data placement strategy that minimize transmission time. Some state-of-the-art strategies combine edge distribute datasets. However, dynamic distribution newly...
Sharing healthcare data has become a vital requirement in system management; however, inappropriate sharing and usage of could threaten patients' privacy. In this paper, we study the privacy concerns blood transfusion information-sharing between Hong Kong Red Cross Blood Transfusion Service (BTS) public hospitals, identify major challenges that make traditional anonymization methods not applicable. Furthermore, propose new model called LKC-privacy, together with an algorithm, to meet...
Web services have had a tremendous impact on the for supporting distributed service-based economy global scale. However, despite outstanding progress, their uptake scale has been significantly less than initially anticipated. The isolation of and lack social relationships among related identified as reasons poor uptake. In this paper, we propose connecting isolated service islands into network to enhance services' sociability First, linked service-specific principles based data publishing...
The edge-cloud hybrid environment requires complex deployment strategies to enable the smart Internet-of-Things (IoT) system. However, current service use simple, generalized heuristics and ignore heterogeneous characteristics in environment. In this article, we devise a method find microservice-based strategy that can reduce average waiting time of IoT devices For purpose, first propose problem (MSDP) based on dynamic environment, including heterogeneity edge server capacities, geographical...
Nowadays, there are many Web services with similar functionality on the Internet. Users consider Quality of Service (QoS) to select best service from among them. The prediction QoS values and recommendations based these users is one major challenges in web area. Major studies this field use collaboration filtering methods for prediction. paper introduced divided them into three main categories: memory-based methods, model-based Collaborative Filtering (CF) combined other methods. In each...
While edge computing has the potential to offer low-latency services and overcome limitations of traditional cloud computing, it presents new challenges in terms trust, security, privacy (TSP) Internet Things environments. Cooperative (CEC) emerged as a solution address these through resource sharing among nodes. However, for multi-infrastructure providers, incentive trust mechanisms nodes are crucial technical issues that must be addressed alongside system latency reliability meet...
Autoscaling is critical for ensuring optimal performance and resource utilization in cloud applications with dynamic workloads. However, traditional autoscaling technologies are typically no longer applicable microservice-based due to the diverse workload patterns complex interactions between microservices. Specifically, propagation of anomalies through leads a high number abnormal microservices, making it difficult identify root bottlenecks (PBs) formulate appropriate scaling strategies. In...
Deep-submicron technology allows billions of transistors on a single die, potentially running at gigahertz frequencies. According to Semiconductor Industry Association (SIA) projections, the number per chip and local clock frequencies for high-performance microprocessors will continue grow exponentially in near future. This ensures that future become ever more complex. However, physical program behavioral constraints limit usefulness this complexity. Physical include interconnect device...
With the scaling of technology promising increases in chip frequency and especially transistor density, system designers must make trade-offs for a rapidly moving target. They constantly deal with area, time, power, reliability, design as well enormous complexity at same time. The driving force innovation is rapid advance technology. As advances feature size shrinks, three other considerations benefit from one process generation to another, resulting higher speed, smaller reduced power...
A Web service is defined as an autonomous unit of application logic that provides either some business functionality or information to other applications through Internet connection. services are based on a set XML standards such Simple Object Access Protocol (SOAP), Universal Description, Discovery and Integration (UDDI) Services Description Language (WSDL). In particular, discovery the process finding most appropriate providers needed by requestor. One important issues in for requestors...
This study systematically assesses the process mining scenario from 2005 to 2014. The analysis of 705 papers evidenced 'discovery' (71%) as main type addressed and 'categorical prediction' (25%) task solved. most applied traditional technique is 'graph structure-based' ones (38%). Specifically concerning computational intelligence machine learning techniques, we concluded that little relevance has been given them. are 'evolutionary computation' (9%) 'decision tree' (6%), respectively....
Quality of Service (QoS) prediction is an important task in services computing, which has been extensively investigated the past decade. Many time-aware QoS approaches have proposed and achieved encouraging performance. However, they did not provide effective model updating mechanisms, thus to periodically retrain whole models deal with newly coming data. How timely update precisely predict missing values candidate becomes urgent issue. In this paper, we propose a novel personalized LSTM...