Omer Rana

ORCID: 0000-0003-3597-2646
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Scientific Computing and Data Management
  • Service-Oriented Architecture and Web Services
  • Peer-to-Peer Network Technologies
  • Distributed systems and fault tolerance
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Parallel Computing and Optimization Techniques
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Software System Performance and Reliability
  • Mobile Agent-Based Network Management
  • Cloud Data Security Solutions
  • Advanced Database Systems and Queries
  • Access Control and Trust
  • Semantic Web and Ontologies
  • Advanced Data Storage Technologies
  • Multi-Agent Systems and Negotiation
  • Advanced Malware Detection Techniques
  • Context-Aware Activity Recognition Systems
  • Mobile Crowdsensing and Crowdsourcing
  • Business Process Modeling and Analysis

Cardiff University
2016-2025

Düsseldorf University Hospital
2023-2024

Heinrich Heine University Düsseldorf
2023-2024

Newcastle University
2024

TU Wien
2024

University of Rome Tor Vergata
2022-2023

Los Alamitos Medical Center
2020-2023

University of Kurdistan
2023

University of Surrey
2021-2023

University of Oulu
2023

Fog computing provides a distributed infrastructure at the edges of network, resulting in low-latency access and faster response to application requests when compared centralized clouds. With this new level capacity introduced between users data center-based clouds, forms resource allocation management can be developed take advantage infrastructure. A wide range applications with different requirements run on end-user devices, popularity cloud many them rely remote processing or storage. As...

10.1109/mcc.2017.27 article EN IEEE Cloud Computing 2017-03-01

Osmotic computing is a new paradigm to support the efficient execution of Internet Things (IoT) services and applications at network edge. This founded on need for holistic distributed system abstraction enabling deployment lightweight microservices resource-constrained IoT platforms edge, coupled with more complex running large-scale datacenters. driven by significant increase in resource capacity/capability along data transfer protocols that enable such resources interact seamlessly...

10.1109/mcc.2016.124 article EN IEEE Cloud Computing 2016-11-01

Research in the Internet of Things (IoT) conceives a world where everyday objects are connected to and exchange, store, process, collect data from surrounding environment. IoT devices becoming essential for supporting delivery enable electronic services, but they not sufficient most cases host application services directly due their intrinsic resource constraints. Fog Computing (FC) can be suitable paradigm overcome these limitations, as it coexist cooperate with centralized Cloud systems...

10.1145/3301443 article EN ACM Transactions on Internet Technology 2019-04-02

ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes data. In this article, leading scientists, researchers engineers discuss the transformative effects ChatGPT modern education. This research seeks improve our knowledge capabilities its use in education sector, identifying potential concerns challenges. Our preliminary evaluation concludes that performed differently each subject area including finance, coding maths. While has...

10.1016/j.iotcps.2023.06.002 article EN cc-by Internet of Things and Cyber-Physical Systems 2023-06-19

Online relationships in social networks are often based on real world and can therefore be used to infer a level of trust between users. We propose leveraging these form dynamic "Social Cloud," thereby enabling users share heterogeneous resources within the context network. In addition, inherent socially corrective mechanisms (incentives, disincentives) enable cloud-based framework for long term sharing with lower privacy concerns security overheads than present traditional cloud...

10.1109/tsc.2011.39 article EN IEEE Transactions on Services Computing 2011-06-28

The use of coronary angiography (CA) for diagnosis and management chest pain (CP) has several flaws. assessment artery disease using fractional flow reserve (FFR) is a well-validated technique describing lesion-level ischemia improves clinical outcome in the context percutaneous intervention. impact routine FFR at time diagnostic CA on patient not been determined.Two hundred patients with stable CP underwent indications. supervising cardiologist (S.C.) made plan based (optimal medical...

10.1161/circinterventions.113.000978 article EN Circulation Cardiovascular Interventions 2014-03-19

Little is currently known about the factors that promote propagation of information in online social networks following terrorist events. In this paper we took case event Woolwich, London 2013 and built models to predict flow size survival using data derived from popular networking site Twitter. We define flows as over time posted Twitter via action retweeting. Following a comparison with different predictive methods, due distribution exhibited by our dependent measure, used zero-truncated...

10.1007/s13278-014-0206-4 article EN cc-by Social Network Analysis and Mining 2014-06-12

Over the past six decades, computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as Internet and commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving adapting to cover multifaceted societal niches. This led new paradigms cloud, fog, edge computing, Things (IoT), which offer fresh economic creative opportunities....

10.48550/arxiv.2401.02469 preprint EN cc-by arXiv (Cornell University) 2024-01-01

It would include details of the processes that produced electronic data as far back beginning time or at least epoch provenance awareness.

10.1145/1330311.1330323 article EN Communications of the ACM 2008-04-01

The Universal Description, Discovery and Integration (UDDI) is a specification for distributed Web-based information registries Web Services. UDDI allows HTTP-enabled business services to be published, subsequently searched, based on their interface. consists of three components: "white pages" hold basic contact identifiers company, "yellow enable companies listed industry categories (using standard taxonomies), "green record interface details how service invoked. however limited in scope -...

10.1109/saintw.2003.1210132 article EN 2003-08-27

With the increasingly ubiquitous nature of Social networks and Cloud computing, users are starting to explore new ways interact with, exploit these developing paradigms. used reflect real world relationships that allow share information form connections between one another, essentially creating dynamic Virtual Organizations. We propose leveraging pre-established trust formed through friend within a network “Social Cloud”, enabling friends resources context network. believe combining with...

10.1109/cloud.2010.28 article EN 2010-07-01

A perennial criticism regarding the use of social media in science research is lack demographic information associated with naturally occurring mediated data such as that produced by Twitter. However fact demographics not explicit does mean it implicitly present. Utilising Cardiff Online Social Media ObServatory (COSMOS) this paper suggests various techniques for establishing or estimating from a sample more than 113 million Twitter users collected during July 2012. We discuss detail methods...

10.5153/sro.3001 article EN Sociological Research Online 2013-08-01

Handoff mechanisms allow mobile users to move across multiple wireless access points while maintaining their voice and/or data sessions. A traditional handoff process is concerned with smoothly transferring a device session from its current point (or cell) target cell). These characteristics are sufficient for calls and background transfers, however nowadays many applications heavily based on processing capabilities the cloud. Such applications, especially those that require greater...

10.1109/3pgcic.2015.85 article EN 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) 2015-11-01

Built environment data is of varying nature embedding various forms sensitivities with potential legal, contractual, intellectual property, and security implications. The paper presents a governance approach for managing multi-actor, multi-discipline, total lifecycle data, informed by wide industry consultation conducted in the UK between March September 2011. study identifies number barriers engaging Building Information Modelling (BIM) efforts view facilitating collaboration around common...

10.3846/13923730.2012.760480 article EN cc-by Journal of Civil Engineering and Management 2013-04-18
Coming Soon ...