- Mobile Health and mHealth Applications
- Software Engineering Research
- IoT and Edge/Fog Computing
- Software Engineering Techniques and Practices
- Advanced Malware Detection Techniques
- Advanced Software Engineering Methodologies
- Data Visualization and Analytics
- Technology Use by Older Adults
- Caching and Content Delivery
- Big Data and Business Intelligence
- Software System Performance and Reliability
- Stroke Rehabilitation and Recovery
- Scientific Computing and Data Management
- Privacy, Security, and Data Protection
- Anomaly Detection Techniques and Applications
- Cloud Computing and Resource Management
- Innovative Human-Technology Interaction
- Digital Mental Health Interventions
- Physical Activity and Health
- Context-Aware Activity Recognition Systems
- Adversarial Robustness in Machine Learning
- Opportunistic and Delay-Tolerant Networks
- Security and Verification in Computing
- Artificial Intelligence in Healthcare
- Network Security and Intrusion Detection
Deakin University
2015-2024
Beni-Suef University
2024
Kafrelsheikh University
2024
Canadian International College
2023
Evelina London Children's Healthcare
2023
Ain Shams University
2019-2022
National Center for Cancer Care and Research
2022
Hamad Medical Corporation
2022
Guy's and St Thomas' NHS Foundation Trust
2021
Institut de Virologie
2021
In the edge computing (EC) environment, servers are deployed at base stations to offer highly accessible and storage resources nearby app users. From vendor's perspective, caching data on can ensure low latency in users' retrieval of data. However, an server normally owns limited due its size. this article, we investigate collaborative problem EC environment with aim minimize system cost including cost, migration quality-of-service (QoS) penalty. We model (CEDC) as a constrained optimization...
In the edge computing (EC) environment, servers are deployed at base stations to offer highly accessible and storage resources nearby app users. From vendor's perspective, caching data on can ensure low latency in users' retrieval of data. However, an server normally owns limited due its size. this article, we investigate collaborative problem EC environment with aim minimize system cost including cost, migration quality-of-service (QoS) penalty. We model (CEDC) as a constrained optimization...
Edge computing, as an extension of cloud distributes computing and storage resources from centralized to distributed edge servers, power a variety applications demanding low latency, e.g., IoT services, virtual reality, real-time navigation, etc. From app vendor's perspective, data needs be transferred the specific servers in area serve users area. However, according pay-as-you-go business model, distributing large amount can expensive. The optimal distribution strategy must minimize cost...
Software engineers are increasingly adding semantic search capabilities to applications using a strategy known as Retrieval Augmented Generation (RAG). A RAG system involves finding documents that semantically match query and then passing the large language model (LLM) such ChatGPT extract right answer an LLM. systems aim to: a) reduce problem of hallucinated responses from LLMs, b) link sources/references generated responses, c) remove need for annotating with meta-data. However, suffer...
Software systems are now ubiquitous and used every day for automation purposes in personal enterprise applications; they also essential to many safety-critical mission-critical systems, e.g., air traffic control autonomous cars, SCADA systems. With the availability of massive storage capabilities, high speed Internet, advent Internet Things devices, modern software growing both size complexity. Maintaining a quality such complex while manually keeping error rate at minimum is challenge....
Edge computing is a new distributed paradigm extending the cloud paradigm, offering much lower end-to-end latency, as real-time, latency-sensitive applications can now be deployed on edge servers that are closer to end-users than distant servers. In computing, user allocation (EUA) critical problem for any app vendors, who need determine which will serve users. This satisfy application-specific optimization objectives, e.g., maximizing users’ overall quality of experience, minimizing system...
Abstract Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) is a highly pathogenic virus that has caused the global COVID-19 pandemic. Tracing evolution and transmission of crucial to respond control pandemic through appropriate intervention strategies. This paper reports analyses genomic mutations in coding regions SARS-CoV-2 their probable protein secondary structure solvent accessibility changes, which are predicted using deep learning models. Prediction results suggest mutation...
Background Globally, stroke is a leading cause of death and disability, with most care undertaken by caregivers who are generally family friends without prior experience care. The lack or unpreparedness results in feelings uncertainty, burnout, anxiety, burden, etc. Hence, it necessary to identify the needs better support them their caregiving journey improve quality delivered. Methods study employed grounded theory methodology that utilizes information gathered from literature reviews...
Engineering Artificial Intelligence (AI) software is a relatively new area with many challenges, unknowns, and limited proven best practices. Big companies such as Google, Microsoft, Apple have provided suite of recent guidelines to assist engineering teams in building human-centered AI systems. The practices currently adopted by practitioners for developing systems, especially during Requirements (RE), are little studied reported date. This paper presents the results survey conducted...
In the multi-access edge computing (MEC) environment, app vendors' data can be cached on servers to ensure low-latency retrieval. Massive users simultaneously access with high rates through flexible allocations of transmit power. The ability manage networking resources offers unique opportunities vendors but also raises unprecedented challenges. To fast retrieval for in MEC caching must take into account data, users, and power jointly. We make first attempt study Data, User, Power Allocation...
Mobile edge computing (MEC) allows servers to be placed at cellular base stations. App vendors like Uber and YouTube can rent resources deploy latency-sensitive applications on for their users access. Non-orthogonal multiple access (NOMA) is an emerging technique that facilitates the massive connectivity of 5G networks, further enhancing capability MEC. The user allocation (EUA) problem faces new challenges in NOMA-based MEC systems. In this study, we investigate EUA a multi-cell...
In traditional approaches to building software systems (that do not include an Artificial Intelligent (AI) or Machine Learning (ML) component), Requirements Engineering (RE) activities are well-established and researched. However, with one more AI components may depend heavily on data limited no insight into the system's workings. Therefore, engineering such poses significant new challenges RE. Our search showed that literature has focused using manage RE activities, research for (RE4AI)....
In recent years, edge computing, as an extension of cloud has emerged a promising paradigm for powering variety applications demanding low latency, e.g., virtual or augmented reality, interactive gaming, real-time navigation, etc. the computing environment, servers are deployed at base stations to offer highly-accessible capacities nearby end-users, CPU, RAM, storage, From service provider's perspective, caching app data on can ensure latency in its users' retrieval. Given constrained cache...
The global mHealth app market is rapidly expanding, especially since the COVID-19 pandemic. However, many of these apps have serious issues, as reported in their user reviews. Better understanding key concerns would help developers improve apps' quality and uptake. While reviews been used to study feedback prior studies, are limited scope, size and/or analysis. In this paper, we introduce a very large-scale analysis We extracted translated over 5 million for 278 apps. These were then...
Data breaches and security incidents are becoming increasingly costly statistics show that hackers highly motivated to acquire confidential data as the financial benefits substantial. Hence, business has become a top priority be compromised. Threat Intelligence been recently introduced by organisations means gain greater visibility of cyber threats, especially breaches, in order better protect their digital assets. A well-planned implementation threat intelligence enables predict (at least...