
Hanan Lutfiyya- Western University
Hanan Lutfiyya
- Western University
About
225
Publications
55,663
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,341
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (225)
The rise of Foundation Models (FMs) like Large Language Models (LLMs) is revolutionizing software development. Despite the impressive prototypes, transforming FMware into production-ready products demands complex engineering across various domains. A critical but overlooked aspect is performance engineering, which aims at ensuring FMware meets perf...
Quantum computing is poised to revolutionize computational performance and capabilities, offering unprecedented efficiency in solving complex problems that surpasses classical approaches. This potential is particularly evident in fields such as optimization and AI. This chapter delves into critical priority areas in quantum computing, including the...
Realistic appliance power consumption data are essential for developing smart home energy management systems and the foundational algorithms that analyze such data. However, publicly available datasets are scarce and time-consuming to collect. To address this, we propose HYDROSAFE, a hybrid deterministic-probabilistic model designed to generate syn...
Machine Learning (ML) and Artificial Intelligence (AI) can harness the immense amount of operational data from clouds to services, to social and communication networks. In the era of data science and connected devices of all varieties, Intelligence have found ways to improve operations and management of next generation networks, systems, and servic...
Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapti...
ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes of data. In this article, leading scientists, researchers and engineers discuss the transformative effects of ChatGPT on modern education. This research seeks to improve our knowledge of ChatGPT capabilities and its use in the educat...
Machine learning and artificial intelligence can harness the immense stream of operational data from clouds, to services, to social and communication networks. In the era of big data and connected devices of all varieties, machine learning and artificial intelligence have found ways to improve operations and management of information technology and...
Cloud, fog, and edge computing integration with future mobile Internet-of-Things (IoT) devices and related applications in 5G/6G networks will become more practical in the coming years. Containers became the de facto virtualization technique that replaced Virtual Memory (VM). Mobile IoT applications, e.g., intelligent transportation and augmented r...
User-Equipments (UEs) capable of working with cloud computing have grown exponentially in recent years, leading to a significant increase in the amount of data production. Moreover, upcoming Internet-of-Things (IoT) applications such as virtual and augmented reality, video streaming, intelligent transportation, and healthcare will require low laten...
The shortage of parking spaces in metropolitan cities has become a significant challenge, leading to wasted time, money, traffic congestion, and environmental pollution. While smart parking solutions offer potential relief, existing systems often struggle with integration and coordination issues in the complex smart city ecosystem. In response, thi...
Cloud, fog, and edge computing integration with future mobile Internet-of-Things (IoT) devices and related applications in 5G/6G networks will become more practical in the coming years. Containers became the de facto virtualization technique that replaced Virtual Memory (VM). Mobile IoT applications, e.g., intelligent transportation and augmented r...
Machine learning and artificial intelligence can harness the immense stream of operational data from clouds, to services, to social and communication networks. In the era of big data and connected devices of all varieties, machine learning and artificial intelligence have found ways to improve operations and management of information technology and...
This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to...
This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to...
Soon after the proliferation of User-Equipments (UEs) that work with cloud computing, there was an explosion in the volume of generated data. Furthermore, emerging IoT applications, e.g. virtual reality, augmented reality, video streaming, intelligent transportation, and healthcare, require low latency and real-time data, processing and communicati...
Autonomic computing investigates how systems can achieve (user) specified “control” outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and...
Autonomic computing investigates how systems can achieve (user) specified control outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and in...
The success and quality of this journal depends on the dedication and expertise of a large number of reviewers. On behalf of the Editorial Board, I would like to thank them explicitly for their excellent work during the non-trivial year 2021. Their substantial and constructive reviews have proven to be very valuable to the authors and are highly ap...
While technology advancements are continuously improving, the energy efficiency of household appliances, energy consumption analysis, and providing feedback to consumers on this analysis remains a critical issue in ensuring the effectiveness of such improvements. Visual feedback is a promising technique for promoting energy conservation by applying...
Artificial Intelligence (AI) has the potential to leverage the immense amount of operational data of clouds, services, and social and communication networks. As a concrete example, AI techniques have been adopted by telcom operators to develop virtual assistants based on advances in natural language processing (NLP) for interaction with customers a...
Designing survivable communication networks to achieve carrier-grade five-nines reliability is of paramount importance for the network operators. This article addresses service reliability and its related aspects such as nodal reachability, network connectivity, and edge-disjoint routing in both traditional networks and software defined networks (S...
Network and Service analytics can harness the immense stream of operational data from clouds, to services, to social and communication networks. In the era of big data and connected devices of all varieties, analytics and machine learning have found ways to improve reliability, configuration, performance, fault and security management. In particula...
The increasing cost, energy demand, and environmental issues has led many researchers to find approaches for energy monitoring, and hence energy conservation. The emerging technologies of Internet of Things (IoT) and Machine Learning (ML) deliver techniques that have the potential to efficiently conserve energy and improve the utilization of energy...
E-learning platforms and processes face several challenges, among which is the idea of personalizing the e-learning experience and to keep students motivated and engaged. This work is part of a larger study that aims to tackle these two challenges using a variety of machine learning techniques. To that end, this paper proposes the use of k-means al...
Domain Name System (DNS) is a crucial component of current IP-based networks as it is the standard mechanism for name to IP resolution. However, due to its lack of data integrity and origin authentication processes, it is vulnerable to a variety of attacks. One such attack is Typosquatting. Detecting this attack is particularly important as it can...
The field of e-learning has emerged as a topic of interest in academia due to the increased ease of accessing the Internet using using smart-phones and wireless devices. One of the challenges facing e-learning platforms is how to keep students motivated and engaged. Moreover, it is also crucial to identify the students that might need help in order...
Building monitoring and management are some of the important components of smart cities. It provides valuable information to the city manager and power supplier to better optimize their resources. With a steady rise in electricity prices in recent years, the importance of efficient use of the Heating, Ventilating, and AirConditioning (HVAC) systems...
Network and Service analytics can harness the immense stream of operational data from clouds, to services, to social and communication networks. In the era of big data and connected devices of all varieties, analytics and machine learning have found ways to improve reliability, configuration, performance, fault and security management. In particula...
In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system foundation that is applied to u...
Current cloud computing frameworks host millions of physical servers that utilize cloud computing resources in the form of different virtual machines (VM). Cloud Data Center (CDC) infrastructures require significant amounts of energy to deliver large scale computational services. Computing nodes generate large volumes of heat, requiring cooling uni...
Current cloud computing frameworks host millions of physical servers that utilize cloud computing resources in the form of different virtual machines. Cloud Data Center (CDC) infrastructures require significant amounts of energy to deliver large scale computational services. Moreover, computing nodes generate large volumes of heat, requiring coolin...
E-learning platforms and processes face several challenges, among which is the idea of personalizing the e-learning experience and to keep students motivated and engaged. This work is part of a larger study that aims to tackle these two challenges using a variety of machine learning techniques. To that end, this paper proposes the use of k-means al...
We apply a genetic algorithm (GA) in the context of a small- and medium-sized economy (SME) to connect individual farmers to individual consumers to optimize the distribution of fresh produce in the agricultural supply chain. The GA solution is intended to support farmers and encourage fresh food consumption, and is applicable globally. Our GA is a...
Introducing resiliency in a legacy power grid is one of the core mandates of smart grid architecture. Resiliency in power grid enables electrical distribution companies to maintain their services to the customers in the event of a grid failure. Its main advantages appear during the fault event: balance the power load and overcome the fault state by...
Cloud and network analytics can harness the immense stream of operational data from clouds and networks, and can perform analytics processing to improve reliability, configuration, performance, fault and security management. In particular, we see a growing trend towards using statistical analysis, Artificial Intelligence (AI) and machine learning t...
In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system approach that is applied to use...
Software-Defined Networking (SDN) is an emerging paradigm in networking and of high interest to the mobile network operators due to its potential benefit in improving network performance. The idea of integrating SDN in mobile network architecture, such as in LTE-evolved packet core (EPC), has already been proposed by many researchers. The SDN-based...
Wireless spectrum licensing has increased due to the continuous evolution and use of cellular technology. The increase in the number of mobile-connected devices and global data traffic demand has led to a significant increase in demand for spectrum access with studies showing that there is unexploited capacity in the spectrum. This is especially cr...
With the proliferation of technology, the field of e-learning has garnered significant attention in recent times. This is because it has allowed users from around the world to learn and access new information. This has added to the growing amount of collected data that is already being generated through different devices and sensors employed around...
Cloud and network analytics can harness the immense stream of operational data from clouds and networks, and can perform analytics processing to improve reliability, configuration, performance, and security management. In particular, we see a growing trend towards using statistical analysis and machine learning to improve operations and management...
Wireless resource virtualization is a potential solution for meeting the increasing demand for mobile data services. Virtualization allows for more efficient utilization of the spectrum, reduces capital expenditures and operating expenditures, and can support higher peak rates. Device-to-device (D2D) communication as an underlay to cellular network...
This paper presents a peer-to-peer (P2P) framework for the deployment of live video streaming applications over P2P overlay networks. The proposed framework provides support for flash-crowds, decentralizes decision making and makes use of network coding to reduce bandwidth consumption. We present the framework and the simulation results that demons...
Managing single-VM applications in data centres is a well-studied problem, managing multi-VM applications is not. Multi-VM applications usually have, in addition to their basic resource requirements, a special set of requirements that the data centre provider has to satisfy as well. We refer to these requirements as placement constraints. We propos...
Increasingly, applications are moving into the cloud, which is actually supported by large-scale data centres on the ground. These data centres are complex systems to manage and centralized solutions might not be able to meet the required scale nor make an efficient use of their networks. In this paper, we propose a hierarchical approach to dynamic...
Mobile devices have limited resources including short battery life, storage capacity and processor performance. This limits the applications that can run on it. Mobile applications can be partitioned so that some of the application runs on a cloud. This works well for applications with relatively little data to be transferred and that do not have a...
Mobile devices are now the most convenient and ubiquitous interface for accessing information services. The advanced sensing capabilities of these devices enable them to effectively observe, analyze and understand the context of the current environment and thus are used as service providers. However, the resource constraints of mobile devices limit...
Increasingly, applications are moving into the cloud, which is actually supported by large-scale data centres on the ground. These data centres are complex systems to manage and centralized solutions might not be able to meet the required scale nor make an efficient use of their networks. In this paper, we propose a hierarchical approach to dynamic...
The growth of cloud computing over the last few years has created an ecosystem where it is necessary for the clients to transact with cloud service providers even though the cloud service clients may or may not completely trust the provider. There is a need for the provider to acknowledge this subjective trust assessment by each client and provide...
Research activities in the mobile computing field aim to find solutions for achieving the smoother access to remote online resources, such as cloud services, from client application found on mobile devices. The limited capabilities of mobile devices and also the unreliable condition of wireless environment are sources of challenges in achieving the...
Computing is increasingly moving into large-scale data centres, providing resources on-demand for clients on a pay-per-usage basis. One form of such on-demand computing is an Infrastructure as a Service (IaaS) Cloud, which provides low level access to virtualized resources. Developing and evaluating data centre management techniques for such large-...
Computing today is increasingly moving into large-scale virtualized data centres, offering computing resources in the form of virtual machines (VMs) on a pay-per-usage basis. In order to minimize costs, VMs should be consolidated on as few physical machines (PMs) as possible, switching idle PMs into a power saving mode. It may be necessary to dynam...
The current multi-channel P2P video streaming architectures incur performance problems including: (i) A low Quality of Service (QoS) in unpopular channels with few viewers; (ii) The sudden drastic increase in the number of requests for a video at the video release time which is referred to as the flash crowd phenomenon. The flash crowd phenomenon i...
Developing algorithms to dynamically manage resources in a virtualized, multi-tenant data centre is challenging. Experimenting with such algorithms on the data centre scale is impractical due to size and complexity. Thus, there is a need for simulation tools to allow rapid development and evaluation of management techniques. We present DCSim, an ex...
Applications are shifting into large scale, virtualized data centres that provide resources on a pay-per-usage basis. Data centres must minimize resource consumption while providing enough resources to meet application requirements. To meet highly variable application demands, a dynamic approach to virtual machine (VM) management is required. This...
In a desktop grid model, the job (computational task) is submitted for execution in the resource only when the resource is idle. There is no guarantee that the job which has started to execute in a resource will complete its execution without any disruption from user activity (such as a keyboard stroke or mouse move) if the desktop machines are use...
Trust is a concept that has been used to support better decision-making when there is incomplete information. Trust requires evidence. There are multiple evidence sources. One or more evidence sources may be used in trust calculation. This paper presents a middleware that takes this into account, the algorithms used and experimental results.
Proxies can be used as gateways between remote resources and mobile devices to deal with the challenges resulted from disconnections and the limited resources of mobile devices. This paper describes a proxy-based infrastructure that provides proxy services to support mobile device applications. Proxy services can be thought of as a library of funct...
Node faults may be frequent in a mobile ad hoc network (MANET). Most work related to fault detection and localization for MANETS essentially use changes in topology to identify faults. Most of this work does not distinguish between node movement that results in a functioning node moving out of range of all other nodes versus a node that crashes as...
In recent years, data centres have come to achieve higher utilization of their infrastructure through the use of virtualization and server consolidation (running multiple application servers simultaneously in one physical server). One problem that arises in these consolidated environments is how to deal with stress situations, that is, when the com...
Computing today is shifting from hosting services in servers owned by individual organizations to data centres providing resources to a number of organizations on a shared infrastructure. Managing such a data centre presents a unique set of goals and challenges. Through the use of virtualization, multiple users can run isolated virtual machines (VM...
a Abstract-Trust plays an important role in decision making especially in cases of uncertainty and incomplete information. There are many challenges to trust calculation. In this paper, we identify the challenges and offer a middleware solution. Our solution consists of a SCOUT middleware and a SCOUT client (Trust Calculator) that can be used by an...
The 6th International Conference on Network and Service Management (CNSM 2010) was held on October 25–29, 2010 in Niagara
Falls, Canada. CNSM is a premier annual conference, sponsored by IEEE Communications Society and IFIP Working Group on Network
and Distributed Systems Management, in the general area of network, systems, and service management....
Node failures may be frequent in MANETs, but there can be many different causes for those failures. Nodes may lose power, crash, or simply move out of range of other nodes in the network. Identifying the root cause is complicated by a lack of fixed monitoring and analysis infrastructure. Past research has focused on monitoring using either ping, he...
Change management in a cloud environment is often complicated by the different needs of the cloud clients. Changes are not applied all at once. For example, a client may require that a change to the Platform-as-Service (PaaS) instance assigned to it must only be done on the weekend while another client allows for the change to be done at any time....
Software as a Service (SaaS) is an online delivery of software to customers as a service. The interest in adopting SaaS has been rapidly increasing due to the advantages of SaaS. Current SaaS vendors such as Salesforce.com charge their customers based on the type of the edition and on the number of users. Many customers are not satisfied with the c...
In this paper, we present a policy-based framework that supports automated dynamic resource management in a virtualized environment. This allows for flexibility in how resources are allocated. We show how this framework can be used to support memory management through the use of migration and making local resource adjustments.
Virtualization has become an essential technology in the data center. Virtualization improves resource utilization through server consolidation, but it also makes resource management more complex. Golondrina, an autonomic resource management system, was built to use virtual machine relocation to handle resource stress situations, that is, situation...
Policies enable management systems to adapt to changes in management strategies. At run time, management agents use information from the policies to monitor attributes of managed objects, to determine if specific events have occurred and to take management actions. In order to do this, information from the policies must first be extracted. The extr...
The increase in the popularity of small digital mobile devices also implies an increased demand in applications. The limited computing capabilities on the mobile devices and the unreliability of wireless links are barriers to the smooth access of mobile devices to the Grid applications and resources. In this paper a proxy-based approach is presente...
In a desktop grid model, the job (computational task) is submitted for execution in the resource only when the resource is idle. There is no guarantee that the job which has started to execute in a resource will complete its execution without any disruption from user activity (such as a keyboard stroke or mouse move) if the desktop machines are use...
Trust is often calculated based on evidence which may come from a set of diverse sources. Challenges in trust calculation include the lack of a standard way to access evidence sources, lack of a standard for presenting evidence, unreliable evidence sources and differences of opinion on how evidence should be interpreted. This work shows that there...
Virtualization has become an essential technology in the data center. Virtualization improves resource utilization through server consolidation, but it also makes resource man-agement more complex. Golondrina, an autonomic resource management system, was built to use virtual server relocation to handle resource stress situations, that is, situation...
A strategy-tree provides a systematic approach to the evaluation of the effectiveness of deployed policy sets and a mechanism
to dynamically alter policy sets (i.e., alter strategy) at run-time in response to feedback. This paper provides an overview
of the strategy-tree concept and its application to a policy-based management system for a data cen...
There exists a multitude of location-sensing systems utilizing wireless technology. The systems vary in cost, coverage and accuracy. In this paper, we introduce WHLocator which provides location information based three technologies: WiFi, altimeter and images. Our results show that the combination of three technologies improves location accuracy.
Policy-based network management (PBNM) in mobile ad-hoc networks (MANETs) requires additional reliable and efficient mechanisms over PBNM in wired networks. Thus, it is important that the management system in MANETs should cluster the moving nodes and manage their movements in an effective manner. In the paper, a scalable framework is proposed for...
Policies have been identified as one possible way to specify to management systems the operational constraints of a system or systems being managed. Such policies, often characterized as event-triggered condition actions rules, are frequently defined via policy languages and or user interface tools in order to simplify their expression and understa...
A Policy-based Network Management (PBNM) in Mobile Ad-hoc Networks (MANETs) should be efficient and reliable. In this letter, we propose a mechanism for the policy-based management in ad hoc networks and we discuss methods to discover the Policy Decision Point (PDP), set the management area, and manage the movements of nodes in the PBNM system. Fin...