Professor Muhammad Younas
Professor of Computer Science
School of Engineering, Computing and Mathematics
Teaching and supervision
Courses
I am Subject Coordinator for the MSc Data Analytics and MSc Data Analytics for Government.
Areas of teaching:
- Web technologies
- Data Science
- E-Business Systems
- Cloud computing
Supervision
I supervise(d) postgraduate (PhD and Master) students in the following areas:
- Web technologies
- Cloud computing
- Big data and NoSQL systems
- Web and database systems
- Cloud and IoT
- Web searching and information retrieval
Research
My research areas include:
- Cloud Computing and Big Data
- Internet of Things
- Web and Database Systems
- Web Information Retrieval/Searching
I am a network co-lead for the Migration and Refugees Research Network, Oxford Brookes University.
Key Research projects
Service Selection and Provisioning in Cloud Computing:
Given the large number of cloud service providers, the different types of cloud services and their quality attributes, makes it difficult for the users (service consumers) to select appropriate cloud services that meet their requirements. This projects aims to improve the cloud service selection and provisioning by taking into account the characteristics of cloud services, representations of cloud services and their capabilities, users’ knowledge and service level agreements.
Transactions Management in NoSQL Cloud Database Systems:
NoSQL database systems are capable of storing and processing big data and are used in large scale applications that need high availability and efficiency. However, such systems generally do not provide support for strong consistency or standard transactions. This project aims to develop a new multi-key transaction model which provides NoSQL systems with standard transaction support and stronger data consistency for NoSQL databases such as MongoDB.
Testing of NoSQL Cloud Database Systems:
NoSQL databases provide high availability and efficiency in big data processing but at the expense of consistency. This project aims to develop a new framework in order to test NoSQL key/value databases and their CRUD operations. It takes into account the contextual requirements of clients (users) and the NoSQL database systems in testing transactional and non-transactional CRUD operations.
Cloud and Web of Things (WoT):
The WoT initiative is to make IoT more appealing to a wider Internet community. This project aims to develop a multi-layer architecture for WoT: At the software layer, cloud and web technologies are used in order to represent and manage things at the higher level of abstraction. At the network layer, SDN and NFV technologies are used. Such network softwarisation is used to create virtual network services to support the QoS requirements of WoT applications.
Web Information Extraction and Searching
This project develops new methods and techniques in order to extract information from the Web. It also investigates into the Hidden or Deep web searching and information extraction.
Centres and institutes
Groups
- Applied Software Engineering and Data Analytics Group (ASEDA)
- Cloud Computing and Cybersecurity Group (CCC)
Projects
- Big data management in NoSQL and cloud
- Cloud services selection
- Cloud Computing Technologies
- Web Services and SOA
Publications
Journal articles
-
Lakhan A, Groenli T-M, Wu H, Younas M, Ghinea G, 'A Novel Homomorphic Blockchain Scheme for Intelligent Transport Services in Fog/Cloud and IoT Networks'
IEEE Transactions on Intelligent Transportation Systems [online first] (2024)
ISSN: 1524-9050 eISSN: 1558-0016AbstractPublished here Open Access on RADARModern smart city services necessitate complex technological infrastructure with heterogeneous compute servers, networks, and communication protocols. However, there are many research issues in heterogeneous computing infrastructure for Intelligent transport systems (ITS) when using the services in the network. Therefore, the main objective of this paper is to intelligent transportation services and their underlying infrastructure, built on an amalgamation of the Internet of Things (IoT), cloud and fog computing, and associated technolo- gies. Specifically, this paper investigates the challenging issues of security, processing costs, and communication delays that frequently occur during the communication of data and messages. We propose novel, secure, and cost-effective schemes based on blockchain-assisted homomorphic encryption techniques. A Secure, Cost-Optimal Workload Assignment (SCWA) algorithm and a blockchain scheme made possible by Partially Hashing Ho- momorphic Encryption and Decryption (PHHE/D) are designed to distribute workload efficiently. We developed a simulator, MOTEL, that simulates the different functions of the proposed schemes and all the necessary components. Using MOTEL and data sets from real transport companies, the proposed approach is tested and evaluated using various experiments. The results demonstrate that, compared to existing solutions, the proposed approach significantly reduces processing costs and delays while maintaining an appropriate level of security in transport services.
-
Basu K, Younas M, Peng S, 'A Study of Supervised Machine Learning Algorithms for Traffic Prediction in SD-WAN'
International Journal of Web and Grid Services 20 (2) (2024) pp.206-229
ISSN: 1741-1106 eISSN: 1741-1114AbstractPublished here Open Access on RADARModern cloud, web and other emerging distributed services have complex network requirements that cannot be fulfilled via classical networks. This paper presents a novel architecture of a noble Software-Defined Wide Area Network (SD-WAN) that provides the framework for incorporating AI/ML based components for managing different centralised services of the WAN.To leverage the benefit of this framework, a crucial early stage requirement is to accurately identify the traffic category of a flow based on which follow-up actions such as QoS provisioning, resource orchestration, etc. can be implemented. To address this, the research then presents the model of a supervised ML based traffic prediction module and presents a detailed comparison and performance analysis of a shortlisted set of ML models with a variety of traffic categories. The research also takes into account the serialized processes in the models’ training and learning phases emphasizing on the sensitivity of the feature selection process in the performance of these algorithms.
-
Chai Y, Qian J, Younas M, 'Metaverse: Concept, Key Technologies, and Vision'
International Journal of Crowd Science 7 (4) (2023) pp.149-157
ISSN: 2398-7294 eISSN: 2398-7294AbstractPublished here Open Access on RADARMetaverse is a collective term for all economic and social activities in the space where the physical world, digital world and consciousness world are interactively integrated and mutually empowered. The metaverse is the advanced stage of digital civilization and the future formation of human society. The basis for developing metaverse is general digital technologies such as high-performance network, high-performance storage, high-performance computing, high-performance security and artificial intelligence. On the basis of the above, the key to developing the metaverse lies in researching core technologies such as digital life technologies, trusted collaborative network technologies, natural interaction technologies, ubiquitous operating system technologies, technologies and methods for computational experiments, and theories and technologies for crowd intelligence science. We should take typical metaverse application scenarios as entry points, such as the key fields of agriculture, industry, service industry, military, social governance and other economic and social areas, to break through key metaverse technologies and implement pilot demonstration projects of metaverse. Through the demonstration, we can systematically promote the application of metaverse in economy and society from point to line, and continuously iterate and evolve the metaverse technology to advance the metaverse to a higher stage. This paper systematically analyzes the current development status and future directions of metaverse from the concept, key technology and vision of metaverse, paving the way for the subsequent research of metaverse.
-
Khacef K, Benbernou S, Ouziri M, Younas M, 'A Dynamic Sharding Model Aware Security and Scalability in Blockchain'
Information Systems Frontiers [online first] (2023)
ISSN: 1387-3326 eISSN: 1572-9419AbstractPublished here Open Access on RADARSecurity and scalability are considered as two major challenges in rapid and smooth deployment of blockchains in businesses, enterprises and organizations. Common belief is that the ability to scale up a blockchain lies mainly in improving the underlying technology rather than deploying new hardware. Though recent research works have applied sharding techniques in enhancing scalability of blockchains, they do not cater for addressing the joint issue of data security and scalability in blockchains. This paper proposes an approach that makes a trade-off between security and scalability when designing blockchain based systems. It designs an efficient replication model, which creates dynamic sharding wherein blocks are stored in a varying number of nodes. In order to maintain required level of security, the proposed approach shows that the replication of blockchain over peer-to-peer network is minimized as the blockchain’s length evolves according to a replication factor.
-
González-Aparicio MT, Younas M, Tuya J, Casado R, 'A transaction platform for microservices-based big data systems'
Simulation Modelling Practice and Theory 123 (2023)
ISSN: 1569-190XAbstractPublished here Open Access on RADARMicroservices architecture has increasingly been adopted for building distributed and scalable applications. The premise is that microservices are designed as smaller software components which are easier to be preserved and which enable separation between different components. This paper proposes a new transaction platform for microservices architecture to manage processing of big data stored in a cluster of NoSQL databases. New asynchronous protocols are designed to execute database operations as transactions, and to maintain their correctness and consistency. A prototype system has been developed that simulates London bus service across bus routes. It is evaluated through simulation experiments using big data from ‘Transport for London’ data service in order to analyse effects of transaction processing on response time and throughput in microservices architecture. The transaction platform reliably processes database operations, and enables data availability and consistency in failure-free and failure-prone environments.
-
Aslaoui MK, Benbernou S, Ouziri M, Lahmar H, Younas M, 'A monitoring framework for transparency and fairness in big data platform'
Concurrency and Computation: Practice and Experience 33 (23) (2021)
ISSN: 1532-0626 eISSN: 1532-0634Published here -
Kaminskyy R, Shakhovska N, Kryvinska N, Younas M, 'Dendrograms-based disclosure method for evaluating cluster analysis in the IoT domain'
Computers & Industrial Engineering 158 (2021)
ISSN: 0360-8352AbstractPublished here Open Access on RADARThe Internet of Things (IoT) generates huge amount of data at an extremely fast pace. Thus, it is important to classify such data objects into different groups or clusters in order to gain some valuable insights from data. This paper aims to develop a dendrograms-based method for 3D visualization of hierarchical clustering for multidimensional data which can be collected from IoT devices and open databases. This method is built on hierarchical clustering algorithm which is simple and efficient. It presents areas of the selected clusters and their objects on a plane, according to the coordinates defined by the open dendrogram. It defines rules for visualization of the dendrogram and allows to find the nature of clusters. The paper also proposes quantitative indicators of localization of objects and evaluation of clusters being formed. The proposed method is evaluated using IoT-based dataset prepared in two different forms. The proposed method significantly improves the quality of visualization and evaluation of cluster analysis results. It is also efficient as the time complexity is significantly less for factorial analysis.
-
Eisa M, Younas M, Basu K, Awan I, 'Modelling and Simulation of QoS-Aware Service Selection in Cloud Computing'
Simulation Modelling Practice and Theory 103 (2020)
ISSN: 1569-190XAbstractPublished here Open Access on RADARCloud service selection process is significantly challenging and complicated as there are various QoS factors to consider when selecting cloud services. This paper proposes a new QoS-aware selection model systematically and succinctly representing QoS attributes which cloud consumers can easily use and understand when selecting cloud services. In order to ensure the credibility of the cloud service selection, the proposed model collects QoS data from different sources including cloud providers, users’ reviews and cloud monitoring tools. It implements Multi-Criteria Decision Making models in order to rank services based on various QoS attributes. The proposed model is implemented as a simulation tool which is deployed on Amazon cloud platform. Using the simulation tool, the proposed model is rigorously evaluated through a number of experiments by taking into account data from widely used commercial cloud service providers. The experimental results show that the proposed model ranks and selects cloud services according to the QoS requirements of cloud service consumers. Unlike existing approaches the proposed model takes into account multi-level QoS attributes and data from real cloud providers when ranking cloud services.
-
Namanya AP, Awan IU, Disso JP, Younas M, 'Similarity Hash based Scoring of Portable Executable Files for Efficient Malware Detection in IoT'
Future Generation Computer Systems: The International Journal of eScience 110 (2019) pp.824-832
ISSN: 0167-739X eISSN: 1872-7115AbstractPublished here Open Access on RADARThe current rise in malicious attacks shows that existing security systems are bypassed by malicious files. Similarity hashing has been adopted for sample triaging in malware analysis and detection. File similarity is used to cluster malware into families such that their common signature can be designed. This paper explores four hash types currently used in malware analysis for portable executable (PE) files. Although each hashing technique produces interesting results, when applied independently, they have high false detection rates. This paper investigates into a central issue of how different hashing techniques can be combined to provide a quantitative malware score and to achieve better detection rates. We design and develop a novel approach for malware scoring based on the hashes results. The proposed approach is evaluated through a number of experiments. Evaluation clearly demonstrates a significant improvement (> 90%) in true detection rates of malware.
-
Bashir M, Awan I, Ugail H, Younas M, 'Failure prediction using machine learning in a virtualised HPC system and application'
Cluster Computing 22 (2) (2019) pp.471-485
ISSN: 1386-7857 eISSN: 1573-7543AbstractPublished here Open Access on RADARFailure is an increasingly important issue in high performance computing and cloud systems. As large-scale systems continue to grow in scale and complexity, mitigating the impact of failure and providing accurate predictions with sufficient lead time remains a challenging research problem. Traditional existing fault-tolerance strategies such as regular check-pointing and replication are not adequate because of the emerging complexities of high performance computing systems. This necessitates the importance of having an effective as well as proactive failure management approach in place aimed at minimizing the effect of failure within the system. With the advent of machine learning techniques, the ability to learn from past information to predict future pattern of behaviours makes it possible to predict potential system failure more accurately. Thus, in this paper, we explore the predictive abilities of machine learning by applying a number of algorithms to improve the accuracy of failure prediction. We have developed a failure prediction model using time series and machine learning, and performed comparison based tests on the prediction accuracy. The primary algorithms we considered are the support vector machine (SVM), random forest (RF), k-nearest neighbors (KNN), classification and regression trees (CART) and linear discriminant analysis (LDA). Experimental results indicates that the average prediction accuracy of our model using SVM when predicting failure is 90% accurate and effective compared to other algorithms. This finding implies that our method can effectively predict all possible future system and application failures within the system.
-
Mirza QA, Awan I, Younas, M, 'CloudIntell: An intelligent malware detection system'
Future Generation Computer Systems: The International Journal of eScience 86 (2018) pp.1042-1053
ISSN: 0167-739X eISSN: 1872-7115AbstractEnterprises and individual users heavily rely on the abilities of antiviruses and other security mechanisms. However, the methodologies used by such software are not enough to detect and prevent most of the malicious activities and also consume a huge amount of resources of the host machine for their regular operations. In this paper, we propose a combination of machine learning techniques applied on a rich set of features extracted from a large dataset of benign and malicious files through a bespoke feature extraction tool. We extracted a rich set of features from each file and applied support vector machine, decision tree, and boosting on decision tree to get the highest possible detection rate. We also introduce a cloud-based scalable architecture hosted on Amazon web services to cater the needs of detection methodology. We tested our methodology against different scenarios and generated high achieving results with lowest energy consumption of the host machine.Published here Open Access on RADAR -
González-Aparicio MT, Younas M, Tuya J, Casado R, 'Testing of transactional services in NoSQL key-value databases'
Future Generation Computer Systems: The International Journal of eScience 80 (March 2018) (2018) pp.384-399
ISSN: 0167-739X eISSN: 1872-7115AbstractTransactional services guarantee the consistency of shared data during the concurrent execution of multiple applications. They have been used in various domains ranging from classical databases through to service-oriented computing systems to NoSQL databases and cloud. Though transactional services aim to ensure data consistency, NoSQL databases prioritize efficiency/availability over data consistency. In order to address these issues various transaction models and protocols have been proposed in the literature. However, testing of transactions in NoSQL database has not been addressed. In this paper, we investigate into the testing of transactional services in NoSQL databases in order to test and analyse the data consistency by taking into account the characteristics of NoSQL databases such as efficiency, velocity, etc. Accordingly, we develop a framework for testing transactional services in NoSQL databases. The novelty and contributions are that we develop a context-aware transactional model that takes into account contextual requirements of NoSQL clients and the system level setting in relation to the data consistency. This can assist NoSQL application developers in choosing between transactional and non-transactional services based on their requirements of the level of data consistency. The framework also provides ways to analyse the impact of the big data requirements and characteristics (e.g., velocity, efficiency) on the data consistency of NoSQL databases. The evaluation and testing are carried out using a widely used NoSQL key/value database, Riak, and a real (open) and big data from the Council of London for public transportation of the London bus services.Published here Open Access on RADAR -
González-Aparicio M-T, Ogunyadeka A, Younas M, Tuya J, Casado R, 'Transaction processing in consistency-aware user’s applications deployed on NoSQL databases'
Human-Centric Computing and Information Sciences 7 (7) (2017)
ISSN: 2192-1962AbstractNoSQL databases are capable of storing and processing big data which is characterized by various properties such as volume, variety and velocity. Such databases are used in a variety of user applications that need large volume of data which is highly available and efficiently accessible. But they do not enforce or require strong data consistency nor do they support transactions. This paper investigates into the transaction processing in consistency-aware applications hosted on MongoDB and Riak which are two representatives of Document and Key-Value NoSQL databases, respectively. It develops new transaction schemes in order to provide NoSQL databases with transactional facilities as well as to analyze the effects of transactions on data consistency and efficiency in user’s applications. The proposed schemes are evaluated using the YCSB + T benchmark which is based on Yahoo! Cloud Services Benchmark (YCSB). Experimental results show that using the proposed schemes, strong consistency can be achieved in MongoDB and Riak without severely affecting their efficiency. We also conduct experiments in order to analyse the level of consistencyof MongoDB and Riak transactional systems.Published here Open Access on RADAR -
Sapkota K, Aldea A, Younas M, Duce DA, Banares-Alcantara R, 'Automating the Semantic Mapping between Regulatory Guidelines and Organizational Processes'
Service Oriented Computing and Applications 10 (4) (2016) pp.365-389
ISSN: 1863-2386 eISSN: 1863-2394AbstractThe mapping of regulatory guidelines with organizational processes is an important aspect of a regulatory compliance management system. Automating this mapping process can greatly improve the overall compliance process. Currently, there is research on mapping between different entities such as ontology mapping, sentence similarity, semantic similarity and regulation-requirement mapping. However, there has not been adequate research on the automation of the mapping process between regulatory guidelines and organizational processes. In this paper, we explain how Natural Language Processing and Semantic Web technologies can be applied in this area. In particular, we explain how we can take advantage of the structures of regulation-ontology and the process-ontology in order to compute the similarity between a regulatory guideline and a process. Our methodology is validated using a case study in the Pharmaceutical industry, which has shown promising results.Published here Open Access on RADAR -
Fan H, Hussain FK, Younas M, Hussain OK, 'An integrated personalization framework for SaaS-based cloud services'
Future Generation Computer Systems: The International Journal of eScience 53 (2015) pp.157-173
ISSN: 0167-739XAbstractPublished here Open Access on RADARSoftware as a Service (SaaS) has recently emerged as one the most popular service delivery models in cloud computing. The number of SaaS services and their users is continuously increasing and new SaaS service providers emerge on a regular basis. As users are exposed to a wide range of SaaS services, they may soon become more demanding when receiving/consuming such services. Similar to the web and/or mobile applications, personalization can play a critical role in modern SaaS-based cloud services. This paper introduces a fully designed, cloud-enabled personalization framework to facilitate the collection of preferences and the delivery of corresponding SaaS services. The approach we adapt in the design and development of the proposed framework is to synthesize various models and techniques in a novel way. The objective is to provide an integrated and structured environment wherein SaaS services can be provisioned with enhanced personalization quality and performance.
-
Casado R, Younas M, 'Emerging trends and technologies in big data processing'
Concurrency and Computation: Practice and Experience 27 (8) (2015) pp.2078-2091
ISSN: 1532-0626 eISSN: 1532-0634AbstractBig Data encompasses large volume of complex structured, semi-structured, and unstructured data, which is beyond the processing capabilities of conventional databases. The processing and analysis of Big Data now play a central role in decision making, forecasting, business analysis, product development, customer experience, and loyalty, to name but a few. In this paper, we examine the distinguishing characteristics of Big Data along the lines of the 3Vs: variety, volume, and velocity. Accordingly, the paper provides an insight into the main processing paradigms in relation to the 3Vs. It defines a lifecycle for Big Data processing and classifies various available tools and technologies in terms of the lifecycle phases of Big Data, which include data acquisition, data storage, data analysis, and data exploitation of the results. This paper is first of its kind that reviews and analyzes current trends and technologies in relation to the characteristics, evolution, and processing of Big Data.Published here Open Access on RADAR -
Nafea I, Younas M, Holton R, Awan I, 'A Priority-Based Admission Control Scheme for Commercial Web Servers'
International Journal of Parallel Programming 42 (5) (2014) pp.776-797
ISSN: 0885-7458 eISSN: 1573-7640AbstractThis paper investigates into the performance and load management of web servers that are deployed in commercial websites. Such websites offer various services such as flight/hotel booking, online banking, stock trading, and product purchases among others. Customers are increasingly relying on these round-the-clock services which are easier and (generally) cheaper to order. However, such an increasing number of customers’ requests makes a greater demand on the web servers. This leads to web servers’ overload and the consequential provisioning of inadequate level of service. This paper addresses these issues and proposes an admission control scheme which is based on the class-based priority scheme that classifies customer’s requests into different classes. The proposed scheme is formally specified using ΠΠ-calculus and is implemented as a Java-based prototype system. The prototype system is used to simulate the behaviour of commercial website servers and to evaluate their performance in terms of response time, throughput, arrival rate, and the percentage of dropped requests. Experimental results demonstrate that the proposed scheme significantly improves the performance of high priority requests but without causing adverse effects on low priority requests.Published here Open Access on RADAR -
Elayyadi I, Benbernou S, Ouziri M, Younas M, 'A tensor-based distributed discovery of missing association rules on the cloud'
Future Generation Computer Systems: The International Journal of eScience 35 (2014) pp.49-56
ISSN: 0167-739X eISSN: 1872-7115AbstractAn increasing number of data applications such as monitoring weather data, data streaming, data web logs, and cloud data, are going online and are playing vital in our every-day life. The underlying data of such applications change very frequently, especially in the cloud environment. Many interesting events can be detected by discovering such data from different distributed sources and analyzing it for specific purposes (e.g., car accident detection or market analysis). However, several isolated events could be erroneous due to the fact that important data sets are either discarded or improperly analyzed as they contain missing data. Such events therefore need to be monitored globally and be detected jointly in order to understand their patterns and correlated relationships. In the context of current cloud computing infrastructure, no solutions exist for enabling the correlations between multi-source events in the presence of missing data. This paper addresses the problem of capturing the underlying latent structure of the data with missing entries based on association rules. This necessitate to factorize the data set with missing data.Published here Open Access on RADARThe paper proposes a novel model to handle high amount of data in cloud environment. It is a model of aggregated data that are confidences of association rules. We first propose a method to discover the association rules locally on each node of a cloud in the presence of missing rules. Afterward, we provide a tensor based model to perform a global correlation between all the local models of each node of the network.
The proposed approach based on tensor decomposition, deals with a multi modal network where missing association rules are detected and their confidences are approximated. The approach is scalable in terms of factorizing multi-way arrays (i.e. tensor) in the presence of missing association rules. It is validated through experimental results which show its significance and viability in terms of detecting missing rules.
-
Grønli T, Ghinea G, Younas M, 'Context-aware and automatic configuration of mobile devices in cloud-enabled ubiquitous computing'
Personal and Ubiquitous Computing 18 (4) (2014) pp.883-894
ISSN: 1617-4909AbstractContext-sensitive (or aware) applications have, in recent years, moved from the realm of possibilities to that of ubiquity. One exciting research area that is still very much in the realm of possibilities is that of cloud computing, and in this paper, we present our work, which explores the overlap of these two research areas. Accordingly, this paper explores the notion of cross-source integration of cloud-based, context-aware information in ubiquitous computing through a developed prototypical solution. Moreover, the described solution incorporates remote and automatic configuration of Android smartphones and advances the research area of context-aware information by harvesting information from several sources to build a rich foundation on which algorithms for context-aware computation can be based. Evaluation results show the viability of integrating and tailoring contextual information to provide users with timely, relevant and adapted application behaviour and content.Published here Open Access on RADAR -
Alhomoud A, Awan I, Disso JFP, Younas M, 'A Next-generation Approach to Combating Botnets'
Computer 46 (2013) pp.62-66
ISSN: 0018-9162 eISSN: 1558-0814AbstractPublished hereAs part of a defense-in-depth security solution for domain-controlled enterprise networks, a proposed self-healing system architecture is designed to increase resiliency against botnets with minimal disruption to network services.
-
Barolli L, Spaho E, Xhafa F, Younas M, 'Application of Smartbox End-device for Medical Care Using Jxta-overlay P2p System'
Computing 95 (2013) pp.1039-1051
ISSN: 0010-485X eISSN: 1436-5057AbstractPublished hereDuring last decade more and more old people live alone and the number of old people that need medical care is increased. The lack of doctors and the increase of the medical cost is becoming a big problem. Therefore, IT-based information systems should be implemented to help solve this problem. In this paper, we present the experimental results and evaluation of the SmartBox stimulation device for medical applications using a P2P system which is based on JXTA-Overlay. The SmartBox is integrated with our P2P system as a useful tool for monitoring and controlling patients activities. We found by experimental results that by SmartBox we can check the patient’s situation. We carried out experiments with a patient in the bed and changed the temperature of the room. From the experimental results, we conclude that the use of SmartBox is an effective way for medical applications.
-
Younas M, Awan I,, 'Mobility management scheme for context-aware transactions in pervasive and mobile cyberspace'
IEEE Transactions on Industrial Electronics 60 (3) (2013) pp.1108-1115
ISSN: 0278-0046AbstractPublished hereRapid advances in software systems, wireless networks,and embedded devices have led to the development of apervasive and mobile cyberspace that provides an infrastructurefor anywhere/anytime service provisioning in different domainssuch as engineering, commerce, education, and entertainment.This style of service provisioning enables users to freely move betweengeographical areas and to continuously access informationand conduct online transactions. However, such a high mobilitymay cause performance and reliability problems during the executionof transactions. For example, the unavailability of sufficientbandwidth can result in failure of transactions when usersmove from one area (cell) to another. We present a context-awaretransaction model that dynamically adapts to the users' needs andexecution environments. Accordingly, we develop a new mobilitymanagement scheme that ensures seamless connectivity andreliable execution of context-aware transactions during mobilityof users. The proposed scheme is designed and developed usinga combination of different queuing models. We conduct variousexperiments in order to show that the proposed scheme optimizesthe mobility management process
-
Casado R, Younas M, Tuya, J, 'Multi-dimensional criteria for testing web services transactions'
Journal of Computer and System Sciences 79 (7) (2013) pp.1057-1076
ISSN: 0022-0000AbstractPublished hereWeb services (WS) transactions are important in order to reliably compose distributed and autonomous services into composite web services and to ensure that their execution is consistent and correct. But such transactions are generally complex and they require longer processing time, and manipulate critical data. Thus various techniques have been developed in order to perform quality assessment of WS transactions in terms of response time efficiency, failure recovery and throughput. This paper focuses on the testing aspect of WS transactions - another key quality issue that has not been examined in the literature. Accordingly it proposes multi-dimensional criteria for testing the WS transactions. The proposed criteria have the potential to capture the behaviour of WS transactions and to analyse and classify the possible (failure) situations that effect the execution of such transactions. These criteria are used to generate various test cases and to provide (WS transactions) ! tester with flexibility of adjusting the method in terms of test efforts and effectiveness. The proposed criteria have been designed, implemented and evaluated through a case study and a number of experiments have been performed. The evaluation shows that these criteria have the capability to effectively generate test cases for testing WS transactions as well as enable tester to decide on the trade-off between test efforts and the quality.
-
Barolli L, Spaho E, Xhafa F, Younas M, 'Performance Evaluation of An Integrated Fuzzy-based Trustworthiness System for P2p Communications in Jxta-overlay'
Neurocomputing 122 (2013) pp.43-49
ISSN: 0925-2312 eISSN: 1872-8286AbstractPublished hereOver the last decade Peer-to-Peer (P2P) systems have become very popular, and have been used to provide solutions in areas such as distributed computation, voice over IP, and knowledge sharing. P2P architectures will be very important for future distributed systems and applications. In such networks, peers are heterogeneous in providing the services and they do not have the same competence of reliability. Therefore, it is necessary to estimate whether a peer is trustworthy or not for file sharing and other services. In this paper, we propose an integrated fuzzy-based trustworthiness system for P2P communications in JXTA-overlay, which consists of two Fuzzy Logic Controllers (FLC1 and FLC2). For FLC1, we use three input parameters: Number of Jobs (NJ), Number of Connections (NC) and Connection Lifetime (CL) and the output is Actual Behavioral Criterion (ABC). We use ABC and Reputation (R) as input linguistic parameters for FLC2 and the output is Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results has shown that the proposed system has a good behavior.
-
Casado R, Tuya J, Younas M, 'Evaluating the effectiveness of the abstract transaction model in testing web services transactions'
Concurrency and Computation: Practice and Experience Early View (-) (2012) pp.--
ISSN: 1532-0626Published here -
Younas M, 'A new model for context-aware transactions in mobile services'
Personal and Ubiquitous Computing 15 (8) (2011) pp.821-831
ISSN: 1617-4909AbstractWith the ubiquity of handheld devices (such as smart phones and PDAs) and the availability of a wide range of mobile services (such as mobile banking, road traffic updates, and weather forecast), people can nowadays access information and conduct online transactions virtually anywhere and anytime. In such flexible, dynamic but less reliable environment, transaction management technology is believed to provide service reliability and data consistency. Indeed, in mobile and ubiquitous environments where devices as well as services can seamlessly join and leave the ubiquitous network; transaction management can be very helpful during the recovery of services from failure. Current transaction models and commit protocols do not take into account context information. However, in mobile environments, it is imperative to consider context information in the commit of a transaction-”i.e., a transaction can be successfully completed if it meets the required context. In this paper, we propose a new model for context-aware transactions and their performance management in mobile environments. Unlike conventional transactions, context-aware transactions adapt to the required context. By context, we mean the service" s context as well as the users" context that includes users" needs and preferences. This paper designs and develops the proposed transaction model and evaluates its performance in terms of time and message complexities as well as transaction" s throughput.Published here -
Anane R, Younas M, 'Editorial for the Special Issue on Adaptivity in Heterogeneous Environments Foreword'
Journal of Computer and System Sciences 77 (2) (2011) pp.221-222
ISSN: 0022-0000 eISSN: 1090-2724AbstractForewordPublished here -
Holton D R W, Younas M, Awan I U, 'Priority scheduling of requests to web portals'
Journal of Systems and Software 84 (2011) pp.1373-1378
ISSN: 0164-1212AbstractPublished hereWeb portals work as a point of access to a large volume of information on the Web. This paper focuses on the performance of Web portals in an E-commerce environment which involves the processing of a large number of users' requests. It proposes a class-based priority scheme which classifies users' requests into high and low priorities. In E-commerce, some requests (e.g. buy) are generally considered more important than others (e.g. search or browse). We contend that the requests received from a Web portal should generally get higher priority as such requests are more likely to lead to purchases. We believe that assigning such priorities at multiple service levels can improve the performance of Web portals' requests of higher priority. The proposed scheme is formally specified and implemented, and performance results are obtained and compared to a server that does not prioritise requests. The results show significant performance improvements in the processing of high priority requests.
-
Holton D R W, Nafea I, Younas M, Awan I, 'A class-based scheme for E-Commerce web servers: Formal specification and performance evaluation'
Journal of Network and Computer Applications 32 (2) (2009) pp.455-460
ISSN: 1084-8045AbstractPublished hereThis paper is an investigation into the performance of E-commerce applications. E-commerce has become one of the most popular applications of the web as a large population of web users is now benefiting from various on-line services including product searches, product purchases and product comparison. E-commerce provides users with 24-7 shopping facilities. However, the consequence of these benefits and facilities is the excessive load on E-commerce web servers and the performance degradation of E-commerce (eCom) requests they process. This paper addresses this issue and proposes a class-based priority scheme which classifies eCom requests into high and low priority requests. In E-commerce, some requests (e.g. payment) are generally considered more important than others (e.g. search or browse). We believe that by assigning class-based priorities at multiple service levels, E-commerce web servers can perform better and can improve the performance of high priority eCom requests. In this paper, we formally specify and implement the proposed scheme and evaluate its performance using multiple servers. Experimental results demonstrate that the proposed scheme significantly improves the performance of high priority eCom requests.
-
Sagar M, Duce D, Younas M, 'The Oea framework for class-based object-oriented style JavaScript for web programming'
Computer Standards & Interfaces 31 (5) (2009) pp.894-905
ISSN: 0920-5489AbstractPublished hereIn this paper we reflect on the differences between prototype-based and class-based programming languages and we introduce a new approach, called the Oea framework, that will allow JavaScript developers to write programs using a class-based style, which we assert is easy to use, has a syntax style that resembles that of the Java class-based approach and has high performance and reliability. We present a survey of the most widely used class-based techniques for JavaScript describing their methods and highlighting their shortcomings and compare the new approach with this earlier work. The approach has been developed in the context of a framework for developing Web applications using Scalable Vector Graphics (SVG), JavaScript and the Resource Description Framework (RDF) which involved the construction of substantial libraries and other code using the approach.
-
Lin W-L, Lo C-C, Chao K-M, Younas M, 'Consumer-centric QoS-aware selection of web services'
Journal of Computer and System Sciences 74 (2) (2008) pp.211-231
ISSN: 0022-0000AbstractThere exist many web services which exhibit similar functional characteristics. It is imperative to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or quality of service (QoS). However, the selection process is greatly complicated by the distinct views of service providers and consumers on the services QoS. For instance, they may have distinct views of the service reliability-wherein a consumer considers that a service is reliable if its success rate is higher than 99%, while a provider may consider its service as reliable if its success rate is higher than 90%. The aim of this paper is to resolve such conflicts and to ensure consensus on the QoS characteristics in the selection of web services. It proposes a QoS Consensus Moderation Approach (QCMA) in order to perform QoS consensus and to alleviate the differences on QoS characteristics in the selection of web services. The proposed approach is implemented as a prototype tool and is tested on a case study of a hotel booking web service. Experimental results show that the proposed approach greatly improves the service selection process in a dynamic and uncertain environment of web services.Published here -
Younas M, Shakshuki E, Chao KM, 'Special Issue: Web and Mobile Information Systems - Foreword'
Journal of Computer and System Sciences 74 (2) (2008) pp.131-132
ISSN: 0022-0000 eISSN: 1090-2724AbstractForewordPublished here -
Younas M, Awan I, Chao K-M, Chung J-Y, 'Priority scheduling service for E-commerce web servers'
Information Systems and E-Business Management 6 (2007) pp.211-231
ISSN: 1617-9846 eISSN: 1617-9854AbstractService scheduling is one of the crucial issues in E-commerce environment. E-commerce web servers often get overloaded as they have to deal with a large number of customers" requests-”for example, browse, search, and pay, in order to make purchases or to get product information from E-commerce web sites. In this paper, we propose a new approach in order to effectively handle high traffic load and to improve web server" s performance. Our solution is to exploit networking techniques and to classify customers" requests into different classes such that some requests are prioritised over others. We contend that such classification is financially beneficial to E-commerce services as in these services some requests are more valuable than others. For instance, the processing of -œbrowse- request should get less priority than -œpayment- request as the latter is considered to be more valuable to the service provider. Our approach analyses the arrival process of distinct requests and employs a priority scheduling service at the network nodes that gives preferential treatment to high priority requests. The proposed approach is tested through various experiments which show significant decrease in the response time of high priority requests. This also reduces the probability of dropping high priority requests by a web server and thus enabling service providers to generate more revenue.Published here -
Mostefaoui S K, Younas M, 'Context-oriented and transaction-based service provisioning'
International Journal of Web and Grid Services 3 (2) (2007) pp.194-218
ISSN: 1741-1106 eISSN: 1741-1114AbstractThis paper presents our approach for service provisioning in pervasive computing environments. The presented approach is based on the usage of context-aware features and transactions during the discovery and the deployment of composite services. Context ensures that the best service offers are selected to participate in a service composition. Transactions help in improving the reliability and efficiency of the composite services. -
Wang P, Chao K-M, Lo C-C, Huang C-L, Younas M, 'A fuzzy outranking approach in risk analysis of web service security'
Cluster Computing 10 (1) (2007) pp.47-55
ISSN: 1386-7857AbstractRisk analysis is considered as an important process to identify the known and potential vulnerabilities and threats in the web services security. It is quite difficult for users to collect adequate events to estimate the full vulnerabilities and probability of threats in the Web, due to the rapid change of the malicious attacks and the new computer" s vulnerabilities. In this paper, a fuzzy risk assessment model is developed in order to evaluate the risk of web services in a situation where complete information is not available. The proposed model extends Pseudo-Order Preference Model (POPM) to estimate the imprecise risk based on richness of information and to determine their ranking using a weighted additive rule. A case study of a number of web services is presented in order to test the proposed approach.Published here -
Hedley Y-L, Younas M, James A, 'CCReSD: concept-based Categorisation of Hidden Web databases'
International Journal of High Performance Computing and Networking 5 (1/2) (2007) pp.24-33
ISSN: 1740-0562AbstractHidden Web databases dynamically generate results in response to users' queries. The categorisation of such databases into a category scheme has been widely employed in information searches. We present a Concept-based Categorisation over Refined Sampled Documents (CCReSD) approach that effectively handles information extraction, summarisation and categorisation of such databases. CCReSD detects and extracts query-related information from sampled documents of databases. It generates terms and frequencies to summarise database contents. It also generates descriptions of concepts from their coverage and specificity given in a category scheme. We conduct experiments to evaluate our approach and to show that it assigns databases with more relevant subject categories.Published here -
Younas M, Chao K-M, Wang P, Huang C-L, 'QoS-aware mobile service transactions in wireless environment'
Concurrency and Computation: Practice and Experience 19 (8) (2007) pp.1219-1236
ISSN: 1532-0626AbstractMobile computing greatly facilitates the provision of mobile services using portable and handheld devices which are connected through wireless networks. A pre-requisite for the provision of an effective service is to ensure quality of service (QoS) during the concurrent execution of requests and system or network failures. This paper presents a new transaction management approach for the provision of mobile services which is based on advanced transaction models and fuzzy selection criteria. It employs a novel QoS consensus moderation approach in order to select preferred mobile services from among various alternatives, thus providing multiple pathways to the completion of mobile service transactions. Unlike traditional transaction management schemes, the proposed approach takes into account QoS attributes in the commit process of mobile service transactions. The proposed approach is implemented as a prototype tool and evaluated through a number of experiments. Experimental results show that the proposed approach effectively selects mobile services and significantly increases the throughput (i.e. commit rate) of mobile service transactions.Published here -
Younas M, Chao KM, Huang Y, 'Web and Distributed Information Systems: Special Issue of the Journal of Information Systems Frontiers'
Information Systems Frontiers 8 (4) (2007) pp.253-254
ISSN: 1387-3326 eISSN: 1572-9419AbstractEditorialPublished here -
Younas M, Chao KM, 'A Tentative Commit Protocol for Composite Web Services'
Journal of Computer and System Sciences 72 (7) (2006) pp.1226-1237
ISSN: 0022-0000 eISSN: 1090-2724AbstractComposite web services provide promising prospects for conducting cross-organizational business transactions. Such transactions: are generally complex, require longer processing time, and manipulate financially critical data. It is therefore crucial to ensure stronger reliability, higher throughput and enhanced performance of transactions. In order to meet these requirements, this paper proposes a new commit protocol for managing transactions in composite web services. Specifically, it aims to improve the performance by reducing network delays and the processing time of transactions. The proposed protocol is based on the concept of tentative commit that allows transactions to tentatively commit on the shared data of web services. The tentative commit protocol avoids resource blocking thus improving performance. The proposed protocol is tested through various simulation experiments. The outcomes of these experiments show that the proposed protocol outperforms existing protocols in terms of transaction performance.Published here -
Chao KM, Younas M, Griffiths N, 'Bpel4ws-based Coordination of Grid Services in Design'
Computers in Industry 57 (2006) pp.778-786
ISSN: 0166-3615 eISSN: 1872-6194Published here
Books
-
, Mobile Web and Intelligent Information Systems. Proceedings, 17th International Conference, MobiWIS 2021, Springer (2021)
eISSN: 1611-3349 ISBN: 9783030831639 eISBN: 9783030831646AbstractPublished hereThis book constitutes the refereed proceedings of the 17th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2021, held as a virtual event, in August 2021.
The 15 full papers presented in this book were carefully reviewed and selected from 40 submissions. The papers of MobiWIS 2021 deal focus on topics such as security and privacy; web and mobile applications; networking and communication; intelligent information systems; and IoT and ubiquitous computing.
Book chapters
-
Parker AF, Grønli T-M, Younas M, 'A Game of Fog and Mirrors: Privacy in the World of Internet of Things' in A Game of Fog and Mirrors: Privacy in the World of Internet of Things, Springer (2021)
eISSN: 1611-3349 ISBN: 9783030831639 eISBN: 9783030831646AbstractPublished here Open Access on RADARPrivacy challenges are a growing point of research in both political science and computer science as the pervasive nature of IoT devices turns Orwell’s dystopic state into a potential reality. This research maps out potential scenarios for IoT privacy challenges in the interdisciplinary effort to understand what it means to have privacy in world of internet-enabled sensors.
-
Leithe W, Grønli T-M, Younas M, 'Analysis of Distance Sensor in Lego Mindstorm' in Analysis of Distance Sensor in Lego Mindstorm, Springer (2021)
eISSN: 1611-3349 ISBN: 9783030831639 eISBN: 9783030831646AbstractPublished here Open Access on RADARInternet of Things is a concept that many physical devices can connect and share information. IoT development in mobile apps aimed to control connected devices. This paper describes the form of an application-led project by building a smart application system using the Lego Mindstorm kit. It decides on and simulates scenarios for the IoT solutions and the design and develop a proof-of-concept mobile and IoT application with emphasis on the technical implementations, architectural considerations, and interoperability. It demonstrates through graphical programming environment the configuring, implement and evaluation of distance sensor technologies in a mobile application.
-
Khacef K, Benbernou S, Ouziri M, Younas M, 'Trade-Off Between Security and Scalability in Blockchain Design: A Dynamic Sharding Approach' in International Conference on Deep Learning, Big Data and Blockchain, Springer (2021)
ISBN: 9783030843366 eISBN: 9783030843373AbstractPublished here Open Access on RADARSecurity and scalability are considered as two major issues that are most likely to influence rapid deployment of blockchains in businesses. We believe that the ability to scale up a blockchain lies mainly in improving the underlying technology rather than deploying new hardware. Though recent research works have applied sharding techniques in enhancing scalability of blockchains, they do not cater for addressing the issue of both data security and scalability in blockchains. In this paper, we propose an approach that makes a trade-off between security and scalability when designing blockchain based systems. We propose an efficient replication model, which creates dynamic sharding wherein blocks are stored in a varying number of nodes. The proposed approach shows that the replication of blockchain over peer-to-peer network is minimized as the blockchain’s length evolves according to a replication factor to preserve the security.
-
Lorentzen K, Gronli TM, Ghinea G, Younas M, Satpathy M, 'Sensors in Your Clothes: Design and Development of a Prototype' in Younas M, Awan I, Kryvinska N, Strauss C, van Thanh D (ed.), Mobile Web and Intelligent Information Systems, Springer (2016)
ISSN: 0302-9743 ISBN: 978-3-319-44214-3 eISBN: 978-3-319-44215-0AbstractWearable computing is fast advancing as a preferred approach for integrating software solutions not only in our environment, but also in our everyday garments to exploit the numerous information sources we constantly interact with. This paper explores this context further by showing the possible use of wearable sensor technology for information critical information systems, through the design and development of a proof-of-concept prototype.Published here -
Casado R, Tuya J, Younas M, 'Testing the reliability of web services transactions in cooperative applications' in Sac '12 proceedings of the 27th annual acm symposium on applied computing, ACM (2012)
ISBN: 9781450308571AbstractPublished hereWeb services provide a distributed computing environment wherein service providers and consumers can dynamically interact and cooperate on various tasks in different domains such as ebusiness, education, government and healthcare. Transaction management technology is fundamental to building automated and reliable web services applications. Various models and protocols have been developed for web services transactions. However, they give no attention to the key issue of testing the web services transactions. We propose a novel abstract model for dynamically modeling distinct web services transaction standards and test their reliability in terms of failures. The proposed approach exploits model-based testing techniques in order to automatically generate test scenarios for web service transactions.
Conference papers
-
Gonzalez-Aparicio MT, Younas M, Tuya J, Casado R, 'Evaluation of ACE Properties of Traditional SQL and NoSQL Big Data Systems'
(2019) pp.1988-1995
ISBN: 9781450359337AbstractPublished here Open Access on RADARTraditional SQL and NoSQL big data systems are the backbone for managing data in cloud, fog and edge computing. This paper develops a new system and adopts the TPC-DS industry standard benchmark in order to evaluate three key properties, availability, consistency and efficiency (ACE) of SQL and NoSQL systems. The contributions of this work are manifold. It evaluates and analyses the tradeoff between the ACE properties. It provides insight into the NoSQL systems and how they can be improved to be sustainable for a more wide range of applications. The evaluation shows that SQL provides stronger consistency, but at the expense of low efficiency and availability. NoSQL provides better efficiency and availability but lacks support for stronger consistency. In order for NoSQL systems to be more sustainable they need to implement transactional schemes that enforce stronger consistency as well as better efficiency and availability.
-
Mirza QKA, Awan I, Younas M, 'A Cloud-Based Energy Efficient Hosting Model for Malware Detection Framework'
(2019)
ISBN: 9781538647271AbstractPublished here Open Access on RADARProtection strategy against malware attacks, whether in enterprise networks or on personal computers is generally divided into two main aspects; the detection rate and the resource consumption. Having a better detection rate is not the solution unless it is complimented by energy efficiency with respect to its CPU resource consumption of the host machine. This paper presents a cloud-based energy efficient hosting model for an intelligent malware detection framework, which amalgamates different components of Amazon's cloud services to develop a unique and dynamically scalable hosting model. The hosting model is then evaluated separately for its CPU utilization and in comparison with the conventional security software. The experimental results demonstrate significant energy efficiency in terms of CPU utilization by the hosting model.
-
Kashinath Basu
Muhammad Younas
Quentin Schueller
Mohit Patel
Frank Ball, 'A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center'
(2019)
ISSN: 2474-154X ISBN: 9781538671771AbstractPublished here Open Access on RADARSoftware-Defined Networks (SDN) has emerged as a dominant programmable network architecture for cloud based data centers. Its centralised programmable control plane decoupled from the data plane with a global view of the network state provides new opportunities to implement innovate security mechanisms. This research leverages this features of SDN and presents the architecture of a hierarchical and lightweight Intrusion Detection System (IDS) for software enabled networks by exploiting the concept of SDN flows. It combines advantages of a flow-based IDS and a packet-based IDS in order to provide a high detection rate without degrading network performances. The flow-based IDS uses an anomaly detection algorithm based on Support Vector Machines (SVM) trained with DARPA Intrusion Detection Dataset . This first line of defence detects any intrusions on the network. When an attack is detected, the malicious flow is mirrored to a packet-based IDS, for further examination and actions. The results show that this scheme provides good detection rates and performances with minimal extra overhead.
-
Basu K, Younas M, Tow A, Ball F, 'Performance Comparison of a SDN Network between Cloud-Based and Locally Hosted SDN Controllers'
(2018)
AbstractIn a SDN network model, the robustness, scalability and reliability requirement of the control plane makes it an ideal candidate for being hosted on a cloud infrastructure. In addition, the control plane performs large volume of data processing from packet headers to network monitoring data in order to provide adequate level of QoS to the traffic. The realization of a cloud based SDN networking approach is predominantly dependent on the performance of the SDN controllers on the cloud environment. This paper presents a comparative study of the performance of a SDN network between a locally hosted SDN controller within the enterprise with a cloud based remote controller. Since a wide range of SDN controllers are available in the market with different levels of functionalities, performance and complexities, the analysis is validated by comparing the results across three different types of controllers. Furthermore, the impact of the network topology on the performance of the controllers is further validated by comparing the performance across two different topologies. In addition, a comparative performance analysis of the throughput and a theoretical evaluation of the controllers are also presented.Open Access on RADAR -
Eisa M, Younas M, Basu K, 'Analysis and Representation of QoS Attributes in Cloud Service Selection'
(2018)
AbstractCloud service selection is complicated by the prospect that there exist a large number of services and each service is characterized by multiple QoS attributes. Various commercial tools have been developed in order to help cloud consumers with selecting best cloud services. This paper provides an in-depth analysis of the three commercial cloud service selection tools as well as the way they represent QoS attributes. Accordingly, it proposes a new model that succinctly represents QoS attributes which cloud consumers can easily use (and understand) when selecting cloud services. The proposed model also classifies the QoS attributes into four main categories of technical, strategic & organizational, economic and political & legislative. These QoS attributes can also be seamlessly fed into the multi-criteria decision (e.g., MCDM) -- which compares and ranks different QoS attributes of multiple alternatives in order to decide which services are most suitable for cloud consumers.Open Access on RADAR -
Ogunyadeka A, Younas M, Zhu H, Aldea A, 'A Multi-key Transactions Model for NoSQL Cloud Database Systems'
(2016) pp.24-27
ISBN: 978-1-5090-2251-9AbstractPublished here Open Access on RADARNoSQL cloud database systems are new types of databases that are built across thousands of cloud nodes and are capable of storing and processing Big Data. NoSQL systems have
increasingly been used in large scale applications that need high availability and efficiency but with weaker consistency. Consequently, such systems lack support for standard transactions which provide stronger consistency. This paper proposes a new multi-key transactional model which provides NoSQL systems with standard transaction support and stronger level of data consistency. The strategy is to supplement current NoSQL architecture with an extra layer that manages transactions. The proposed model is configurable where consistency, availability and efficiency can be adjusted based on application requirements. The proposed model is validated through a prototype system using MongoDB. Preliminary experiments show that it ensures stronger consistency and maintains good performance.
-
Eisa M, Younas M, Basu K, Zhu H, 'Trends and Directions in Cloud Service Selection'
(2016) pp.423-432
ISBN: 978-1-5090-2253-3AbstractWith the growing popularity of cloud computing the number of cloud service providers and services have significantly increased. Thus selecting the best cloud services becomes a challenging task for prospective cloud users. The process of selecting cloud services involves various factors such as characteristics and models of cloud services, user requirements and knowledge, and service level agreement (SLA), to name a few. This paper investigates into the cloud service selection tools, techniques and models by taking into account the distinguishing characteristics of cloud services. It also reviews and analyses academic research as well as commercial tools in order to identify their strengths and weaknesses in the cloud services selection process. It proposes a framework in order to improve the cloud service selection by taking into account services capabilities, quality attributes, level of user's knowledge and service level agreements. The paper also envisions various directions for future research.Published here Open Access on RADAR -
González-Aparicio MT, Younas M, Tuya J, Casado R, 'A New Model for Testing CRUD Operations in a NoSQL Database'
(16022530) (2016) pp.79-86
ISBN: 978-1-5090-1857-4AbstractPublished here Open Access on RADARNoSQL databases provide high availability and efficiency in data processing but at the expense of weaker consistency. In this paper, we propose a new approach in order to test NoSQL key/value databases in general and their CRUD operations in particular. We design a new context-aware model that takes into account the contextual requirements of clients (users) and the NoSQL database system. Accordingly, we develop a transaction model and testing criteria in order to test NoSQL databases by taking into account transactional and nontransactional CRUD operations. Results from testing criteria are used to analyse the trade-off between availability and consistency of NoSQL databases. In addition, these are used to help NoSQL database users and developers to choose between transactional and non-transactional CRUD operations.
-
Zhu H, Bayley I, Younas M, Lightfoot D, Yousef B, Liu D, 'Big SaaS: The Next Step Beyond Big Data'
(2015) pp.775-784
ISBN: 978-1-4673-7277-0AbstractPublished here Open Access on RADARSoftware-as-a-Service (SaaS) is a model of cloud computing in which software functions are delivered to the users as services. The past few years have witnessed its global flourishing. In the foreseeable future, SaaS applications will integrate with the Internet of Things, Mobile Computing, Big Data, Wireless Sensor Networks, and many other computing and communication technologies to deliver customizable intelligent services to a vast population. This will give rise to an era of what we call Big SaaS systems of unprecedented complexity and scale. They will have huge numbers of tenants/users interrelated in complex ways. The code will be complex too and require Big Data but provide great value to the customer. With these benefits come great societal risks, however, and there are other drawbacks and challenges. For example, it is difficult to ensure the quality of data and metadata obtained from crowdsourcing and to maintain the integrity of conceptual model. Big SaaS applications will also need to evolve continuously. This paper will discuss how to address these challenges at all stages of the software lifecycle.
-
Mesfin WF, Grønli TM, Ghinea G, Younas M, 'A Mobile Money Solution for Illiterate User'
(2015) pp.328-335
ISBN: 978-1-4673-7284-8AbstractExisting mobile money platforms have text based interfaces and target literate people. Illiterate people, without the assistance of literate individuals, cannot use such platforms. Applying user-centered requirements gathered in an Ethiopian context, this paper presents the design and development of a mobile money solution that targets illiterate people. Particular emphasis is given to how illiterate users deal with cash money in their everyday life and how such practices can be mapped into financial technology design. Given the ubiquity of mobile telephony in Africa, our solution is based on the widely available, relatively inexpensive and open source Android mobile web platform. The proposed system enables illiterate individuals to count money bills, while providing the facility to accept and make payments. In so doing, we provide an example of how a pervasive technology such as smartphones can empower a hitherto often neglected user category of illiterate users.Published here -
Zhu H, Yousef B, Younas M, 'Evaluation of a Tenant Level Checkpointing Technique for SaaS Applications'
(2015) pp.989-994
ISBN: 978-1-4673-7286-2AbstractPublished hereTenant level checkpointing is a novel fault-tolerance technique proposed in our previous work for largescale software-as-a-service applications. This paper evaluates the technique by a theoretical analysis of the technique and an empirical study using workload benchmarks of real largescale cluster systems. We propose the notion of accumulated delay as a measurement of the performance of checkpointing techniques. It reflects the effect of checkpointing on system
performance as experienced by the end users. Both theoretical analysis and empirical study show that tenant level checkpointing significantly outperforms traditional bulk checkpointing as
measured by the amount of accumulated delays.
-
Apduhan BO, Younas M, Uchibayashi T, 'Improving Reliability and Availability of IaaS Services in Hybrid Clouds'
9155 (2015) pp.557-568
ISBN: 978-3-319-21403-0 eISBN: 978-3-319-21404-7AbstractThis paper investigates into IaaS service provisioning in hybrid cloud which comprises private and public clouds. It proposes a hybrid cloud framework in order to improve reliability and availability of IaaS services by taking into account alternative services which are available through public clouds. However, provisioning of alternative services in hybrid cloud involves complex processing, intelligent decision making and reliability and consistency issues. In the proposed framework, we develop an agent-based system using cloud ontology in order to identify and rank alternative cloud services which users can acquire in the event of failures or unavailability of desired services. The proposed framework also exploits transactional techniques in order to ensure the reliability and consistency of the service acquisition process. The proposed framework is evaluated through various experiments which show that it improves service availability and reliability in hybrid cloud.Published here Open Access on RADAR -
Yousef B, Zhu H, Younas M, 'Tenant Level Checkpointing of Meta-Data for Multi-Tenancy SaaS'
(2014) pp.148-153
ISBN: 978-1-4799-2504-9AbstractPublished here Open Access on RADARTraditional checkpointing techniques are facing a grave challenge when applied to multi-tenancy software-as-a-service (SaaS) systems due to the huge scale of the system state and the diversity of users' requirements on the quality of services. This paper proposes the notion of tenant level checkpointing and an algorithm that exploits Big Data techniques to checkpoint tenant's meta-data, which are widely used in configuring SaaS for tenant-specific features. The paper presents a prototype implementation of the proposed technique using NoSQL database Couchbase and reports the experiments that compare it with traditional implementation of checkpointing using file systems. Experiments show that the Big Data approach has a significantly lower latency in comparison with the traditional approach.
-
Awan I, Younas M, Naveed W, 'Modelling QoS in IoT Applications'
(2014) pp.99-105
ISBN: 978-1-4799-4226-8AbstractInternet of Things (IoT) aims to enable the interconnection of a large number of smart devices (things) using a combination of networks and computing technologies. But an influx of interconnected things makes a greater demand on the underlying communication networks and affects the quality of service (QoS). This paper investigates into the QoS of delay sensitive things and the corresponding traffic they generate over the network. Things such as security alarms, cameras, etc, generate delay sensitive information that must be communicated in a real time. Such things have heterogeneous features with limited buffer capacity, storage and processing power. Thus the most commonly used Best Effort service model cannot be an attractive mechanism to treat delay sensitive traffic. This paper proposes a cost-effective analytical model for a finite capacity queueing system with pre-emptive resume service priority and push-out buffer management scheme. Based on the analytical model various simulation results are generated in order to analyse the mean queue length and the blocking probability of high and low priority traffic for system with various capacities.Published here -
Sapkota K, Aldea A, Duce D, Younas M, Banares-Alcantara R, 'Semantic-ART: a framework for semantic annotation of regulatory text'
(2011)
ISBN: 1861662459Published here -
Younas M, MosteÌfaoui S K, 'Context-aware mobile services transactions'
(2010) pp.705-712
ISSN: 1550-445X eISSN: 1550-445XAbstractPublished hereWith the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable environment transaction management technology is believed to provide service reliability and data consistency. Existing models developed for mobile transactions mainly focus on variation of conventional commit procedures and give little or no attention to the context-awareness which has become a crucial part of modern mobile applications. Given the high availability of context-aware services, mobile transactions should not only acquire required services but should also comply with the service context. This paper exploits the service-oriented computing technology and accordingly proposes a novel approach that manages transactions using the contextual information of mobile services. The proposed approach has several advantages. It manages transactions such that they adapt to the required service context as well as user's needs. It also ensures the reliability of transactions and also increases their resilience to failures.
-
Holton DRW, Awan IU, Younas M, 'The role of client behaviour in the performance analysis of eCommerce systems'
(2008)
AbstractIn order to investigate the performance of priority protocols in an eCommerce system, we simulate their behaviour when composed with clients with differing behaviour. As suspected, we find that there is a relationship between the behaviour of the clients and the prformance of the protocols.Published here -
Younas M, Awan I, Chao KM, 'Efficient Scheduling of Vital E-commerce Requests'
(2007) pp.496-503
-
Duce D, Younas M, 'P2p Network Protocol for Efficient Choreography of Web Services'
(2007) pp.839-846
-
Li YS, Lu XH, Chao KM, Huang Y, Younas M, 'The Realization of Service-oriented E-marketplaces'
Information Systems Frontiers 8 (2007) pp.307-319
ISSN: 1387-3326 eISSN: 1572-9419Published here -
Duce D, Younas M, 'An Efficient Composition of Web Services With Active Network Support'
Expert Systems with Applications 31 (2006) pp.859-869
ISSN: 0957-4174 eISSN: 1873-6793Published here -
Younas M, Chao KM, Lo CC, Li YS, 'An Efficient Transaction Commit Protocol for Composite Web Services'
(2006) pp.591-596
AbstractTransaction commit protocols have widely been used to ensure the correctness and reliability of distributed applications. This paper investigates into the performance of such protocols within the context of composite web services. It presents a new commit protocol which aims to improve the performance of composite web services transactions. The proposed protocol is tested through various analytical experiments. These experiments reveal that the proposed protocol significantly improves the performance in committing a composite web service transaction. The experiments also exhibit the processing overhead of the proposed protocol in the case of unsuccessful execution of a web service transaction. -
Huang CL, Lo CC, Chao KM, Younas M, 'Reaching Consensus: a Moderated Fuzzy Web Services Discovery Method'
Information and Software Technology 48 (2006) pp.410-423
ISSN: 0950-5849 eISSN: 1873-6025Published here -
Younas M, Chao KM, Laing C, 'Composition of Mismatched Web Services in Distributed Service Oriented Design Activities'
Advanced Engineering Informatics 19 (2005) pp.143-153
ISSN: 1474-0346 eISSN: 1873-5320Published here -
C. Cooper, D. Duce, M. Younas, W. Li, M. Sagar, Gordon S. Blair, G. Coulson, P. Grace, 'The Open Overlays Collaborative Workspace'
(2005)
AbstractNext-generation Grid applications will operate within and across many heterogeneous network types, will employ a wide range of device types ranging from supercomputers to sensor motes; and will require many more “interaction paradigms” than merely RPC and message-passing. The Open Overlays project proposes a middleware approach to satisfy these emerging needs. In this paper we describe an application scenario, wildfire management, that encompasses these needs, and our approach to constructing a component of this scenario, a collaborative workspace tool (svgCWE). This is being constructed using Web technologies: SVG and RDF. Information in the collaborative workspace is regarded as an annotation of the workspace resource which can be described with an RDF model. The architecture of svgCWE is designed so that a variety of different kinds of RDF repository (centralized, replicated and distributed) can be used. The paper describes the first prototype of svgCWE and draws some tentative conclusions about the advantages of the approach.
Other publications
-
Shakshuki E, Younas M, 'New Developments in Pervasive and Ambient Information Systems', (2013)
Published here -
Sheng QZ, Younas M, Georgakopoulos D, 'Guest Editorial: Mobile Services on the Web', (2011)
Published here -
Younas M, Awan I, Takizawa M, 'Special Issue on the Information Networking and Services Preface', (2011)
Published here -
Younas M, Awan I, Yang LT, 'Special Issue on Service Oriented Computing and Advanced Network Applications', (2009)
Published here -
Uehara M, Younas M, 'Special Issue: Web and Grid Services for Advanced Network and Information Systems Preface', (2009)
-
Awan I, Younas M, Takizawa M, 'Special Issue: Advanced Networking and Web Technologies - Guest Editorial', (2007)
Published here -
Chao KM, Shen WM, Younas M, 'Special Issue - Cscwd 2005', (2006)
Published here -
Younas M, Shakshuki E, Chao KM, 'Special Issue Editorial: Wamis 2005 Workshop', (2006)
Published here
Professional information
Memberships of professional bodies
I'm member/reviewer of the following funding councils/bodies:
- Engineering and Physical Sciences Research Council (EPSRC), UK
- Natural Sciences and Engineering Research Council (NSERC), Canada
- Agence Nationale de la Recherche (ANR), France
- The Royal Society, UK
Conferences
I've been chairing a number of international conferences, such as:
- The IEEE International Conference on Web Services (ICWS)
- The IEEE International Conference on Services Computing (SCC)
- The IEEE International Conference on Big Data Computing Service and Applications (BigDataService)
- The IEEE International Symposium on Service-Oriented System Engineering (SOSE)
- The International Conference Big Data Innovations and Applications (Innovate-Data)
- The IEEE International Conference on Advanced Information Networking and Applications (AINA)
- The IEEE International Conference on e-Business Engineering (ICEBE)
- The International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)
- The IEEE International Conference on Service-Oriented Computing and Applications (SOCA)
- The IEEE International Conference on CSCW in Design (CSCWD)
Programme Committees
I serve(d) on the programme committees of a number of international conferences and symposia/workshops. Some of these include:
- The IEEE International Conference on Services Computing (SCC)
- The IEEE/ACM International Conference on Utility and Cloud Computing (UCC)
- The IEEE International Conference on Web Services (ICWS)
- The ACM/SIGAPP Symposium on Applied Computing (SAC)
- The IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
- The ACM International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
- The IEEE International Conference on Advanced Information Networking and Applications (AINA)
- The IEEE International Conference on Web Services (ICWS)
- The IEEE International Symposium on Service-Oriented System Engineering (SOSE)
- The IEEE International Conference on Big Data and Cloud Computing (BDCloud)
Journals: Editorial Board
- International Journal of Service-Oriented Computing and Applications
- International Journal of Web Information Systems
- Human-centric Computing and Information Sciences
- International Journal of Pervasive Computing and Communications
- Journal for STEM Education, The American Institute of Mathematical Sciences
Journals: Review Panel
- IEEE Transactions on Parallel and Distributed Systems
- IEEE Transactions on Knowledge and Data Engineering
- ACM Transactions on Internet Technology
- IEEE Transactions on Big Data
- ACM Computing Surveys
- IEEE Computer
- Communications of ACM
- IEEE/ACM Transactions on Networking
- IEEE Transactions on Services Computing
- IEEE Transactions on Systems, Man, and Cybernetics
- ACM Transactions on Embedded Computing Systems
- IEEE Transactions on Industrial Informatics
- ACM Transactions on Storage