Dr  Shaleeza Sohail

Dr Shaleeza Sohail

Lecturer

School of Information and Physical Sciences (Computing and Information Technology)

Career Summary

Biography

Dr Shaleeza Sohail received her Ph.D. and Masters in Computer Science from the University of New South Wales, Australia. She is the Program Convenor for Master of IT and Graduate Certificate of IT in Sydney, Computing and IT discipline at The University of Newcastle, Sydney.

She has been teaching undergraduate and postgraduate courses in the field of Computer Science and Information Systems and has extensive experience in teaching and learning design and curriculum development. Dr. Sohail has been actively involved in research in various fields of computing and published a number of papers. Her current research interests include Cyber Security, Blockchain and, Machine Learning. 

Cybersecurity plays an important and unique role in protecting information, data, infrastructure and devices. In recent times there has been a big rise in cyber-attacks causing huge financial damage and information loss. In response, the research community has been actively trying to find the countermeasures to provide cybersecurity. However, there are still a number of unresolved issues jeopardizing the security, privacy and trust involved in the cyber world. In this broad field of cybersecurity research, some of the themes that I have been exploring are:

· Artificial intelligence-based cyber-attack detection and prevention system.

· Security and Configuration Management of IoT Systems

· Utilizing blockchain for ensuring trust and authenticity of data

The industry today still struggles to provide timely response action against rapidly evolving cyber security threats. The domains that I am working on currently are smart agriculture, smart home and smart cities.


Qualifications

  • Doctor of Philosophy, University of New South Wales
  • Master of Engineering, University of New South Wales

Keywords

  • Blockchain
  • Computer Networks
  • Cyber Security
  • Machine Learning

Languages

  • Urdu (Mother)
  • English (Fluent)

Fields of Research

Code Description Percentage
460603 Cyberphysical systems and internet of things 30
460499 Cybersecurity and privacy not elsewhere classified 50
461199 Machine learning not elsewhere classified 20

Professional Experience

UON Appointment

Title Organisation / Department
Lecturer University of Newcastle
School of Information and Physical Sciences
Australia

Teaching

Code Course Role Duration
INFO6001 Database Management 1
Faculty of Engineering and Built Environment - The University of Newcastle (Australia)
Course Coordinator and Lecturer 1/1/2020 - 31/12/2021
INFO6030 System Analysis and Design
College of Engineering, Science and Environment, University of Newcastle
Course Coordinator and Lecturer 1/1/2020 - 31/12/2021
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Chapter (1 outputs)

Year Citation Altmetrics Link
2010 Shah GA, Sohail S, Hussain FB, 'QoS in wireless sensor networks', Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication 53-74 (2010)

Wireless Sensor Networks (WSNs) have been envisioned as a new and effective means for creating and deploying previously unimaginable applications. These networks generally have th... [more]

Wireless Sensor Networks (WSNs) have been envisioned as a new and effective means for creating and deploying previously unimaginable applications. These networks generally have the capabilities of observing the physical phenomena, communication, data processing and dissemination. Limited resources of sensor nodes like energy, bandwidth and processing abilities, make these networks excellent candidates for incorporating QoS framework. The possible applications of WSNs are numerous while being diverse in nature which makes analyzing and designing QoS support for each application a non-trivial task. At the same time, these applications require different type of QoS support from the network for optimum performance. A single layer cannot address all these issues, hence, numerous researchers have proposed protocols and architectures for QoS support at different network layers. In this chapter, the authors identify the generic QoS parameters which are usually supported at different layers of WSNs protocol stack and investigate their importance in different application models. A brief overview of significant research contribution at every network layer is provided. It is worthwhile to mention that same QoS parameter may be supported at multiple layers, hence, adequate selection of suitable mechanism would be application's choice. On the other hand, it is quite possible that a single QoS parameter, such as energy conservation or real-time delivery, can be efficiently supported through interaction of multiple layers. It is difficult, if not impossible to optimize multi layer QoS architecture. Hence, a number of researchers have also proposed the idea of cross layer architecture for providing QoS support for a number of sensor applications, which is also discussed in this chapter. At the end, the authors highlight the open research issues that might be the focus of future research in this area. © 2010, IGI Global.

DOI 10.4018/978-1-61520-791-6.ch004
Citations Scopus - 1

Journal article (17 outputs)

Year Citation Altmetrics Link
2024 Devaraj H, Sohail S, Li B, Hudson N, Baughman M, Chard K, et al., 'RuralAI in Tomato Farming: Integrated Sensor System, Distributed Computing and Hierarchical Federated Learning for Crop Health Monitoring', IEEE Sensors Letters, (2024) [C1]

Precision horticulture is evolving due to scalable sensor deployment and machine learning integration. These advancements boost the operational efficiency of individual farms, bal... [more]

Precision horticulture is evolving due to scalable sensor deployment and machine learning integration. These advancements boost the operational efficiency of individual farms, balancing the benefits of analytics with autonomy requirements. However, given concerns that affect wide geographic regions (e.g., climate change), there is a need to apply models that span farms. Federated Learning (FL) has emerged as a potential solution. FL enables decentralized machine learning (ML) across different farms without sharing private data. Traditional FL assumes simple 2-tier network topologies and thus falls short of operating on more complex networks found in real-world agricultural scenarios. Networks vary across crops and farms, and encompass various sensor data modes, extending across jurisdictions. New hierarchical FL (HFL) approaches are needed for more efficient and context-sensitive model sharing, accommodating regulations across multiple jurisdictions. We present the RuralAI architecture deployment for tomato crop monitoring, featuring sensor field units for soil, crop, and weather data collection. HFL with personalization is used to offer localized and adaptive insights. Model management, aggregation, and transfers are facilitated via a flexible approach, enabling seamless communication between local devices, edge nodes, and the cloud.

DOI 10.1109/LSENS.2024.3384935
2023 Gu X, Sabrina F, Fan Z, Sohail S, 'A Review of Privacy Enhancement Methods for Federated Learning in Healthcare Systems', International Journal of Environmental Research and Public Health, 20 (2023) [C1]

Federated learning (FL) provides a distributed machine learning system that enables participants to train using local data to create a shared model by eliminating the requirement ... [more]

Federated learning (FL) provides a distributed machine learning system that enables participants to train using local data to create a shared model by eliminating the requirement of data sharing. In healthcare systems, FL allows Medical Internet of Things (MIoT) devices and electronic health records (EHRs) to be trained locally without sending patients data to the central server. This allows healthcare decisions and diagnoses based on datasets from all participants, as well as streamlining other healthcare processes. In terms of user data privacy, this technology allows collaborative training without the need of sharing the local data with the central server. However, there are privacy challenges in FL arising from the fact that the model updates are shared between the client and the server which can be used for re-generating the client¿s data, breaching privacy requirements of applications in domains like healthcare. In this paper, we have conducted a review of the literature to analyse the existing privacy and security enhancement methods proposed for FL in healthcare systems. It has been identified that the research in the domain focuses on seven techniques: Differential Privacy, Homomorphic Encryption, Blockchain, Hierarchical Approaches, Peer to Peer Sharing, Intelligence on the Edge Device, and Mixed, Hybrid and Miscellaneous Approaches. The strengths, limitations, and trade-offs of each technique were discussed, and the possible future for these seven privacy enhancement techniques for healthcare FL systems was identified.

DOI 10.3390/ijerph20156539
Citations Scopus - 6
2023 Ooi MPL, Sohail S, Huang VG, Hudson N, Baughman M, Rana O, et al., 'Measurement and Applications: Exploring the Challenges and Opportunities of Hierarchical Federated Learning in Sensor Applications', IEEE Instrumentation and Measurement Magazine, 26 21-31 (2023) [C1]

Sensor applications have become ubiquitous in modern society as the digital age continues to advance. AI-based techniques (e.g., machine learning) are effective at extracting acti... [more]

Sensor applications have become ubiquitous in modern society as the digital age continues to advance. AI-based techniques (e.g., machine learning) are effective at extracting actionable information from large amounts of data. An example would be an automated water irrigation system that uses AI-based techniques on soil quality data to decide how to best distribute water. However, these AI-based techniques are costly in terms of hardware resources, and Internet-of-Things (IoT) sensors are resource-constrained with respect to processing power, energy, and storage capacity. These limitations can compromise the security, performance, and reliability of sensor-driven applications. To address these concerns, cloud computing services can be used by sensor applications for data storage and processing. Unfortunately, cloud-based sensor applications that require real-time processing, such as medical applications (e.g., fall detection and stroke prediction), are vulnerable to issues such as network latency due to the sparse and unreliable networks between the sensor nodes and the cloud server [1]. As users approach the edge of the communications network, latency issues become more severe and frequent. A promising alternative is edge computing, which provides cloud-like capabilities at the edge of the network by pushing storage and processing capabilities from centralized nodes to edge devices that are closer to where the data are gathered, resulting in reduced network delays [2], [3].

DOI 10.1109/MIM.2023.10328671
2022 Sabrina F, Li N, Sohail S, 'A Blockchain Based Secure IoT System Using Device Identity Management.', Sensors (Basel, Switzerland), 22 7535 (2022) [C1]
DOI 10.3390/s22197535
Citations Scopus - 9Web of Science - 1
2022 Sabrina F, Sohail S, Farid F, Jahan S, Ahamed F, Gordon S, 'An Interpretable Artificial Intelligence Based Smart Agriculture System', CMC-COMPUTERS MATERIALS & CONTINUA, 72 3777-3797 (2022) [C1]
DOI 10.32604/cmc.2022.026363
Citations Scopus - 9Web of Science - 1
2022 Sohail S, Fan Z, Gu X, Sabrina F, 'Multi-tiered Artificial Neural Networks model for intrusion detection in smart homes', Intelligent Systems with Applications, 16 (2022) [C1]

In recent years cybersecurity has become a major concern in the adaptation of smart applications. A secure and trusted mechanism can provide peace of mind for users, especially in... [more]

In recent years cybersecurity has become a major concern in the adaptation of smart applications. A secure and trusted mechanism can provide peace of mind for users, especially in smart homes where a large number of IoT devices are used. Artificial Neural Networks (ANN) provide promising results for detecting any security attacks on smart applications. However, due to the complex nature of the model used for this technique, it is not easy for common users to trust ANN-based security solutions. Also, the selection of the right hyperparameters for ANN architecture plays a crucial role in the accurate detection of security attacks. This paper proposes Multi-tiered ANN Model for Intrusion Detection (MAMID) that is a novel and scalable solution for optimal hyperparameter selection to detect security attacks with high accuracy. The explainability analysis of the predictions made by the model is also provided for establishing trust among users. The approach considers a subset of the dataset for quick, scalable and optimal selection of hyperparameters to reduce the overhead of the process of ANN architecture design. Using a very recent IoT dataset the proposed approach showed high performance for intrusion detection with 99.9%, 99.7%, and 97.7% accuracy for binary, category, and subcategory classification of attacks. To the best of the authors' knowledge, no previous research work has been able to achieve attack detection at the subcategory level beyond 90%.

DOI 10.1016/j.iswa.2022.200152
Citations Scopus - 3
2022 Sohail S, Alvi A, Khanum A, 'Interpretable and Adaptable Early Warning Learning Analytics Model', CMC-COMPUTERS MATERIALS & CONTINUA, 71 3211-3225 (2022) [C1]
DOI 10.32604/cmc.2022.023560
Citations Scopus - 3Web of Science - 1
2022 Sabrina F, Azad S, Sohail S, Thakur S, 'Ensuring academic integrity in online assessments: A literature review and recommendations', International Journal of Information and Education Technology, 12 60-70 (2022) [C1]

During the recent COVID-19 outbreak, educational institutions have transitioned to online teaching for all students for most of the programs. Due to lack of in-person interactions... [more]

During the recent COVID-19 outbreak, educational institutions have transitioned to online teaching for all students for most of the programs. Due to lack of in-person interactions and monitoring, assessments in online courses may be more susceptible to contract cheating, collusion, fabrication and other types of academic misconduct than the assessments in face-to-face courses. This situation has raised several research questions that need immediate attention, such as what are the best possible options for online assessments and how to administer online assessments so that academic integrity could be preserved. The authors have conducted a scoping study and carried out an extensive literature review on i) different types of assessments that are suitable for online courses, ii) strategies for ensuring academic integrity, and iii) methods, tools and technologies available for preventing academic misconduct in online assessments. It is evident from the literature review that there are a range of options available for designing assessment tasks to detect and prevent violations of academic integrity. However, no single method or design is enough to eliminate all sorts of academic integrity violations. After thorough research and analysis of existing literature, the authors have provided a comprehensive set of recommendations that could be adopted for ensuring academic integrity in online assessments.

DOI 10.18178/ijiet.2022.12.1.1587
Citations Scopus - 17
2017 Hashish S, Sohail S, 'Utilizing RFID for Effective Real Time Retrieval and Translation of Public Advertisements', Menoufia Journal of Electronic Engineering Research, 26 501-518 (2017)
DOI 10.21608/mjeer.2017.63623
2011 Sohail S, 'Bandwidth broker', Recent Patents on Computer Science, 4 127-133 (2011)

Research community has been showing an immense interest for more than a decade in issues related to providing better than best effort service guarantees on the Internet. A number ... [more]

Research community has been showing an immense interest for more than a decade in issues related to providing better than best effort service guarantees on the Internet. A number of options have been explored in this regard. Differentiated Services architecture is one of the proposed solutions that treat traffic flows based on their pre-assigned classes to eliminate scalability issue, otherwise a difficult and non trivial problem to solve. Bandwidth Broker is a logical resource management entity in Differentiated Services domain that performs a number of important functions at inter and intra-domain level to optimize resource utilization. Optimal resource management is not only complex but is tricky in this scenario, as the network's service providing ability is greatly affected by the optimality of domain management. Hence, Bandwidth Broker has been a focus of a lot of research efforts. This paper: a) provides a brief but concise discussion on different functions and modules of Bandwidth Broker, b) points out some advance features proposed for BB's performance enhancements and, c) reviews recent patents directly and indirectly related to Bandwidth Broker. © 2011 Bentham Science Publishers.

DOI 10.2174/2213275911104020127
2010 Sohail S, 'Automation of network management with multidisciplinary concepts', International Journal of Computer Technology and Applications, 1 (2010)
2010 Iqbal U, Sohail S, Javed MY, 'SIP-based QoS management architecture for IP multimedia subsystems over IP access networks', World Academy of Science, Engineering and Technology, 64 547-554 (2010)

True integration of multimedia services over wired or wireless networks increase the productivity and effectiveness in today's networks. IP Multimedia Subsystems are Next Gen... [more]

True integration of multimedia services over wired or wireless networks increase the productivity and effectiveness in today's networks. IP Multimedia Subsystems are Next Generation Network architecture to provide the multimedia services over fixed or mobile networks. This paper proposes an extended SIP-based QoS Management architecture for IMS services over underlying IP access networks. To guarantee the end-to-end QoS for IMS services in interconnection backbone, SIP based proxy Modules are introduced to support the QoS provisioning and to reduce the handoff disruption time over IP access networks. In our approach these SIP Modules implement the combination of Diffserv and MPLS QoS mechanisms to assure the guaranteed QoS for real-time multimedia services. To guarantee QoS over access networks, SIP Modules make QoS resource reservations in advance to provide best QoS to IMS users over heterogeneous networks. To obtain more reliable multimedia services, our approach allows the use of SCTP protocol over SIP instead of UDP due to its multi-streaming feature. This architecture enables QoS provisioning for IMS roaming users to differentiate IMS network from other common IP networks for transmission of realtime multimedia services. To validate our approach simulation models are developed on short scale basis. The results show that our approach yields comparable performance for efficient delivery of IMS services over heterogeneous IP access networks.

Citations Scopus - 1
2010 Iqbal U, Sohail S, Javed MY, 'SIP-based QoS management architecture for IP multimedia subsystems over IP access networks', World Academy of Science, Engineering and Technology, 40 552-559 (2010)

True integration of multimedia services over wired or wireless networks increase the productivity and effectiveness in today's networks. IP Multimedia Subsystems are Next Gen... [more]

True integration of multimedia services over wired or wireless networks increase the productivity and effectiveness in today's networks. IP Multimedia Subsystems are Next Generation Network architecture to provide the multimedia services over fixed or mobile networks. This paper proposes an extended SIP-based QoS Management architecture for IMS services over underlying IP access networks. To guarantee the end-to-end QoS for IMS services in interconnection backbone, SIP based proxy Modules are introduced to support the QoS provisioning and to reduce the handoff disruption time over IP access networks. In our approach these SIP Modules implement the combination of Diffserv and MPLS QoS mechanisms to assure the guaranteed QoS for real-time multimedia services. To guarantee QoS over access networks, SIP Modules make QoS resource reservations in advance to provide best QoS to IMS users over heterogeneous networks. To obtain more reliable multimedia services, our approach allows the use of SCTP protocol over SIP instead of UDP due to its multi-streaming feature. This architecture enables QoS provisioning for IMS roaming users to differentiate IMS network from other common IP networks for transmission of real- time multimedia services. To validate our approach simulation models are developed on short scale basis. The results show that our approach yields comparable performance for efficient delivery of IMS services over heterogeneous IP access networks.

2009 Khan B, Sohail S, Javed MY, 'ESBASCA: A Novel Software Clustering Approach', International Journal of Software Engineering and Its Applications, 3 1-18 (2009)
2006 Sohail S, Jha SK, Kanhere SS, Chou CT, 'QoS driven parallelization of resources to reduce file download delay', IEEE Transactions on Parallel and Distributed Systems, 17 1204-1215 (2006)

In this paper, we propose a novel approach for reducing the download time of large files over the Internet. Our approach, known as Parallelized File Transport Protocol (P-FTP), pr... [more]

In this paper, we propose a novel approach for reducing the download time of large files over the Internet. Our approach, known as Parallelized File Transport Protocol (P-FTP), proposes simultaneous downloads of disjoint file portions from multiple file servers. P-FTP server selects file servers for the requesting client on the basis of a variety of QoS parameters, such as available bandwidth and server utilization. The sensitivity analysis of our file server selection technique shows that it performs significantly better than random selection. During the file transfer, P-FTP client monitors the file transfer flows to detect slow servers and congested links and adjusts the file distributions accordingly. P-FTP is evaluated with simulations and real-world implementation. The results show at least 50 percent reduction in download time when compared to the traditional file-transfer approach. Moreover, we have also carried out a simulation-based study to investigate the issues related to large scale deployment of our approach on the Internet. Our results demonstrate that a large number of P-FTP users has no adverse effect on the performance perceived by non-P-FTP users. In addition, the file servers and network are not significantly affected by large scale deployment of P-FTP. © 2006 IEEE.

DOI 10.1109/TPDS.2006.144
Citations Scopus - 6
2004 Al-Ali R, Sohail S, Rana O, Hafid A, Von Laszewski G, Amin K, et al., 'Network QoS provision for distributed grid applications', International Journal of Simulation: Systems, Science and Technology, 5 13-28 (2004)

Grid computing provides a global-scale distributed computing infrastructure for executing scientific and business applications. An important requirement is the need to make this i... [more]

Grid computing provides a global-scale distributed computing infrastructure for executing scientific and business applications. An important requirement is the need to make this infrastructure appear as a single logical coordinated resource¿which in reality consists of a variety of resources aggregated across different administrative domains. The aggregation of network resources is often undertaken over a ¿best effort¿ infrastructure as provided by the Internet¿however many applications, which necessitate soft-real time constraints, such as collaborative working or remote visualisation, require more stringent traffic guarantees. Managing Quality of Service (QoS) requirements across these aggregated resources therefore becomes an important concern. Such QoS criteria must extend to computational, data and network resources, and are often expressed in a Service Level Agreement, multiples of which may co-exist over the entire collection of resources. In this paper we focus on network QoS as part of our wider work on the Grid QoS Management (G-QoSm) framework. Provisioning of such QoS support is provided via the Differentiated Services architecture, and relies on the use of a Bandwidth Broker (BB) component. Performance results of using the BB alongside other elements in G-QoSm are presented.

Citations Scopus - 15
2002 Al-Ali RJ, Rana OF, Walker DW, Jha S, Sohail S, 'G-QOSM: Grid service discovery using QOS properties', Computing and Informatics, 21 363-382 (2002)

We extend the service abstraction in the Open Grid Services Architecture [12] for Quality of Service (QoS) properties. The realization of QoS often requires mechanisms such as adv... [more]

We extend the service abstraction in the Open Grid Services Architecture [12] for Quality of Service (QoS) properties. The realization of QoS often requires mechanisms such as advance or on-demand reservation of resources, varying in type and implementation, and independently controlled and monitored. Foster et al. propose the GARA [10] architecture. The GARA library provides a restricted representation scheme for encoding resource properties and the associated monitoring of Service Level Agreements (SLAs). Our focus is on the application layer, whereby a given service may indicate the QoS properties it can offer, or where a service may search for other services based on particular QoS properties.

Citations Scopus - 135
Show 14 more journal articles

Conference (24 outputs)

Year Citation Altmetrics Link
2023 Huang V, Sohail S, Mayo M, Botran TL, Rodrigues M, Anderson C, Ooi M, 'Keep It Simple: Fault Tolerance Evaluation of Federated Learning with Unreliable Clients', 2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, IL, Chicago (2023) [E1]
DOI 10.1109/CLOUD60044.2023.00024
2022 Sohail S, Salter G, 'PRAGMATISM AS A TEACHING APPROACH FOR ENGAGING STUDENTS IN COMPUTING EDUCATION', ICERI2022 Proceedings (2022)
DOI 10.21125/iceri.2022.1040
2021 Azad S, Naqvi SS, Sabrina F, Sohail S, Thakur S, 'IoT Cybersecurity: On the Use of Machine Learning Approaches for Unbalanced Datasets', 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2021, Brisbane, Australia (2021) [E1]
DOI 10.1109/CSDE53843.2021.9718426
Citations Scopus - 1
2020 Sabrina F, Sohail S, Thakur S, Azad S, Wasimi S, 'Use of Deep Learning Approach on UAV imagery to Detect Mistletoe Infestation', 2020 IEEE Region 10 Symposium (TENSYMP), Dakha, Bangladesh (2020) [E1]
DOI 10.1109/TENSYMP50017.2020.9230971
Citations Scopus - 8Web of Science - 2
2018 Sohail S, Khanum A, Alvi A, 'Hybrid Fuzzy-Statistical System for Learning Analytics', Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018 (2018)

Learning analytics, being a very active field of research, recently has a number of significant contributions where data related to students' demographics, learning and behav... [more]

Learning analytics, being a very active field of research, recently has a number of significant contributions where data related to students' demographics, learning and behaviour is being used to predict student performance. In higher education institutes most of these models are based on statistical and machine learning techniques. The biggest challenge that can be seen in almost all these research efforts is the ineffective portability of prediction model across multiple cohorts even in the same institute. We propose to use hybrid fuzzy-statistical model for predicting student performance based on behaviour related predictors in a particular cohort. We have recently started this project so preliminary details of our model based on Fuzzy Expert System are provided. The model is proposed for enhancing traditional statistical models with Fuzzy SetslFuzzy Logic to overcome the limitations of commonly used statistical techniques and deliver a stronger system with combined advantages of both domains.

DOI 10.1109/TALE.2018.8615182
Citations Scopus - 3
2018 Jonathan J, Sohail S, Kotob F, Salter G, 'The Role of Learning Analytics in Performance Measurement in a Higher Education Institution', Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, TALE 2018 (2018)

Recently, learning analytics have played a vital role in predicting and monitoring students' performance. Our work-in-progress paper suggests, this data could be further anal... [more]

Recently, learning analytics have played a vital role in predicting and monitoring students' performance. Our work-in-progress paper suggests, this data could be further analysed to ascertain the alignment between institutional strategic goals and staff performance approaches in higher education institutions. We extend this model to institutional performance based on key performance indicators. We contend that learning analytics could act as a crucial mechanism in achieving goal congruence between higher education institutions' strategy and performance and not limited to the study of students' performance. This study is aimed at finding how this could be applied to institutional level goal alignment.

DOI 10.1109/TALE.2018.8615151
Citations Scopus - 4
2018 Sohail S, Khanum A, 'Fuzzy Approach to Controller Placement Problem: Fuzzy Controller (FC)', 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD 2018), Durban, South Africa (2018) [E1]
DOI 10.1109/ICABCD.2018.8465134
Citations Scopus - 1
2015 Ijaz K, Sohail S, Hashish S, 'A survey of latest approaches for crowd simulation and modeling using hybrid techniques', 17th UKSIMAMSS International Conference on Modelling and Simulation, Cambridge, United Kingdom (2015)
2015 Hashish S, Sohail S, 'Exploiting RFID for real time accessing and translation of public advertisements', 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015 (2015)

One of the important characteristics of smart cities is ease in accessibility of information for residents and visitors alike. Language barriers, impairments and presence of crowd... [more]

One of the important characteristics of smart cities is ease in accessibility of information for residents and visitors alike. Language barriers, impairments and presence of crowd should not influence the context-awareness of the visitors in such cities. The information provided via advertisement boards play an important part in this regard. In this paper, we propose Smart ads-RFID based system for real time retrieval and translation of public advertisements. Candidate signs and advertisements are RFID-enabled and the electronic contents of such advertisements/signs are acquired and stored in a cloud database server. The system offers both real time and off-line text/voice translation into user's preferred language and communicates the translated contents to user's smart phone. The system also provides real time GIS map visualization of the RFID enabled advertisements in the city. It collects statistics regarding the number of users subscribed in the system, their locations, preferred language and most frequently used languages to help decision makers to decide when and where to post such advertisements. We described our developed pilot project and we investigated its usability, validity and usefulness using Fuzzy Rule-based System. We believe that such system could provide promising services within the context of smart cities.

DOI 10.1109/WiMOB.2015.7347938
2011 Sohail S, Felemban E, AlThobaiti B, AlHetairshi A, 'Smart-lab LAN based application for effective lab supervision', Proceedings - 2nd International Conference on Networking and Distributed Computing, ICNDC 2011 (2011)

A general problem while coducting lab sessions is inability to correctly assess students' progress of the taught material. The main reason is that generally the lab layout do... [more]

A general problem while coducting lab sessions is inability to correctly assess students' progress of the taught material. The main reason is that generally the lab layout does not provide access to view every student's computer screen. Application of science and technology in the field of education can solve this and numerous other issues. For this specific problem, class and lab monitoring systems provide easy control and monitoring facility to teachers for all students' activities on every computer in the lab. For this purpose a number of classroom management softwares are commercially available in the market these days. Research has shown that the use of such management applications can facilitate teachers and can improve students' learning. However, such applications are expensive and cannot be customized as source code is not available due to their commercial nature. We have designed an open source and free of cost educational application called Smart-Lab by using simple networking concepts. Smart-Lab provides effective means for carrying out interactive and efficient lab sessions and classroom exercises. The design and preliminary testing of this application is discussed in this paper. © 2011 IEEE.

DOI 10.1109/ICNDC.2011.11
Citations Scopus - 4
2010 Sarfraz M, Javed Y, Anjum A, Sohail S, 'Routing optimization strategy using genetic algorithm utilizing bandwidth and delay', 2010 The 2nd International Conference on Computer and Automation Engineering, ICCAE 2010 (2010)

Intelligent analysis and designing of network routing provides an edge in this increasingly fast era. In this work, we present a variation of Genetic Algorithm (GA) for finding th... [more]

Intelligent analysis and designing of network routing provides an edge in this increasingly fast era. In this work, we present a variation of Genetic Algorithm (GA) for finding the Optimized shortest path of the network. The algorithm finds the optimal path by using an objective function consisting of the bandwidth and delay metrics of the network. We also introduce the concept of "2-point over 1-point crossover". The population comprises of all chromosomes (feasible and infeasible). Moreover, it is of variable length, so that the algorithm can perform efficiently in all scenarios. Rank-based selection is used for cross-over operation. Mutation operation is used for maintaining the population diversity. We have also performed various experiments for the population selection. The experiments indicate that random selection method is the most optimum. Hence, the population is selected randomly once the generation is developed. The results prove our assertion that our proposed algorithm finds the optimal shortest path more efficiently than existing algorithms. In this work, we have shown the results using a smaller network; however the work for larger network is in progress. ©2010 IEEE.

DOI 10.1109/ICCAE.2010.5451746
Citations Scopus - 1
2009 Qayyum H, Sohail S, Shah GA, Khanum A, 'A fuzzy decision maker for wireless sensor network in ubiquitous network environment', Proceedings - International Conference on Advanced Information Networking and Applications, AINA (2009)

Large range of tiny, embedded sensor devices capable of sensing, communicating and routing data are available now a days. Due to higher failure rate of sensor nodes or their mobil... [more]

Large range of tiny, embedded sensor devices capable of sensing, communicating and routing data are available now a days. Due to higher failure rate of sensor nodes or their mobility, the sink node might not exist in their transmission range. We proposed an approach which uses fuzzy logic to deal with diverse QoS requirements of sensor applications. In this paper, we have designed, an Intelligent Intermediate Robust Gateway module, which provides an efficient and consistent QoS based connectivity to sensor applications to outside world. This Gateway defines a decision structure needed by sensor network applications to switch over to any wireless network, in order to make communication with the remote sink fulfilling application QoS requirement. The result of our approach show that it is capable of selecting appropriate network for range of sensor network applications. © 2009 IEEE.

DOI 10.1109/WAINA.2009.85
Citations Scopus - 2
2009 Sarfraz M, Sohail S, Javed Y, Anjum A, 'Network path optimization using GA approach', 2009 International Conference on Information and Communication Technologies, ICICT 2009 (2009)

In this paper, we present a variation of Genetic Algorithm (GA) for finding the Optimized shortest path of the network. The algorithm finds the optimal path based on the bandwidth... [more]

In this paper, we present a variation of Genetic Algorithm (GA) for finding the Optimized shortest path of the network. The algorithm finds the optimal path based on the bandwidth and utilization of the network. The main distinguishing element of this work is the use of "2-point over 1- point crossover". The population comprises of all chromosomes (feasible and infeasible). Moreover, it is of variable length, so that the algorithm can perform efficiently in all scenarios. Rankbased selection is used for cross-over operation. Therefore, the best chromosomes crossover and give the most suitable offsprings. If the resulting offsprings are least fitted, they are discarded. Mutation operation is used for maintaining the population diversity. We have also performed various experiments for the population selection. The experiments indicate that random selection method is the most optimum. Hence, the population is selected randomly once the generation is developed. In this paper, we have shown the results using a smaller network; however the work for larger network is in progress. © 2009 IEEE.

DOI 10.1109/ICICT.2009.5267195
2008 Khanum A, Javed MY, Sohail S, Mufti M, 'A heuristically guided hybrid approach to face detection for content based image retrieval in internet images', 2008 4th International Conference on Emerging Technologies (2008)
DOI 10.1109/icet.2008.4777507
2008 Kausar S, Javed MY, Sohail S, 'Recognition of gestures in Pakistani sign language using fuzzy classifier', Rhodes (Rodos) Island, Greece (2008)
2008 Khan B, Sohail S, Javed MY, 'Evolution strategy based automated software clustering approach', Proceedings of the 2008 Advanced Software Engineering and its Applications, ASEA 2008 (2008)

In the software development life cycle, maintenance is a key phase that determines long term and effective use of any software. Maintenance can become very lengthy and costly for ... [more]

In the software development life cycle, maintenance is a key phase that determines long term and effective use of any software. Maintenance can become very lengthy and costly for large software systems when structure of the system is complicated. One of the factors complicating the structure of the software system is subsystem boundaries becoming ambiguous due to system evolution, lack of up to date documentation and high turn over rate of software professionals (leading to non availability of original designers of the software systems). Software module clustering helps software professionals to recover high-level structure of the system by decomposing the system into smaller manageable subsystems, containing interdependent modules. Automated approaches simplify the software clustering process, which otherwise is quite a tedious task for medium and large software systems. We treat software clustering as an optimization problem and propose an automated technique to get near optimal decompositions of relatively independent subsystems, containing interdependent modules. We propose the use of self adaptive Evolution Strategies to search a large solution space consisting of modules and their relationships. We compare our proposed approach with a widely used genetic algorithm based approach on a number of test systems. Our proposed approach shows considerable improvement in terms of quality and effectiveness of the solutions for all tests cases. © 2008 IEEE.

DOI 10.1109/ASEA.2008.17
Citations Scopus - 10
2008 Khan B, Sohail S, 'Using ES based automated software clustering approach to achieve consistent decompositions', Proceedings - Asia-Pacific Software Engineering Conference, APSEC (2008)

Effective life time of any software can be increased many folds by proper and up to date maintenance. Automated software module clustering is a method used by software professiona... [more]

Effective life time of any software can be increased many folds by proper and up to date maintenance. Automated software module clustering is a method used by software professionals to recover high-level structure of the system by decomposing the system into smaller manageable subsystems, containing interdependent modules. Once the structure of the system is clear, the understanding of any system for proper maintenance can be achieved. We have proposed an automated clustering approach based on the principles of Evolution Strategies to search a large solution space consisting of modules and their relationships. Our approach tries to achieve near optimal decompositions consisting of independent subsystems, containing interdependent modules. We have compared our proposed approach with a widely used Genetic Algorithm based clustering technique and our approach worked better in all test cases. In this paper, we are highlighting one distinguishing feature of our approach: the consistency in results. For any optimization algorithm, exactly similar results in different executions of the algorithm on same data cannot be achieved. However, the results should remain in close proximity and should not change drastically. We have carried out a comparative study of our approach and the Genetic Algorithm based approach using a set of test systems. The results with our approach are always consistent than those produced by the Genetic Algorithm based approach.

Citations Scopus - 1
2008 Sohail S, Khanum A, 'Simplifying network management with fuzzy logic', IEEE International Conference on Communications (2008)

This paper advocates the use of machine learning for complex network management tasks. Specifically, this paper describes a novel idea of using fuzzy logic for effective network m... [more]

This paper advocates the use of machine learning for complex network management tasks. Specifically, this paper describes a novel idea of using fuzzy logic for effective network management, as the use of imprecise and linguistic information for intelligent decision making, can reduce the overhead of extensive network measurements for management purpose. It also describes the distinguishing features of network management that makes fuzzy logic suitable to be used in this field. Among a huge number of possible applications of this idea in broad area of network management, this paper briefly discusses few options that we are planning to explore further. In addition, it discusses one such option in detail. ©2008 IEEE.

DOI 10.1109/ICCW.2008.42
Citations Scopus - 6
2008 Khan B, Sohail S, 'Using ES based automated software clustering approach to achieve consistent decompositions', Neonatal, Paediatric and Child Health Nursing (2008)

Effective life time of any software can be increased many folds by proper and up to date maintenance. Automated software module clustering is a method used by software professiona... [more]

Effective life time of any software can be increased many folds by proper and up to date maintenance. Automated software module clustering is a method used by software professionals to recover high-level structure of the system by decomposing the system into smaller manageable subsystems, containing interdependent modules. Once the structure of the system is clear, the understanding of any system for proper maintenance can be achieved. We have proposed an automated clustering approach based on the principles of Evolution Strategies to search a large solution space consisting of modules and their relationships. Our approach tries to achieve near optimal decompositions consisting of independent subsystems, containing interdependent modules. We have compared our proposed approach with a widely used Genetic Algorithm based clustering technique and our approach worked better in all test cases. In this paper, we are highlighting one distinguishing feature of our approach: the consistency in results. For any optimization algorithm, exactly similar results in different executions of the algorithm on same data cannot be achieved. However, the results should remain in close proximity and should not change drastically. We have carried out a comparative study of our approach and the Genetic Algorithm based approach using a set of test systems. The results with our approach are always consistent than those produced by the Genetic Algorithm based approach. © 2008 IEEE.

DOI 10.1109/APSEC.2008.18
2008 Sohail S, Khanum A, Sarfraz M, Sana J, Iqbal U, 'Fuzzy bandwidth broker: Machine learning based approach to resolve architectural issues', Proceedings - 2008 IEEE International Networking and Communications Conference, INCC 2008 (2008)

This paper proposes a novel idea of using fuzzy logic for architectural and resource management aspects of the bandwidth broker. The scalability problem of bandwidth broker, being... [more]

This paper proposes a novel idea of using fuzzy logic for architectural and resource management aspects of the bandwidth broker. The scalability problem of bandwidth broker, being a centralised resource manager in a domain, can be solved by employing a distributed architecture. The decisions regarding the distributed architecture, namely, number and location of distributed entities can be best solved using computational intelligence. This paper focuses on the fuzzy logic based approach for resolving architectural issues of Bandwidth Broker. In addition, we also propose two phase resource allocation algorithm for bandwidth broker. In first phase, when large amount of resources are available, fuzzy logic is used for decision making to reduce processing overhead. In case of low resource availability, the resource allocation algorithm transitions to second phase, where crisp values are used for decision purpose.his paper proposes a novel idea of using fuzzy logic for architectural and resource management aspects of the bandwidth broker. The scalability problem of bandwidth broker, being a centralised resource manager in a domain, can be solved by employing a distributed architecture. The decisions regarding the distributed architecture, namely, number and location of distributed entities can be best solved using computational intelligence. This paper focuses on the fuzzy logic based approach for resolving architectural issues of Bandwidth Broker. In addition, we also propose two phase resource allocation algorithm for bandwidth broker. In first phase, when large amount of resources are available, fuzzy logic is used for decision making to reduce processing overhead. In case of low resource availability, the resource allocation algorithm transitions to second phase, where crisp values are used for decision purpose.T ©2008 IEEE.

DOI 10.1109/INCC.2008.4562689
2005 Sohail S, Kanhere SS, Jha S, Baig A, Malik MA, 'A parallelized file-transfer-protocol for on-board IP networks', IEEE Vehicular Technology Conference (2005)

On board IP networks are an effective mean to provide uninterrupted Internet access to public transport passengers. Such networks require optimal resource allocation due to the sc... [more]

On board IP networks are an effective mean to provide uninterrupted Internet access to public transport passengers. Such networks require optimal resource allocation due to the scarcity and high cost of network resources. The parallelized file transfer protocol (P-FTP) is a novel network resource aware parallel technique for improving file transfer performance for the clients connected with wired networks. An extension of P-FTP approach, Mobile P-FTP is an efficient file transfer technique for the users of on-board networks. The simulation study shows that by virtue of its self-tuning capability, such technique exhibit improved performance for on-board IP network users as compared to a tradition file transfer approach. ©2005 IEEE.

Citations Scopus - 2
2005 Sohail S, Chou CT, Kanhere SS, Jha S, 'On large scale deployment of parallelized file transfer protocol', Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (2005)

The parallelized file transfer protocol (P-FTP) is a novel network resource aware parallel technique for improving file transfer performance on the Internet. Before starting the p... [more]

The parallelized file transfer protocol (P-FTP) is a novel network resource aware parallel technique for improving file transfer performance on the Internet. Before starting the parallel file transfer sessions, it considers the available resources in the network (available band-width) and at the file servers (memory and CPU utilization). The client dynamically changes the file portions being downloaded from different file servers by monitoring the FTP flows and detecting slow servers and congested links. Early experimentation on Planet-Lab [1] for a single P-FTP client suggests that the download time can be reduced by more than 50% for large files. In this paper, our goal is to evaluate whether P-FTP can be widely adopted within the Internet. To this end, we have carried out a simulation-based study to investigate the performance of P-FTP when it is adopted by a large user base. We find that, by virtue of its self-tuning capability, P-FTP continues to exhibit improved performance even with many simultaneous clients. Our results also demonstrate that introducing a large number of P-FTP users has no adverse effect on the performance perceived by users of the traditional single server file transfer. We attribute this improvement to the fact that P-FTP dynamically adapts the parallel sessions in response to changes in network state and server resources. This illustrates that P-FTP is highly scalable and is hence suitable for widespread deployment in the Internet. © 2005 IEEE.

Citations Scopus - 3
2003 Sohail S, Pham KB, Nguyen R, Jha S, 'Bandwidth broker implementation: Circa-complete and integrable', Gold Coast (2003)
2003 Sohail S, Jha S, ElGindy H, 'Parallelized file transfer protocol (P-FTP)', Proceedings - Conference on Local Computer Networks, LCN (2003)

Parallelized FTP (P-FTP) approach, attempts to solve the problem of slow downloads of large multimedia files while optimizing the utilization of mirror servers. The approach prese... [more]

Parallelized FTP (P-FTP) approach, attempts to solve the problem of slow downloads of large multimedia files while optimizing the utilization of mirror servers. The approach presented in this paper downloads a single file from multiple mirror servers simultaneously, where each mirror server transfers a portion of the file. P-FTP server calculates the optimum division of the file for efficient transfer. The dynamic monitoring ability of P-FTP maintains the file transfer process at the optimized level no matter how abruptly network and mirror server characteristics change.

DOI 10.1109/LCN.2003.1243189
Citations Scopus - 8
Show 21 more conferences
Edit

Grants and Funding

Summary

Number of grants 1
Total funding $50,000

Click on a grant title below to expand the full details for that specific grant.


20141 grants / $50,000

National Science, Technology and Innovation Plan (NSTIP) strategic technologies program$50,000

Funding body: National Science, Technology and Innovation Plan (NSTIP) strategic technologies program

Funding body National Science, Technology and Innovation Plan (NSTIP) strategic technologies program
Project Team

Sonia Hashish and Shaleeza Sohail

Scheme National Science, Technology and Innovation Plan (NSTIP) strategic technologies program
Role Investigator
Funding Start 2014
Funding Finish 2016
GNo
Type Of Funding C3232 - International Govt - Other
Category 3232
UON N
Edit

Research Collaborations

The map is a representation of a researchers co-authorship with collaborators across the globe. The map displays the number of publications against a country, where there is at least one co-author based in that country. Data is sourced from the University of Newcastle research publication management system (NURO) and may not fully represent the authors complete body of work.

Country Count of Publications
Australia 20
Pakistan 14
United States 6
United Kingdom 4
New Zealand 3
More...
Edit

Dr Shaleeza Sohail

Position

Lecturer
School of Information and Physical Sciences
College of Engineering, Science and Environment

Focus area

Computing and Information Technology

Contact Details

Email shaleeza.sohail@newcastle.edu.au
Phone 0240553334
Links Research Networks
Research Networks

Office

Room Level 2
Building 55 Elizabeth Street
Location Sydney

,
Edit