UTS site search

Dr Farookh Hussain

Biography

 
Senior Lecturer, School of Software
Associate Member, AAI - Advanced Analytics Institute
Core Member, Centre for Artificial Intelligence
Bachelor of Technology (Comp Science & Engineering), MIT, Master of Information Technology, Doctor of Philosophy (PHD), PhD
Member, Institute of Electrical and Electronics Engineers
 
Phone
+61 2 9514 1856
Can supervise: Yes

Books

Hussain, O., Dillon, T.S., Hussain, F.K. & Chang, E. 2013, Risk Assessment and Management in the Networked Economy, 1, Springer-Verlag, Netherlands.
View/Download from: UTS OPUS or Publisher's site
This book, authored by some of the leading researchers in the field, includes chapters that shed a new light over the domain. The book builds on the important idea that users confidence in online services will be increasingly based on a VI Foreword sound, shared notion of dynamic transactional risk, rather then on todays heuristics. Such notion, as proposed in this book, captures the fundamental aspects of occasional online transactions, including time-dependence and possible information asymmetries.
Chang, E., Dillon, T. & Hussain, F.K. 2006, Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence.
View/Download from: Publisher's site
Trustworthiness technologies and systems for service-oriented environments are re-shaping the world of e-business. By building trust relationships and establishing trustworthiness and reputation ratings, service providers and organizations will improve customer service, business value and consumer confidence, and provide quality assessment and assurance for the customer in the networked economy. Trust and Reputation for Service-Oriented Environments is a complete tutorial on how to provide business intelligence for sellers, service providers, and manufacturers. In an accessible style, the authors show how the capture of consumer requirements and end-user opinions gives modern businesses the competitive advantage. Trust and Reputation for Service-Oriented Environments: Clarifies trust and security concepts, and defines trust, trust relationships, trustworthiness, reputation, reputation relationships, and trust and reputation models. Details trust and reputation ontologies and databases. Explores the dynamic nature of trust and reputation and how to manage them efficiently. Provides methodologies for trustworthiness measurement, reputation assessment and trustworthiness prediction. Evaluates current trust and reputation systems as employed by companies such as Yahoo, eBay, BizRate, Epinion and Amazon, etc. Gives ample illustrations and real world examples to help validate trust and reputation concepts and methodologies. Offers an accompanying website with lecture notes and PowerPoint slides. This text will give senior undergraduate and masters level students of IT, IS, computer science, computer engineering and business disciplines a full understanding of the concepts and issues involved in trust and reputation. Business providers, consumer watch-dogs and government organizations will find it an invaluable reference to establishing and maintaining trust in open, distributed, anonymous service-oriented network environments. © 2006 John Wiley & Sons, Ltd.

Chapters

Memon, T., Hussain, F.K. & Lu, J. 2014, 'Human-Centric Cognitive Decision Support System for Ill-Structured Problems' in Guo, P. & Pedrycz, W. (eds), Human-Centric Decision-Making Models for Social Sciences, Springer, Germany, pp. 289-313.
View/Download from: UTS OPUS or Publisher's site
The solutions to ill-structured decision problems greatly rely upon the intuition and cognitive abilities of a decision maker because of the vague nature of such problems. To provide decision support for these problems, a decision support system (DSS) must be able to support a user's cognitive abilities, as well as facilitate seamless communication of knowledge and cognition between itself and the user. This study develops a cognitive decision support system (CDSS) based on human-centric semantic de-biased associations (SDA) model to improve ill-structured decision support. The SDA model improves ill-structured decision support by refining a user's cognition through reducing or eliminating bias and providing the user with validated domain knowledge. The use of semantics in the SDA model facilitates the natural representation of the user's cognition, thus making the transfer of knowledge/cognition between the user and system a natural and effortless process. The potential of semantically defined cognition for effective ill-structured decision support is discussed from a human-centric perspective. The effectiveness of the approach is demonstrated with a case study in the domain of sales.
Hameurlain, A., Hussain, F.K., Morvan, F. & Tjoa, A.M. 2012, 'Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface' in Data Management in Cloud, Grid and P2P Systems, Springer, Germany, pp. V-V.

Conferences

Hussain, W., Farookh Hussain & Omar Hussain 2016, 'Risk Management Framework to Avoid SLA Violation in Cloud from a Provider's Perspective', Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Springer International Publishing, Asan, Korea, pp. 233-241.
View/Download from: Publisher's site
Managing risk is an important issue for a service provider to avoid SLA violation in any business. The elastic nature of cloud allows consumers to use a number of resources depending on their business needs. Therefore, it is crucial for service providers; particularly SMEs to first form viable SLAs and then manage them. When a provider and a consumer execute an agreed SLA, the next step is monitoring and, if a violation is predicted, appropriate action should be taken to manage that risk. In this paper we propose a Risk Management Framework to avoid SLA violation (RMF-SLA) that assists cloud service providers to manage the risk of service violation. Our framework uses a Fuzzy Inference System (FIS) and considers inputs such as the reliability of a consumer; the attitude towards risk of the provider; and the predicted trajectory of consumer behavior to calculate the amount of risk and the appropriate action to manage it. The framework will help small-to-medium sized service providers manage the risk of service violation in an optimal way.
Hussain, W., Hussain, F.K. & Omar Hussain 2016, 'SLA Management Framework to Avoid Violation in Cloud', Neural Information Processing (LNCS), International Conference on Neural Information Processing (ICONIP), Springer International Publishing, Kyoto, Japan, pp. 309-316.
View/Download from: Publisher's site
Cloud computing is an emerging technology that have a broad scope to offers a wide range of services to revolutionize the existing IT infrastructure. This internet based technology offers a services like – on demand service, shared resources, multitenant architecture, scalability, portability, elasticity and giving an illusion of having an infinite resource by a consumer through virtualization. Because of the elastic nature of a cloud it is very critical of a service provider specially for a small/medium cloud provider to form a viable SLA with a consumer to avoid any service violation. SLA is a key agreement that need to be intelligently form and monitor, and if there is a chance of service violation then a provider should be informed to take necessary remedial action to avoid violation. In this paper we propose our viable SLA management framework that comprise of two time phases – pre-interaction time phase and post-interaction time phase. Our viable SLA framework help a service provider in making a decision of a consumer request, offer the amount of resources to consumer, predict QoS parameters, monitor run time QoS parameters and take an appropriate action to mitigate risks when there is a variation between a predicted and an agreed QoS parameters.
Alkalbani, A.M., Ghamry, A.M., Hussain, F.K. & Hussain, O.K. 2016, 'Sentiment Analysis and classification for Software as a Service Reviews', IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, pp. 53-58.
View/Download from: Publisher's site
Hussain, W., Hussain, F.K. & Hussain, O.K. 2016, 'QoS prediction methods to avoid SLA violation in post-interaction time phase', 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), 11th Conference on Industrial Electronics and Applications (ICIEA), 2016 IEEE, IEEE, Hefei, China, pp. 32-37.
View/Download from: Publisher's site
Due to the dynamic nature of cloud computing it is very important for a small to medium scale service providers to optimally assign computing resources and apply accurate prediction methods that enable the best resource management. The choice of an ideal quality of service (QoS) prediction method is one of the key factors in business transactions that help a service provider manage the risk of SLA violations by taking appropriate and immediate action to reduce occurrence, or avoid operations that may cause risk. In this paper we analyze ten prediction methods, including neural network methods, stochastic methods and others to predict time series cloud data and compare their prediction accuracy over five time intervals. We use Cascade Forward Backpropagation, Elman Backpropagation, Generalized Regression, NARX, Simple Exponential Smoothing, Simple Moving Average, Weighted Moving Average, Extrapolation, Holt-Winters Double Exponential Smoothing and ARIMA and predict resource usage at 1, 2, 3, 4 and 5 hours into the future. We use Root Means Square Error and Mean Absolute Deviation as a benchmark for their prediction accuracy. From the prediction results we observed that the ARIMA method provides the most optimal prediction results for all time intervals.
Alkalbani, A.M., Ghamry, A.M., Hussain, F.K. & Hussain, O.K. 2016, 'Harvesting Multiple Resources for Software as a Service Offers: A Big Data Study', Neural Information Processing (LNCS), International Conference on Neural Information Processing, Springer, Kyoto, Japan, pp. 61-71.
View/Download from: UTS OPUS or Publisher's site
Currently, the World Wide Web (WWW) is the primary resource for cloud services information, including offers and providers. Cloud applications (Software as a Service), such as Google App, are one of the most popular and commonly used types of cloud services. Having access to a large amount of information on SaaS offers is critical for the potential cloud client to select and purchase an appropriate service. Web harvesting has become a primary tool for discovering knowledge from the Web source. This paper describes the design and development of Web scraper to collect information on SaaS offers from target Digital cloud services advertisement portals, namely www.getApp.com, and www.cloudreviews.com. The collected data were used to establish two datasets: a SaaS provider's dataset and a SaaS reviews/feedback dataset. Further, we applied sentiment analysis on the reviews dataset to establish a third dataset called the SaaS sentiment polarity dataset. The significance of this study is that the first work focuses on Web harvesting for cloud computing domain, and it also establishes the first SaaS services datasets. Furthermore, we present statistical data that can be helpful to determine the current status of SaaS services and the number of services offered on the Web. In our conclusion, we provide further insight into improving Web scraping for SaaS service information. Our datasets are available online through www.bluepagesdataset.com
Hussain, W., Hussain, F.K. & Hussain, O.K. 2016, 'Allocating optimized resources in the cloud by a viable SLA model', 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver, Canada.
View/Download from: Publisher's site
Alkalbani, A.M., Hussain, F.K. & IEEE 2016, 'A Comparative Study and Future Research Directions in Cloud Service Discovery', PROCEEDINGS OF THE 2016 IEEE 11TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), pp. 1049-1056.
Do, Q.N.T., Zhilin, A., Junior, C.Z.P., Wang, G. & Hussain, F.K. 2016, 'A network-based approach to detect spammer groups', Proceedings of the International Joint Conference on Neural Networks, pp. 3642-3648.
View/Download from: UTS OPUS or Publisher's site
© 2016 IEEE.Online reviews nowadays are an important source of information for consumers to evaluate online services and products before deciding which product and which provider to choose. Therefore, online reviews have significant power to influence consumers' purchase decisions. Being aware of this, an increasing number of companies have organized spammer review campaigns, in order to promote their products and gain an advantage over their competitors by manipulating and misleading consumers. To make sure the Internet remains a reliable source of information, we propose a method to identify both individual and group spamming reviews by assigning a suspicion score to each user. The proposed method is a network-based approach combining clustering techniques. We demonstrate the efficiency and effectiveness of our approach on a real-world and manipulated dataset that contains over 8000 restaurants and 600,000 restaurant reviews from TripAdvisor website. We tested our method in three testing scenarios. The method was able to detect all spammers in two testing scenarios, however it did not detect all in the last scenario.
Alkalbani, A.M., Ghamry, A.M., Hussain, F.K. & Hussain, O.K. 2016, 'Predicting the sentiment of SaaS online reviews using supervised machine learning techniques', Proceedings of the International Joint Conference on Neural Networks 2016, International Joint Conference on Neural Networks (IJCNN), IEEE, Piscataway, USA, pp. 1547-1553.
View/Download from: UTS OPUS or Publisher's site
© 2016 IEEE.There has been a dramatic increase in the sharing of opinions and information across different web platforms and social media, especially online product reviews. Cloud web portals, such as getApp.com, were designed to amalgamate cloud service information and to also examine how consumers evaluate their experience of using cloud computing products. The current literature shows the growing importance of online users' reviews, hence this study focuses on investigating consumers' feedback on Software-as-a-Service (SaaS) products by developing models to predict reviewers' attitudes. The goal of this paper is to develop prediction models to predict the sentiment of SaaS consumers' reviews (positive or negative). This research proposes five models that are based on five algorithms, the Support Vector Machine algorithm, Naive Bayes algorithm, Naive Bayes (Kernel) algorithm, k-nearest neighbors algorithm, and the decision tree algorithm to predict the attitude of SaaS reviews. The prediction accuracy of the space vector algorithm (5-fold cross-validation) is 92.37% which suggests that this algorithm is able to better determine the sentiment of online reviews compared with the other models. The results of this study provide valuable insight into online SaaS reviews and will assist in the design of SaaS review websites.
Ikeda, M., Pop, F. & Hussain, F. 2016, 'Message from CISIS 2016 Program Co-Chairs', Proceedings - 2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2016, p. xviii.
View/Download from: Publisher's site
Braytee, A., Hussain, F., Anaissi, A. & Kennedy, P.J. 2015, 'ABC-Sampling for balancing imbalanced datasets based on Artificial Bee Colony algorithm', Proceedings 2015 IEEE 14th International Conference on Machine Learning and Applications ICMLA 2015, 14th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, Miami, Florida, pp. 594-599.
View/Download from: UTS OPUS or Publisher's site
Class imbalanced data is a common problem for predictive modelling in domains such as bioinformatics. It occurs when the distribution of classes is not uniform among samples and results in a biased prediction of learning towards majority classes. In this study, we propose the ABC-Sampling algorithm based on a swarm optimization method called Artificial Bee Colony, which models the natural foraging behaviour of honeybees. Our algorithm lessens the effects of imbalanced classes by selecting the most informative majority samples using a forward search and storing them in a ranked subset. Then we construct a balanced dataset with a planned undersampling strategy to extract the most frequent majority samples from the top ranked subset and combine them with all minority samples. Our algorithm is superior to a state-of-the-art method on nine benchmark datasets with various levels of imbalance ratios.
Braytee, A., Gill, A.Q., Kennedy, P.J. & Hussain, F.K. 2015, 'A Review and comparison of service E-Contract Architecture Metamodels', Neural Information Processing (LNCS), International Conference on Neural Information Processing, Springer, Istanbul, Turkey, pp. 583-595.
View/Download from: UTS OPUS or Publisher's site
© Springer International Publishing Switzerland 2015. An adaptive service e-contract is an electronic agreement which is required to enable adaptive or agile service sourcing and pro- visioning. There are a number of e-contract metamodels that can be used to create a context specific adaptive service e-contract. The chal- lenge is which one to choose and adopt for adaptive services. This paper presents a review and comparison of well-known e-contract metamod- els using the architecture theory. The architecture theory allows the analysis of the e-contract metamodels using a three-dimension analyt- ical lens: structure, behavior and technology. The results of this paper highlight the metamodels structural, behavioral and technological differ- ences and similarities. This paper will help researchers and practitioners to observe the existing e-contract metamodels are appropriate to the adaptive services or if thwhetherere is a need to merge and integrate the concepts of these metamodels to propose a new unifying adaptive service e-contract metamodel. This paper is limited to the number of compared metamodels.
Chotipant, S., Hussain, F.K., Dong, H. & Hussain, O.K. 2015, 'A neural network based approach for semantic service annotation', Neural Information Processing (LNCS), Part II, 22nd International Conference on Neural Information Processing, Springer, Istanbul, Turkey, pp. 292-300.
View/Download from: UTS OPUS or Publisher's site
© Springer International Publishing Switzerland 2015. Nowadays, a large number of business owners provide advertising for their services on the web. Semantically annotating those services, which assists machines to understand their purpose, is a significant factor for improving the performance of automated service retrieval, selection, and composition. Unfortunately, most of the existing research into semantic service annotation focuses on annotating web services, not on business service information. Moreover, all are semi-automated approaches that require service providers to select proper annotations. As a result, those approaches are unsuitable for annotating very large numbers of services that have accrued or been updated over time. This paper outlines our proposal for a Neural Network (NN)-based approach to annotate business services. Its aim is to link a given service to a relevant service concept. In this case, we treat the task as a service classification problem. We apply a feed forward neural network and a radial basis function network to determine relevance scores between service information and service concepts. A service is then linked to a service concept if its relevance score reaches the threshold. To evaluate the performance of this approach, it is compared with the ECBR algorithm. The experimental results demonstrate that the NN-based approach performs significantly better than the ECBR approach.
Hussain, W., Hussain, F.K. & Hussain, O.K. 2015, 'Transmitting Scalable Video Streaming over Wireless Ad-hoc Networks', 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015), pp. 201-206.
View/Download from: Publisher's site
Chotipant, S., Hussain, F.K. & Hussain, O.K. 2015, 'An Automated and Fuzzy Approach for Semantically Annotating Services', 2015 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2015).
View/Download from: UTS OPUS
Braytee, A., Gill, A.Q., Kennedy, P.J. & Hussain, F.K. 2015, 'A Review and comparison of service E-Contract Architecture Metamodels', Neural Information Processing (LNCS), International Conference on Neural Information Processing, Springer, Istanbul, Turkey, pp. 583-595.
View/Download from: Publisher's site
© Springer International Publishing Switzerland 2015. An adaptive service e-contract is an electronic agreement which is required to enable adaptive or agile service sourcing and pro- visioning. There are a number of e-contract metamodels that can be used to create a context specific adaptive service e-contract. The chal- lenge is which one to choose and adopt for adaptive services. This paper presents a review and comparison of well-known e-contract metamod- els using the architecture theory. The architecture theory allows the analysis of the e-contract metamodels using a three-dimension analyt- ical lens: structure, behavior and technology. The results of this paper highlight the metamodels structural, behavioral and technological differ- ences and similarities. This paper will help researchers and practitioners to observe the existing e-contract metamodels are appropriate to the adaptive services or if thwhetherere is a need to merge and integrate the concepts of these metamodels to propose a new unifying adaptive service e-contract metamodel. This paper is limited to the number of compared metamodels.
Alshehri, M.D. & Hussain, F.K. 2015, 'A comparative analysis of scalable and context-aware trust management approaches for internet of things', Neural Information Processing (LNCS), Part iV, 22nd International Conference on Neural Information Processing, Springer, Germany, pp. 596-605.
View/Download from: UTS OPUS or Publisher's site
© Springer International Publishing Switzerland 2015. The Internet of Things - IoT - is a new paradigm in technology that allows most physical 'things' to contact each other. Trust between IoT devices is a critical factor. Trust in the IoT environment can be modeled using various approaches, such as confidence level and reputation parameters. Furthermore, trust is an important element in engineering reliable and scalable networks. In this paper, we survey scalable and context-aware trust management for IoT from three perspectives. First, we present an overview of the IoT and the importance of trust in relation to it, and then we provide an in-depth trust/reliable management protocol for the IoT and evaluate comparable trust management protocols. We also investigate a scalable solution for trust management in the IoT and provide a comparative evaluation of existing trust solutions. We then pre-sent a context-aware assessment for the IoT and compare the different trust solutions. Lastly, we give a full comparative analysis of trust/reliability management in the IoT. Our results are drawn from this comparative analysis, and directions for future research are outlined.
Hussain, W., Hussain, F.K. & Hussain, O.K. 2015, 'Towards soft computing approaches for formulating viable service level agreements in cloud', Neural Information Processing (LNCS), International Conference on Neural Information Processing, Springer, Istanbul, Turkey, pp. 639-646.
View/Download from: Publisher's site
© Springer International Publishing Switzerland 2015. A service level agreement (SLA) is a legal document that binds consumers and providers together for the delivery of specific services for a certain period of time. Providers need a viable SLA to maintain successful relationships with consumers. A viable SLA, based on the previous profile of a consumer, will help a service provider determine whether to accept or reject a consumer's request and the amount of resources to offer them. In this paper we propose a softcomputing based approach to form a personalized and viable SLA. This process is carried out in the pre-interaction time phase. We build a Fuzzy Inference System (FIS) and consider a consumer's reliability value and contract duration as the input factors to determine the amount of resources to offer to the consumer. In addition to the Fuzzy Inference System, we tested various Neural Network-based methods for viable SLA formation and compared their prediction accuracy with the output of the FIS.
Alkalbani, A., Shenoy, A., Hussain, F.K., Hussain, O.K. & Xiang, Y. 2015, 'Design and Implementation of the Hadoop-based Crawler for SaaS Service Discovery', 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015), pp. 785-790.
View/Download from: Publisher's site
Hussain, W., Hussain, F.K. & Hussain, O.K. 2015, 'Comparative Analysis of Consumer Profile-based Methods to Predict SLA Violation', 2015 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2015), IEEE International Conference on Fuzzy Systems, IEEE, Istanbul.
View/Download from: Publisher's site
A Service Level Agreement (SLA) is a contract between a service provider and a consumer which specifies in detail the level of service expected from the service provider, obligations, commitment and objectives. In the cloud computing environment, both the cloud provider and the cloud consumer want to know of a likely service violation before the actual violation occurs and to adjust the scaling of the cloud resources appropriately. A consumer's previous resource usage profile is a key element in determining the possibility of service violation in the cloud computing environment, which has not been an area of research focus so far. In this paper, we analyze and compare QoS prediction by considering the consumer's previous resource usage profile in various conditions. From comparative analysis, we observe that by combining a consumer's previous resource usage profile history along with the previous resource usage profile history of its nearest neighbors, we obtain an optimal result.
Alkalbani, A.M., Ghamry, A.M., Hussain, F.K. & Hussain, O.K. 2015, 'Blue Pages: Software as a Service Data Set', Proceedings of the 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, Krakow, Poland, pp. 269-274.
View/Download from: UTS OPUS or Publisher's site
Blue Pages is a repository that contains data collected on Software as a Service(SaaS). The repository lists SaaS information according to an organization's functional needs. Blue Pages holds thousands of records on SaaS applications' business profiles. The data was extracted between February 2015 and August 2015 from the following web portals: www.cloudreviews.com & www.getApp.com. Every record holds details on the service offerings, including service name, the date the service was founded, service category, free trial (yes/no), mobile app (yes/no), starting price, service description, service type and provider link. The dataset is the first to provide information on SaaS. The dataset presented in this paper can be used in future research in cloud service selection and cloud service discovery. The dataset is available online through the Blue Page website http://www.bluepagesdataset.com/.
Hussain, W., Hussain, F.K., Hussain, O. & Chang, E. 2015, 'Profile-based viable Service Level Agreement (SLA) Violation Prediction Model in the Cloud', Proceedings of the 2015 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, IEEE, Krakow, Poland, pp. 268-272.
View/Download from: UTS OPUS or Publisher's site
The worldwide web (www) provides a platform that enables service providers to transcend barriers and engage with current or potential customers globally resulting in their economic growth and expanded business horizons -- thereby creating the internet economy. It enables customers to receive desired services in a cost effective way, but given the open and ubiquitous nature of the www, particularly in cloud computing, both service providers and service consumers need efficient approach that guarantee their business requirements will be met. Additionally, all stakeholders need an efficient system that predicts any violation before it occurs and recommends how to mitigate those violations to avoid any penalties. In this paper we propose an intelligent, profile-based SLA violation prediction model, from the provider's perspective. The model begins monitoring an SLA in the pre-interaction time phase, before finalizing the SLA. It intelligently predicts the consumer's likely resouce usage, by considering the consumer's reputation from its previous transaction history, and determines the level of required resources based on their reliability. The framework helps service providers: make decisions about whether to form SLAs, maximize profit, and avoid service violations in post-interaction time phase.
Ikram, M.A., Alshehri, M.D. & Hussain, F.K. 2015, 'Architecture of an IoT-based System for Football Supervision (IoT Football)', Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), IEEE World Forum on Internet of Things (WF-IoT), IEEE, Milan, Italy, pp. 69-74.
View/Download from: UTS OPUS or Publisher's site
Football, also called soccer, is one of the most popular sports in the world, if one considers the number of fans as well as the number of players. However, footballers face serious injuries during the match and even during training. Concussion, hypoglycemia, swallowing the tongue and shortness of breath are examples of the health problems footballers face, and in extreme cases, may lead to death. In addition, many sport clubs and sport academies spend millions of dollars contracting new professional footballers or even developing new professional footballers. The Internet of Things (IoT) is a new paradigm that combines various technologies to enhance our lives. Today's technology can protect footballers by diagnosing any health problems, which may occur during the match or training session, which, if detected early, may prevent any adverse effects on their long-term health. This paper proposes an IoT-based architecture for the sport of football, called IoT Football. Our proposal aims to embed sensing devices (e.g. sensors and RFID), telecommunication technologies (e.g. ZigBee) and cloud computing in the sport of football in order monitor the health of footballers and reduce the occurrence of adverse health conditions. The aim is to integrate the IoT environment, in particular the IoT application, into the field of sport in the form of a new application.
Ramezani, F., Lu, J. & Hussain, F.K. 2012, 'Task Based System Load Balancing Approach in Cloud Environments', Knowledge Engineering and Management, Seventh International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2012), Springer Berlin Heidelberg, Beijing, China, pp. 31-42.
View/Download from: UTS OPUS or Publisher's site
Live virtual machine (VM) migration is a technique for transferring an active VM from one physical host to another without disrupting the VM. This technique has been proposed to reduce the downtime for migrated overload VMs. As VMs migration takes much more times and cost in comparison with tasks migration, this study develops a novel approach to confront with the problem of overload VM and achieving system load balancing, by assigning the arrival task to another similar VM in a cloud environment. In addition, we propose a multi-objective optimization model to migrate these tasks to a new VM host applying multi-objective genetic algorithm (MOGA). In the proposed approach, there is no need to pause VM during migration time. In addition, as contrast to tasks migration, VM live migration takes longer to complete and needs more idle capacity in host physical machine (PM), the proposed approach will significantly reduce time, downtime memory, and cost consumption.
Azadeh, A., KoKabi, R., Saberi, M., Hussain, F.K. & Hussain, O.K. 2014, 'Trust Prediction Using Z-numbers and Artificial Neural Networks', Proceedings of the 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE - Institute of Electrical and Electronics Engineers, Beijing, China, pp. 522-528.
Azadeh, A., Zadeh, S.A., Saberi, M., Hussain, F.K. & Hussain, O.K. 2014, 'A trust-based performance measurement modeling using DEA, T-norm and S-norm operators', Proceedings of the 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE - Institute of Electrical and Electronics Engineers, Beijing, China, pp. 1913-1920.
View/Download from: Publisher's site
Le, S., Dong, H., Hussain, F.K., Hussain, O.K., Ma, J. & Zhang, Y. 2014, 'Multicriteria Decision Making with Fuzziness and Criteria Interdependence in Cloud Service Selection', Proceedings of the 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE - Institute of Electrical and Electronics Engineers, Beijing, China, pp. 1929-1936.
View/Download from: UTS OPUS
Azadeh, A., Zia, N.P., Saberi, M., Hussain, F.K., Hussain, O.K. & Chang, E. 2014, 'Trust-Based Performance Measurement Using Fuzzy Operators', Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications (ICIEA 2014), IEEE - Institute of Electrical and Electronics Engineers, Huangzhou, China, pp. 1701-1706.
Hussain, W., Hussain, F.K. & Hussain, O.K. 2014, 'Maintaining Trust in Cloud Computing through SLA Monitoring', Proceedings of the 21st International Conference on Neural Information Processing, Springer Verlag, Kuching, Malaysia.
View/Download from: UTS OPUS
Le, S., Dong, H., Hussain, F.K., Hussain, O.K., Ma, J. & Zhang, Y. 2014, 'A Hybrid Fuzzy Framework for Cloud Service Selection', Proceedings of the 2014 IEEE International Conference on Web Services, 2014 IEEE International Conference on Web Services, Institute of Electrical and Electronics Engineers (IEEE), Alaska, USA, pp. 313-320.
View/Download from: Publisher's site
Chotipant, S., Hussain, F.K., Dong, H. & Hussain, O.K. 2014, 'A fuzzy VSM-based approach for semantic service retrieval', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), International Conference on Neural Information Processing, Springer Verlag, Kuching, Malaysia, pp. 682-689.
View/Download from: Publisher's site
A vast number of business services have been published on the Web in an attempt to achieve cost reductions and satisfy user demand. Service retrieval consequently plays an important role, but unfortunately existing research focuses on crisp service retrieval techniques which are unsuitable for vague real world information. In this paper, we propose a new fuzzy service retrieval approach which consists of two modules: service annotation and service retrieval. Related service concepts for a given query are semantically retrieved, following which services that are annotated to those concepts are retrieved. The degree of retrieval of the retrieval module and the similarity between a service, a concept, and a query are fuzzy. Our experiment shows that the proposed approach performs better than a non-fuzzy approach on Recall measure.
Rahman, Z.U., Hussain, O.K. & Hussain, F.K. 2014, 'Time Series QoS Forecasting for Management of Cloud Services', 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), International Conference on Broadband and Wireless Computing, Communication and Applications, Guangdong.
View/Download from: Publisher's site
Management of Cloud services is one of the important aspects for the cloud service users to manage in order to ensure that they achieve their required outcomes. There is a wide interest in the literature on this problem, but most of that work has approached this problem from the service provider's (platform) viewpoint. While on the one hand, having techniques to monitor a service from this viewpoint is important, on the other hand it is also important to monitor the QoS of a cloud service being received at the user side. This is because there is a possibility of the service user being unable to obtain the promised service with the required characteristics due to factors beyond the platform side which affects the QoS being received at the run time. One of the main factors for user side service monitoring is the accurate forecasting of the QoS of cloud services over a period of time in the future based on the past observed pattern or history. In this paper we investigate the use of exponential smoothing and autoregressive moving average models for forecasting the QoS of cloud services. We propose a forecasting mechanism which uses the past QoS values collected though QoS monitoring to forecast the future QoS of cloud services.
Dong, H., Hussain, F.K. & Bouguettaya, A. 2014, 'Discovering Plain-Text-Described Services Based on Ontology Learning', Neural Information Processing, 21st International Conference, ICONIP 2014, Kuching, Malaysia, pp. 673-681.
View/Download from: Publisher's site
Ramezani, F., Lu, J. & Hussain, F.K. 2013, 'Task Scheduling Optimization in Cloud Computing Applying Multi-Objective Particle Swarm Optimization', Lecture Notes in Computer Science, Springer, Berlin, Germany, pp. 237-251.
View/Download from: UTS OPUS or Publisher's site
Optimizing the scheduling of tasks in a distributed heterogeneous computing environment is a nonlinear multi-objective NP-hard problem which is playing an important role in optimizing cloud utilization and Quality of Service (QoS). In this paper, we develop a comprehensive multi-objective model for optimizing task scheduling to minimize task execution time, task transferring time, and task execution cost. However, the objective functions in this model are in conflict with one another. Considering this fact and the supremacy of Particle Swarm Optimization (PSO) algorithm in speed and accuracy, we design a multi-objective algorithm based on multi-objective PSO (MOPSO) method to provide an optimal solution for the proposed model. To implement and evaluate the proposed model, we extend Jswarm package to multi-objective Jswarm (MO-Jswarm) package. We also extend Cloudsim toolkit applying MO-Jswarm as its task scheduling algorithm. MO-Jswarm in Cloudsim determines the optimal task arrangement among VMs according to MOPSO algorithm. The simulation results show that the proposed method has the ability to find optimal trade-off solutions for multi-objective task scheduling problems that represent the best possible compromises among the conflicting objectives, and significantly increases the QoS.
Ramezani, F., Hussain, F.K. & Lu, J. 2013, 'A Fuzzy Predictable Load Balancing Approach in Cloud Computing', Proceedings of the International Conference on Grid & Cloud Computing and Applications GCA'13, The 2013 International Conference on Grid & Cloud Computing and Applications, WorldComp, Las Vegas, Nevada, USA.
View/Download from: UTS OPUS
Cloud computing is a new paradigm for hosting and delivering services on demand over the internet where users access services. It is an example of an ultimately virtualized system, and a natural evolution for data centers that employ automated systems management, workload balancing, and virtualization technologies. Live virtual machine (VM) migration is a technique to achieve load balancing in cloud environment by transferring an active overload VM from one physical host to another one without disrupting the VM. In this study, to eliminate whole VM migration in load balancing process, we propose a Fuzzy Predictable Load Balancing (FPLB) approach which confronts with the problem of overload VM, by assigning the extra tasks from overloaded VM to another similar VM instead of whole VM migration. In addition, we propose a Fuzzy Prediction Method (FPM) to predict VMs migration time. This approach also contains a multi-objective optimization model to migrate these tasks to a new VM host. In proposed FPLB approach there is no need to pause VM during migration time. Furthermore, considering this fact that VM live migration contrast to tasks migration takes longer to complete and needs more idle capacity in host physical machine (PM), the proposed approach will significantly reduce time, idle memory and cost consumption.
Ramezani, F., Lu, J. & Hussain, F.K. 2013, 'An Online Fuzzy Decision Support System for Resource Management in Cloud Environments', Proceedings of the 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS), 2013 Joint IFSA World Congress NAFIPS Annual Meeting (IFSA/NAFIPS), IEEE, Edmonton, Canada, pp. 754-760.
View/Download from: UTS OPUS or Publisher's site
Cloud computing is a large-scale distributed computing paradigm driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. Although a significant amount of studies have been developed to optimize resource management and task scheduling in cloud computing, none of them considered the impact of task scheduling patterns on resource management and vice versa. To overcome this drawback, and considering the lack of resources in cloud environments and growing customer demands for cloud services, this paper proposes an Online Resource Management Decision Support System (ORMDSS) that addresses both tasks scheduling and resource management optimization in a unique system. In addition, ORMDSS contains a fuzzy prediction method for predicting VM workload patterns and VM migration time by applying neural networks and fuzzy expert systems. This ORMDSS helps cloud providers to automatically allocate scare resources to the applications and services in an optimal way. It is expected that the ORMDSS not only increases cloud utilization and QoS, but also decreases cost and response time.
Rehman, Z., Hussain, O.K. & Hussain, F.K. 2013, 'Multi-criteria IaaS Service Selection Based on QoS History', 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), International Conference on Advanced Information Networking and Applications, IEEE, Barcelona, Spain, pp. 1129-1135.
View/Download from: UTS OPUS or Publisher's site
The growing number of cloud services have made service selection a challenging decision-making problem by providing wide ranging choices for cloud service consumers. This necessitates the use of formal decision making methodologies to assist a decision maker in selecting the service that best fulfils the user's requirements. In this paper, we present a cloud service selection methodology that utilizes QoS history over different time periods, performs Multi-Criteria Decision Analysis to rank all cloud services in each time period in accordance with user preferences before aggregating the results to determine the overall service rank of all the available services for cloud service selection.
Hussain, F.K. 2014, 'An Enhanced Mental Model Elicitation Technique to Improve Mental Model Accuracy', Proceedings of the 20th International Conference on Neural Information Processing, International Conference on Neural Information Processing, Springer Verlag, Daegu, Korea, pp. 82-89.
Ramezani, F., Lu, J. & Hussain, F.K. 2013, 'Task Scheduling Optimization in Cloud Computing Applying Multi-Objective Particle Swarm Optimization', Proceedings of the 11th International Conference on Service-Oriented Computing, 11th International Conference on Service-Oriented Computing, Springer Verlag, Berlin, Germany, pp. 237-251.
View/Download from: UTS OPUS
Dong, H., Hussain, F.K. & Chang, E. 2013, 'UCOSAIS: A Framework for User-Centered Online Service Advertising Information Search', Proceedings of the 14th International Conference on Web Information Systems Engineering, Springer Verlag, Nanjing, China, pp. 267-276.
View/Download from: UTS OPUS
Rehman, Z., Hussain, F.K., Hussain, O. & Singh, J. 2013, 'Is There Self-Similarity in Cloud QoS Data?', 2013 IEEE 10th International Conference on e-Business Engineering, The 10th IEEE International Conference on e-Business Engineering (ICEBE 2013), IEEE Computer Society, Coventry, UK, pp. 76-81.
View/Download from: UTS OPUS or Publisher's site
Monitoring and forecasting of QoS of cloud services is becoming increasingly important with increasing use of cloud computing. Cloud service selection, SLA compliance, service migration and many other areas in current cloud computing research rely on QoS data collected thorough cloud service monitoring. In this paper we have presented the results of our experiments for estimating the self-similarity in cloud service QoS data.
Chen, H.C., Skarmeta Gómez, A.F. & Hussain, F. 2013, 'Welcome message from CISIS 2013 program committee co-chairs', Proceedings - 2013 7th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2013.
View/Download from: Publisher's site
Parvin, S., Han, S., Rehman, Z., Faruque, M.A. & Hussain, F.K. 2012, 'A New Identity-Based Group Signature Scheme Based on Knapsack ECC', 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), IEEE, Palermo, Italy, pp. 73-80.
View/Download from: UTS OPUS or Publisher's site
Elliptic curve cryptography (ECC) is a way to provide security for exchanging keys among communicating parties using the Diffie Hellman key exchange algorithm. This paper presents the ECC implementation for identity-based signature authentication and then applies the knapsack algorithm on ECC for signing a message. The group signature is the concatenation of the identity-based signature with the user's public key. In this paper, we attempt to provide a secure ID-based group signature scheme by using knapsack based ECC.
Demong, N.A., Lu, J. & Hussain, F.K. 2012, 'Multidimensional Analysis and Data Mining for Property Investment Risk Analysis', International Conference on Information Systems (ICIS 2012), International Conference on Information Systems (ICIS 2012), World Academy of Science, Engineering and Technology, Penang, Malaysia, pp. 118-123.
View/Download from: UTS OPUS
Property investment in the real estate industry has a high risk due to the uncertainty factors that will affect the decisions made and high cost. Analytic hierarchy process has existed for some time in which referred to an expertâs opinion to measure the uncertainty of the risk factors for the risk analysis. Therefore, different level of expertsâ experiences will create different opinion and lead to the conflict among the experts in the field. The objective of this paper is to propose a new technique to measure the uncertainty of the risk factors based on multidimensional data model and data mining techniques as deterministic approach. The propose technique consist of a basic framework which includes four modules: user, technology, end-user access tools and applications. The property investment risk analysis defines as a micro level analysis as the features of the property will be considered in the analysis in this paper.
Esfijani, A., Hussain, F.K. & Chang, E. 2012, 'An Approach to University Social Responsibility Ontology Development through Text Analyses', Human System Interactions (HSI), 2012 5th International Conference on, HSI 2012, IEEE, Perth, WA, pp. 1-7.
View/Download from: UTS OPUS or Publisher's site
The main purpose of this paper is to propose a content analysis approach in order to develop an ontology of university social responsibility (USR). The proposed approach comprises four main phases in which two content analyses software have been utilized to extract the main USR components and to identify the domain of this concept. To achieve the goal, the existing body of knowledge of USR definitions and specifications - using a variety of terms - has been considered to identify the main notions of USR and their relationships. The developed ontology can be applied to define a formal, explicit description of the USR concept and to construct a more reliable basis for measurement purposes.
Rehman, Z., Hussain, O.K., Parvin, S. & Hussain, F.K. 2012, 'A Framework for User Feedback Based Cloud Service Monitoring', Proceedings of the 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), IEEE, Palermo, Italy, pp. 257-262.
View/Download from: UTS OPUS or Publisher's site
The increasing popularity of the cloud computing paradigm and the emerging concept of federated cloud computing have motivated research efforts towards intelligent cloud service selection aimed at developing techniques for enabling the cloud users to gain maximum benefit from cloud computing by selecting services which provide optimal performance at lowest possible cost. Given the intricate and heterogeneous nature of current clouds, the cloud service selection process is, in effect, a multi criteria optimization or decision-making problem. The possible criteria for this process are related to both functional and nonfunctional attributes of cloud services. In this context, the two major issues are: (1) choice of a criteria-set and (2) mechanisms for the assessment of cloud services against each criterion for thorough continuous cloud service monitoring. In this paper, we focus on the issue of cloud service monitoring wherein the existing monitoring and assessment mechanisms are entirely dependent on various benchmark tests which, however, are unable to accurately determine or reliably predict the performance of actual cloud applications under a real workload. We discuss the recent research aimed at achieving this objective and propose a novel user-feedback-based approach which can monitor cloud performance more reliably and accurately as compared with the existing mechanisms.
Memon, T., Lu, J. & Hussain, F.K. 2012, 'Semantic De-biased Associations (SDA) Model to Improve Ill-Structured Decision Support', Proceedings of the 19th International Conference on Neural Information Processing, 19th International Conference on Neural Information Processing, Springer Verlag, Doha, Qatar, pp. 483-490.
View/Download from: UTS OPUS
Rehman, Z., Hussain, O. & Hussain, F.K. 2012, 'Iaas Cloud Selection using MCDM Methods', 2012 IEEE Ninth International Conference on e-Business Engineering (ICEBE), IEEE International Conference on e-Business Engineering (ICEBE), IEEE, Hangzhou, pp. 246-251.
View/Download from: UTS OPUS or Publisher's site
The popularity of cloud computing and IaaS has spawned numerous cloud service providers which offer various cloud services, including IaaS, to cloud users. These services vary considerably in terms of their performance and cost and the selection of a suitable cloud service becomes a complex decision making issue for a cloud service user. Furthermore, the cloud services have several attributes all of which are the criteria that have to be taken into account when making a service selection decision. In the presence of these multiple criteria, a compromise has to be made because in most real-world situations, no single service exceeds all other services in all criteria but one service may be better in terms of some of the criteria while other services may outperform it if judged on the basis of the remaining criteria. Multi-criteria decision-making is a sub-field in operations research that deals with the techniques to solve such multi-criteria problems. There are several methods of multicriteria decision-making. In this paper, we use key multi-criteria decision-making methods for IaaS cloud service selection in a case study which contains five basic performance measurements of thirteen cloud services by a third party monitoring service. We demonstrate the use of these multi-criteria methods for cloud service selection and compare the results obtained by using each method to find out how the choice of a particular MCDM method affects the outcome of the decision-making process for IaaS cloud service selection.
Parvin, S., Hussain, F.K. & Hussain, O. 2012, 'Digital signature-based authentication framework in cognitive radio networks', Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, MoMM 2012, ACM, Bali, Indonesia, pp. 136-142.
View/Download from: UTS OPUS or Publisher's site
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a technology to solve spectrum source deficiency by improving effective utilization of limited radio spectrum resources for future wireless communications and mobile computing. However, the unique characteristics of CRNs make security a greater challenge. Moreover, due to the dynamic characteristics of CRNs, a member of CRNs, may join or leave the network at any time. The issue of supporting secure communication in CRNs therefore becomes more serious than for conventional wireless networks. Public key encryption and signature techniques have been adopted here to ensure the security of message transmission in CRNs. This work proposes a digital signature-based trust-oriented scheme to ensure communication by identifying efficient trustworthy users in CRNs. The security analysis is analyzed to guarantee that the proposed approach achieves security proof.
Parvin, S. & Hussain, F.K. 2012, 'Trust-based Security for Community-based Cognitive Radio Networks', Proceedings of the 2012 26th IEEE International Conference on Advanced Information Networking and Applications, IEEE International Conference on Advanced Information Networking and Applications, IEEE, Fukuoka, Japan, pp. 518-525.
View/Download from: UTS OPUS or Publisher's site
Cognitive Radio (CR) is considered to be a necessary mechanism to detect whether a particular segment of the radio spectrum is currently in use, and to rapidly occupy the temporarily unused spectrum without interfering with the transmissions of other users. As Cognitive Radio has dynamic properties, so a member of Cognitive Radio Networks may join or leave the network at any time. These properties mean that the issue of secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes a trust-based security system for community-based CRNs. A CR node's trust value is analyzed according to its previous behavior in the network and, depending on this trust value, it is decided whether this member node can take part in the communication of CRNs. For security purposes, we have designed our model to ensure that the proposed approach is secure in different contexts.
Esfijani, A., Hussain, F.K. & Chang, E. 2012, 'Human motivation principles and human factors for virtual communities', Proceedings of the 4th International Conference on Computer Supported Education vol 1, International Conference on Computer Supported Education, Science and Technology Publications, Porto, Portugal, pp. 93-100.
View/Download from: UTS OPUS
The main purpose of this study is to investigate, from a theoretical point of view, virtual universities in comparison with Social Networking Services (SNS). The theoretical framework constitutes of the Human Motivation Theory (HMT) and the Human Factors (HF) in which Facebook as the most popular SNS is compared with virtual university in general. The main features of these technologies were compared in order to consider whether they comply with mentioned theories. Using an exploratory research methodology, this study concludes that SNSs are more adopted with HMT than virtual university. In the other word, Facebook applications as the most popular virtual community with over 500,000,000 users worldwide, is more compliant with HMT to gratify users needs. Also, from the perspective of human factors, it is more successful than the virtual university
Dong, H., Hussain, F.K. & Chang, E. 2012, 'Ontology-Learning-Based Focused Crawling for Online Service Advertising Information Discovery and Classification', Proceedings of the 10th International Conference on Service-Oriented Computing, 10th International Conference on Service-Oriented Computing, Springer Verlag, Shanghai, China, pp. 591-598.
View/Download from: UTS OPUS
Enokido, T. & Hussain, F. 2012, 'Message from the 3PGCIC 2012 Workshops Co-chairs', Proceedings - 2012 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012.
View/Download from: Publisher's site
Uehara, M., Hussain, F. & Durresi, A. 2012, 'Welcome message from workshops co-chairs of NBiS 2012', Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012.
View/Download from: Publisher's site
Parvin, S. & Hussain, F.K. 2011, 'Digital signature-based secure communication in cognitive radio networks', Proceedings - 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2011, pp. 230-235.
View/Download from: Publisher's site
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. The unique characteristics of Cognitive Radio Networks (CRNs) make security more challenging. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes digital signature-based secure communication for identifying efficient primary users in CRNs. The security analysis is analyzed to guarantee that the proposed approach achieves security proof. © 2011 IEEE.
Hussain, F.K. & Chang, E. 2011, '3. Message from the editors', IEEE International Conference on Digital Ecosystems and Technologies, p. 8.
View/Download from: Publisher's site
Janjua, N.K. & Hussain, F.K. 2011, 'Rule-based business policies specification, reasoning and integration for business process model extraction', Proceedings - 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2011, pp. 51-56.
View/Download from: Publisher's site
Business policies are pervasive in web-based information systems and the introduction of the semantic web has opened new fertile horizons for their representation and automated processing. However, a number of challenges have also emerged. First is the formal representation and handling of contradictory business policies. Second, is the extraction of process models from a given set of business policies. This paper reports on a semantic, rule-based information system for business policies representation, and argumentative reasoning to resolve conflicts and integrate them to produce a business process model for a given task. We demonstrate the working of the proposed system with help of a case study. © 2011 IEEE.
Janjua, N.K. & Hussain, F.K. 2011, 'Defeasible reasoning based argumentative Web-IDSS for Virtual Teams (VTs)', Proceedings - 2011 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT 2011, pp. 330-334.
View/Download from: Publisher's site
TheWeb-based intelligent decision support system (Web-IDSS) is pivotal for a Virtual Team (VT) to successfully execute business-related tasks. The current generation of Web-IDSS built on top of semantic web technologies for VTs lacks the capability to provide decision support when underlying information is incomplete and/or contradictory. In this article, we address this limitation of current Web-IDSS through defeasible logic based argumentation formalism. The proposed Web-IDSS uses a hybrid reasoning approach: forward chaining (data-driven) for the construction of arguments over incomplete information, and backward chaining (goal-driven) for conflict identification and resolution with explanation. The proposed Web-IDSS adheres to web standards and publishes the outcome of argumentative reasoning in Argument Interchange Format (AIF). © 2011 IEEE.
Parvin, S., Han, S., Hussain, F. & Tian, B. 2011, 'A combinational approach for trust establishment in cognitive radio networks', Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2011, pp. 227-232.
View/Download from: Publisher's site
Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interference to the transmissions of other users. Because of the dynamic properties of CRNs, the issue of supporting secure communication in CRNs becomes more critical than that of other conventional wireless networks. In this paper, we propose a combination of certificate-based trust with a behavior-based trust which will benefit both by representing the trust as certificates in the the predeployment trust relation and by providing a continuous behaviour-based evalution of trust. © 2011 IEEE.
Rehman, Z.U., Hussain, F.K. & Hussain, O.K. 2011, 'Towards multi-criteria cloud service selection', Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011, pp. 44-48.
View/Download from: Publisher's site
Cloud computing despite being in an early stage of adoption is becoming a popular choice for businesses to replace in-house IT infrastructure due to its technological advantages such as elastic computing and cost benefits resulting from pay-as-you-go pricing and economy of scale. These factors have led to a rapid increase in both the number of cloud vendors and services on offer. Given that cloud services could be characterized using multiple criteria (cost, pricing policy, performance etc.) it is important to have a methodology for selecting cloud services based on multiple criteria. Additionally, the end user requirements might map to different criteria of the cloud services. This diversity in services and the number of available options have complicated the process of service and vendor selection for prospective cloud users and there is a need for a comprehensive methodology for cloud service selection. The existing research literature in cloud service selection is mostly concerned with comparison between similar services based on cost or performance benchmarks. In this paper we discuss and formalize the issue of cloud service selection in general and propose a multi-criteria cloud service selection methodology. © 2011 IEEE.
Raza, M., Hussain, F.K., Hussain, O. & Chang, E. 2010, 'Md(2) Metrics For Optimizing Trust Prediction In Digital Business Ecosystem', Intelligent Decision Making Systems, International Conference on Intelligent Systems and Knowledge Engineering, World Scientific And Engineering Acad And Soc, Hasselt, BELGIUM, pp. 402-410.
View/Download from: UTS OPUS or Publisher's site
The process of predicting the future trust value of an entity, based on its past value is a challenging issue The prediction process is even more imperative in the scenario where in the interaction would take place at a future point in time Being able to
ZadJabbari, B., Wongthongtham, P., Hussain, F.K. & Soc, I.E.E.E.C. 2010, 'Knowledge sharing effectiveness measurement', 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), pp. 1249-1254.
View/Download from: Publisher's site
Janjua, N.K. & Hussain, F.K. 2010, 'Development of a logic layer in the semantic web: Research issues', Proceedings - 6th International Conference on Semantics, Knowledge and Grid, SKG 2010, pp. 367-370.
View/Download from: Publisher's site
The ontology layer of the semantic web is now mature enough (i.e. standards like RDF, RDFs, OWL, OWL 2) and the next step is to work on a logic layer for the development of advanced reasoning capabilities for knowledge extraction and efficient decision making. Adding logic to the web means using rules to make inferences. Rules are a means of expressing business processes, policies, contracts etc but most of the studies have focused on the use of monotonic logics in layered development of the semantic web which provides no mechanism for representing or handling incomplete or contradictory information respectively. This paper discusses argumentation, semantic web and defeasible logic programming with their distinct features and identifies the different research issues that need to be addressed in order to realize defeasible argumentative reasoning in the semantic web applications. © 2010 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2010, 'A framework enabling semantic search in health service ecosystems', Proceedings - 6th International Conference on Semantics, Knowledge and Grid, SKG 2010, pp. 235-242.
View/Download from: Publisher's site
The health service ecosystem is a sub domain of the service ecosystem, which is an ecological view of the health service domain. Due to the importance and the speciality of health services, service consumers have rigorous requirements regarding the efficiency of health service search engines. However, as most health service consumers do not have enough domain knowledge, their service queries are sometimes not able to denote their actual service requests. Moreover, we find that the existing health service search engines lack the ability to help the consumers to disambiguate their service queries, which may impede the efficiency of the search engines. In this paper, by means of semantic search technologies, we design a framework enabling user query disambiguation in the health service ecosystem. The framework embodies a health service ontology for domain knowledge-based user query disambiguation and an ECBR algorithm for accurate service retrieval. In order to evaluate the framework, we build a system prototype and perform a series of experiments on it. Conclusions from the evaluation are drawn in the paper. © 2010 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2010, 'Semantic service retrieval and QoS measurement in the digital ecosystem environment', CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pp. 153-160.
View/Download from: Publisher's site
Digital Ecosystem is an innovative high-tech environment with the purpose of supporting the activities among species within the business ecosystem. In this paper, we concern about the research issue of service retrieval within such an environment. Due to the fact that species are heterogeneous and geographically dispersed, to precisely and quickly locate a service provider becomes an issue. In addition, the Digital Ecosystem environment urgently requires the structualization of service information and a set of unified QoS measurement for service ranking and evaluation. In order to unfold the issues in detail, we use the means of case study and literature survey. Eventually we formulate the research issues in this domain and provide a possible solution. © 2010 IEEE.
Fachrunnisa, O. & Hussain, F.K. 2010, 'A framework for creating a sustainable community in Virtual Environments', iiWAS2010 - 12th International Conference on Information Integration and Web-Based Applications and Services, pp. 735-742.
View/Download from: Publisher's site
There is much interest in using the virtual community as a business medium to establish a relationship between customer and stakeholders. While studies on virtual communities have widely discussed ways to sustain this community, there is the need for a complete framework or methodology to regulate members' interactions so as to produce sustainability. In order to achieve this sustainability, it is important to consider the existing trust relationship between community members and ways to identify an untrustworthy agent in a community. In this paper, we propose a framework for creating a sustainable community in Virtual Environments. The role of a third party agent and the effectiveness of continuous performance monitoring are the main keys to creating a sustainable virtual community. We also present the results of an experimental study. The study shows that the framework will help the administrator to identify all non-compliant agents after a transaction or interactions. Copyright 2010 ACM.
Parvin, S., Han, S., Tian, B. & Hussain, F.K. 2010, 'Trust-based authentication for secure communication in Cognitive Radio Networks', Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, pp. 589-596.
View/Download from: Publisher's site
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node's trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User's free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof. © 2010 IEEE.
Raza, M., Hussain, F.K., Hussain, O.K. & Chang, E. 2010, 'Q-Contract Net: A negotiation protocol to enable quality-based negotiation in Digital Business Ecosystems', CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pp. 161-167.
View/Download from: Publisher's site
The Digital Business Ecosystem (DBE) is the result of the co-evolution of the Business Ecosystem and the Digital Ecosystem. There are numerous approaches and enabling technologies which are used in modeling open business marketplaces and, due to the similarities between the Digital Business environments, they can also help to enable the Digital Business Ecosystem but with some limitations. The complete lifecycle of the DBE can be decomposed into the following phases: formation, evolution and dissipation. In this work, our main focus is on the importance of negotiation in the DBE formation phase and especially on the structure of Contract Net Protocol. We will present an extension to the primitive Contract Net Protocol and name it Contract Net with Quality Protocol (CNQP or Q-Contract Net) to facilitate the negotiation process by adding the quality evaluation steps during the negotiation phase of the DBE formation. © 2010 IEEE.
Fachrunnisa, O., Hussain, F. & Chang, E. 2010, 'State of the art review for trust maintenance in organizations', CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems, pp. 574-580.
View/Download from: Publisher's site
The nature of trust in business relationships is dynamic rather than static. Trust has evolutionary phases or a life cycle. This pattern of evolution can be described as building, maintaining and destroying. Building trust comes at high cost and hard effort. Therefore, once trust has been established in a business relationship, every effort must be made to maintain it. Maintaining trust can be defined as an effort to maximize the benefits of a relationship and to prevent the level of trust from decreasing to the destroying phase. Grounded in state-of-the-art literature, this paper presents current insights for the research into trust maintenance and suggests directions for future research in this field. © 2010 IEEE.
Parvin, S., Han, S., Gao, L., Hussain, F. & Chang, E. 2010, 'Towards trust establishment for spectrum selection in cognitive radio networks', Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 579-583.
View/Download from: Publisher's site
Cognitive Radio (CR) has been considered as a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. As cognitive radio network (CRN) is a general wireless heterogeneous network, it is very essential for detecting the misbehaving or false nodes in the network. So in this paper we propose a trust aware model which provides a reliable approach to establish trust for CRN. This approach combines all kinds of trust values together, including the direct trust and indirect trust value for the secondary users. Depending on this trust value, it is decided that whether the secondary user can user the primary user's spectrum band or not. The mathematical results show that our trust model can efficiently take decision for assigning spectrums to the users. © 2010 IEEE.
Hsu, H.H., Aleksy, M. & Hussain, F. 2010, 'Message from the AINA 2010 workshops co-chairs', 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010.
View/Download from: Publisher's site
Hussain, F., Hsu, H.H. & Aleksy, M. 2010, 'Welcome message from the 6th International Symposium on Frontiers of Information Systems and Network Applications (FINA 2010) workshop chairs', 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010.
View/Download from: Publisher's site
Hussain, F.K. & Chang, E. 2010, '4th IEEE International Conference on Digital Ecosystems and Technologies - Conference Proceedings of IEEE-DEST 2010, DEST 2010: Message from the editors', 4th IEEE International Conference on Digital Ecosystems and Technologies - Conference Proceedings of IEEE-DEST 2010, DEST 2010.
View/Download from: Publisher's site
Parvin, S., Han, S., Hussain, F.K. & Al Faruque, M.A. 2010, 'Trust based security for Cognitive Radio Networks', iiWAS2010 - 12th International Conference on Information Integration and Web-Based Applications and Services, pp. 743-748.
View/Download from: Publisher's site
With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a promising concept to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Because of the dynamic behavior of Cognitive Radio Networks (CRNs), secure communication in CRNs becomes more critical than for other conventional Wireless networks. So, in this paper we propose a trust-based security solution for CRNs. Trust is calculated from the requesting node depending on various communication attributes and the evaluated trust is compared with the trust threshold value. Depending on the resultant decision, the requested service is available to the requesting user. We prove the security of our proposed scheme in terms of security analysis. Copyright 2010 ACM.
Tabesh, A.R., Hussain, F.K., Chang, E. & Sianki, O.A. 2010, 'Subjective quality assessments in virtual environments', Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, pp. 345-349.
View/Download from: Publisher's site
Being able to make objective Quality of Service (QoS) judgments or assessments is a challenging and crucial activity. The process of making these assessments is compounded when the environment in which the assessments have to be made are virtual; in the sense the interacting parties might not have necessarily met with each other physically. In a broad sense Quality of Service assessments could be broadly categorized into two areas, namely objective assessments and subjective assessments. In this paper, we propose a suite of metrics to carry out subjective quality assessment in a virtual environment. © 2010 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2009, 'A Hybrid Concept Similarity Measure Model For Ontology Environment', On The Move To Meaningful Internet Systems: Otm 2009 Workshops, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Vilamoura, PORTUGAL, pp. 848-857.
View/Download from: UTS OPUS
In this paper, we present a hybrid concept similarity measure model for the ontology environment. Whilst to date many similar technologies have been developed for semantic networks, few of them can be directly applied to the semantic-rich ontology enviro
Kasisopha, N., Wongthongtham, P. & Hussain, F.K. 2009, 'Semantic Wild As A Basis For Software Engineering Ontology Evolution', On The Move To Meaningful Internet Systems: Otm 2009 Workshops, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Vilamoura, PORTUGAL, pp. 858-865.
View/Download from: UTS OPUS
Ontology plays a vital role in sharing a common understanding of the domain among groups of people and provides terminology interpretable by machines. Recently, ontology has grown and continued to evolve constantly, but there are not many tools to provid
Dong, H., Hussain, F.K. & Chang, E. 2009, 'State Of The Art In Semantic Focused Crawlers', Computational Science And Its Applications - Iccsa 2009, Pt Ii, International Conference on Computational Science and Its Applications, Springer-verlag Berlin, Seoul, SOUTH KOREA, pp. 910-924.
View/Download from: UTS OPUS
Nowadays, the research of focused crawler approaches the field of semantic web, along with the appearance of increasing semantic web documents and the rapid development of ontology mark-up languages. Semantic focused crawlers are a series of focused craw
Parvin, S., Ali, S., Singh, J., Hussain, F.K. & Han, S. 2009, 'Towards DOS Attack Prevention Based On Clustering Architecture In Mobile IP Communication', IECON: 2009 35th Annual Conference Of IEEE Industrial Electronics, Vols 1-6, IEEE Industrial Electronics Society Annual Conference, IEEE, Porto, Portugal, pp. 3007-3012.
View/Download from: UTS OPUS or Publisher's site
Mobile IP communication, like wired communication and mobile ad hoc networking, is vulnerable to Denial-of-Service (DOS) attacks. In this paper, we propose using a lightweight packet filtering technique in different domains and base stations to reduce/el
Dong, H., Hussain, F.K. & Chang, E. 2009, 'An Ontology-based Webpage Classification Approach For The Knowledge Grid Environment', 2009 Fifth International Conference On Semantics, Knowledge And Grid (skg 2009), International Conference on Semantics, Knowledge and Grid, IEEE, Zhuhai, PEOPLES R CHINA, pp. 120-127.
View/Download from: UTS OPUS or Publisher's site
With the rapid growth of the amount of information available in the Web, webpage classification technologies are widely employed by many search engines in order to formulate user queries and make users' search tasks easier. Knowledge Grid is a new form o
Hussain, O., Dillon, T.S., Chang, E. & Hussain, F.K. 2009, 'Determining The Net Financial Risk For Decision Making In Business Interactions', 2009 International Conference On Advanced Information Networking And Applications, International Conference on Advanced Information Networking and Applications, IEEE, Bradford, ENGLAND, pp. 822-829.
View/Download from: UTS OPUS or Publisher's site
In a business interaction, transactional risk highlights the uncertainty associated in not achieving the desired outcomes. The assessment of transactional risk gives the interacting user the different levels of failure in achieving its desired outcomes a
Dong, H., Hussain, F.K. & Chang, E. 2009, 'A Hybrid Service Metadata Clustering Methodology In The Digital Ecosystem Environment', 2009 International Conference On Advanced Information Networking And Applications Workshops: Waina, Vols 1 And 2, International Conference on Advanced Information Networking and Applications, IEEE, Bradford, ENGLAND, pp. 238-243.
View/Download from: UTS OPUS or Publisher's site
Digital Ecosystem is defined as 'an open, loosely coupled, domain clustered, demand-driven, self-organizing and agent-based environment, in which each species is proactive and responsive for its own benefit and profit' [1]. Species in the Digital Ecosyst
Hussain, O., Dillon, T.S., Chang, E. & Hussain, F.K. 2009, 'A Methodology For Transactional Risk Assessment And Decision Making In E-business Interactions', IEEE International Conference on e-Business Engineering, 2009. ICEBE '09, IEEE International Conference on e-Business Engineering, IEEE Computer Soc, Macau, PEOPLES R CHINA, pp. 157-164.
View/Download from: UTS OPUS or Publisher's site
The development and advancement of technologies have enabled users to complete their tasks efficiently. They have also provided them with various options and alternatives to complete and achieve their tasks. In such an environment, it is imperative for a
Tian, B., Chang, E., Dillon, T.S., Han, S. & Hussain, F.K. 2009, 'An Authenticated Self-healing Key Distribution Scheme Based On Bilinear Pairings', 2009 6th IEEE Consumer Communications And Networking Conference, Vols 1 And 2, IEEE Consumer Communications and Networking Conference, IEEE, Las Vegas, NV, pp. 1061-1065.
View/Download from: UTS OPUS
Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network. A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairing-based a
Hussain, O., Dillon, T.S., Chang, E. & Hussain, F.K. 2009, 'A Fuzzy Inference Model For Risk Based Informed Decision-making In E-business', 2009 International Conference On Network-based Information Systems, International Conference on Network Based Information Systems, IEEE, Indianapolis, ID, pp. 519-524.
View/Download from: UTS OPUS or Publisher's site
Since its invention, the web has considerably advanced and it now provides its users with sophisticated technologies and processes for facilitating interactions. This has enabled users to complete their tasks by efficient ways and in turn increase their
Dong, H., Hussain, F.K. & Chang, E. 2009, 'Semantic Service Search, Service Evaluation and Ranking in Service Oriented Environment', IT REVOLUTIONS, pp. 111-117.
Raza, M., Hussain, F.K. & Chang, E. 2009, 'Quality Measures for Digital Business Ecosystems Formation', IT REVOLUTIONS, pp. 118-121.
Dong, H., Hussain, F.K. & Chang, E. 2009, 'Paradox in Applications of Semantic Similarity Models in Information Retrieval', IT REVOLUTIONS, pp. 60-68.
Fachrunnisa, O., Hussain, F.K. & Chang, E. 2009, 'Current research trends and directions for future research in trust maintenance for virtual environments', iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services, pp. 718-724.
View/Download from: Publisher's site
Trust is widely acknowledged as being important for the efficient and effective operation of business in virtual environments. This is because trust functions like a glue that holds and links virtual agents together as they relate and collaborate remotely. In virtual environments, trust needs to be established swiftly as there is little time to build it gradually in the absence of face-to-face meetings. However, the manner in which trust develops and is maintained is a critical factor in relationships, both physically and virtually. In virtual environments, trust needs to be managed including network connection as well as social aspects of interaction. Maintaining trust in virtual environments is defined as an effort to maximize the benefits of such virtual relationship and to prevent the level of trust from decreasing. In this paper, we undertake a general survey of the current situation of trust maintenance in virtual environments. We review several researches from the perspective of terminology, strategies presented, and types of strategies. We describe the benefits and shortcomings of each strategy, conduct an integrative review of these strategic approaches, and make suggestions for future research. © 2010 ACM.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A Semantic Crawler Based On An Extended Cbr Algorithm', On The Move To Meaningful Internet Systems: Otm 2008 Workshops, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Monterrey, MEXICO, pp. 1076-1085.
View/Download from: UTS OPUS
A semantic (web) crawler refers to a series of web crawlers designed for harvesting semantic web content. This paper presents the frame-work of a semantic crawler that call abstract metadata from online webpages and Cluster the metadata by associating th
Dong, H., Hussain, F.K. & Chang, E. 2008, 'Transport Service Ontology And Its Application In The Field Of Semantic Search', IEEE/soli'2008: Proceedings Of 2008 IEEE International Conference On Service Operations And Logistics, And Informatics, Vols 1 And 2, IEEE International Conference on Service Operations and Logistics and Informatics, IEEE, Beijing, PEOPLES R CHINA, pp. 820-824.
View/Download from: UTS OPUS
Transport is a crucial component in logistics, which joints each activity in the logistics chain. The performance of logistics heavily relies on the efficiency of transport services. However, until now there has not been a clear definition about transpor
Hussain, O., Chang, E., Dillon, T.S. & Hussain, F.K. 2008, 'Determining The Level Of Perceived Risk In E-business Web 2.0 Interactions', Proceedings Of The ICEBE 2008: IEEE International Conference On E-business Engineering, IEEE International Conference on e-Business Engineering, IEEE Computer Soc, Xian, China, pp. 13-20.
View/Download from: UTS OPUS or Publisher's site
In the domain of e-commerce business it is important for the initiating agent of the interaction to analyze and consider the level of perceived risk in forming an interaction with an agent, apart from just considering the level of trust and security. By
Dong, H., Hussain, F.K. & Chang, E. 2008, 'Developing A Semantic Service Transaction System In The DE Environment', 6th IEEE International Conference On Industrial Informatics 2008, IEEE International Conference on Industrial Informatics, IEEE, Daejeon, SOUTH KOREA, pp. 1353-1357.
View/Download from: UTS OPUS
Digital Ecosystem (DE), which is an emerging service environment beyond the service-oriented architecture (SOA), is increasingly attracting researchers' interest. However, current literature reveals that there is not reliable and trustworthy technical su
Arathoon, S., Fazall, A., Hussain, O., Hussain, F.K. & Chang, E. 2008, 'Ontological Manifestation Of Product Risk In Service Oriented Environment', 2008 6th International Symposium On Intelligent Systems And Informatics, International Symposium on Intelligent Systems and Informatics, IEEE, Subotica, SERBIA, pp. 302-307.
View/Download from: UTS OPUS
Risk is omnipresent in all the interactions that we carry out. Quantifying and making risk-based assessments and decisions is very important especially in the case of business interactions. However in the existing literature there is no ontological manif
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A Work-in-progress Platform For Solving Knowledge Sharing Issues In Organizations', 2008 6th International Symposium On Intelligent Systems And Informatics, International Symposium on Intelligent Systems and Informatics, IEEE, Subotica, SERBIA, pp. 374-378.
View/Download from: UTS OPUS
In this paper, we propose a knowledge sharing platform based on the technology of ontology and agent, in order to solve the issues in the knowledge sharing activities within organizations. Based on the analysis of literature, the issues within current or
Hussain, O., Chang, E., Dillon, T.S. & Hussain, F.K. 2008, 'Ascertaining The Semantic And Linguistic Level Of Perceived Risk In E-business Interactions', Proceedings Of The ICEBE 2008: IEEE International Conference On E-business Engineering, IEEE International Conference on e-Business Engineering, IEEE Computer Soc, Xian, China, pp. 723-727.
View/Download from: UTS OPUS or Publisher's site
By analyzing the level of perceived risk in the domain of e-business, the interaction initiating agent can determine beforehand whether or not it will achieve its desired outcomes and the associated consequences to it in interacting with the other agent.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'Developing A Conceptual Framework Of Semantic Search Engine To Promote The Collaborations Between Smes In The Digital Ecosystems Environment', 2008 2nd IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Phitsanulok, Thailand, pp. 409-412.
View/Download from: UTS OPUS or Publisher's site
The research with regards to digital ecosystems emerged in the end of last century, and has developed in this century. Due to its immaturity, some fields within it are deemed to be blank. This research proposes to fill one of the blanks in the digital ecosystems research. By analyzing the issues in the current research, we propose to develop a semantic search engine, with the purpose of querying services provided by SMEs. The objective of this research is to build a reliable and trustworthy link between SMEs in the digital ecosystems environment. Relevant research methods and steps are discussed in this paper.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A Survey In Traditional Information Retrieval Models', 2008 2nd IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Phitsanulok, Thailand, pp. 397-402.
View/Download from: UTS OPUS or Publisher's site
As a matter of fact, many so-called semantic search algorithms are derived from the traditional indexterm- based search models. In this paper, we survey the traditional information retrieval models by categorizing them into three main classes and eleven subclasses, and analyse their benefits and issues of them.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'State Of The Art In Metadata Abstraction Crawlers', 2008 IEEE International Conference On Industrial Technology, Vols 1-5, IEEE International Conference on Industrial Technology, IEEE, Chengdu, PEOPLES R CHINA, pp. 1404-1409.
View/Download from: UTS OPUS
Nowadays, the research of crawlers moves closer to the semantic web, along with the appearance of increasing XML/RDF/OWL files and the rapid development of ontology mark-up languages. As an emerging concept, metadata abstraction crawlers are a series of
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A Survey In Semantic Web Technologies-inspired Focused Crawlers', 2008 Third International Conference On Digital Information Management, Vols 1 And 2, International Conference on Digital Information Management, IEEE, London, ENGLAND, pp. 961-963.
View/Download from: UTS OPUS
Crawlers are software which can traverse the internet and retrieve webpages by hyperlinks. In the face of the inundant spam websites, traditional web crawlers cannot function well to solve this problem. Semantic focused crawlers utilize semantic web tech
Hammadi, A., Hussain, F.K., Chang, E., Dillon, T.S. & Ali, S. 2008, 'Ontological Framework For Trust & Reputation For DBE', 2008 2nd IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Phitsanulok, THAILAND, pp. 650-653.
View/Download from: UTS OPUS or Publisher's site
Abstract- Today's e-Businesses rely heavily on trust and reputation systems. These systems are key indicators for businesses performance. Businesses that interact with each other for their business needs form a Digital Business Ecosystem (DBE). Members ofDBE need to know the trust and reputation value of each other before the start of business interactions. The feedback mechanism is needed so that members of DBE form a unanimous opinion about trustworthiness of any specific member of the community and based their business interactions on this opinion. We present an ontological framework that will combine the feedback from all different trust and reputation information publicly available for a specific member of a domain and gives the knowledge representation on the bases of combined feedback. We call this ontological framework 'feedback ontology'.
Hussain, O., Dillon, T.S., Chang, E. & Hussain, F.K. 2008, 'Highlighting The Issues In Making An Informed Interaction-based Decision In Industrial Ecosystems', 6th IEEE International Conference On Industrial Informatics 2008, IEEE International Conference on Industrial Informatics, IEEE, Daejeon, SOUTH KOREA, pp. 1324-1329.
View/Download from: UTS OPUS
In the literature, the notion of trust has been widely discussed and various approaches have been proposed to assess and quantify it, in order to take it into consideration when making an interaction-based decision in industrial ecosystems. At the same t
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A Survey In Semantic Search Technologies', 2008 2nd IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Phitsanulok, Thailand, pp. 403-408.
View/Download from: UTS OPUS or Publisher's site
In this paper, we make a survey over the primary literature regarding semantic search technologies. By classifying the literature into six main categories, we review their characteristics respectively. In addition, the issues within the reviewed semantic search methods and engines are analysed and concluded based on four perspectives.
Zadjabbari, B., Wongthongtham, P. & Hussain, F.K. 2008, 'Towards an Ontological Intellectual Capital based Model in Sustainable Business Performance', 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2, pp. 512-515.
View/Download from: Publisher's site
Dong, H., Hussain, F.K., Chang, E. & IEEE 2008, 'A Survey in Traditional Information Retrieval Models', 2008 2ND IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, pp. 500-505.
Dong, H., Hussain, F.K., Chang, E. & IEEE 2008, 'A Survey in Semantic Search Technologies', 2008 2ND IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, pp. 422-427.
Raza, M., Hussain, F.K. & Chang, E. 2008, 'A methodology for quality-based mashup of data sources', Proceedings of the 10th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2008, pp. 528-533.
View/Download from: Publisher's site
The concept of mashup is gaining tremendous popularity and its application can be seen in a large number of domains. Enterprises using and relying upon mashup have improved their mass collaboration and personalization. In order for mashup technology to be widely accepted and widely used, we need a methodology by which can make use of the quality of the input to the mashup process as a governing principle to carry out mashup. This paper reviews the concept of mashup in different domains and proposes a conceptual solution framework for providing quality based mashup process. © 2008 ACM.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A transport service ontology-based focused Crawler', Proceedings of the 4th International Conference on Semantics, Knowledge, and Grid, SKG 2008, pp. 49-56.
View/Download from: Publisher's site
Ontology is a technology for conceptualizing specific domain knowledge, which can provide machine-readable definitions to the severed domain. Therefore, ontology can be utilized to enhance the performance of focused crawlers, by precisely defining the crawling boundary. In this paper, we will exhibit a conceptual framework of an ontology-based focused crawler serving in the domain of transport services. Here, a transport service ontology is designed for filtering non-relevant metadata, by means of logically linking the metadata with ontological concepts. In addition, we will provide the evaluation process in order to assess the power of ontology in the focused crawler. Conclusion and further works based on our current evaluation results will be made in the final section. © 2008 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'Quality of service (QOS) based service retrieval engine', MoMM2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, pp. 405-408.
View/Download from: Publisher's site
It is observed that there are few service evaluation and ranking methodologies currently available in the SOE. In this paper, we propose an innovative service evaluation and ranking strategy, based on the measurement of trustworthiness and reputation of services (or service providers'). CCCI Metrics originally proposed and developed by Chang et al [1] is used to measure the trustworthiness and reputation of e-services. Here we extend the application of CCCI Metrics to the field of service retrieval. A java-based search engine prototype is designed, with the purpose of implementing the trustworthiness and reputation-based service search, evaluation and ranking. Conclusions and future works are drawn in the final section. © 2008 ACM.
Hussain, F.K., Chang, E. & Hussain, O. 2008, 'A robust methodology for prediction of trust and reputation values', Proceedings of the ACM Conference on Computer and Communications Security, pp. 97-108.
View/Download from: Publisher's site
In this paper, we present the FC direct trust value-based decision making methodology, for making direct trust value based decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. The direct trust value-based decision making methodology models the context specific nature of trust and the dynamic nature of trust to make direct trust value-based decisions regarding interactions. Additionally in this paper, we present the FC reputation-based trust decision making methodology, for making reputation-based trust decisions regarding interactions, if direct trust value-based decisions cannot be made. The FC reputationbased trust decision making methodology can make reputationbased trust decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. Copyright 2008 ACM.
Aseeri, A., Wongthongtham, P., Chen, W. & Hussain, F.K. 2008, 'Towards social network based ontology evolution wiki for an ontology evolution', Proceedings of the 10th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2008, pp. 500-502.
View/Download from: Publisher's site
There is a lack of well-maintained ontologies thus ontology evolution now becomes an important filed of ontology research. The evolution may reflect new categories of systems being evaluated on broader and different understandings of certain concepts and relations. Alternatively ontologies evolve because the conceptualization improves. For ontology evolution, we focus in this paper a social network based approach in which the user community has direct control over the evolution of the ontologies. Ontologies can be enriched, learnt, and obtained from social network users using various empirical techniques. In this paper, we ground the social network based approach on the philosophy of wikis so called ontology Evolution Wiki. © 2008 ACM.
Dong, H., Hussain, F.K. & Chang, E. 2008, 'State of the Art in Negotiation Ontologies for Enhancing Business Intelligence', Proceedings - International Conference on Next Generation Web Services Practices, NWeSP 2008, pp. 107-112.
View/Download from: Publisher's site
Negotiation is defined as two or more agents making agreement on the common interests, which provides an efficient approach for companies to gain business intelligence from suppliers and customers. Current negotiation research focuses on automatically stimulating negotiation behaviors among agents. Ontology, as a modeling technology in semantic web, is regarded as an effective tool to improve the negotiation ability of agents, considering that ontology can provide richer semantic expressions for agents in negotiation process. In this paper, we make a brief review on the current negotiation ontology researches. In addition, by means of a unique ontology notation system, we unify the notations used in these ontologies, to maximally promote knowledge sharing outcome in this field. By comparing and contrasting the ontologies from five perspectives, we draw a brief conclusion to the present status of negotiation ontology researches, and make our suggestions to the further research in this field. © 2008 IEEE.
Wongthongtham, P., Hussain, F.K., Chang, E. & Dillon, T.S. 2008, 'Multi-site software engineering ontology instantiations management using reputation based decision making', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 199-218.
View/Download from: Publisher's site
In this paper we explore the development of systems for software engineering ontology instantiations management in the methodology for multi-site distributed software development. Ultimately the systems facilitate collaboration of teams in multi-site distributed software development. In multi-site distributed environment, team members in the software engineering projects have naturally an interaction with each other and share lots of project data/agreement amongst themselves. Since they are not always residing at the same place and face-to-face meetings hardly happen, there is a need for methodology and tools that facilitate effective communication for efficient collaboration. Whist multi-site distributed teams collaborate, there are a lot of shared project data updated or created. In a large volume of project data, systematic management is of importance. Software engineering knowledge is represented in the software engineering ontology whose instantiations, which are undergoing evolution, need a good management system. Software engineering ontology instantiations signify project information which is shared and has evolved to reflect project development, changes in the software requirements or in the design process, to incorporate additional functionality to systems or to allow incremental improvement, etc. © 2009 Springer Berlin Heidelberg.
Hussain, O.K., Chang, E., Hussain, F.K. & Dillon, T.S. 2008, 'Determining the failure level for risk analysis in an e-commerce interaction', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 290-323.
View/Download from: Publisher's site
Before initiating a financial e-commerce interaction over the World Wide Web, the initiating agent would like to analyze the possible Risk in interacting with an agent, to ascertain the level to which it will not achieve its desired outcomes in the interaction. By analyzing the possible risk, the initiating agent can make an informed decision of its future course of action with that agent. To determine the possible risk in an interaction, the initiating agent has to determine the probability of failure and the possible consequences of failure to its resources involved in the interaction. In this chapter as a step towards risk analysis, we propose a methodology by which the initiating agent can determine beforehand the probability of failure in interacting with an agent, to achieve its desired outcomes. © 2009 Springer Berlin Heidelberg.
Hussain, O.K., Chang, E., Hussain, F.K. & Dillon, T.S. 2008, 'Quantifying the numeric and linguistic magnitude of perceived risk in e-commerce interactions for RDSS', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, IEEE-DEST 2008, pp. 604-610.
View/Download from: Publisher's site
In an e-commerce business interaction, the risk assessing agent by analyzing the possible level of perceived risk beforehand can make an informed decision of its future course of interaction with an agent. The perceived risk in the context of an e-commerce business interaction is a multidimensional construct which is the combination of its subcategories. In this paper we propose a methodology by which the risk assessing agent can ascertain the numeric and linguistic level of perceived risk in an interaction by combining its different subcategories. © 2008 IEEE.
Chang, E. & Hussain, F.K. 2008, 'Editors' page', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, IEEE-DEST 2008.
View/Download from: Publisher's site
Dong, H., Hussain, F.K. & Chang, E. 2008, 'A survey in semantic web technologies-inspired focused crawlers', 3rd International Conference on Digital Information Management, ICDIM 2008, pp. 934-936.
View/Download from: Publisher's site
Crawlers are software which can traverse the internet and retrieve webpages by hyperlinks. In the face of the inundant spam websites, traditional web crawlers cannot function well to solve this problem. Semantic focused crawlers utilize semantic web technologies to analyze the semantics of hyperlinks and web documents. This paper briefly reviews the recent studies on one category of semantic focused crawlers - ontology-based focused crawlers, which are a series of crawlers that utilize ontologies to link the fetched web documents with the ontological concepts (topics). The purpose of this is to organize and categorize web documents, or filtering irrelevant webpages with regards to the topics. A brief comparison are made among these crawlers, from six perspectives - domain, working environment, special functions, technologies utilized, evaluation metrics and evaluation results. The conclusion with respect to this comparison is made in the final section. © 2008 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Contemporary Cultural Researches On Knowledge Sharing', Proceedings Of The 2007 IEEE International Conference On Service Operations And Logistics, And Informatics, IEEE International Conference on Service Operations and Logistics and Informatics, IEEE, Philadelphia, PA, pp. 140-142.
Knowledge sharing, as an essential component in the field of knowledge management research, attracts increasing researchers into this discipline. Current researches on KS can be categorized as two independent views - exploring from technical perspective
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Compare And Contrast Of Contemporary Technical Knowledge Sharing Technologies', Proceedings Of The 2007 IEEE International Conference On Service Operations And Logistics, And Informatics, IEEE International Conference on Service Operations and Logistics and Informatics, IEEE, Philadelphia, PA, pp. 255-258.
Knowledge sharing is not a new topic in knowledge management research field. Many methodologies have been proposed, which aims to exploit the embodied knowledge in practice and transform them to a normal form so that other staffs and organizations can ut
Hussain, F.K., Hussain, O. & Chang, E. 2007, 'Trustworthiness Measurement Methodology (tmm) For Assessment Purposes', Proceedings Of The 2007 IEEE International Conference On Service Operations And Logistics, And Informatics, IEEE International Conference on Service Operations and Logistics and Informatics, IEEE, Philadelphia, PA, pp. 369-374.
Quality assessment process is a very complex process. At the same time quality assessment is very vital and crucial for many business processes. In this paper we propose and explain trustworthiness measurement methodology, which is a generic method which
Chang, E., Dillon, T.S. & Hussain, F.K. 2007, 'Trust Ontologies For E-service Environments', International Journal Of Intelligent Systems, International FLINS Conference on Applied Artificial Intelligence, Wiley-blackwell, Blankenberge, BELGIUM, pp. 519-545.
View/Download from: Publisher's site
In this article, we introduce trust ontologies. An ontology represents a set of concepts that are commonly shared and agreed to by all parties in a particular domain. Here, we introduce generic and specific trust ontologies. These ontologies include the
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Quantifying The Loss In Resource Benefit For Risk Based Decision In Digital Business Ecosystem', 2007 IEEE International Symposium On Industrial Electronics, Proceedings, Vols 1-8, IEEE International Symposium on Industrial Electronics, IEEE, Vigo, SPAIN, pp. 2917-2922.
View/Download from: Publisher's site
In a financial digital business ecosystem, the trusting agent by analyzing beforehand the possible risk in interacting with a probable trusted agent can make a better decision of its future course of interaction with it. Another factor that would help th
Hussain, F.K., Hussain, O. & Chang, E. 2007, 'An Overview Of The Interpretations Of Trust And Reputation', Etfa 2007: 12th IEEE International Conference On Emerging Technologies And Factory Automation, Vols 1-3, IEEE International Conference on Emerging Technologies and Factory Automation, IEEE, Patras, GREECE, pp. 826-830.
In this paper we present an overview of the definitions of the terms of trust and reputation from the literature. Trust and reputation have been defined in different ways by the various researchers. As a result of these various definitions of trust and r
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Towards Quantifying The Possible Risk In E-commerce Interactions For Rdss', Icebe 2007: IEEE International Conference On E-business Engineering, Proceedings, IEEE International Conference on e-Business Engineering, IEEE Computer Soc, Hong Kong, PEOPLES R CHINA, pp. 89-96.
View/Download from: Publisher's site
By analyzing the possible level of Risk beforehand the initiating agent can make an informed decision of its future course of interaction with an agent. The possible risk in the context of an e-commerce interaction is a multidimensional construct which i
Hussain, F.K., Hussain, O. & Chang, E. 2007, 'Illustrative Example Of Determining Quality Of Service (qos) Using Trustworthiness Measurement Methodology', Proceedings Of The 2007 IEEE International Conference On Service Operations And Logistics, And Informatics, IEEE International Conference on Service Operations and Logistics and Informatics, IEEE, Philadelphia, PA, pp. 530-535.
In this paper we make use of a case study comprising of an interaction between a service provider and a service requestor to determine the quality of service (QoS) provided by the service provider. The trustworthiness measurement methodology is made use
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Project Track And Trace Methodology In The Environment Of Digital Ecosystem', 2007 Inaugural IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Cairns, AUSTRALIA, pp. 145-148.
Digital Ecosystems (DE) is an open-source network environment for Small and Medium Enterprises (SMEs). By means of DE, project organisations are able to realize the distribution of organisational structure, to reduce internal cost and to achieve the bigg
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Ontology-based Solutions For Knowledge Sharing Issues In Project Organisations', 2007 Inaugural IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Cairns, AUSTRALIA, pp. 154-159.
Knowledge sharing is not a new topic in knowledge management research field. Current research focused on the use of formal ontologies for specifying content-specific agreement for a variety of knowledge sharing activities. In this paper, we choose projec
Sidhu, A., Hussain, F.K., Dillon, T.S. & Chang, E. 2007, 'Trust Based Decision Making Approach For Protein Ontology', Etfa 2007: 12th IEEE International Conference On Emerging Technologies And Factory Automation, Vols 1-3, IEEE International Conference on Emerging Technologies and Factory Automation, IEEE, Patras, GREECE, pp. 810-813.
Biomedical Knowledge of Proteomics Domain is represented in the Protein Ontology, whose instantiations, which are undergoing evolution, need a good management and maintenance system. Protein Ontology instantiations signify information about proteins that
Dong, H. & Hussain, F.K. 2007, 'Digital Ecosystem Ontology', Etfa 2007: 12th IEEE International Conference On Emerging Technologies And Factory Automation, Vols 1-3, IEEE International Conference on Emerging Technologies and Factory Automation, IEEE, Patras, GREECE, pp. 814-817.
Digital Ecosystems is a neoteric terminology and there are two major definitions about it square respectively from Soluta.Net and from Digital Ecosystem and Business Intelligence Institute. In this paper, to solve the ambiguous problem in Digital Ecosyst
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Quantifying The Level Of Failure In A Digital Business Ecosystem Interactions', Etfa 2007: 12th IEEE International Conference On Emerging Technologies And Factory Automation, Vols 1-3, IEEE International Conference on Emerging Technologies and Factory Automation, IEEE, Patras, GREECE, pp. 818-825.
To ascertain the possible level of risk in a digital business ecosystem interaction, the initiating agent has to determine beforehand the probability of failure, the possible consequences of failure, and the loss of investment probability to its resource
Hussain, F.K., Hussain, O. & Chang, E. 2007, 'Trustworthiness Measurement Methodology (tmm) For Assessment Purposes', Iccc 2007: 5th IEEE International Conference On Computational Cybernetics, Proceedings, IEEE International Conference on Computational Cybernetics, IEEE, Gammarth, TUNISIA, pp. 107-112.
View/Download from: Publisher's site
Quality assessment process is a very complex process. At the same time quality assessment is very vital and crucial for many business processes. In this paper we propose and explain trustworthiness measurement methodology, which is a generic method which
Dong, H. & Hussain, F.K. 2007, 'Digital Ecosystem Ontology', 2007 IEEE International Symposium On Industrial Electronics, Proceedings, Vols 1-8, IEEE International Symposium on Industrial Electronics, IEEE, Vigo, SPAIN, pp. 2944-2947.
View/Download from: Publisher's site
Digital Ecosystems is a neoteric terminology and there are two major definitions about it respectively from Soluta.Net and from Digital Ecosystem and Business Intelligence Institute. In this paper, to solve the ambiguous problem in Digital Ecosystem's de
Doug, H., Hussain, F.K. & Chang, E. 2007, 'Ontology For Automated Multi-site Project Management', 2007 Inaugural IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Cairns, AUSTRALIA, pp. 149-153.
One characteristic of multi-site project organizations is that people in the organizations are geographically dispersed and from different cultural background, which challenges the senior management to successfully complete the task of project management
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Ascertaining Risk In Financial Terms In Digital Business Ecosystem Environments', 2007 Inaugural IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Cairns, AUSTRALIA, pp. 594-599.
In a digital business ecosystem environment the trusting agent by analysing beforehand the possible risk in interacting with a probable trusted agent, can make a better decision of its future course of interaction with it. A possible outcome of Risk is t
Chang, E., Hussain, F.K. & Boley, H. 2007, 'Dynamic Self-organized Digital Ecosystem Architecture', 2007 Inaugural IEEE International Conference On Digital Ecosystems And Technologies, IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Cairns, AUSTRALIA, pp. 606-606.
NA
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Determining The Loss Of Investment Probability For Risk Based Decision Support System', 6th IEEE/acis International Conference On Computer And Information Science, Proceedings, IEEE/ACIS International Conference on Computer and Information Science in Conjunction with 1st IEEE/ACIS International Workshop on, IEEE Computer Soc, Melbourne, AUSTRALIA, pp. 1129-1134.
View/Download from: Publisher's site
In an e-commerce interaction it is rational for the initiating agent to be apprehensive about the outcome of the interaction and fear for the safety of its resources involved in it. The initiating agent can alleviate this to a certain extent by determini
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'A Methodology To Ascertain The Level Of Failure In An E-commerce Interaction', Pacific Asia Conference On Information Systems 2007, Sections 1-6, Pacific Asia Conference on Information Systems, Natl Sun Yat-sen Univ, Auckland, New Zealand.
To ascertain the possible level of risk in an e-commerce interaction, the initiating agent needs to determine beforehand the probability of failure and the possible consequences of failure to its resources in interacting with an agent. The initiating agent can determine beforehand the probability of failure in interacting with an agent either by considering its past interaction history with it or by soliciting recommendations from other agents. In both cases, it is imperative for the agent who is either considering its past interaction history, or who is communicating a recommendation about the other agent, to know the accurate level of failure in interacting with the other agent. To achieve this, in this paper we propose a methodology by which the initiating agent of the interaction ascertains the level of failure in the interaction, after interacting with an agent.
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Multi-site project organisation knowledge sharing ontology', Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07.
View/Download from: Publisher's site
The implementation of ontology starts to step into the field of project organizations. With the appearance of project outsourcing, the location of project workplace becomes increasingly multiple, which challenges the administration of senior management to projects. In this paper, we analyze the daily knowledge sharing activities, including the organizational structure, the procedure of project planning and the scenarios of project distribution, by a case study in City of Melville Council -a typical multi-site project organization, to discover the issues in these activities. By means of extending the theory of CCCI Metrics into the field of project management, we design the multi-site project track and trace ontology, in order to promote the knowledge sharing activities between senior management and project groups. © 2007 IEEE.
Hussain, F.K., Hussain, O.K. & Chang, E. 2007, 'Illustrative example of determining Quality of Product (QoP) using trustworthiness measurement methodology', Proceedings - International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2007, pp. 269-274.
View/Download from: Publisher's site
In this paper we make use of a case study, involving the use of a product by a given user, to determine the quality of product (QoP). The trustworthiness measurement methodology is made use of to carry out the QoP assessment. The steps involved are discussed and illustrated by the trustworthiness measurement methodology software that we have engineered. © 2007 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2007, 'An Integrative view of the concept of Digital Ecosystem', 3rd International Conference on Networking and Services,ICNS 2007.
View/Download from: Publisher's site
In the literature we fid two broad definitions of the concept of Digital Ecosystem, hence leading to confusion and ambiguity with regards to its semantic interpretation. In this paper we make use of ontology, which is a well-known tool for knowledge sharing, in order to present an integrative view of the concept of Digital Ecosystem. We implement the ontology by using Protégé-owl. © 2007 IEEE.
Hussain, O.K., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Quantifying the possible financial consequences of failure for making a risk based decision', Second International Conference on Internet Monitoring and Protection, ICIMP 2007.
View/Download from: Publisher's site
In a financial e-commerce interaction it is rational for the initiating agent to analyze beforehand the possible risk in interacting with any other agent. Doing so would give the initiating agent an idea of direction in which its interaction might head and also help it to make an informed decision of its future course of action with that particular agent. For risk analysis in the context of e-commerce interactions, the initiating agent has to determine beforehand the probability of failure and the possible consequences of failure in interacting with an agent. In this paper, we propose a methodology by which the initiating agent can determine beforehand the possible consequences of failure in its resources, according to the demand of its future interaction with an agent. © 2007 IEEE.
Hai, D., Hussain, F.K. & Chang, E. 2007, 'Project track and trace methodology in the environment of digital ecosystem', Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, pp. 357-360.
View/Download from: Publisher's site
Digital Ecosystems (DE) is an open-source network environment for Small and Medium Enterprises (SMEs). By means of DE, project organisations are able to realize the distribution of organisational structure, to reduce internal cost and to achieve the biggest benefit. However, some issues exist in the process of project track and trace processes. In this paper, we analyze the daily project track and trace activities, including the organisational structure, the procedure of project planning and the scenarios of project distribution, by a case study in City of Melville Council - a typical project organisation, to discover the issues in these activities. To solve the issues, we extend the theory of CCCI Metrics to the field of project management. By means of the extended theory, a Project Track and Trace Card is designed to assist the senior management to timely administrate the project completion status in organisations, and then to promote the knowledge sharing in project organisations. © 2007 IEEE.
Hai, D., Hussain, F.K. & Chang, E. 2007, 'Exploring the conceptual model of digital ecosystem', 2007 Second International Conference on Digital Telecommunications, ICDT'07.
View/Download from: Publisher's site
Digital Ecosystem, as a neoteric terminology, has emerged along with the appearance of Business Ecosystem which is a form of naturally existing business network of small and medium enterprises. However, few researches have been found in the field of defining digital ecosystem. In this paper, by means of ontology technology as our research methodology, we propose to develop a conceptual model for digital ecosystem. By introducing an innovative ontological notation system, we create the hierarchical framework of digital ecosystem form up to down, based on the related theories form Digital Ecosystem and Business Intelligence Institute. © 2007 IEEE.
Hai, D., Hussain, F.K. & Chang, E. 2007, 'Ontology-based solutions for knowledge sharing issues in project organisations', Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, pp. 346-351.
View/Download from: Publisher's site
Knowledge sharing is not a new topic in knowledge management research field. Current research focused on the use of formal ontologies for specifying content-specific agreement for a variety of knowledge sharing activities. In this paper, we choose project organisation as our research domain, due to its geographical issues and cultural issues which may affect knowledge sharing activities occurring in dispersed project groups and group members. Provided by a simple notation system, we propose the project organisation knowledge sharing ontology and validate the conceptual model by realizing in Protégé -OWL and SPARQL Query Language. © 2007 IEEE.
Hussain, F.K., Chang, E. & Hussain, O.K. 2007, 'State of the art review of the existing bayesian-network based approaches to trust and reputation computation', Second International Conference on Internet Monitoring and Protection, ICIMP 2007.
View/Download from: Publisher's site
In this paper we present a state of the art review of the bayesian-network based approaches for trust and reputation computation. We divide the bayesian network based approaches for trust and reputation computation into four different classes. Each of the four different classes is discussed in this paper. © 2007 IEEE.
Hussain, O.K., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Quantifying failure for risk based decision making in digital business ecosystem interactions', Second International Conference on Internet and Web Applications and Services, ICIW'07.
View/Download from: Publisher's site
Due to technological advancement of the internet, conducting e-commerce transactions have become a part of our daily lives. In a financial interaction to be carried over the digital business ecosystem domain, it is rational for an agent instigating the interaction to analyse beforehand the possible risk in interacting with any other agent. Doing so would give the instigating agent an idea of direction in which its interaction might head and also help it to make an informed decision of its future course of action with that particular agent. For risk analysis, the instigating agent has to determine beforehand the probability of failure and the possible consequences of failure in interacting with an agent. In this paper, we propose such a methodology by which the instigating agent quantifies the probability of failure beforehand in interacting with an agent according to the demand of its future interaction with it. © 2007 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Project track and trace ontology', Second International Conference on Internet and Web Applications and Services, ICIW'07.
View/Download from: Publisher's site
It is well-known that ontology is utilized as an effective methodology to share domain-specific knowledge in multidisciplinary fields. In the field of project management, due to the characteristic of project organizations in which project members are geographically dispersed and from different cultural background, senior management would feel difficulty when they attempt to know about the detailed project completion status from dispersed project groups. Thus, the objective of this paper is to propose an automated project track and trace methodology through the use of ontology technology, to challenge the knowledge sharing issues in project organizations. By means of extending CCCI Metrics into the field of project management and introducing a new ontological notation system, we deliver the project track and trace ontology. © 2007 IEEE.
Hussain, O.K., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'Ascertaining risk in financial terms in digital business ecosystem environments', Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, pp. 296-301.
View/Download from: Publisher's site
In a digital business ecosystem environment the trusting agent by analysing beforehand the possible risk in interacting with a probable trusted agent, can make a better decision of its future course of interaction with it. A possible outcome of Risk is the loss to trusting agent's resources involved in the interaction. In a financial interaction, the possible loss that may be incurred is usually the monetary loss in the resources of the trusting agent that are involved in the interaction. In this paper, we propose a methodology by which the trusting agent can determine beforehand the possible Risk in financial terms or the possible loss to its resources as a result of interacting with a probable trusted agent. © 2007 IEEE.
Chang, E. & Hussain, F.K. 2007, 'Editors' page', Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007.
View/Download from: Publisher's site
Hai, D., Hussain, F.K. & Chang, E. 2007, 'Ontology for automated multi-site project management', Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, pp. 352-356.
View/Download from: Publisher's site
One characteristic of multi-site project organizations is that people in the organizations are geographically dispersed and from different cultural background, which challenges the senior management to successfully complete the task of project management. Here we introduce the theory of CCCI Metrics in order to solve the issue. By means of ontology technology, we propose an ontology-based system which is to help the senior management to realize the function of automated project management in multi-site project organization. © 2007 IEEE.
Hussain, F.K., Hussain, O.K. & Chang, E. 2007, 'An overview of the interpretations of trust and reputation', IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, pp. 826-830.
View/Download from: Publisher's site
In this paper we present an overview of the definitions of the terms of trust and reputation from the literature. Trust and reputation have been defined in different ways by the various researchers. As a result of these various definitions of trust and reputation there is a lot of confusion regarding what these terms actually mean. Additionally in the literature there is no work towards collecting all the definitions of trust and reputation. In this paper we discuss and present an overview of the terms of trust and reputation from the literature. © 2007 IEEE.
Hussain, F.K., Chang, E. & Hussain, O.K. 2007, 'State of the art review of the existing PageRank based algorithms for trust computation', Second International Conference on Systems and Networks Communications, ICSNC 2007.
View/Download from: Publisher's site
In this paper we present a state of the art review of PageRank based approaches for trust and reputation computation. We divide the approaches that make use of PageRank method for trust and reputation computation, into six different classes. Each of the six classes is discussed in this paper. © 2007 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Application of Protégé and SPARQL in the field of project knowledge management', Second International Conference on Systems and Networks Communications, ICSNC 2007.
View/Download from: Publisher's site
Protégé is a set of open-source ontology design software developed in Stanford Medical Informatics. SPARQL (Protocol and RDF Query Language) is recommended by W3C, to represent the RDF (Resource Description Framework) graph - a set of triples that consist of a subject, a predicate and an object as the basic expression of data stored in OWL-based knowledge base. In this paper, we propose an ontology-based project knowledge management methodology, by means of Protégé and SPARQL, to solve the issues in project management activities. By introducing a set of new ontology notations, we present the conceptual model of our ontology to realize the function of knowledge management in project organizations. Following that, we realize the prototype in Protégé and validate it by means of SPARQL. Finally we make comments on our project and plan our future work. © 2007 IEEE.
Dong, H., Hussain, F.K. & Chang, E. 2007, 'Ontology-based digital ecosystem conceptual representation', 3rd International Conference on Autonomic and Autonomous Systems, ICAS'07.
View/Download from: Publisher's site
Along with the evolution of Digital Ecosystem, in regards to its definition, two different theories have emerged, respectively from Soluta.net and from Digital Ecosystem and Business Intelligence Institute. This is paper explains the differences between the two theories and more importantly proposes a ontology-based conceptual representation for the concept of Digital Ecosystem with the purpose of helping researchers in the field to better understand the notion of Digital Ecosystem. In addition, we will introduce a simple ontology notation system, as the basis of our ontology model. © 2007 IEEE.
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Ontological manifestations of trust for service oriented environment', 2006 IEEE interenational cinference on industrial informatics, IEEE interenational cinference on industrial informatics, IEEE, Singapore, pp. 593-598.
View/Download from: UTS OPUS or Publisher's site
Trust and reputation are vital components for trusted e-business. In the literature however there has been no effort in proposing ontology for trust. The trusted agent in service oriented environment may trust a software agent or human agent or a service or a product. Based on this distinction, trust ontology could be proposed for different domains .The trust ontology for the individual domains is proposed and discussed.
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2006, 'Quantifying risk in financial terms in an e-transaction', 2006 IEEE international conference on industrial informatics, International IEEE conference on industrial informatics, IEEE, Singapore, pp. 587-592.
View/Download from: UTS OPUS or Publisher's site
An outcome of risk is the possible loss that could incur in an interaction. In a peer-to-peer financial interaction, the possible loss that could incur is usually the financial loss in the resources of the trusting agent that are involved in the interaction. Hence, a consideration for the trusting agent to analyze the risk in interacting with any probable trusted agent in order to decide whether to interact with it or not, is to determine the potential loss in its resources that may occur. In this paper, we will propose a methodology by which the trusting agent can determine beforehand the possible loss that could be incurred to it as a result of interacting with a probable trusted agent.
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2006, 'A Fuzzy Approach to Risk Based Decision Making', Lecture Notes in Computer Science 4278 - On the Move to Meaningful Internet Systems 2006: OTM 2006 W Part II, On the Move to Meaningful Internet Systems Workshops, Springer-Verlag Berlin Heidelberg, Montpellier, France, pp. 1765-1775.
View/Download from: UTS OPUS or Publisher's site
Decision making is a tough process. It involves dealing with a lot of uncertainty and projecting what the final outcome might be. Depending on the projection of the uncertain outcome, a decision has to be taken. In a peer-to-peer financial interaction, the trusting agent in order to analyze the Risk has to consider the possible likelihood of failure of the interaction and the possible consequences of failure to its resources involved in the interaction before concluding whether to interact with the probable trusted agent or not. Further it might also have to choose and decide on an agent to interact with from a set of probable trusted agents. In this paper we propose a Fuzzy Risk based decision making system that would assist the trusting agent to ease its decision making process.
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2006, 'A Methodology For Determining The Creditability Of Recommending Agents', Knowledge-based Intelligent Information And Engineering Systems, Pt 3, Proceedings, International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer-verlag Berlin, Bournemouth, ENGLAND, pp. 1119-1127.
The trusting agent in order to analyze the Risk that could be present in its future interaction with a trusted agent might solicit for its recommendations from other agents. Based on the recommendations achieved the trusting agent can decide whether to i
Hussain, F.K., Sidhu, A., Dillon, T.S. & Chang, E. 2006, 'Engineering Trustworthy Ontologies: Case Study Of Protein Ontology', 19th IEEE International Symposium On Computer-based Medical Systems, Proceedings, IEEE Symposium on Computer-Based Medical Systems, IEEE Computer Soc, Salt Lake City, UT, pp. 617-620.
View/Download from: Publisher's site
Biomedical Ontologies are huge. It is not possible for any one person to manage and engineer a complete ontology. They would need the help of Research Assistants and other people to develop and maintain the ontology. In the process of developing and main
Hussain, F.K., Chang, E. & Dillon, T.S. 2012, 'Trust Ontology For Service-oriented Environment', 2006 IEEE International Conference On Computer Systems And Applications, Vols 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 320-325.
View/Download from: UTS OPUS or Publisher's site
Trust and Reputation are vital components for trusted e-business. In the literature however there has been no effort in proposing ontology for trust. The trusted agent in service oriented environment may trust a software agent or human agent or a service
Hussain, O., Chang, E., Hussain, F.K., Dillon, T.S. & Soh, B. 2006, 'Predicting The Dynamic Nature Of Risk', 2006 IEEE International Conference On Computer Systems And Applications, Vols 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 500-507.
View/Download from: UTS OPUS or Publisher's site
The trusting peer in order to determine the likelihood of the loss in its resources might analyze the Risk before engaging in an interaction with any trusted peer. This likelihood of the loss in the resources is termed as Risk in the interaction. Risk an
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Trust Relationships And Reputation Relationships For Service Oriented Environments', 2006 IEEE International Conference On Computer Systems And Applications, Vols 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 508-510.
View/Download from: UTS OPUS or Publisher's site
Trust and Reputation are vital components for trusted e-business. In this paper, we propose a definition of trust relationship. Additionally we discuss in depth about the concept of trust relationship. A definition for reputation relationship is proposed
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Reputation Relationship And Its Inner Relationships For Service Oriented Environments', 2006 IEEE International Conference On Computer Systems And Applications, Vols 1-3, IEEE/ACS International Conference on Computer Systems and Applications, IEEE, Sharjah, UAE, pp. 641-646.
View/Download from: UTS OPUS or Publisher's site
Trust and Reputation are vital components for trusted e-business. In this paper, we propose a definition of trust relationship. Additionally we discuss in depth about the concept of trust relationship. A definition for reputation relationship is proposed
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Trustworthiness Measurement Methodology For E-business', Advances In Web Intelligence And Data Mining, International Atlantic Web Intelligence Conference, Springer-verlag Berlin, Beer Sheva, ISRAEL, pp. 21-30.
The purpose of the Trustworthiness Measure is to (a) to determine the quality of the Trusted Agents and (b) once the trusting agent has determined and recorded the trustworthiness of the trusted agent or the quality of the trusted agent, the trusting age
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Quantification Of The Effectiveness Of The Markov Model For Trustworthiness Prediction', Computational Intelligence, Theory And Application, International Conference on Dortmund Fuzzy Days, Springer-verlag Berlin, Dortmund, GERMANY, pp. 191-200.
View/Download from: Publisher's site
In this paper we propose a method for determining the effectiveness of the Markov Model for predicting the future trustworthiness value of a given agent by utilizing simulation methods. This paper presents in detail the simulation method that we employed
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2006, 'A Methodology For Risk Based Decision Making In A Service Oriented Environment', IEEE International Conference On Sensor Networks, Ubiquitous, And Trustworthy Computing, Vol 1, Proceedings, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE Computer Soc, Tai Chung, TAIWAN, pp. 506-513.
Decision making is a complex process. It involves in dealing with a lot of uncertainty and projecting in mind what the final outcome might be at the end. Based on the Projection of the final outcome a decision is taken. Decision making in a peer-to-peer
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2006, 'Towards Ascertaining Risk In Digital Business Ecosystem Interactions', 2006 Innovations In Information Technology, Innovations in Information Technology Conference, IEEE, Dubai, U ARAB EMIRATES, pp. 227-231.
In digital business ecosystem architecture, it is rational for the trusting agent to analyse the possible risk in interacting with a probable trusted agent beforehand. Doing so would assist the trusting agent in its decision process. The possible risk in
Hussain, O., Chang, E., Hussain, F.K., Dillon, T.S. & Soh, B. 2006, 'Context And Time Dependent Risk Based Decision Making', 20th International Conference On Advanced Information Networking And Applications, Vol 1, Proceedings, International Conference on Advanced Information Networking and Applications, IEEE, Vienna, AUSTRIA, pp. 585-590.
As there is a lack of central management in an e-commerce interaction carried out based on peer-to-peer architecture, it is obvious for the trusting peer to analyze the Risk beforehand that could be involved in dealing with a trusted peer in these types
Chang, E., Hussain, F.K. & Dillon, T. 2006, 'Reputation ontology for reputation systems', On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, pp. 1724-1733.
Sidhu, A.S., Dillon, T.S., Hussain, F.K., Chang, E. & SOC, I.C. 2006, 'Accomplishments and challenges of protein ontology', 30th Annual International Computer Software and Applications Conference, Vol 1, Regular Papers/Panels, Proceedings, pp. 71-76.
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Comparative analysis of trust and security', 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2006, pp. 1019-1023.
View/Download from: Publisher's site
In the literature, there is a lot of confusion regarding the relationship between the 'trust' and 'security'. Most of the times, these terms are regarded as being synonymous with each other. The existing literature does not draw a clear line how and when the terms of 'trust' and 'security' are synonymous and when they are not synonymous. In this paper we address this issue and discuss when the distinct terms of 'trust' and 'security' can be regarded as being synonymous with each other and when they could be regarded as not being synonymous with each other. © 2006 IEEE.
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Trust issues in service oriented environment', 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2006, pp. 790-793.
View/Download from: Publisher's site
Service Oriented Environment (SOE) is new paradigm for carrying out business activities on the internet. In this paper I give an introduction to the concept of service oriented environment and discuss the different activities carried out in the SOE and different entities involved in SOE. The issues related to trust in service oriented environment and proposed and explained. © 2006 IEEE.
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Defining reputation in service oriented environment', Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, AICT/ICIW'06, p. 177.
View/Download from: Publisher's site
Reputation has a profound impact on the Trusting Agent and Trusted Agent in business interactions. Moral, ethical and legal guidelines are implemented as a result of the promotion of fair trading practices, honesty from all parties, consumer protection legislation, service quality assessment, and assurance for customers, e-businesses and service-oriented environments. In this paper we propose a definition of reputation that is more suited to service oriented environments. Additionally we explain in detail, all the terms in the definition. © 2006 IEEE.
Hussain, O.K., Chang, E., Hussain, F.K., Dillon, T.S. & Soh, B. 2006, 'Context and time based riskiness assessment for decision making', Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, AICT/ICIW'06, p. 104.
View/Download from: Publisher's site
In an e-commerce interaction carried out in a Peer-to-Peer environment it is rational for the trusting peer to analyze the Risk that could be involved in dealing with a trusted peer as there is a lack of central management in these type of interactions. Risk analysis can be done by assimilating recommendations from other peers if there is no previous interaction history between the trusting peer and the trusted peer. But the assimilated recommendations might be according to the criteria of the recommending peer with the trusted peer, and it is not necessary for the trusting peer to have the same criteria in its interaction with the trusted peer as that of the recommending peer even thought it is interacting in the same context. Further it might interact in a different time as that of the recommending peer. The Risk that was present in a particular context and at a particular time might not be the same at a different time. Hence in this paper we discuss the process of the trusting peer assimilating the recommendations from the recommending peers according to the context, criteria and time of its interaction in order to determine the Riskiness value of the trusted peer, which would help it considerably in decision making. © 2006 IEEE.
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Quantification of the effectiveness of the Markov model for trustworthiness prediction', Advances in Soft Computing, pp. 191-200.
In this paper we propose a method for determining the effectiveness of the Markov Model for predicting the future trustworthiness value of a given agent by utilizing simulation methods. This paper presents in detail the simulation method that we employed in order to determine the effectiveness of the Markov Model. Additionally the paper presents the results that we obtained form the simulation experiments.
Hussain, F.K., Chang, E. & Dillon, T. 2006, 'Defining trustworthiness in service oriented environment', Proceedings - 2006 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2006, pp. 3616-3621.
View/Download from: Publisher's site
© 2006 IEEE.In the existing literature we note that there has been no effort in proposing a definition of trustworthiness. In this paper, we propose a definition of trustworthiness with focus on service oriented environments. In addition, we propose and discuss in detail the various factors which can affect the trustworthiness assigned by the trusting agent to the trusted agent.
Hussain, F.K., Chang, E. & Dillon, T.S. 2006, 'Aspects influencing trustworthiness in service oriented environments', ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops.
View/Download from: Publisher's site
© 2006 IEEE.Transactions have moved away from faceto- face encounters to more being on the Internet. The infrastructure for the business and information exchange activities could be client-server, peer-To-peer (P2P), or mobile networks. In this paper we refer to 'peer' as an entity involved in a transaction. Trust between two interacting peers involved in an electronic transaction is a major issue that needs to be addressed in order to make the internet a safe medium for carrying out transactions. In this paper, we propose the aspects that can influence the trustworthiness assigned to the trusted peer. Furthermore we catalogue these factors into three classes and discuss the relationship between these factors.
Chang, E., Thomson, P., Dillon, T.S. & Hussain, F.K. 2005, 'The fuzzy and dynamic nature of trust', Lecture Notes in Computer Science: Trust, Privacy, And Security In Digital Business, International Conference on Trust, Privacy and Security in Digital Business, Springer-Verlag Berlin, Copenhagen, Denmark, pp. 161-174.
View/Download from: UTS OPUS or Publisher's site
Trust is one of the most fuzzy, dynamic and complex concepts in both social and business relationships. The difficulty in measuring Trust and predicting Trustworthiness in service-oriented network environments leads to many questions. These include issue
Hussain, O., Chang, E., Soh, B., Hussain, F.K. & Dillon, T.S. 2005, 'Factors of Risk Variance in Decentralized Communications', EICAR 2005 Conference Best Paper Proceedings, European Institute for Computer Anti-Virus Research EICAR Conference, Computer Associates, Saint Julians, Malta, pp. 129-137.
View/Download from: UTS OPUS
Decentralized transactions are increasingly becoming popular. These transactions resemble the early forms of the internet and in many ways are regarded as the next generation of the internet. The result will be that this e-commerce transactions approach will shift to peer-to-peer communications rather than client-server environment. However, these peer-to-peer communications or decentralized transactions suffer from some disadvantages, which includes the risk associated with each transaction. This paper focuses on the factors that influence Risk in a decentralized transaction.
Hussain, O., Chang, E., Soh, B. & Dillon, T.S. 2005, 'Risk in Trusted Decentralised Communications', Proceedings of the International Workshop on Privacy Data Management - PDM 2005, International Conference on Data Engineering, IEEE, Tokyo, Japan, pp. 63-67.
View/Download from: UTS OPUS or Publisher's site
Risk is associated with almost every activity that is undertaken on a daily life. Risk associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environments, networks, partnerships, etc. Generally speaking, risk signifies the likelihood of financial losses, human casualties, business destruction and environmental damages. Risk indicator gives early warning to the party involved and helps avoid deserters. Until now, risk has been discussed extensively in the areas of investment, finance, health, environment, daily life activities and engineering. However, there is no systematic study of risk in Decentralised communication, which involves e-business, computer networks and service oriented environment. In this paper, we define risk associated with trusted communication in e-business and e-transactions; provide risk indicator calculations and basic application areas.
Hussain, F.K., Chang, E. & Dillon, T.S. 2005, 'Formalizing a grammar for reputation in peer-to-peer communication', MoMM 2005 Proceedings, International Conference on Advances in Mobile Computing and Multimedia, Australian Computer Society, Kuala Lumpur, Malaysia, pp. 81-96.
View/Download from: UTS OPUS
Chang, E., Dillon, T.S. & Hussain, F.K. 2005, 'Trust and Reputation Relationships in Service-Oriented Environments', Proceedings of Third International Conference On Information Technology And Applications, Vol 1, International Conference on Information Technology and Applications, IEEE Computer Society, Sydney, Australia, pp. 4-14.
View/Download from: UTS OPUS or Publisher's site
Trust and trustworthiness plays a major role in conducting business on the Internet in service-oriented environments. In defining trust for service-oriented environments, one needs to capture the notation of service level, service agreement, context and timeslots. The same applies for reputation which is the opinion of the third party agents which is used in determining the trust and trustworthiness. Because of the complexity of the issues, and the fact that the trust and reputation are essentially concerns with the relationships, it is important to clearly define the notion of the trust relationships and notion of the reputation relationships. In this paper, therefore, we clear these definitions and we introduce a graphical notation for representing these relationships.
Chang, E., Hussain, F.K. & Dillon, T.S. 2005, 'CCCI Metrics for the Measurement of Quality of e-Service', Proceedings of the 2005 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IEEE CS Press, Campiegne, France, pp. 603-610.
View/Download from: UTS OPUS or Publisher's site
The growing development in web-based trust and reputation systems in the 21st century will have powerful social and economic impact on all business entities, and will make transparent quality assessment and customer assurance realities in the distributed web-based service oriented environments. The growth in web-based trust and reputation systems will be the foundation for web intelligence in the future. Trust and Reputation systems help capture business intelligence through establishing customer relationships, learning consumer behaviour, capturing market reaction on products and services, disseminating customer feedback, buyers opinions and end-user recommendations, and revealing dishonest services, unfair trading, biased assessment, discriminatory actions, fraudulent behaviours, and un-true advertising. The continuing development of these technologies will help in the improvement of professional business behaviour, sales, reputation of sellers, providers, products and services. In this paper, we present a new methodology known as CCCI (Correlation, Commitment, Clarity, and Influence) for trustworthiness measure that is used in the Trust and Reputation System. The methodology is based on determining the correlation between the originally committed services and the services actually delivered by a Trusted Agent in a business interaction over the service oriented networks to determine the trustworthiness of the Trusted Agent.
Hussain, O., Chang, E., Hussain, F.K., Dillon, T.S. & Soh, B. 2005, 'Context based riskiness assessment', Tencon 2005 - 2005 IEEE Region 10, IEEE Tencon (IEEE Region 10 Conference), IEEE, Melbourne, Aust, pp. 1-6.
View/Download from: UTS OPUS
In almost every interaction the trusting peer might fear about the likelihood of the loss in the resources involved during the transaction. This likelihood of the loss in the resources is termed as Risk in the transaction. Hence analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. If a trusting peer is unfamiliar with a trusted peer and has not interacted with it before in a specific context, then it will ask for recommendations from other peer in order to determine the trusted peer?s Riskiness value or reputation. In this paper we discuss the process of asking recommendations from other peers in a specific context and assimilating those recommendations according to its criteria of the interaction in order to determine the correct Riskiness value of the trusted peer.
Chang, E., Hussain, F.K. & Dillon, T.S. 2005, 'Reputation ontology for reputation systems', OTM 2005 Workshops Proceedings, The International Conference on Semantic Web and Web Services, Springer, New York, USA, pp. 957-966.
View/Download from: UTS OPUS or Publisher's site
The growing development of web-based reputation systems in the 21st century will have a powerful social and economic impact on both business entities and individual customers, because it makes transparent quality assessment on products and services to achieve customer assurance in the distributed web-based Reputation Systems. The web-based reputation systems will be the foundation for web intelligence in the future. Trust and Reputation help capture business intelligence through establishing customer trust relationships, learning consumer behavior, capturing market reaction on products and services, disseminating customer feedback, buyers opinions and end-user recommendations. It also reveals dishonest services, unfair trading, biased assessment, discriminatory actions, fraudulent behaviors, and un-true advertising. The continuing development of these technologies will help in the improvement of professional business behavior, sales, reputation of sellers, providers, products and services. Given the importance of reputation in this paper, we propose ontology for reputation. In the business world we can consider the reputation of a product or the reputation of a service or the reputation of an agent. In this paper we propose ontology for these entities that can help us unravel the components and conceptualize the components of reputation of each of the entities.
Hussain, O., Chang, E., Hussain, F.K., Dillon, T.S. & Soh, B. 2005, 'A Methodology for Determining Riskiness in Peer-to-Peer Communications', Proceedings of the IEEE International Conference of Industrial Informatics (INDIN 05), INDIN, IEEE, Perth, Australia, pp. 421-432.
View/Download from: UTS OPUS
Every activity has some Risk involved in it. Analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. Similarly in Peer-to-Peer communication analyzing the Risk involved in undertaking a transaction with another peer too is important. It would be much easier for the trusting peer to make a decision of proceeding a transaction with the trusted peer if he knows the Risk that the trusted peer is worthy of. In this paper develop and propose such a methodology which allows the trusting peer to rate the trusted peer in terns of Risk that he deserves after the transaction is over.
Chang, E., Hussain, F.K. & Dillon, T.S. 2005, 'Trustworthiness Measure for e-Service', Proceedings of Third Annual Conference on Privacy, Security and Trust (PST 2005), Annual Conference on Privacy, Security and Trust, University of New Brunswick, St Andrews, Canada, pp. 1-14.
View/Download from: UTS OPUS
Traditionally, transactions were carried out face-toface, now, they are carried out over the Internet. The infrastructure for the above business and information exchange could be client-server, peer-to-peer or mobile network environments, and very often users on the network carry out interactions in one of three forms: Anonymous (No names are identified in the communication) Pseudo-anonymous (Nicknames are used in the communication) Non-anonymous (Real names are used in the communication) Incapability or a fraudulent practice could occur when the seller or business provider or buyer (the agents on the network) does not behave in the manner that is mutually agreed or understood, especially if published terms and conditions exist. This paper evaluates currently existing trustworthiness systems and points out that currently there is no existing standardized measurement system for Quality of Service and outlines the methodology that we have developed for this.
Chang, E., Hussain, F.K. & Dillon, T.S. 2005, 'Fuzzy nature of trust and dynamic trust modeling in service oriented environments', Proceedings of the ACM workshop on secure web services, ACM Workshop on Secure Web Services, ACM Press, Fairfax, USA, pp. 1-10.
View/Download from: UTS OPUS or Publisher's site
In this paper, we propose and describe the six characteristics of trust. Based on the six proposed characteristics, we determine why trust is fuzzy. The term 'fuzzy' in this paper not in the sense of the precise definitions given in the Fuzzy Systems literature but to indicate a certain vagueness, complexity or ill-definition and qualitative characterization rather than quantitative representation and dynamic.We then determine why due to the six characteristics of trust, trust is dynamic. We then propose a modeling language tool to model the fuzzy and dynamic nature of trust.
Chang, E., Hussain, F.K. & Dillon, T.S. 2005, 'Towards Defining An Ontology For Reputation', International Conference On Systems, Man And Cybernetics, Vol 1-4, Proceedings, IEEE International Conference on Systems, Man and Cybernetics, IEEE, Waikoloa, HI, pp. 2601-2607.
The growing development of web based trust and reputation systems in the 21(st) century will have powerful social and economic impact on all business entities, and will make transparent the quality assessment and customer assurance realities in the distr
Hussain, F.K., Chang, E. & Dillon, T.S. 2005, 'Markov Model For Modelling And Managing Dynamic Trust', 2005 3rd IEEE International Conference On Industrial Informatics (INDIN), IEEE International Conference On Industrial Informatics, IEEE, Perth, Australia, pp. 725-733.
View/Download from: UTS OPUS or Publisher's site
In this paper we propose a trust model for decision making that models both the context specific and the dynamic nature of trust. We propose to make use of the Markov Model for modelling the context specific and the dynamic nature of trust. Using the Mar
Hussain, O.K., Chang, E., Hussain, F.K., Dillon, T.S., Soh, B. & IEEE 2005, 'A methodology for determining riskiness in peer-to-peer communications', 2005 3rd IEEE International Conference on Industrial Informatics (INDIN), pp. 655-666.
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Taxonomy of Trust Relationships in Peer-Peer (P2P) Communication', Proceedings of the Second International Workshop on Security in Information Systems WOSIS-2004, International Workshop on Security in Information Systems, INSTICC: Press, Institute for Systems and Technologies of Information, Control and Communication, Portugal, pp. 99-103.
View/Download from: UTS OPUS
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Classification of Reputation in Peer-to-Peer communication', Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications Vol III, International Conference on Parallel and Distributed Processing Techniques and Applications, CSREA Press, Nevada, USA, pp. 1429-1436.
Hussain, F.K. & Dillon, T.S. 2004, 'Reputation in Peer-to-Peer communication', Proceedings of the International Conference on Internet Computing IC04 Vol 1, International Conference on Internet Computing, CSREA Press, Nevada, USA, pp. 269-271.
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Peer to peer (P2P) trust modeling', International Conference on Communication and Broadband Networking (ICBN'04), International Conference on Communication and Broadband Networking (ICBN'04), ICBN'04, Kobe, Japan, pp. 1-18.
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Factors of trust that influence trust worthiness in peer-to-peer (P2P) based e-commerce', BAI 2004 International Workshop on Business and Information, International Workshop on Business and Information, Academy of Taiwan information system research, Taipei, Taiwan, pp. 1-10.
View/Download from: UTS OPUS
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Repute Relationships for Reputation Management in Peer-to-Peer Communication', 2004 International Conference on Security and Management - SAM 04 Proceedings, International Conference on Security and Management, CSREA, Las Vegas, Nevada, USA, pp. 147-153.
View/Download from: UTS OPUS
Dillon, T.S., Chang, E. & Hussain, F.K. 2004, 'A framework for a trusted environment for virtual collaboration', Advances In Web-Age Information Management: Proceedings of WAIM 2004, International Conference on Web-Age Information Management, Springer-Verlag Berlin, Dalian, China, pp. 1-12.
View/Download from: UTS OPUS or Publisher's site
Trusted computing has assumed major significance since the advent of internet based commerce and peer to peer communications. Trust is the belief that a peer has another peer in a given context. This paper addresses both identity trust which establishes the identity of another party and behaviour trust which answers the question rsquoDo you believe that the entity will behave as you expect it to?rsquo It develops complete definitions of context and time dependant trust and reputation and develops trust models, trust relationships of a peer.
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Repute Relationships For Reputation Management In Peer-to-peer Communication - Ii', Icwn'04 & Pcc'04, Vols, 1 And 2, Proceedings, International Conference on Wireless Networks/International Conference on Pervasive Computing and Communications, C S R E A Press, Las Vegas, NV, pp. 793-798.
Trust between two communicating peers is increasingly catching the attention of the research community. Several trust models and trust management protocols have been proposed to assist the task of establishing trust between two communicating peers. Allt
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Classification Of Reputation In Peer-to-peer (p2p) Communication', Pdpta '04: Proceedings Of The International Conference On Parallel And Distributed Processing Techniques And Applications, Vols 1-3, International Conference on Parallel and Distributed Processing Techniques and Applications, C S R E A Press, Las Vegas, NV, pp. 1429-1435.
Trust between communicating peers is increasingly catching the attention of the research community. Several trust models and trust management protocols have been proposed to assist the task of establishing trust between communicating peers, all of which
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Repute Relationships For Reputation Management In Peer-to-peer Communication - I', Sam '04: Proceedings Of The International Conference On Security And Management, International Conference on Security and Management, C S R E A Press, Las Vegas, NV, pp. 147-153.
Trust between two communicating peers is increasingly catching the attention of the research community. Several trust models and trust management protocols have been proposed to assist the task of establishing trust between two communicating peers. Allt

Journal articles

Sun, L., Ma, J., Zhang, Y., Dong, H. & Hussain, F.K. 2016, 'Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection', Future Generation Computer Systems, vol. 57, pp. 42-55.
View/Download from: Publisher's site
© 2015 Elsevier B.V. All rights reserved.With the rapidly growing number of available Cloud services, to fulfill the need for ordinary users to select accurate services has become a significant challenge. However, as a Cloud service environment encompasses many uncertainties that may hinder users to make sound decisions, it is highly desirable to handle fuzzy information when choosing a suitable service in an uncertain environment. In this paper, we present a novel fuzzy decision-making framework that improves the existing Cloud service selection techniques. In particular, we build a fuzzy ontology to model uncertain relationships between objects in databases for service matching, and present a novel analytic hierarchy process approach to calculate the semantic similarity between concepts. We also present a multi-criteria decision-making technique to rank Cloud services. Furthermore, we conduct extensive experiments to evaluate the performance of the fuzzy ontology-based similarity matching. The experimental results show the efficiency of the proposed method.
Hussain, W., Hussain, F.K., Hussain Omar K & Chang E 2016, 'Provider-Based Optimized Personalized Viable SLA (OPV-SLA) Framework to Prevent SLA Violation', The Computer Journal, vol. 59, no. 12, pp. 1760-1783.
View/Download from: UTS OPUS or Publisher's site
Service level agreement (SLA) is an essential agreement formed between a consumer and a provider in business activities. The SLA defines the business terms, objectives, obligations and commitment of both parties to a business activity, and in cloud computing it also defines a consumer's request for both fixed and variable resources, due to the elastic and dynamic nature of the cloud-computing environment. Providers need to thoroughly analyze such variability when forming SLAs to ensure they commit to the agreements with consumers and at the same time make the best use of available resources and obtain maximum returns. They can achieve this by entering into viable SLAs with consumers. A consumer's profile becomes a key element in determining the consumer's reliability, as a consumer who has previous service violation history is more likely to violate future service agreements; hence, a provider can avoid forming SLAs with such consumers. In this paper, we propose a novel optimal SLA formation architecture from the provider's perspective, enabling the provider to consider a consumer's reliability in committing to the SLA. We classify existing consumers into three categories based on their reliability or trustworthiness value and use that knowledge to ascertain whether to accept a consumer request for resource allocation, and then to determine the extent of the allocation. Our proposed architecture helps the service provider to monitor the behavior of service consumers in the post-interaction time phase and to use that information to form viable SLAs in the pre-interaction time phase to minimize service violations and penalties.
Dong, H. & Hussain, F.K. 2015, 'Service-requester-centered service selection and ranking model for digital transportation ecosystems', Computing, vol. 97, no. 1, pp. 79-102.
View/Download from: Publisher's site
Transport services are a fundamental utility that drives human society. A Digital Transportation Ecosystem is a sub-system of the Digital Ecosystem, which uses ICT resources to facilitate transport service transactions. This research focuses on the selection and ranking of online transport service information. The previous research in this area has been unable to achieve satisfactory performance or give sufficient freedom to service requesters to rank services based on their preferences. `User-centered design is a broad term to describe how end-users influence system design. In this research, we propose a Service-Requester-Centered Service Selection and Ranking Model, guided by the philosophy of user-centered design. Three major sub-models are involved in this model: a model for assisting service requesters to search appropriate transport service ontology concepts to denote their service requests, a model for enhancing the accuracy of automatic transport service concept recommendation by observing service requesters click behaviours, and a model for enabling service-requester-preference-based service ranking. Implementations and empirical experiments are conducted to evaluate the three sub-models and the drawn conclusions along with directions for future work are outlined.
Huassain, O.K., Rahman, Z.U., Hussain, F.K., Singh, J., Janjua, N.K. & Chang, E. 2015, 'A User-Based Early Warning Service Management Framework in Cloud Computing', Computer Journal, vol. 58, no. 3, pp. 472-796.
View/Download from: Publisher's site
Cloud computing is a very attractive option for service users and service providers for their businesses because of the benefits it provides. A major concern among service users regarding cloud adoption, however, is the unpredictability of performance in relation to the services provided. Even though guarantees in the form of service-level agreements are provided to users by service providers, real-time service-level degradability remains a critical concern; hence, there is a need for an approach that assists users to manage a service before it fails. The approaches proposed in the literature assess and evaluate the performance of the cloud infrastructure of providers, but this does not guarantee that a given service instance will meet the desired quality level because there may be factors other than the provider's infrastructure that will affect the level of quality of the service instance. In this paper, we present an approach that measures the quality of a service instance in real time and provides important analysis for service users as to whether they will achieve their desired objectives. This analysis also constitutes an important input for service users in the assessment and management of a service to avoid the failure to achieve objectives.
Ramezani, F., Lu, J., Taheri, J. & Hussain, F.K. 2015, 'Evolutionary algorithm-based multi-objective task scheduling optimization model in cloud environments', WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, vol. 18, no. 6, pp. 1737-1757.
View/Download from: UTS OPUS or Publisher's site
Ashraf, J., Chang, E., Hussain, O.K. & Hussain, F.K. 2015, 'Ontology usage analysis in the ontology lifecycle: A state-of-the-art review', KNOWLEDGE-BASED SYSTEMS, vol. 80, pp. 34-47.
View/Download from: Publisher's site
Azadeh, A., Zia, N.P., Saberi, M., Hussain, F.K., Yoon, J.H., Hussain, O.K. & Sadri, S. 2015, 'A trust-based performance measurement modeling using t-norm and t-conorm operators', APPLIED SOFT COMPUTING, vol. 30, pp. 491-500.
View/Download from: Publisher's site
Fan, H., Hussain, F.K. & Hussain, O.K. 2015, 'Semantic client-side approach for web personalization of SaaS-based cloud services', CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, vol. 27, no. 8, pp. 2144-2169.
View/Download from: Publisher's site
Hussain, F.K. 2015, 'Special issue on intelligent e-services', CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, vol. 27, no. 4, pp. 763-764.
View/Download from: Publisher's site
Fan, H., Hussain, F.K., Younas, M. & Hussain, O.K. 2015, 'An integrated personalization framework for SaaS-based cloud services', Future Generation Computer Systems, vol. 53, pp. 157-173.
View/Download from: Publisher's site
© 2015 Elsevier B.V. Software as a Service (SaaS) has recently emerged as one of the most popular service delivery models in cloud computing. The number of SaaS services and their users is continuously increasing and new SaaS service providers emerge on a regular basis. As users are exposed to a wide range of SaaS services, they may soon become more demanding when receiving/consuming such services. Similar to the web and/or mobile applications, personalization can play a critical role in modern SaaS-based cloud services. This paper introduces a fully designed, cloud-enabled personalization framework to facilitate the collection of preferences and the delivery of corresponding SaaS services. The approach we adapt in the design and development of the proposed framework is to synthesize various models and techniques in a novel way. The objective is to provide an integrated and structured environment wherein SaaS services can be provisioned with enhanced personalization quality and performance.
Rehman, Z.U., Hussain, O.K. & Hussain, F.K. 2015, 'User-side cloud service management: State-of-the-art and future directions', Journal of Network and Computer Applications, vol. 55, pp. 108-122.
View/Download from: Publisher's site
© 2015 Elsevier Ltd.Abstract Cloud computing is increasing in usage because of its technical and financial advantages over traditional computing paradigms and also because of the availability of an expanding number of cloud services offered by new service providers. Consistent with its growth, there has been wide research interest in the literature that focuses on increasing cloud adoption. However, the current commercial and research-oriented cloud computing research in the literature mainly deals with functionalities closer to cloud infrastructure, such as improved performance and the management of virtualized resources, as well as fundamental issues related to efficient resource utilization, such as virtual machine (VM) migrations and server consolidation. While on the one hand, such features are very important, on the other hand, other important features, such as cloud quality of service management which is important for the cloud environment to move from a basic cloud service infrastructure to a broader cloud service ecosystem, have not received the required due attention. In cloud service management, a cloud service user has several choices for service selection and the quest to achieve interoperability and compatibility in cloud computing will consequently enable the user to easily migrate between service providers. In this scenario, the user needs to make important cloud service management decisions based on QoS, in addition to other criteria such as usage cost. These issues, when considered from a user's perspective, are quite different from cloud infrastructure management issues envisioned from a cloud provider's perspective. There are several challenges in cloud service management from a user's perspective, which the current cloud service management platforms in the literature do not address. To address this drawback, this paper presents a comprehensive state-of-the-art discussion on the existing approaches to cloud service management, critically evalu...
ur Rehman, Z., Hussain, O.K., Hussain, F.K., Chang, E. & Dillon, T. 2015, 'User-side QoS forecasting and management of cloud services', World Wide Web, vol. 18, no. 6, pp. 1677-1716.
View/Download from: Publisher's site
© 2015, Springer Science+Business Media New York.Cloud computing is a new computing paradigm in which virtualized hardware and software resources are provided to the users over the Internet as services with pay-as-you-go like pricing mechanisms. This enables the cloud users to fulfil their IT requirements by using virtualized computing resources, located at a cloud service provider, as cloud services over the Internet instead of establishing an in-house computing infrastructure of their own. This is beneficial for the users as they only have to pay for the resources which they are actually using rather than paying for the entire cost of hardware and software, as is the case in other computing paradigms. However, to ensure that users' achieve their required outcomes, monitoring and managing the QoS of the cloud service they are receiving is a very important aspect. This is different from monitoring and managing the QoS of the cloud service at the platform side which is done by service providers. In this paper, we propose and demonstrate the working of an approach that enables users to forecast and appropriately manage the cloud service based on the QoS they are receiving at their end.
Ashraf, J., Hussain, O.K. & Hussain, F.K. 2014, 'Making sense from Big RDF Data: OUSAF for measuring ontology usage', Software: Practice and Experience.
View/Download from: Publisher's site
Ashraf, J., Hussain, O. & Hussain, F.K. 2014, 'Empirical analysis of domain ontology usage on the Web: eCommerce domain in focus', Concurrency and Computation: Practice and Experience, vol. 26, no. 5, pp. 1157-1184.
View/Download from: Publisher's site
In the recent past, there has been an exponential growth in Resource Description Framework data on the web known as web of data. The emergence of the web of data is transforming the existing web from a document-sharing medium to a decentralized knowledge platform for publishing and sharing information between humans and computers. To enable common understanding between different users, domain ontologies are being developed and deployed to annotate information on the web. This semantically annotated information is then accessed by machines to extract and aggregate information, on the basis of the underlying ontologies used. To effectively and efficiently access data on the web, insight into the usage of ontology is pivotal, because this assists users in experiencing the benefits offered by the Semantic Web. However, such an approach has not been proposed in the literature. In this paper, we present a pragmatic approach to the analysis of domain ontology usage on the web. We propose metrics to measure the use of domain ontology constructs on the web from different aspects. To comprehensively understand the usage patterns of conceptual knowledge, instance data, and ontology co-usability, we considered GoodRelations ontology as the domain ontology and built a dataset by collecting structured data from 211 web-based data sources that have published information using the domain ontology. The dataset is analyzed by using the proposed metrics and observations along with their usability and applicability to the different users of the Semantic Web. Copyright © 2013 John Wiley & Sons, Ltd.
Ramezani, F., Lu, J. & Hussain, F.K. 2014, 'Task-Based System Load Balancing in Cloud Computing Using Particle Swarm Optimization', International Journal of Parallel Programming, vol. 42, pp. 1-12.
View/Download from: UTS OPUS or Publisher's site
Live virtual machine (VM) migration is a technique for achieving system load balancing in a cloud environment by transferring an active VM from one physical host to another. This technique has been proposed to reduce the downtime for migrating overloaded VMs, but it is still time- and cost-consuming, and a large amount of memory is involved in the migration process. To overcome these drawbacks, we propose a Task-based System Load Balancing method using Particle Swarm Optimization (TBSLB-PSO) that achieves system load balancing by only transferring extra tasks from an overloaded VM instead of migrating the entire overloaded VM. We also design an optimization model to migrate these extra tasks to the new host VMs by applying Particle Swarm Optimization (PSO). To evaluate the proposed method, we extend the cloud simulator (Cloudsim) package and use PSO as its task scheduling model. The simulation results show that the proposed TBSLB-PSO method significantly reduces the time taken for the load balancing process compared to traditional load balancing approaches. Furthermore, in our proposed approach the overloaded VMs will not be paused during the migration process, and there is no need to use the VM pre-copy process. Therefore, the TBSLB-PSO method will eliminate VM downtime and the risk of losing the last activity performed by a customer, and will increase the Quality of Service (QoS) experienced by cloud customers.
Rehman, Z., Hussain, O.K. & Hussain, F.K. 2014, 'Parallel Cloud Service Selection and Ranking Based on QoS History', International Journal of Parallel Programming, vol. 42, pp. 820-852.
View/Download from: UTS OPUS or Publisher's site
Janjua, N...K..., Hussain, O...K., Hussain, F.K. & Chang, E... 2014, 'Philosophical and Logic-Based Argumentation-Driven Reasoning Approaches and their Realization on the WWW: A Survey', Computer Journal, vol. 57, pp. 1-33.
View/Download from: UTS OPUS or Publisher's site
Hussain, F.K. 2014, 'Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery', IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1616-1626.
View/Download from: Publisher's site
Sun, L.E., Dong, H., Hussain, F.K., Khadeer Husseain, O. & Chang, E. 2014, 'Cloud Service Selection: State-of-the-Art and Future Research Directions', Journal of Network and Computer Applications, vol. 99, no. 1, pp. 1-12.
View/Download from: UTS OPUS or Publisher's site
Hussain, F.K. 2014, 'A Framework for Measuring Ontology Usage on the Web', Computer Journal, vol. 56, no. 9, pp. 1083-1101.
View/Download from: Publisher's site
Demong, N.A.R., Lu, J. & Hussain, F.K. 2014, 'Personalised property investment risk analysis model in the real estate industry', Studies in Computational Intelligence, vol. 502, pp. 369-390.
View/Download from: Publisher's site
Property investment in the real estate industry entails high cost and high risk, but provides high yield for return on investment. Risk factors in the real estate industry are mostly uncertain and change dynamically with the surrounding developments. There are many existing risk analysis tools or techniques that help investors to find better solutions. Most techniques available refer to expert's opinions in ranking and weighting the risk factors. As a result, they create misinterpretation and varying judgments from the experts. In addition, investment purposes differ between investors for both commercial and residential properties. There is therefore a need for personalisation elements to enable investors to interact with the analysis. This chapter presents a personalised risk analysis model that enables investors to analyse the risk of their property investments and make correct decisions. The model has three main components: investor, decision support technologies, and the data. Real world data from the Australian real estate industry is used to validate the proposed model. © 2014 Springer-Verlag Berlin Heidelberg.
Dong, H. & Hussain, F.K. 2013, 'SOF: A Semi-supervised Ontology-learning-based Focused Crawler', Concurrency and Computation: Practice and Experience, vol. 25, no. 12, pp. 1755-1770.
View/Download from: UTS OPUS or Publisher's site
The rapid increase in the volume of data available on the Internet makes it increasingly impractical for a crawler to index the whole Web. Instead, many intelligent crawlers, known as ontology-based semantic focused crawlers, have been designed by making use of Semantic Web technologies for topic-centered Web information crawling. Ontologies, however, have constraints of validity and time, which may influence the performance of the crawlers. Ontology-learning-based focused crawlers are therefore designed to automatically evolve ontologies by integrating ontology learning technologies. Nevertheless, surveys indicate that the existing ontology-learning-based focused crawlers do not have the capability to automatically enrich the content of ontologies, which makes these crawlers unreliable in the open and heterogeneous Web environment. Hence, in this paper, we propose a framework for a novel semi-supervised ontology-learning-based focused (SOF) crawler, the SOF crawler, which embodies a series of schemas for ontology generation and Web information formatting, a semi-supervised ontology learning framework, and a hybrid Web page classification approach aggregated by a group of support vector machine models. A series of tests are implemented to evaluate the technical feasibility of this proposed framework. The conclusion and the future work are summarized in the final section
Dong, H., Hussain, F.K. & Chang, E. 2013, 'Semantic Web Service matchmakers: State of the art and challenges', Concurrency and Computation: Practice and Experience, vol. 25, no. 7, pp. 961-988.
View/Download from: UTS OPUS or Publisher's site
Web services provide a standard means for the interoperable operations between electronic devices in a network. The mission of Web service discovery is to seek an appropriate Web service for a service requester on the basis of the service descriptions in Web service advertisements and the service requesterâs requirements. Nevertheless, the standard language used for encoding service descriptions does not have the capacity to specify the capabilities of a Web service, leading to the problem of ambiguity in the service discovery process. This brings up the vision of SemanticWeb Services and SemanticWeb Service discovery, which make use of the SemanticWeb technologies to enrich the semantics of service descriptions for service discovery. Semantic Web Service matchmakers are the programs or frameworks designed to implement the task of Semantic Web Service discovery and have drawn a significant amount of attention from both academia and industry from the start of this century. In this paper, we conduct a survey of the contemporary Semantic Web Service matchmakers in order to obtain an overview of the state of the art in this research area. We summarize six technical dimensions from the past literature and analyze the typical Semantic Web Service matchmakers mostly developed during the past 4 or 5 years in terms of the six dimensions. By means of this analysis, we gain an understanding of the current research and summarize a series of potential issues to that would provide the foundation for future research in this area. Copyright © 2012 John Wiley & Sons, Ltd
Fazal, A., Hussain, F.K. & Dillon, T.S. 2013, 'An Innovative Approach For Automatically Grading Spelling In Essays Using Rubric-based Scoring', Journal of Computer and System Sciences, vol. 79, no. 7, pp. 1040-1056.
View/Download from: UTS OPUS or Publisher's site
Automated Essay Grading (AEG) is defined as a computer technology that evaluates and scores written prose. A number of AEG systems have been developed since the 1960s and in most of them, an ad-hoc or generalized approach is used to grade spelling even though it is an important element of an essay-scoring rubric. Existing approaches do not therefore give an accurate representation or measure of spelling in essays. According to the rubric-based scoring method used in the National Assessment Program Literacy and Numeracy (NAPLAN) in Australia, spelling is marked in three steps first, by identifying the correct and incorrect words in the essay; second, by categorizing each word based on the difficulty level into one of four classes: Simple, Common, Difficult or Challenging, and counting the number of correct and incorrect words in each category; finally, by using the pre-defined NAPLAN rubric scale to assign the mark. Only a small number of existing AEG systems can be used for rubric-based scoring, and none can be used to grade spelling according to the NAPLAN rubric. In this paper, we address this shortcoming in the existing literature and present an innovative approach to automatically mark spelling using rubric based scoring. We develop two algorithms based on the rules and heuristics of the English language to formulize the rubric for spelling and then implement these algorithms in Java language and perform a series of evaluations of our system using an essay dataset. Our results are very promising, even though it is the first system of this kind.
Rehman, Z., Hussain, F.K. & Hussain, O.K. 2013, 'Frequency-based similarity measure for multimedia recommender systems', Multimedia Systems, vol. 19, no. 2, pp. 95-102.
View/Download from: UTS OPUS or Publisher's site
Personalized recommendation has become a pivotal aspect of online marketing and e-commerce as a means of overcoming the information overload problem. There are several recommendation techniques but collaborative recommendation is the most effective and widely used technique. It relies on either item-based or user-based nearest neighborhood algorithms which utilize some kind of similarity measure to assess the similarity between different users or items for generating the recommendations. In this paper, we present a new similarity measure which is based on rating frequency and compare its performance with the current most commonly used similarity measures. The applicability and use of this similarity measure from the perspective of multimedia content recommendation is presented and discussed
Janjua, N.K., Hussain, F.K. & Hussain, O.K. 2013, 'Semantic information and knowledge integration through argumentative reasoning to support intelligent decision making', Information Systems Frontiers, vol. 15, no. 2, pp. 167-192.
View/Download from: UTS OPUS or Publisher's site
The availability of integrated, high quality information is a pre-requisite for a decision support system (DSS) to aid in the decision-making process. The introduction of semantic web ensures the seamless integration of information derived from diverse sources and transforms the DSS to an adoptable and flexible Semantic Web-DSS (Web-DSS). However, due to the monotonic nature of the layered development of semantic web, it lacks the capability to represent, reason and integrate incomplete and conflicting information. This, in turn, renders an enterprise incapable of knowledge integration; that is, integration of information about a subject that could potentially be incomplete, inconsistent and distributed among different Web-DSS within or across enterprises. In this article, we address the issues of incomplete and inconsistent semantic information and knowledge integration by using argumentation and argumentation schemes. We discuss the Argumentation-enabled Information Integration Web-DSS (Web@IDSS) along with its syntax and semantics for semantic information integration, and devise a methodology for sharing the results of Web@IDSS in Argument Interchange Format (AIF) format. We also discuss Argumentation-enabled Knowledge Integration Web-DSS (Web@KIDSS) for semantic knowledge integration. We provide formal syntax and semantics for the Web@KIDSS, propose a conceptual framework, and describe it in detail. We present the algorithms for knowledge integration and the prototype application for validation of results
Saberi, M., Mirtalaie, M., Hussain, F.K., Azadeh, A., Hussain, O. & Ashjari, B. 2013, 'A granular computing-based approach to credit scoring modeling', Neurocomputing, vol. 122, no. 1, pp. 100-115.
View/Download from: UTS OPUS or Publisher's site
The credit card industry has been growing rapidly and thus huge numbers of consumers' credit data are collected by the credit department of the banks. The credit scoring managers often evaluate the consumer's credit with intuitive experience. However, wi
Ashraf, J., Hussain, O.K. & Hussain, F.K. 2013, 'A Framework for measuring Ontology Usage on the Web', Computer Journal, vol. 56, no. 9, pp. 1083-1101.
View/Download from: Publisher's site
A decade-long conscious effort by the Semantic Web community has resulted in the formation of a decentralized knowledge platform which enables data interoperability at a syntactic and semantic level. For information interoperability, at a syntactic level, RDF provides the standard format for publishing data and RDFS gives structure to the information. For semantic-level interoperability, ontologies are used which allow information dissemination and assimilation among diverse applications and systems; where information is equally accessible and useful to humans and machines. The success of the linked open data project, recognition of explicit semantics (annotated through web ontologies) by search engines and the realized potential advantages of semantic data for publishers have resulted in tremendous growth in the use of web ontologies on the web. In order to promote the adoption of ontologies (to new users), reusability of adopted ontologies, effective and efficient utilization on ontological knowledge and evolving the ontological model, erudite insight on the usage of ontologies is imperative.
Parvin, S., Hussain, F.K., Hussain, O.K., Thein, T. & Park, J.S. 2013, 'Multi-Cyber Framework for Availability Enhancement of Cyber Physical Systems', Computing, vol. 95, no. 10-11, pp. 927-948.
View/Download from: UTS OPUS or Publisher's site
With the rapid growth of wireless communication, the deployment of cyber-physical system (CPS) is increasing day by day. As a cyber physical system involves a tight coupling between the physical and computational components, it is critical to ensure that the system, apart from being secure, is available for both the cyber and physical processes. Traditional methods have generally been employed to defend an infrastructure system against physical threats. However, this does not guarantee that the availability of the system will always be high. In this paper, we propose a multi-cyber (computational unit) framework to improve the availability of CPS based on Markov model. We evaluate the effectiveness of our proposed framework in terms of availability, downtime, downtime cost and reliability of the CPS framework.
Kazem, A., Sharifi, E., Hussain, F.K., Saberi, M. & Hussain, O.K. 2013, 'Support Vector Regression with chaos-based firefly algorithm for stock market price forecasting', Applied Soft Computing, vol. 13, no. 2, pp. 947-958.
View/Download from: UTS OPUS or Publisher's site
Due to the inherent non-linearity and non-stationary characteristics of financial stock market price time series, conventional modeling techniques such as the BoxJenkins autoregressive integrated moving average (ARIMA) are not adequate for stock market price forecasting. In this paper, a forecasting model based on chaotic mapping, firefly algorithm, and support vector regression (SVR) is proposed to predict stock market price. The forecasting model has three stages. In the first stage, a delay coordinate embedding method is used to reconstruct unseen phase space dynamics. In the second stage, a chaotic firefly algorithm is employed to optimize SVR hyperparameters. Finally in the third stage, the optimized SVR is used to forecast stock market price. The significance of the proposed algorithm is 3-fold. First, it integrates both chaos theory and the firefly algorithm to optimize SVR hyperparameters, whereas previous studies employ a genetic algorithm (GA) to optimize these parameters. Second, it uses a delay coordinate embedding method to reconstruct phase space dynamics. Third, it has high prediction accuracy due to its implementation of structural risk minimization (SRM). To show the applicability and superiority of the proposed algorithm, we selected the three most challenging stock market time series data from NASDAQ historical quotes, namely Intel, National Bank shares and Microsoft daily closed (last) stock price, and applied the proposed algorithm to these data.
Hammadi, A., Hussain, O.K., Dillon, T.S. & Hussain, F.K. 2013, 'A Framework for SLA Management in Cloud Computing for informed decision making', Cluster Computing: The Journal of Networks, Software Tools and Applications, vol. 16, no. 4, pp. 961-977.
View/Download from: UTS OPUS or Publisher's site
In cloud computing, service providers offer cost-effective and on-demand IT services to service users on the basis of Service Level Agreements (SLAs). However the effective management of SLAs in cloud computing is essential for the service users to ensure that they achieve the desired outcomes from the formed service. In this paper, we introduce a SLA management framework that will enable service users to select the best available service provider on the basis of its reputation and then monitor the run time performance of the service provider to determine whether or not it will fulfill its promise defined in the SLA. Such analysis will assist the service user to make an informed decision about the continuation of service with the service provider.
Do, Q. & Hussain, F.K. 2013, 'A hybrid approach for the personalisation of cloud-based e-governance services', International Journal of High Performance Computing and Networking, vol. 7, no. 3, pp. 205-214.
View/Download from: UTS OPUS or Publisher's site
Cloud computing is a new and promising paradigm for service delivery including computing resources over the internet. Cloud computing standards and architecture play an important role in benefiting governments by reducing operating costs and increasing governance effectiveness. Cloud-based e-governance contributes to managing security, reducing cost based on a pay-as-you-go method, IT labour cost reduction, and increasing scalability. Given the importance of cloud computing in the today's emerging technologies, personalisation in cloud computing is also significant in supporting users to obtain what they need without being required to request it explicitly. This research will focus mainly on a personalisation algorithm to for cloud computing. A case study in which a user can suggest the language they want to use without making an explicit request will be provided to assist further understanding of the new algorithm, which is a combination of the TOPSIS and Pearson correlation coefficient methods.
Parvin, S., Hussain, F.K. & Hussain, O.K. 2013, 'Conjoint trust assessment for secure communication in cognitive radio networks', Mathematical And Computer Modelling, vol. 58, no. 5-6, pp. 1340-1350.
View/Download from: UTS OPUS or Publisher's site
With the rapid development of wireless communication, the growth of Cognitive Radio (CR) is increasing day by day. Because CR is flexible and operates on the wireless network, there are more security threats to CR technology than to the traditional radio environment. In addition, there is no comprehensive framework for achieving security in Cognitive Radio Networks (CRNs), and the role of trust for achieving security in CRNs has not been explored previously. Security vulnerability in cognitive radio technology is unavoidable due to the intrinsic nature of the technology, so it is critical to ensure system security in CRNs. The issue of secure communication in CRNs thus becomes more important than it is in conventional wireless networks. In this paper, we propose a conjoint trust assessment approach (combining trust assessment from the Primary User Network and the Secondary User Network) in a CRN to solve the security threats brought about by untrustworthy entities, such as selfish, malicious, and faultless nodes, and to ensure secure spectrum sharing in CRNs. A numerical analysis shows the feasibility of our proposed approach.
Esfijani, A., Hussain, F.K. & Chang, E. 2013, 'University social responsibility ontology', Engineering Intelligent Systems, vol. 21, no. 4, pp. 271-281.
This paper draws on the existing body of knowledge to develop an ontology for university social responsibility (USR). There are numerous terms and definitions for USR in the existing literature. However, there is no consensus among them. In order to address this issue, we used a semi-automated text mining approach for ontology engineering. The developed ontology covered USR and its associated terms by which social responsibilities of a university to its communities have been described in the existing literature. The developed ontology, which is an explicit specification of USR concept, its components and their relationships, can contribute to develop a unified understanding of the concept for measurement purposes
Hussain, F.K. & Fachrunnisa, O. 2013, 'A Methodology for Maintaining Trust in Industrial Digital Ecosystems', IEEE Transactions On Industrial Electronics, vol. 60, no. 3, pp. 1042-1058.
View/Download from: UTS OPUS or Publisher's site
Trust is widely considered to be essential for the smooth functioning of digital ecosystems. However, trust by its very nature, and due to the virtual connection between entities, is extremely fragile. Trust has a life cycle which is composed of building, maintaining, and declining. Given the fragility of trust in virtual environments, it is challenging to work out how to maintain the level of trust (specifically positive trust) between two interacting parties. Once positive trust has been established in the trust building phase, a methodological framework is needed to maintain the existing trust level, so that the relationship may be sustained in the future. In this paper, we present a methodology for maintaining trust in industrial digital ecosystems. The methodology proposes the use of a third party agent, an iterative negotiation process, proactive performance monitoring, and intelligence metrics recalibration of the trust level. In a trust-based relationship, trust can be regarded as having been maintained if the final trust is greater than or equal to initial trust. We demonstrate the validity of the methodology by engineering a prototype setup and running simulations under various operational conditions.
Memon, T., Lu, J. & Hussain, F.K. 2013, 'An Enhanced Mental Model Elicitation Technique to Improve Mental Model Accuracy', Lecture Notes in Computer Science, vol. 8226, pp. 82-89.
View/Download from: UTS OPUS or Publisher's site
The causal mental model representation has been used extensively in decision support. Due to limited information requirements of this representation, that is concepts and relationships, the users are required to articulate only the mental models, without invoking the corresponding experiential knowledge stored in associative memory. The elicitation of mental models without being endorsed by experiential knowledge may lead to inaccurate, invalidated or biased mental models, and espoused theories, being stored for decision making. We introduce SDA articulation/ elicitation cycle, which invokes a users associative memory during the articulation/elicitation process to validate mental models. It is argued in this paper that by engaging associative memory during the mental model articulation/elicitation process, the accuracy and validity of mental models can be improved, the biases can be reduced, and the theories-in-use can be elicited rather than the espoused theories. A case study is presented to demonstrate the working and contributions of the SDA articulation/elicitation cycle.
Memon, T., Lu, J., Hussain, F.K. & Rauniyar, R.K. 2013, 'Subject-Oriented Semantic Knowledge Warehouse (SSKW) to Support Cognitive DSS', Lecture Notes in Computer Science, vol. 8185, pp. 291-299.
View/Download from: UTS OPUS or Publisher's site
The communication between cognitive DSS and data warehouse tends to be inefficient due to their contradictory knowledge/data oriented nature. Data-to-knowledge conversion requires specialized techniques, whereas knowledge-to-data conversion results in loss of knowledge. To address these issues, a subject-oriented semantic knowledge warehouse (SSKW) is proposed, to provide relevant and precise knowledge to CDSS. The SSKW consists of: a) object/process/event/relationship (OPER) model to store domain knowledge in a unified fashion; and, b) a subjective view database, containing opinions of stakeholders about various OPER knowledge elements. A case study to compare the performance of the SSKW-based CDSS against a DW-based CDSS is presented. The results show that SSKW improves communication efficiency, provides relevant and precise domain knowledge to CDSS in less decision cycles, minimizes the loss of knowledge, and helps decision maker to quickly grasp the decision situation through its human-centric nature.
Hussain, O.K., Dillon, T.S., Hussain, F.K. & Chang, E.J. 2013, 'Understanding risk and its importance in business activities', Studies in Computational Intelligence, vol. 412, pp. 1-313.
View/Download from: Publisher's site
Motivation: Nearly all of us have used the word risk in our conversations or have heard it in our daily life experience. To mention a few such situations: (i) you risk losing your driving license if you are caught drink driving; (ii) you risk your enrolment being cancelled if you are caught cheating; (iii) you risk losing your job if you don't improve your performance; (iv) your business is at risk if the current financial and economic situation does not improve; (v) you risk not reaching your job interview in Sydney on time on Monday if you leave from Perth by car on Friday. In all the above mentioned situations, risk is associated with an outcome that highlights losing a certain thing; for example losing a license, losing an enrolment, losing a job, losing a business, not reaching an interview on time. In all these examples, the thing which may be lost is considered an important one, hence the word 'losing' is associated with them. © 2013 Springer-Verlag Berlin Heidelberg.
Dong, H., Hussain, F.K. & Chang, E. 2012, 'Ontology-Learning-Based Focused Crawling for Online Service Advertising Information Discovery and Classification', Lecture Notes in Computer Science, vol. 7636, pp. 591-598.
View/Download from: UTS OPUS or Publisher's site
Online advertising has become increasingly popular among SMEs in service industries, and thousands of service advertisements are published on the Internet every day. However, there is a huge barrier between service-provider-oriented service information publishing and service-customer-oriented service information discovery, which causes that service consumers hardly retrieve the published service advertising information from the Internet. This issue is partly resulted from the ubiquitous, heterogeneous, and ambiguous service advertising information and the open and shoreless Web environment. The existing research, nevertheless, rarely focuses on this research problem. In this paper, we propose an ontology-learning-based focused crawling approach, enabling Web-crawler-based online service advertising information discovery and classification in the Web environment, by taking into account the characteristics of service advertising information. This approach integrates an ontology-based focused crawling framework, a vocabulary-based ontology learning framework, and a hybrid mathematical model for service advertising information similarity computation.
Parvin, S., Hussain, F.K. & Ali, S. 2012, 'A Methodology To Counter DoS Attacks In Mobile IP Communication', Mobile Information Systems, vol. 8, no. 2, pp. 127-152.
View/Download from: UTS OPUS or Publisher's site
Similar to wired communication, Mobile IP communication is susceptible to various kinds of attacks. Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication. The number of approaches hitherto proposed to
Parvin, S., Hussain, F.K., Hussain, O.K., Han, S., Tian, B. & Chang, E. 2012, 'Cognitive radio network security: A survey', Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1691-1708.
View/Download from: UTS OPUS or Publisher's site
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the userâs demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical ad hoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper.
Mirtalaei, M.S., Saberi, M., Hussain, O.K., Ashjari, B. & Hussain, F.K. 2012, 'A trust-based bio-inspired approach for credit lending decisions', Computing, vol. 94, no. 7, pp. 541-577.
View/Download from: UTS OPUS or Publisher's site
Credit scoring computation essentially involves taking into account various financial factors and the previous behavior of the credit requesting person. There is a strong degree of correlation between the compliance level and the credit score of a given entity. The concept of trust has been widely used and applied in the existing literature to determine the compliance level of an entity. However it has not been studied in the context of credit scoring literature. In order to address this shortcoming, in this paper we propose a six-step bio-inspired methodology for trust-based credit lending decisions by credit institutions. The proposed methodology makes use of an artificial neural network-based model to classify the (potential) customers into various categories. To show the applicability and superiority of the proposed algorithm, it is applied to a credit-card dataset obtained from the UCI repository. Due to the varying spectrum of trust levels, we are able to solve the problem of binary credit lending decisions. A trust-based credit scoring approach allows the financial institutions to grant credit-based on the level of trust in potential customers.
Fachrunnisa, O. & Hussain, F.K. 2012, 'A methodology for modelling temporal nature of trust in trust maintenance for digital enterprise', International Journal of Computer Systems Science And Engineering, vol. 27, no. 3, pp. 1-11.
View/Download from: UTS OPUS
Trust is the foundation for the success of Digital Enterprise. However, in a trust-based relationship, trust has distinct life cycle phases. These phases are: building, maintenance and dissolution. A positive trust value between trusting agent and trusted agent results from the activity of successful trust building. However, the next important step in the relationship is to maintain this positive trust level which has been established. In the trust maintenance phase, the initial trust value that that has already been established in the trust building phase needs to be re-calibrated. In this paper, we present a methodology for calculating the final trust during the trust maintenance phase. Continuous performance monitoring employed during trust maintenance results in multiple intermediate trust values. This intermediate trust value takes into account the dynamic nature of trust in an interaction. We present a framework for using our proposed metrics to calculate final trust values in a real world situation and demonstrate the validity of the metrics with a case study and simulations
Raza, M.R., Hussain, F.K. & Hussain, O.K. 2012, 'Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications', Computer Journal, vol. 55, no. 3, pp. 347-378.
View/Download from: UTS OPUS or Publisher's site
Janjua, N.K. & Hussain, F.K. 2012, 'Web@IDSS - Argumentation-enabled Web-based IDSS for reasoning over incomplete and conflicting information', Knowledge-Based Systems, vol. 32, no. 1, pp. 9-27.
View/Download from: UTS OPUS or Publisher's site
Over the past few decades, there has been a resurgence of interest in using high-level software intelligence for business intelligence (BI). The objective is to produce actionable information that is delivered at the right time, easily comprehendible and exportable to other software to assist business decision-making processes. Although the design and development of decision support systems (DSS) has been carried out for over 40 years, DSS still suffer from many limitations such as poor maintainability, poor flexibility and less reusability. The development of the Internet and WWW has helped information systems to overcome those limitations and Web DSS is now an active area of research in business intelligence, impacting significantly on the way information is exchanged and businesses are conducted. However, to remain competitive, companies rely on business intelligence (BI) to continually monitor and analyze the operating environment (both internal and external), to identify potential risks, and to devise competitive business strategies. However, the current Web DSS applications are not able to reason over information present across organizational boundaries which could be incomplete and conflicting. The use of an argumentation-based mechanism has not been explored to address such shortcomings in Web DSS. Argumentation is a kind of commonsense reasoning used by human beings to reach a justifiable conclusion when available information is incomplete and/or inconsistent among participants. In this paper, we propose and elaborate in detail a conceptual framework and formal argumentation-based semantics for Web enabled Intelligent DSS (Web@IDSS). We evaluate the use of argumentative reasoning in Web DSS with the help of a case study, prototype development and future directions. Applications built according to the proposed framework will provide more practical, understandable results to decision makers.
Parvin, S., Hussain, F.K., Park, J.S. & Kim, D.S. 2012, 'A Survivability Model In Wireless Sensor Networks', Computers & Mathematics With Applications, vol. 64, no. 12, pp. 3666-3682.
View/Download from: UTS OPUS or Publisher's site
In this paper, we present a survivability evaluation model and analyze the performance of Wireless Sensor Networks (WSNs) under attack and key compromise. First, we present a survivability evaluation model of WSNs by representing the states of WSNs under
Parvin, S., Hussain, F.K., Hussain, O.K. & Faruque, M.A. 2012, 'Trust-based Throughput in Cognitive Radio Networks', Procedia Engineering, vol. 10, pp. 713-720.
View/Download from: UTS OPUS or Publisher's site
Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Nowa-days Cognitive Radio (CR) is a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. In this paper, we propose two approaches. At first we propose a trust aware model to authenticate the secondary users (SUs) in CRNs which provides a reliable technique to establish trust for CRNs. Secondly, we propose trust throughput mechanism to measure throughput in CRNs.
Hussain, O., Dillon, T., Hussain, F.K. & Chang, E. 2012, 'Probabilistic assessment of loss in revenue generation in demand-driven production', Journal of Intelligent Manufacturing, vol. 23, no. 3, pp. 2069-2084.
View/Download from: UTS OPUS or Publisher's site
In Demand-driven Production with Just-in-Time inputs, there are several sources of uncertainty which impact on themanufacturers ability to meet the required customers demand within the given time frame. This can result in a loss of revenue and customers, which will have undesirable impacts on the financial aspects and on the viability of the manufacturer.Hence, a key concern for manufacturers in justin- time production is to determine whether they can meet a specific level of demand within a given time frame, to meet the customers orders and also to achieve the required revenue target for that period of time. In this paper, we propose a methodology by which a manufacturer can ascertain the probability of not meeting the required demand within a given period by considering the uncertainties in the availability of production units and raw materials, and the loss of financial revenue that it would experience as a result.
Fachrunnisa, O. & Hussain, F.K. 2012, 'A methodology for modelling temporal nature of trust in trust maintenance for Digital Enterprise', Computer Systems Science and Engineering, vol. 27, no. 3, pp. 219-233.
Trust is the foundation for the success of Digital Enterprise. However, in a trust-based relationship, trust has distinct life cycle phases. These phases are: building, maintenance and dissolution. A positive trust value between trusting agent and trusted agent results from the activity of successful trust building. However, the next important step in the relationship is to maintain this positive trust level which has been established. In the trust maintenance phase, the initial trust value that that has already been established in the trust building phase needs to be re-calibrated. In this paper, we present a methodology for calculating the final trust during the trust maintenance phase. Continuous performance monitoring employed during trust maintenance results in multiple intermediate trust values. This intermediate trust value takes into account the dynamic nature of trust in an interaction. We present a framework for using our proposed metrics to calculate final trust values in a real world situation and demonstrate the validity of the metrics with a case study and simulations.
Hussain, O., Sangka, K.B. & Hussain, F.K. 2012, 'Determining the Significance of Assessment Criteria for Risk Analysis in Business Associations', Intelligent Systems Reference Library, vol. 33, pp. 403-416.
View/Download from: Publisher's site
Risk assessment in business associations is the process which determines the likelihood of negative outcomes according to a given set of desired criteria. When there is more than one desired criterion to be achieved in a business association, the process of risk assessment needs to be done by capturing the importance that each of the criteria will have on the successful completion of the business activity. In this paper, we present an approach that determines the significance of each criterion with respect to the goal of the business association and by considering the inter-dependencies that may exist between the different assessment criteria. This analysis will provide important insights during the process of risk management, where the occurrence of such negative outcomes can be managed, according to their significance, to ensure the successful completion of a business activity. © Springer-Verlag Berlin Heidelberg 2012.
Dong, H. & Hussain, F.K. 2011, 'Focused Crawling for Automatic Service Discovery, Annotation, and Classification in Industrial Digital Ecosystems', IEEE Transactions On Industrial Electronics, vol. 58, no. 6, pp. 2106-2116.
View/Download from: UTS OPUS or Publisher's site
Digital Ecosystems make use of Service Factories for service entities' publishing, classification, and management. However, before the emergence of Digital Ecosystems, there existed ubiquitous and heterogeneous service information in the Business Ecosyst
Dong, H., Hussain, F.K. & Chang, E. 2011, 'A context-aware semantic similarity model for ontology environments', Concurrency and Computation, vol. 23, no. 5, pp. 505-524.
View/Download from: UTS OPUS or Publisher's site
While many researchers have contributed to the field of semantic similarity models so far, we find that most of the models are designed for the semantic network environment. When applying the semantic similarity model within the semantic-rich ontology en
Parvin, S., Hussain, F.K., Han, S. & Hussain, O. 2011, 'Trust-based spectrum sharing for cognitive radio networks', Journal of Interconnection Networks, vol. 12, no. 3, pp. 155-171.
View/Download from: UTS OPUS
Cognitive Radio Networks (CRNs) is a promising technology which deals with shared spectrum access and usage in order to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Security becomes a very challenging issue in CRNs as different types of attacks are very common to cognitive radio technology compared to general wireless networks. The proper working of cognitive radio and the functionality of CRNs relies on the compliant behaviour of the secondary user. In order to address this issue, we propose two approaches in this paper. Firstly, we propose a trust aware model to authenticate the secondary users of CRNs which offers a reliable technique to provide a security-conscious decision by using trust evaluation for CRNs. Secondly, we propose an analytical model for analyzing the availability of spectrum in CRNs using a stochastic approach. We have modeled and analyzed the availability of free spectrum for the usage of secondary users by adopting different activities in a spectrum management scheme to improve the spectrum availability in CRNs
Dong, H., Hussain, F.K. & Chang, E. 2011, 'A Service Search Engine for the Industrial Digital Ecosystems', IEEE Transactions On Industrial Electronics, vol. 58, no. 6, pp. 2183-2196.
View/Download from: UTS OPUS or Publisher's site
Digital ecosystem (DE) is comprised of heterogeneous and distributed species which can play the dual role of service provider and service requester. Nowadays, DE lacks semantic search support, which means it cannot provide a reliable and trustworthy link
Hussain, O., Dillon, T.S., Hussain, F.K. & Chang, E. 2011, 'Probabilistic assessment of financial risk in e-business associations', Simulation Modelling Practice and Theory, vol. 19, no. 2, pp. 704-717.
View/Download from: UTS OPUS or Publisher's site
Business activities are a result of carefully formed associations between different users in order to achieve certain pre-decided outcomes. Decision-making in such associations is an important step and transactional risk analysis is one of the integral processes that facilitates this step. This paper presents an approach that determines the negative consequences (termed as financial risk) of forming e-business associations. Unlike other approaches, our model captures the different types of events and their uncertainties to determine the financial risk by using the convolution operator and expressing it as a probabilistic measure rather than as a crisp financial value. Such representation makes sense as the financial risk may be determined at a point of time in future where nothing is certain. Depending upon the complexity of the problem, we explain the different ways of using the convolution operator to determine the financial risk. The simulation result shows a better representation and understanding of the financial risk that will provide important inputs to the transactional risk analysis and the decision-making process.
Raza, M., Hussain, O., Hussain, F.K. & Chang, E. 2011, 'Maturity, distance and density (MD(2)) metrics for optimizing trust prediction for business intelligence', Journal Of Global Optimization, vol. 51, no. 2, pp. 285-300.
View/Download from: UTS OPUS or Publisher's site
The modelling and management of trust between interacting parties are crucial parts of the overall business intelligence strategy for any organization. Predicting trust values is a key element of modelling and managing trust. It is of critical importance when the interaction is to be conducted at a future point in time. In the existing body of work, there are a few approaches for predicting trust. However, none of these approaches proposes a framework or methodology by which the predicted trust value can be considered in light of its accuracy or confidence level. This is a key element in order to ensure optimized trust prediction. In this paper, we propose a methodology to address this critical issue. The methodology comprises a suite of metricsmaturity, distance and density (MD2) which are capable of capturing various aspects of the confidence level in the predicted trust value. The proposed methodology is exemplified with the help of case studies.
Dong, H. & Hussain, F.K. 2011, 'Semantic service matchmaking for digital health ecosystems', Knowledge-based Systems, vol. 24, no. 6, pp. 761-774.
View/Download from: UTS OPUS or Publisher's site
The vision of Digital Ecosystems was initiated by the European Commission, with the purpose of constructing an information and communication technology environment to facilitate the sustainable development of small and medium enterprises. As a key sub-domain of Digital Ecosystems, Digital Health Ecosystems provide crucial services to maintain the health of the main participants of Digital Ecosystems. We are concerned with the large-scale, ambiguous, heterogeneous, and untrustworthy nature of health service information in Digital Health Ecosystems. An intensive survey found that current research cannot support accurate and trustworthy matchmaking between health service requests and health service advertisements in Digital Health Ecosystems. Therefore, in this paper, we propose a framework for a semantic service matchmaker that takes into account the ambiguous, heterogeneous nature of service information in Digital Health Ecosystems. This framework is designed to make four major contributions, which are health service domain knowledge modeling, online health service information disambiguation, health service query disambiguation and health service quality evaluation and ranking. In order to thoroughly evaluate this framework, we implement a prototype - a Semantic Health Service Search Engine, and conduct a series of experiments on the prototype using a functional testing and simulation approach
Dong, H., Hussain, F.K. & Chang, E. 2011, 'A framework for discovering and classifying ubiquitous services in digital health ecosystems', Journal of Computer and System Sciences, vol. 77, no. 4, pp. 687-704.
View/Download from: UTS OPUS or Publisher's site
A digital ecosystem is a widespread type of ubiquitous computing environment comprised of ubiquitous, geographically dispersed, and heterogeneous species, technologies and services. As a subdomain of the digital ecosystems, digital health ecosystems are crucial for the stability and sustainable development of the digital ecosystems. However, since the service information in the digital health ecosystems exhibits the same features as those in the digital ecosystems, it is difficult for a service consumer to precisely and quickly retrieve a service provider for a given health service request. Consequently, it is a matter of urgency that a technology is developed to discover and classify the health service information obtained from the digital health ecosystems. A survey of state-of-the-art semantic service discovery technologies reveals that no significant research effort has been made in this area. Hence, in this paper, we present a framework for discovering and classifying the vast amount of service information present in the digital health ecosystems. The framework incorporates the technology of semantic focused crawler and social classification. A series of experiments are conducted in order to respectively evaluate the framework and the employed mathematical model.
Dong, H., Hussain, F.K. & Chang, E. 2011, 'A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment', Journal Of Network And Computer Applications, vol. 34, no. 2, pp. 619-631.
View/Download from: UTS OPUS or Publisher's site
A Service Ecosystem is a biological view of the business and software environment, which is comprised of a Service Use Ecosystem and a Service Supply Ecosystem. Service matchmakers play an important role in ensuring the connectivity between the two ecosystems. Current matchmakers attempt to employ ontologies to disambiguate service consumers' service queries by semantically classifying service entities and providing a series of human computer interactions to service consumers. However, the lack of relevant service domain knowledge and the wrong service queries could prevent the semantic service matchmakers from seeking the service concepts that can be used to correctly represent service requests. To resolve this issue, in this paper, we propose the framework of a service concept recommendation system, which is built upon a semantic similarity model. This system can be employed to seek the concepts used to correctly represent service consumers' requests, when a semantic service matchmaker finds that the service concepts that are eventually retrieved cannot match the service requests. Whilst many similar semantic similarity models have been developed to date, most of them focus on distance-based measures for the semantic network environment and ignore content-based measures for the ontology environment. For the ontology environment in which concepts are defined with sufficient datatype properties, object properties, and restrictions etc., the content of concepts should be regarded as an important factor in concept similarity measures. Hence, we present a novel semantic similarity model for the service ontology environment. The technical details and evaluation details of the framework are discussed in this paper
Dong, H., Hussain, F.K. & Chang, E. 2011, 'ORPMS: An Ontology-based Real-time Project Monitoring System in the Cloud', JOURNAL OF UNIVERSAL COMPUTER SCIENCE, vol. 17, no. 8, pp. 1161-1182.
Barolli, L., Takizawa, M. & Hussain, F.K. 2011, 'Special issue on emerging trends in cyber-physical systems', JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, vol. 2, no. 4, pp. 249-250.
View/Download from: Publisher's site
Dong, H., Hussain, F.K. & Chang, E. 2011, 'An ontology-based real-time project monitoring system in the cloud', Journal of Universal Computer Science, vol. 17, no. 8, pp. 1161-1182.
Project monitoring plays a crucial role in project management, which is a part of every stage of a project's life-cycle. Nevertheless, along with the increasing ratio of outsourcing in many companies' strategic plans, project monitoring has been challenged by geographically dispersed project teams and culturally diverse team members. Furthermore, because of the lack of a uniform standard, data exchange between various project monitoring software becomes an impossible mission. These factors together lead to the issue of ambiguity in project monitoring processes. Ontology is a form of knowledge representation with the purpose of disambiguation. Consequently, in this paper, we propose the framework of an ontology-based real-time project monitoring system (ORPSM), in order to, by means of ontologies, solve the ambiguity issue in project monitoring processes caused by multiple factors. The framework incorporates a series of ontologies for knowledge capture, storage, sharing and term disambiguation in project monitoring processes, and a series of metrics for assisting management of project organizations to better monitor projects. We propose to configure the ORPMS framework in a cloud environment, aiming at providing the project monitoring service to geographically distributed and dynamic project members with great flexibility, scalability and security. A case study is conducted on a prototype of the ORPMS in order to evaluate the framework. © J.UCS.
Dong, H., Hussain, F.K. & Chang, E. 2010, 'A Human-Centered Semantic Service Platform for the Digital Ecosystems Environment', World Wide Web, vol. 13, no. 1-2, pp. 75-103.
View/Download from: UTS OPUS or Publisher's site
Digital Ecosystems (DEST) have emerged with the purpose of enhancing communications among small and medium enterprises (SMEs) within the worldwide Business Ecosystem. However, because of the diversity and heterogeneity of the services in the DEST environ
Hussain, O., Dillon, T.S., Chang, E. & Hussain, F.K. 2010, 'Transactional risk-based decision making system in e-business interactions', International Journal of Computer Systems Science And Engineering, vol. 25, no. 1, pp. 15-28.
View/Download from: UTS OPUS
The credit crunch and economic crisis have demonstrated the need to properly understand, characterize and assimilate risk in business activities. Failure to do this has resulted in serious consequences to the users involved. So the analysis and managemen
Zadjabbari, B., Wongthongtham, P. & Hussain, F.K. 2010, 'Ontology based Approach in Knowledge Sharing Measurement', Journal of Universal Computer Science, vol. 16, no. 6, pp. 956-982.
View/Download from: UTS OPUS
For many years, physical asset indicators were the main evidence of an organization's successful performance. However, the situation has changed following the revolution of information technology in the knowledge-based economy and in the new ideas in eco
Dong, H., Hussain, F.K. & Chang, E. 2009, 'A QoS-based service retrieval methodology for digital ecosystems', International Journal of Web and Grid Services, vol. 5, no. 3, pp. 261-283.
View/Download from: UTS OPUS or Publisher's site
The emergence of the World Wide Web and its influence on the fields of industry, commerce, healthcare and so on, has led to an innovative, dynamic, open, collaborative and interactive environment - the digital ecosystem. Whereas service plays an importan
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2007, 'A methodology to quantify failure for risk-based decision support system in digital business ecosystems', Data & Knowledge Engineering, vol. 63, no. 3, pp. 597-621.
View/Download from: UTS OPUS or Publisher's site
In digital business ecosystem architecture it is rational for the trusting agent to analyse the possible risk according to its demand before interacting with a probable trusted agent. Doing so would assist the trusting agent in its decision process and w
Hussain, F.K. 2007, 'Trust Ontologies for E-Service Environments', International Journal of Intelligent Systems, vol. 22, pp. 519-545.
View/Download from: Publisher's site
Hussain, O., Chang, E., Hussain, F.K. & Dillon, T.S. 2006, 'A methodology for Risk measurement in e-transactions', Computer Systems Science And Engineering, vol. 21, no. 1, pp. 17-31.
Risk is present in almost every activity. Alternately speaking, almost every activity may have some undesired outcomes which the person doing the activity hopes that they do not occur when it undertakes that particular activity. The quantification of tho
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Classification of trust in peer-to-peer (P2P) communication', International Journal of Computer Systems Science And Engineering, vol. 19, no. 02, pp. 59-73.
View/Download from: UTS OPUS
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Trustworthiness and CCI Metrics for Assigning Trustworthiness', International Journal of Computer Systems, Science and Engineering, vol. 19, no. 3/4, pp. 95-114.
Hussain, F.K., Chang, E. & Dillon, T.S. 2004, 'Trustworthiness and CCI metrics in P2P Communication', International Journal of Computer Systems, Science and Engineering, vol. 19, no. 3, pp. 173-191.
View/Download from: UTS OPUS
Dillon, T.S., Chang, E. & Hussain, F.K. 2004, 'Managing the dynamic nature of trust', IEEE Intelligent Systems, vol. 19, no. 5, pp. 79-82.
View/Download from: UTS OPUS
Hussain, F.K., Chang, E. & Dillon, T. 2004, 'Classification of trust in peer-to-peer (P2P) communication', COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol. 19, no. 2, pp. 59-73.
Staab, S., Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T.S., Chang, E., Hussain, F.K., Nejdl, W., Olmedilla, D. & Kashyap, V. 2004, 'The pudding of trust', IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88.
View/Download from: Publisher's site
The role of trust in pervasive computing environment is discussed. The use of trust paradigm requires careful selection of useful trust aspects needed for the system being designed. Any exchange of an entity's private information for a gain in its partner's trust depends on satisfactory limits on its further dissemination. The organization's policies should describe who can do what under what circumstances to establish trust.