@nsf.gov
Professor
National Science Foundation
Professor Eduard Babulak is accomplished international scholar, researcher, consultant, educator, professional engineer and polyglot, with more than thirty years of experience. He served as Editor, reviewer, Conference Chair, has successfully published. He served as Chair of the IEEE Vancouver Ethics, Professional and Conference Committee. He was Invited Plenary & Keynote Speaker in Tokyo (2023), Oxford (2020 & 2023), University of Cambridge (2005 & 2010), MIT (2005 & 2010), Yokohama National University & University of Electro Communications in Tokyo (2009 – 2010), Kyushu Institute of Technology (2016), Japan, Shanghai Jiao Tong University (2013), Sungkyunkwan University in Korea (2012 – 2014), University of Surrey, Purdue University, Penn State, Graz University of Technology, Austria, Czech Technical University, and other prestigious academic institutions worldwide. His academic and engineering work was recognized internationally by the Engineering Council in UK, EU, USA & Canada.
Doctor-Habil. (Docent - D.Sc.) University of Pardubice (Czech Republic), 2008
Ph.D., Staffordshire University (United Kingdom), 2003
M.Sc., University of East London, (United Kingdom), 1991
High National Certificate, Brighton College of Technology (United Kingdom), 1990
M.Sc., Technical University of Kosice (Slovakia), 1982
High National Diploma, Electro-technical College (Slovakia), 1976
Computer Science, Computer Engineering, Artificial Intelligence, Computer Networks and Communications
The book main objective is to bring to light most recent technological and pedagogical advances in the field of education and educational learning tools. The book will present a collection of selected peer reviewed book chapters, bringing to light the current state-of-the-art in the field of Education and most recent advances in the AI driven smart computing technologies for the benefit of learners (i.e., students) at all levels of education starting from the kindergarten, primary, secondary, college and university (i.e., BSc MSc, PhD and postdocs levels).
The scope of this Research Topic focuses on Cyber Security, Malware Detection and Prevention Mechanisms, Software and Hardware Security, the IoT and Critical Cyber Infrastructures Security, as well as the Human Factor and Social dimension of Cyber Security.
Given the current advances in the field of Fast Internet, Smart Computation and AI, proper Cyber Security Mechanisms are essential in securing Cyber Critical Infrastructures, Big Data Centers, Businesses, Industries and Governments worldwide. This Special Issue will present up-to-date cutting-edge research in the field of Cyber Security Mechanisms and Services, AI and Ultra Smart Computational Devices as tools to create a safe and secure cyberspace. The papers published in the Special Issue will be peer reviewed and indexed in the Scopus and Web of Science Databases. The Special Issue will promote the creation of global, multidisciplinary research consortiums to help us work together.
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
S. N. Kumar, Sherin Zafar, Eduard Babulak, M. Afshar Alam, and Farheen Siddiqui
CRC Press
Feng Wang, Eduard Babulak, and Yongning Tang
Institute of Advanced Engineering and Science
As internet of things (IoT) devices play an integral role in our everyday life, it is critical to monitor the health of the IoT devices. However, fault detection in IoT is much more challenging compared with that in traditional wired networks. Traditional observing and polling are not appropriate for detecting faults in resource-constrained IoT devices. Because of the dynamic feature of IoT devices, these detection methods are inadequate for IoT fault detection. In this paper, we propose two methods that can monitor the health status of IoT devices through monitoring the network traffic of these devices. Based on the collected traffic or flow entropy, these methods can determine the health status of IoT devices by comparing captured traffic behavior with normal traffic patterns. Our measurements show that the two methods can effectively detect and identify malfunctioned or defective IoT devices.
Ehsan Akbari Sekehravani, Eduard Babulak, and Mehdi Masoodi
Institute of Advanced Engineering and Science
Tracking of moving objects in a sequence of images is one of the important and functional branches of machine vision technology. Detection and tracking of a flying object with unknown features are important issues in detecting and tracking objects. This paper consists of two basic parts. The first part involves tracking multiple flying objects. At first, flying objects are detected and tracked, using the particle filter algorithm. The second part is to classify tracked objects (military or nonmilitary), based on four criteria; Size (center of mass) of objects, object speed vector, the direction of motion of objects, and thermal imagery identifies the type of tracked flying objects. To demonstrate the efficiency and the strength of the algorithm and the above system, several scenarios in different videos have been investigated that include challenges such as the number of objects (aircraft), different paths, the diverse directions of motion, different speeds and various objects. One of the most important challenges is the speed of processing and the angle of imaging.
Ehsan Akbari Sekehravani, Eduard Babulak, and Mehdi Masoodi
Institute of Advanced Engineering and Science
Edge detection is a significant stage in different image processing operations like pattern recognition, feature extraction, and computer vision. Although the Canny edge detection algorithm exhibits high precision is computationally more complex contrasted to other edge detection methods. Due to the traditional Canny algorithm uses the Gaussian filter, which gives the edge detail represents blurry also its effect in filtering salt-and-pepper noise is not good. In order to resolve this problem, we utilized the median filter to maintain the details of the image and eliminate the noise. This paper presents implementing and enhance the accuracy of Canny edge detection for noisy images. Results present that this proposed method can definitely overcome noise disorders, preserve the edge useful data, and likewise enhance the edge detection precision.
Cristian Bucur and Eduard Babulak
IEEE
Researchers are trying to find new ways of finding and pointing out Cybersecurity vulnerabilities by using innovative metrics. New theoretical proposals need to be tested in a real environment, using Cybersecurity tools applications that can validate the applicability of those in real life. This paper presents an experimental flexible environment, which can be used for the validation of several theoretical claims based on an “easy to use” architecture implemented in a cloud environment. The framework provides a much shorter time setup in the real world as well as a much better understanding based on log analysis provided by MS Azure. As a proof of concept, we have tested three different claims and provided proves of results such as screenshots and log samples.
Aanchal Jhingan, Lavish Kansal, Gurjot Singh Gaba, Eduard Babulak, and Mohamed Mounir
IEEE
Orthogonal frequency division multiplexing (OFDM) and Multiple input multiple output (MIMO) is capable to enhance data rates over the radio channel providing enough protection against the destructions caused in the path of the signal. But the bit error rate (BER) of the systems degrades due to the presence of Carrier frequency offset (CFO). The presence of CFO results in generation of Inter Carrier Interference (ICI) which in turn results in loss of orthogonality between the sub carriers. The significance of MIMO-OFDM is due to orthogonality among the carriers which is at stake due to presence of CFO. In this paper, the performance of the MIMO–OFDM system is analysed over the Rayleigh channel for 2 and 3-array antennas under the effect of CFO with Maximal Ratio Combining (MRC) diversity technique at receiver section. It is observed from simulations that the MIMO-MRC reduces the BER and improves the overall performance of the system which is very much useful to combat against the effects of CFO.
Renuka Mohanraj and Eduard Babulak
Institute of Electrical and Electronics Engineers (IEEE)
Gurpreet K. Sodhi, Gurjot S. Gaba, Lavish Kansal, Eduard Babulak, Mohammed AlZain, Sandeep Kumar Arora, and Mehedi Masud
Institute of Advanced Engineering and Science
<p>In this era of universal electronic connectivity, communication is no more confined to transfer of data from one end to the other; rather it aims at secure data transfer. Communication sector has developed beyond this traditional boundary of data transfer and is now working on ways to provide data from the intended senders to the intended receivers in an unaltered form. Considering all these conditions, the data transfer needs to follow the principles of authentication, confidentiality and integrity. The former two have been addressed using digital signatures and encryption schemes respectively, while the solution to the later is the use of Message Authentication Code. This paper presents a Message Authentication Code scheme, which uses the biological characteristics represented by Deoxyribonucleic acid combined with the output of Blum Blum Shub Random Number Generator, as a secret key along with a novel hash algorithm. This Message Authentication Code structure is evaluated on the basis of National Institute of Science and Technology test suite for random numbers, avalanche criteria and network attacks. The results reveal that the proposed scheme performs well under all the criteria and thus is capable of preserving integrity; this increases its applicability in any data sensitive environment<em>.</em></p>
Mehran Alidoost Nia, Reza Ebrahimi Atani, Benjamin Fabian, and Eduard Babulak
Wiley
This paper presents a new approach to network traffic control based on the pattern theorem. In order to generate unique detection patterns for the process of traffic analysis, a self-avoiding walk algorithm is used. During data processing and analysis, the traffic patterns are adapted dynamically in real-time. The modified traffic patterns are systematically analyzed using a threat database. In this work, a threshold is set to distinguish and trigger critical levels of threats. The matching process is terminated under each of the three conditions: i pattern matching rate is up to 80%; ii pattern matching rates of at least five various threats are up to 50%; and iii pattern matching is enhanced up to 50% for each matched pattern using an implicit combination of threat coefficients. Our experimental results show that in the worst-case scenario, the true detection rate of malicious traffic is higher than 69%, and in the best situation, it would be about 95% for the same malicious traffic. Also, the precision of false detection for trusted patterns is negligible. Copyright © 2016 John Wiley & Sons, Ltd.
Theofilos Chrysikos, Stavros Kotsopoulos, and Eduard Babulak
IGI Global
The aim of this chapter is to summarize and present recent findings in the field of wireless channel modeling that provide a new method for the reliable calculation of the statistical parameters of large-scale variations of the average received signal (shadow fading). This algorithm is theoretically based on a path loss estimation model that incorporates losses due to walls and floors. This has been confirmed to be the most precise mathematical tool for average signal strength prediction for various frequencies of interest and propagation environments. The total path loss is estimated as a sum of two independent attenuation processes: free space loss and losses due to obstacles. This solution allows for a direct and reliable calculation of the deviation of the fluctuations of the average received signal in an obstacle-dense environment.
Eduard Babulak
IEEE
The author worked past year as Professor & Head of School of Computing, Information and Mathematical Sciences and Director of Japan Pacific ICT Centre at the University of South Pacific. The South Pacific Region has many problems related to environmental and economic issues. The University of the South Pacific (USP) is an ideal platform for provision of development of Human Resources and enhancement of Human Security in the Pacific. Current dynamic Internet developments and continuous demand for the ubiquitous connectivity combined with the next generation of networks contributes towards creation the future cyberspace infrastructures worldwide. Implementation of the cyberspace in the government and corporate infrastructures, contributes towards creation of new paradigm in the decision making processes. Decisions that are currently governed by the human intelligence knowledge and intuition may be influenced by the cyber-data and processes. Future cyberspace will ultimately impact the decision making processes by government, corporate, industrial and academic institutions worldwide. Main objective of ICT Development is to build human-resource for ICT capacity development all across developing countries in the south pacific while “bridging the digital divide”. Main Goal was to provide the south pacific region with appropriate resources to take the lead role in driving the Pacific through Human Resource Development Programs. Specific Goal is to focus on developing and strengthening ICT skills applicable at the e-services level. The author discusses the development of new Japan Pacific Information Communications Technologies (ICT) Centre at the University of the South Pacific and ICT for Human Development and Security in the South Pacific Region. The main objective is to accommodate increasing demand for ICT-related education and training in the region and to accelerate research and development activities in the Pacific. The ICT Centre will play a facilitator role for ICT related education, Training; and Research and Development for the Pacific. In conclusion the author promotes discussion on the role of the role of the ICT in the South Pacific Region. The author opens discussion on ICT's social and ethical impact in the south pacific region in the context of governance vs. privacy.
Eduard Babulak
IEEE
The author discusses the development of new Information Communications Technologies (ICT) in the areas of eLearning, e-Health, e-Government, e-Journalism, etc. The current Web 2.0 combined with the 3D Telepresence, Future Internet, Semantic Web Technologies provide support to creation of social networks, content retrieval and analysis, which creates foundation for the future fully automated cyberspace. The technical development of Internet and ICT Technologies established a platform for the next generation Internet and ICT often referred to as the next generation cyberspace.The current cyberspace is already changing the way we work, study, live, socialize, etc. The next generation cyberspace combined with the future ICT technologies will drive the e-type applications, such as e-health, e-government, e-security, e-law, e-learning, e-commerce, etc., to the next level of fully automated cyberspace.
Eduard Babulak
IEEE
The 21st century started new era of global workforce, connectivity, ubiquity and mobility. Past decade will be remembered by dynamic developments and innovation in the field of information technologies (IT), communications and ubiquitous Internet technologies. The 21st Century started with innovation and dynamic developments in the area of next generation networks, Internet 2-3 and Web 2-3 technologies that will transform the current already technology-driven world to next level of Future Cyberspace and Ubiquity. The ubiquity of current internet and future cyber-space facilitates creation of very effective and real-time collaborative environment supported with the Tele-presence and a new generation of Video Conferencing Technologies. Globalization of world trades open doors to mobility of workers as well as creation of virtual teams of experts and virtual companies bringing together experts from all over the world via Telepresence combined with next generation of Holographic Image Technologies.
Eduard Babulak
IEEE
The author discusses the development of new Information Communications Technologies (ICT) in the areas of e-Learning, e-Health, e-Government, e-Journalism, etc. The current Web 2.0 combined with the 3D Telepresence, Future Internet, Semantic Web Technologies provide support to creation of social networks, content retrieval and analysis, which creates foundation for the future fully automated cyberspace. Current dynamic Internet developments and continuous demand for the ubiquitous connectivity combined with the next generation of networks contributes towards creation the future cyberspace infrastructures worldwide. Implementation of the cyberspace in the government and corporate infrastructures, contributes towards creation of new paradigm in the decision making processes. Decisions that are currently governed by the human intelligence knowledge and intuition may be influenced by the cyber-data and processes. Future cyberspace will ultimately impact the decision making processes by government, corporate, industrial and academic institutions worldwide. In conclusion the author promotes discussion on the social and ethical impact of the future cyberspace and ICT technologies in the context of governance vs. privacy.
Eduard Babulak
IEEE
Past decade will be remembered by dynamic developments and innovation in the field of information technologies (IT), communications and ubiquitous Internet technologies. The 21st Century started with innovation and dynamic developments in the area of next generation networks, Internet 2-3 and Web 2-3 technologies that will transform the current already technology-driven world to next level of Future Cyberspace and Ubiquity [1].The ubiquity of current internet and future cyber-space facilitates creation of very effective and real-time collaborative environment supported with the Tele-presence and a new generation of Video Conferencing Technologies. Globalization of world trades open doors to mobility of workers as well as creation of virtual teams of experts and virtual companies bringing together experts from all over the world via Tele-presence combined with next generation of Holographic Image Technologies [2].Given current economic climate, researchers and engineers worldwide are looking for new financially viable software/hardware solutions and platforms for the creation of virtual global corporations. The author discusses the current and future trends in the Future Cyberspace Collaborative Environments, as well as, his own vision on the Next Generation Collaborative Online Systems.
Eduard Babulak
ACM
Transportation and Internet Technologies have evolved dramatically during the last decade, laying solid foundation for the future generation of the Ubiquitous Internet access, omnipresent web technologies and ultimate automated information cyberspace. As a result, the current efforts in the research and development in the areas of Future Transportation and Next Generation of Internet Technologies promotes formation of inter-disciplinary international teams of experts, scientists, researchers and engineers to create a new generation of applications and technologies that will facilitate the future transportation system. The author discusses the current state of the art in the world of Telecommunications and Internet Technologies, new technological trends directions in the application in the Future Transportation.
Eduard Babulak
IEEE
In the last decade we have been witnessing a new revolution in information processing and information accessibility via Internet. The evolution of Information Technologies (IT) and personal digital technologies has important impact on automation and manufacturing industry. The IT has become essential component of operational, control and business processes in everyone’s life worldwide. In the area of Real Estate the modern smart houses are now being built enabling owners to change window tints, turn on music, control thermostats, regulate sprinklers, monitor security, and open the front door from their cars [1]. In the medical field the impact of IT is most significant in the area of patient’s remote monitoring, medication administration and diagnosis control. Wearable computers, such as small wristwatch devices enable to check temperatures, news headlines, personal messages, and personal planners. Modern handheld devices, mobile phones, cameras, TVs, and personal computers are converging into single mobile and computational device. In the field of education, most of the colleges are implementing wireless campus enabling students to monitor their course content and working on collaborative projects. Current Precision CNC Lathes and Mills SmartCut II Series are not only a cutting device but a fully computerized and interconnected apparatus controlled remotely via mobile handheld device with wireless link. SmartCut was designed for growing companies evolving from manual lathe operations to CNC and more sophisticated users who would like a simple, easy to use machine. The Fagor 8055TC control is equipped with multiple ports for connection to off-line programming systems for more advanced users. The combination of these control features and hand wheels enable you to use a single machine for one-off or prototype production; in a semi-automatic mode for small production lots; and in its fully automatic mode for medium length production runs [2]. The author discusses the current state of the art and future trend of IT for the 21st century in automation and manufacturing industry as well as in education and public sectors.
Eduard Babulak, Konstantinos G. Ioannou, and Athanasios Ioannou
IGI Global
Transportation and Internet Technologies have evolved dramatically during the last decade, laying solid foundation for the future generation of the Ubiquitous Internet access, omnipresent Web technologies and ultimate automated information cyberspace. As a result, the current efforts in the research and development in the areas of Future Transportation and Next Generation of Internet Technologies promotes formation of inter-disciplinary international teams of experts, scientists, researchers and engineers to create a new generation of applications and technologies that will facilitate the future transportation system. The authors present a dynamic channel management scheme for a Mobile Communication System, that supports services in Ubiquitous Communications Infrastructures for Future Transportation Technologies (DCMS-FTT). The performance is improved as it can be seen from the simulation results.
Awarded the Cyber Security Grant in the USA and South Korea
Panelist: US National Science Foundation
Expert: European Commission
Chartered Engineer
Professional Engineer
Chartered Information Technology Professional
Senior IT Expert -
Head of Community Edorer -
Mentor: