Eduard Babulak

@nsf.gov

Professor
National Science Foundation



                                                              

https://researchid.co/eduardbabulak

Professor Eduard Babulak is accomplished international scholar, researcher, consultant, educator, professional engineer and polyglot, with more than thirty years of experience. He served as Editor, reviewer, Conference Chair, has successfully published. He served as Chair of the IEEE Vancouver Ethics, Professional and Conference Committee. He was Invited Plenary & Keynote Speaker in Tokyo (2023), Oxford (2020 & 2023), University of Cambridge (2005 & 2010), MIT (2005 & 2010), Yokohama National University & University of Electro Communications in Tokyo (2009 – 2010), Kyushu Institute of Technology (2016), Japan, Shanghai Jiao Tong University (2013), Sungkyunkwan University in Korea (2012 – 2014), University of Surrey, Purdue University, Penn State, Graz University of Technology, Austria, Czech Technical University, and other prestigious academic institutions worldwide. His academic and engineering work was recognized internationally by the Engineering Council in UK, EU, USA & Canada.

EDUCATION

Doctor-Habil. (Docent - D.Sc.) University of Pardubice (Czech Republic), 2008
Ph.D., Staffordshire University (United Kingdom), 2003
M.Sc., University of East London, (United Kingdom), 1991
High National Certificate, Brighton College of Technology (United Kingdom), 1990
M.Sc., Technical University of Kosice (Slovakia), 1982
High National Diploma, Electro-technical College (Slovakia), 1976

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Computer Engineering, Artificial Intelligence, Computer Networks and Communications

FUTURE PROJECTS

New Book: Educational AI Humanoid Computing Devices for Cyber Nomads

The book main objective is to bring to light most recent technological and pedagogical advances in the field of education and educational learning tools. The book will present a collection of selected peer reviewed book chapters, bringing to light the current state-of-the-art in the field of Education and most recent advances in the AI driven smart computing technologies for the benefit of learners (i.e., students) at all levels of education starting from the kindergarten, primary, secondary, college and university (i.e., BSc MSc, PhD and postdocs levels).


Applications Invited
https://www.igi-global.com/publish/call-for-papers/call-details/7933

Frontiers in Computer Science Research Topic: Cyber Security Prevention, Defenses Driven by AI, and Mathematical Modelling and Simulation Tools

The scope of this Research Topic focuses on Cyber Security, Malware Detection and Prevention Mechanisms, Software and Hardware Security, the IoT and Critical Cyber Infrastructures Security, as well as the Human Factor and Social dimension of Cyber Security.


Applications Invited
https://www.frontiersin.org/research-topics/64135

Special Issue: Advances in Computer Security and Applied Cybersecurity

Given the current advances in the field of Fast Internet, Smart Computation and AI, proper Cyber Security Mechanisms are essential in securing Cyber Critical Infrastructures, Big Data Centers, Businesses, Industries and Governments worldwide. This Special Issue will present up-to-date cutting-edge research in the field of Cyber Security Mechanisms and Services, AI and Ultra Smart Computational Devices as tools to create a safe and secure cyberspace. The papers published in the Special Issue will be peer reviewed and indexed in the Scopus and Web of Science Databases. The Special Issue will promote the creation of global, multidisciplinary research consortiums to help us work together.


Applications Invited
https://www.mdpi.com/journal/applsci/special_issues/WWZ8RAJU18
33

Scopus Publications

748

Scholar Citations

13

Scholar h-index

19

Scholar i10-index

Scopus Publications


  • Preface


  • Preface



  • Artificial Intelligence in Telemedicine: Artificial Intelligence in Telemedicine Processing of Biosignals and Medical Images
    S. N. Kumar, Sherin Zafar, Eduard Babulak, M. Afshar Alam, and Farheen Siddiqui

    CRC Press

  • On detecting and identifying faulty internet of things devices and outages
    Feng Wang, Eduard Babulak, and Yongning Tang

    Institute of Advanced Engineering and Science
    As internet of things (IoT) devices play an integral role in our everyday life, it is critical to monitor the health of the IoT devices. However, fault detection in IoT is much more challenging compared with that in traditional wired networks. Traditional observing and polling are not appropriate for detecting faults in resource-constrained IoT devices. Because of the dynamic feature of IoT devices, these detection methods are inadequate for IoT fault detection. In this paper, we propose two methods that can monitor the health status of IoT devices through monitoring the network traffic of these devices. Based on the collected traffic or flow entropy, these methods can determine the health status of IoT devices by comparing captured traffic behavior with normal traffic patterns. Our measurements show that the two methods can effectively detect and identify malfunctioned or defective IoT devices.

  • Flying object tracking and classification of military versus nonmilitary aircraft
    Ehsan Akbari Sekehravani, Eduard Babulak, and Mehdi Masoodi

    Institute of Advanced Engineering and Science
    Tracking of moving objects in a sequence of images is one of the important and functional branches of machine vision technology. Detection and tracking of a flying object with unknown features are important issues in detecting and tracking objects. This paper consists of two basic parts. The first part involves tracking multiple flying objects. At first, flying objects are detected and tracked, using the particle filter algorithm. The second part is to classify tracked objects (military or nonmilitary), based on four criteria; Size (center of mass) of objects, object speed vector, the direction of motion of objects, and thermal imagery identifies the type of tracked flying objects. To demonstrate the efficiency and the strength of the algorithm and the above system, several scenarios in different videos have been investigated that include challenges such as the number of objects (aircraft), different paths, the diverse directions of motion, different speeds and various objects. One of the most important challenges is the speed of processing and the angle of imaging.

  • Implementing canny edge detection algorithm for noisy image
    Ehsan Akbari Sekehravani, Eduard Babulak, and Mehdi Masoodi

    Institute of Advanced Engineering and Science
    Edge detection is a significant stage in different image processing operations like pattern recognition, feature extraction, and computer vision. Although the Canny edge detection algorithm exhibits high precision is computationally more complex contrasted to other edge detection methods. Due to the traditional Canny algorithm uses the Gaussian filter, which gives the edge detail represents blurry also its effect in filtering salt-and-pepper noise is not good. In order to resolve this problem, we utilized the median filter to maintain the details of the image and eliminate the noise. This paper presents implementing and enhance the accuracy of Canny edge detection for noisy images. Results present that this proposed method can definitely overcome noise disorders, preserve the edge useful data, and likewise enhance the edge detection precision.

  • Security validation testing environment in the cloud
    Cristian Bucur and Eduard Babulak

    IEEE
    Researchers are trying to find new ways of finding and pointing out Cybersecurity vulnerabilities by using innovative metrics. New theoretical proposals need to be tested in a real environment, using Cybersecurity tools applications that can validate the applicability of those in real life. This paper presents an experimental flexible environment, which can be used for the validation of several theoretical claims based on an “easy to use” architecture implemented in a cloud environment. The framework provides a much shorter time setup in the real world as well as a much better understanding based on log analysis provided by MS Azure. As a proof of concept, we have tested three different claims and provided proves of results such as screenshots and log samples.

  • BER assessment of OFDM system augmented with MRC technique under the effect of CFO
    Aanchal Jhingan, Lavish Kansal, Gurjot Singh Gaba, Eduard Babulak, and Mohamed Mounir

    IEEE
    Orthogonal frequency division multiplexing (OFDM) and Multiple input multiple output (MIMO) is capable to enhance data rates over the radio channel providing enough protection against the destructions caused in the path of the signal. But the bit error rate (BER) of the systems degrades due to the presence of Carrier frequency offset (CFO). The presence of CFO results in generation of Inter Carrier Interference (ICI) which in turn results in loss of orthogonality between the sub carriers. The significance of MIMO-OFDM is due to orthogonality among the carriers which is at stake due to presence of CFO. In this paper, the performance of the MIMO–OFDM system is analysed over the Rayleigh channel for 2 and 3-array antennas under the effect of CFO with Maximal Ratio Combining (MRC) diversity technique at receiver section. It is observed from simulations that the MIMO-MRC reduces the BER and improves the overall performance of the system which is very much useful to combat against the effects of CFO.

  • A Secure Energy Efficient IoT Based Fractional Correlated Bayesian Data Transmission in WSNs
    Renuka Mohanraj and Eduard Babulak

    Institute of Electrical and Electronics Engineers (IEEE)

  • ICT performance and robustness investigations: Some ethical and human behavior aspects


  • Preserving authenticity and integrity of distributed networks through novel message authentication code
    Gurpreet K. Sodhi, Gurjot S. Gaba, Lavish Kansal, Eduard Babulak, Mohammed AlZain, Sandeep Kumar Arora, and Mehedi Masud

    Institute of Advanced Engineering and Science
    <p>In this era of universal electronic connectivity, communication is no more confined to transfer of data from one end to the other; rather it aims at secure data transfer. Communication sector has developed beyond this traditional boundary of data transfer and is now working on ways to provide data from the intended senders to the intended receivers in an unaltered form. Considering all these conditions, the data transfer needs to follow the principles of authentication, confidentiality and integrity. The former two have been addressed using digital signatures and encryption schemes respectively, while the solution to the later is the use of Message Authentication Code. This paper presents a Message Authentication Code scheme, which uses the biological characteristics represented by Deoxyribonucleic acid combined with the output of Blum Blum Shub Random Number Generator, as a secret key along with a novel hash algorithm. This Message Authentication Code structure is evaluated on the basis of National Institute of Science and Technology test suite for random numbers, avalanche criteria and network attacks. The results reveal that the proposed scheme performs well under all the criteria and thus is capable of preserving integrity; this increases its applicability in any data sensitive environment<em>.</em></p>

  • On detecting unidentified network traffic using pattern-based random walk
    Mehran Alidoost Nia, Reza Ebrahimi Atani, Benjamin Fabian, and Eduard Babulak

    Wiley
    This paper presents a new approach to network traffic control based on the pattern theorem. In order to generate unique detection patterns for the process of traffic analysis, a self-avoiding walk algorithm is used. During data processing and analysis, the traffic patterns are adapted dynamically in real-time. The modified traffic patterns are systematically analyzed using a threat database. In this work, a threshold is set to distinguish and trigger critical levels of threats. The matching process is terminated under each of the three conditions: i pattern matching rate is up to 80%; ii pattern matching rates of at least five various threats are up to 50%; and iii pattern matching is enhanced up to 50% for each matched pattern using an implicit combination of threat coefficients. Our experimental results show that in the worst-case scenario, the true detection rate of malicious traffic is higher than 69%, and in the best situation, it would be about 95% for the same malicious traffic. Also, the precision of false detection for trusted patterns is negligible. Copyright © 2016 John Wiley & Sons, Ltd.

  • Visualization of functions of two variables by anaglyphs


  • A Generic method for the reliable calculation of large-scale fading in an obstacle-dense propagation environment
    Theofilos Chrysikos, Stavros Kotsopoulos, and Eduard Babulak

    IGI Global
    The aim of this chapter is to summarize and present recent findings in the field of wireless channel modeling that provide a new method for the reliable calculation of the statistical parameters of large-scale variations of the average received signal (shadow fading). This algorithm is theoretically based on a path loss estimation model that incorporates losses due to walls and floors. This has been confirmed to be the most precise mathematical tool for average signal strength prediction for various frequencies of interest and propagation environments. The total path loss is estimated as a sum of two independent attenuation processes: free space loss and losses due to obstacles. This solution allows for a direct and reliable calculation of the deviation of the fluctuations of the average received signal in an obstacle-dense environment.

  • ICT for human development in south pacific
    Eduard Babulak

    IEEE
    The author worked past year as Professor & Head of School of Computing, Information and Mathematical Sciences and Director of Japan Pacific ICT Centre at the University of South Pacific. The South Pacific Region has many problems related to environmental and economic issues. The University of the South Pacific (USP) is an ideal platform for provision of development of Human Resources and enhancement of Human Security in the Pacific. Current dynamic Internet developments and continuous demand for the ubiquitous connectivity combined with the next generation of networks contributes towards creation the future cyberspace infrastructures worldwide. Implementation of the cyberspace in the government and corporate infrastructures, contributes towards creation of new paradigm in the decision making processes. Decisions that are currently governed by the human intelligence knowledge and intuition may be influenced by the cyber-data and processes. Future cyberspace will ultimately impact the decision making processes by government, corporate, industrial and academic institutions worldwide. Main objective of ICT Development is to build human-resource for ICT capacity development all across developing countries in the south pacific while “bridging the digital divide”. Main Goal was to provide the south pacific region with appropriate resources to take the lead role in driving the Pacific through Human Resource Development Programs. Specific Goal is to focus on developing and strengthening ICT skills applicable at the e-services level. The author discusses the development of new Japan Pacific Information Communications Technologies (ICT) Centre at the University of the South Pacific and ICT for Human Development and Security in the South Pacific Region. The main objective is to accommodate increasing demand for ICT-related education and training in the region and to accelerate research and development activities in the Pacific. The ICT Centre will play a facilitator role for ICT related education, Training; and Research and Development for the Pacific. In conclusion the author promotes discussion on the role of the role of the ICT in the South Pacific Region. The author opens discussion on ICT's social and ethical impact in the south pacific region in the context of governance vs. privacy.

  • Global cyberspace
    Eduard Babulak

    IEEE
    The author discusses the development of new Information Communications Technologies (ICT) in the areas of eLearning, e-Health, e-Government, e-Journalism, etc. The current Web 2.0 combined with the 3D Telepresence, Future Internet, Semantic Web Technologies provide support to creation of social networks, content retrieval and analysis, which creates foundation for the future fully automated cyberspace. The technical development of Internet and ICT Technologies established a platform for the next generation Internet and ICT often referred to as the next generation cyberspace.The current cyberspace is already changing the way we work, study, live, socialize, etc. The next generation cyberspace combined with the future ICT technologies will drive the e-type applications, such as e-health, e-government, e-security, e-law, e-learning, e-commerce, etc., to the next level of fully automated cyberspace.

  • Future global office
    Eduard Babulak

    IEEE
    The 21st century started new era of global workforce, connectivity, ubiquity and mobility. Past decade will be remembered by dynamic developments and innovation in the field of information technologies (IT), communications and ubiquitous Internet technologies. The 21st Century started with innovation and dynamic developments in the area of next generation networks, Internet 2-3 and Web 2-3 technologies that will transform the current already technology-driven world to next level of Future Cyberspace and Ubiquity. The ubiquity of current internet and future cyber-space facilitates creation of very effective and real-time collaborative environment supported with the Tele-presence and a new generation of Video Conferencing Technologies. Globalization of world trades open doors to mobility of workers as well as creation of virtual teams of experts and virtual companies bringing together experts from all over the world via Telepresence combined with next generation of Holographic Image Technologies.

  • The 21 <sup>st</sup> century cyberspace
    Eduard Babulak

    IEEE
    The author discusses the development of new Information Communications Technologies (ICT) in the areas of e-Learning, e-Health, e-Government, e-Journalism, etc. The current Web 2.0 combined with the 3D Telepresence, Future Internet, Semantic Web Technologies provide support to creation of social networks, content retrieval and analysis, which creates foundation for the future fully automated cyberspace. Current dynamic Internet developments and continuous demand for the ubiquitous connectivity combined with the next generation of networks contributes towards creation the future cyberspace infrastructures worldwide. Implementation of the cyberspace in the government and corporate infrastructures, contributes towards creation of new paradigm in the decision making processes. Decisions that are currently governed by the human intelligence knowledge and intuition may be influenced by the cyber-data and processes. Future cyberspace will ultimately impact the decision making processes by government, corporate, industrial and academic institutions worldwide. In conclusion the author promotes discussion on the social and ethical impact of the future cyberspace and ICT technologies in the context of governance vs. privacy.

  • Teleworking &amp; next generation cyberspace
    Eduard Babulak

    IEEE
    Past decade will be remembered by dynamic developments and innovation in the field of information technologies (IT), communications and ubiquitous Internet technologies. The 21st Century started with innovation and dynamic developments in the area of next generation networks, Internet 2-3 and Web 2-3 technologies that will transform the current already technology-driven world to next level of Future Cyberspace and Ubiquity [1].The ubiquity of current internet and future cyber-space facilitates creation of very effective and real-time collaborative environment supported with the Tele-presence and a new generation of Video Conferencing Technologies. Globalization of world trades open doors to mobility of workers as well as creation of virtual teams of experts and virtual companies bringing together experts from all over the world via Tele-presence combined with next generation of Holographic Image Technologies [2].Given current economic climate, researchers and engineers worldwide are looking for new financially viable software/hardware solutions and platforms for the creation of virtual global corporations. The author discusses the current and future trends in the Future Cyberspace Collaborative Environments, as well as, his own vision on the Next Generation Collaborative Online Systems.

  • The next generation of it & education


  • Next generation of transportation &amp; information technologies
    Eduard Babulak

    ACM
    Transportation and Internet Technologies have evolved dramatically during the last decade, laying solid foundation for the future generation of the Ubiquitous Internet access, omnipresent web technologies and ultimate automated information cyberspace. As a result, the current efforts in the research and development in the areas of Future Transportation and Next Generation of Internet Technologies promotes formation of inter-disciplinary international teams of experts, scientists, researchers and engineers to create a new generation of applications and technologies that will facilitate the future transportation system. The author discusses the current state of the art in the world of Telecommunications and Internet Technologies, new technological trends directions in the application in the Future Transportation.

  • Next generation of applied internet technologies in E-manufacturing
    Eduard Babulak

    IEEE
    In the last decade we have been witnessing a new revolution in information processing and information accessibility via Internet. The evolution of Information Technologies (IT) and personal digital technologies has important impact on automation and manufacturing industry. The IT has become essential component of operational, control and business processes in everyone’s life worldwide. In the area of Real Estate the modern smart houses are now being built enabling owners to change window tints, turn on music, control thermostats, regulate sprinklers, monitor security, and open the front door from their cars [1]. In the medical field the impact of IT is most significant in the area of patient’s remote monitoring, medication administration and diagnosis control. Wearable computers, such as small wristwatch devices enable to check temperatures, news headlines, personal messages, and personal planners. Modern handheld devices, mobile phones, cameras, TVs, and personal computers are converging into single mobile and computational device. In the field of education, most of the colleges are implementing wireless campus enabling students to monitor their course content and working on collaborative projects. Current Precision CNC Lathes and Mills SmartCut II Series are not only a cutting device but a fully computerized and interconnected apparatus controlled remotely via mobile handheld device with wireless link. SmartCut was designed for growing companies evolving from manual lathe operations to CNC and more sophisticated users who would like a simple, easy to use machine. The Fagor 8055TC control is equipped with multiple ports for connection to off-line programming systems for more advanced users. The combination of these control features and hand wheels enable you to use a single machine for one-off or prototype production; in a semi-automatic mode for small production lots; and in its fully automatic mode for medium length production runs [2]. The author discusses the current state of the art and future trend of IT for the 21st century in automation and manufacturing industry as well as in education and public sectors.

  • Channel management schemes to support services in ubiquitous communications infrastructures for future transportation technologies
    Eduard Babulak, Konstantinos G. Ioannou, and Athanasios Ioannou

    IGI Global
    Transportation and Internet Technologies have evolved dramatically during the last decade, laying solid foundation for the future generation of the Ubiquitous Internet access, omnipresent Web technologies and ultimate automated information cyberspace. As a result, the current efforts in the research and development in the areas of Future Transportation and Next Generation of Internet Technologies promotes formation of inter-disciplinary international teams of experts, scientists, researchers and engineers to create a new generation of applications and technologies that will facilitate the future transportation system. The authors present a dynamic channel management scheme for a Mobile Communication System, that supports services in Ubiquitous Communications Infrastructures for Future Transportation Technologies (DCMS-FTT). The performance is improved as it can be seen from the simulation results.

RECENT SCHOLAR PUBLICATIONS

  • Advances in Digital Transformation - Rise of Ultra-Smart Fully Automated Cyberspace
    E Babulak
    PUBLISHED 17 July 2024 DOI 10.5772/intechopen.1000369 ISBN 978-0-85466-508 2024

  • Digitalization of American Aerospace SMEs
    D Salian, E Babulak
    Proceedings of the 3rd International Conference on Big Data Economy and 2024

  • Applied AI and Humanoid Robotics for the Ultra-Smart Cyberspace
    E Babulak
    DOI: 10.4018/979-8-3693-2399-1, ISBN13: 9798369323991|ISBN13 Softcover 2024

  • XAI Human-Machine collaboration applied to network security
    S Moyle, A Martin, N Allott
    Frontiers in Computer Science 6, 1321238 2024

  • Chatbots-The AI-Driven Front-Line Services for Customers
    E Babulak
    2023

  • Introductory Chapter: Journey to AI Driven Chatbots
    E Babulak
    Chatbots-The AI-Driven Front-Line Services for Customers 2023

  • Artificial Intelligence in Telemedicine: Processing of Biosignals and Medical Images
    SN Kumar, S Zafar, E Babulak, MA Alam, F Siddiqui
    CRC Press 2023

  • Acknowledgment to the Reviewers of Photonics in 2022
    ABMM Rahman, A Montanaro, AMV Bharathy, A Puliafito, ...
    2023

  • Malware-Detection and Defense
    E Babulak
    IntechOpen (2022) 2022

  • New Updates in E-learning
    E Babulak
    BoD–Books on Demand 2022

  • Certificate of Recognization
    E Babulak
    University of Missouri, USA 2022

  • International Journal on Advances in Life Sciences Volume 14, Number 1 & 2, 2022
    M Hettinga, Smedberg, A Glascock, H Khachfe, I Evgeniev, TU Sofia, ...
    2022

  • AI Tools for Protecting and Preventing Sophisticated Cyber Attacks
    E Babulak
    https://www.igi-global.com/book/tools-protecting-preventing-sophisticated 2022

  • On detecting and identifying faulty internet of things devices and outages
    F Wang, E Babulak, Y Tang
    Bulletin of Electrical Engineering and Informatics 10 (6), 3127-3136 2021

  • Visualization of functions of two variables by anaglyphs
    M Vargov, D Smetanov, E Babulak
    Available at SSRN 3925864 2021

  • The Good ICT Design and Implementation Practices: Metallurgical and Radio-Astronomic Case Studies
    MR Jozef Bohdan Lewoc, Eduard Babulak, Erich Leitgeb, Nicolae Bulz
    Software Engineering 9 (3), 59-64 2021

  • From E to U: Towards an Innovative Digital Era
    E Babulak
    From E to U: Towards an Innovative Digital Era Spyros P. Angelopoulos 2021

  • ICT Book Aspect Case Study
    B Lewoc, E Babulak, S Cukier, E Leitgeb, M Rozent
    Intechopen, Published: April 14th 2021

  • DAS SMART HOUSE SICHERHEIT
    SSIES VOR
    2021

  • Third Millennium Life Saving Smart Cyberspace Driven by AI & Robotics
    E Babulak
    COJ Rob Artificial Intel 1 (4) 2021

MOST CITED SCHOLAR PUBLICATIONS

  • Discrete event simulation
    E Babulak, M Wang
    Aitor Goti (Hg.): Discrete Event Simulations. Rijeka, Kroatien: Sciyo, 1 2010
    Citations: 122

  • Implementing canny edge detection algorithm for noisy image
    EA Sekehravani, E Babulak, M Masoodi
    Bulletin of Electrical Engineering and Informatics 9 (4), 1404-1410 2020
    Citations: 118

  • Quality of service provision assessment in the healthcare information and telecommunications infrastructures
    E Babulak
    International journal of medical informatics 75 (3-4), 246-252 2006
    Citations: 45

  • From e to u: Towards an innovative digital era
    SP Angelopoulos, FC Kitsios, E Babulak
    Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and 2010
    Citations: 30

  • A Novel Enhanced Positioning Trilateration Algorithm Implemented for Medical Implant In‐Body Localization
    P Brida, J Machaj
    International Journal of Antennas and Propagation 2013 (1), 819695 2013
    Citations: 29

  • Automated environment via cyberspace
    B Eduard
    Proceedings of the International Conference on Applied Computing (IADIS) 2005 2005
    Citations: 22

  • Interdisciplinarity and ubiquitous internet technologies in support of automation
    E Babulak
    International Journal of Online and Biomedical Engineering (iJOE)–eISSN 2006
    Citations: 20

  • Preserving authenticity and integrity of distributed networks through novel message authentication code
    GK Sodhi, G Singh Gaba, L Kansal, E Babulak, M AlZain, S Arora, ...
    Available at SSRN 2018
    Citations: 18

  • Teleworking and next generation cyberpace
    E Babulak
    2009 International Conference on Computational Intelligence, Modelling and 2009
    Citations: 15

  • Ubiquitous internet and house automations
    E Babulak
    The IEEE International Conferecne on Telecommunications Systems, Modeling 2006
    Citations: 15

  • Next Generation of Internet & Telecommunications Technologies for Fully Automated Cyberspace
    B Eduard
    Keynote Speech, the 7th International Conference on New Trends in Technology 2005
    Citations: 15

  • Pervasive and future computing domain
    E Babulak
    invited Plenary Talk, the International Conference on Signals and 2006
    Citations: 14

  • Information cyberspace and future cyber homes
    E Babulak
    iJOE, eISSN, 2626-8493 2006
    Citations: 13

  • Future computing and cyber home 2015
    E Babulak
    the International Review on Computers and Software (IRECOS) 2006
    Citations: 13

  • The IT quality of service provision analysis in light of user’s perception and expectations
    E Babulak, RA Carrasco
    Int. Symp. CSNDSP 2002, 5-8 2002
    Citations: 13

  • Manufacturing for the 21st Century
    E Babulak
    1st Int. Conf. Manufact. Manag 2004
    Citations: 12

  • On detecting unidentified network traffic using pattern‐based random walk
    MA Nia, RE Atani, B Fabian, E Babulak
    Security and Communication Networks 9 (16), 3509-3526 2016
    Citations: 11

  • Future automation via ubiquitous communications technologies
    E Babulak
    Journal of Telecommunications and Information Technology, 83-86 2006
    Citations: 11

  • The university network model for the quality of service provision analysis
    E Babulak, R Carrasco
    International Math Journal, Int. Math. J 2, 651-661 2002
    Citations: 10

  • Third Millennium Life Saving Smart Cyberspace Driven by AI & Robotics
    E Babulak
    COJ Rob Artificial Intel 1 (4) 2021
    Citations: 9

Publications









GRANT DETAILS

Awarded the Cyber Security Grant in the USA and South Korea

CONSULTANCY

Panelist: US National Science Foundation
Expert: European Commission

Industry, Institute, or Organisation Collaboration

Chartered Engineer
Professional Engineer
Chartered Information Technology Professional

INDUSTRY EXPERIENCE

Senior IT Expert -

STARTUP

Head of Community Edorer -

SOCIAL, ECONOMIC, or ACADEMIC BENEFITS

Mentor: