Programs
lili-saghafi

Lili Saghafi

Computer Science — MIS; CASP; CISO; PMP

Sessional

BIOGRAPHY

Professor Saghafi served as Computer Science / MBA Faculty, Dean / Director of Continuing Education also as the Chair of IT college, Computer Engineering, Computer Science, in many different countries and 4 different continents. She also teaches both on-campus and in the distance learning programs, often combining the students in both modes. Her research is on:

  • Understanding how and why a quantumcomputer is more powerful than a classical one
  • Quantum fault-tolerance anderror-correction — necessary for achieving scalable quantum computation
  • Simulation of quantum systems in general and quantum computers in particular, on classical and on quantum computers
  • Design of quantum algorithms: what would you do with a working quantum computer?
  • Building scalable quantum processors and quantum memory
  • Optimization of quantum control signals, circuits, and programs
  • Developing tests for quantum hardware: is it really quantum?

Professor Saghafi’s research in programming languages includes object-oriented programming for Web Implementation and E-Commerce; there are ASP, JavaScript, and VBScript, using various applications like IBM Web Sphere, MS FrontPage and Cold Fusion, Visual Web Developer. She uses the web programming language extensively in her research and teaching and is committed to its broadening use and continued refinement. her research interest is in digital and wireless communications, Digital Media and  Biomedical Image Processing.

She is working on the Youth Employment Strategy to create internships for post-secondary graduates in “high-demand fields”. Also, she is working on the Canada Accelerator and Incubator programs to help organizations provide business development services to businesses and entrepreneurs;

With involving different countries collected data she also works on establishing an OpenData Board.

Also, she is working on developing a PC based virtual reality system (PC-VRS) for the medical market that can be marketed at a price which is accessible to its possible end-users (hospitals, universities, and research centers) and which would have the modular, respectability and interoperability characteristics that the existing systems lack; to develop three hardware/software modules for the application of the PC VRS.

Professor Saghafi is conducting research in asynchronous learning networks and distance education, and infrastructures for future educational software.   She has vast research experience over topics in relation with Quantum Computers, web2 and using mobile capability in teaching and as part of distance education, working research on VRS Virtual Reality Systems, Web software development, open source software development, agile development approaches, business intelligence/Analytic and Big Data analysis.

She is SAP consultant/trainer and a professional member of ACM, International Conference on Cyber Warfare and Security ICCWS, International Conference European Conference on eGovernment – ECEG, QA auditor for IQEF  and member of Canada’s Association of Information Technology Professionals  CIPS.

She is a professional member of ACM, QA auditor for IQEF  and member of Canada’s Association of Information Technology Professionals  CIPS. Also,     a Certified CompTIA, CASP /Chief Information Security Officer (CISO) and Project Management Professional. Trained in 2014 for Design and Development of Educational Technology and Design and Development of Games for Learning from MIT.

Professor Saghafi has enormous experience in Development of programs and curriculum for technical Colleges and Universities around the world programs in E-learning /Distance Education, Computer Science, MBA program with IT concentration, MBAwith the concentration in PM approved by the ministry of education for University and Colleges, in various part of the world. She is the director of Interdisciplinary Research ConsultingBoard (IRCB) which mainly aims to facilitate research and contribute to the maturation of the research in Higher Educational Institutions and help and encourage faculty members to conduct research.

Her teaching interest is on any subject which provides tangible outcome for students in Computer Science and CIS. Various courses in Cybersecurity, Databases /Data Science /Blockchain Technology, Software Engineering , Quantum Computing and AI.

She is Multilingual, and have knowledge of  5 different languages. She presently works as a Computer Science Faculty and Computer Science / MBA Online Program/Course Developer / Consultant Expert at University.

Publications

QIP 2016 Accepted Posters | QIP 2016 | University of Calgary
https://www.ucalgary.ca/qip2016/home/accepted-posters

Quantum computing, superposition qubits , Quantum Computing Journal Quantum Computing, Quantum Error Correction, http://www.slideshare.net/lsaghafi/quantum-computers-new-generation-of-computers-part-8-quantum-error-correction-by-prof-lili-saghafi?qid=c4bb9488-53ca-468f-8603-69f46b0e0145&v=&b=&from_search=1

Using Predictive Analytics? Here’s Why You Should Start Today http://cuspcreativeagency.com/thecusp/using-predictive-analytics-heres-why-you-should-start-today/

Quantum Algorithm http://www.slideshare.net/lsaghafi/quantum-computers-new-generation-of-computers-part-7-by-prof-lili-saghafi-quantum-algorithm

Cybersecurity, RSA Conference, http://www.slideshare.net/lsaghafi/the-front-lines-of-cyber-security-by-prof-lili-saghafi

Network Security Threats within BYOD, Conference on Communication and Network Security (ICCNS 2014)

Essential Security Control Implementation, Conference on Cyber Warfare and Security Fighting Advanced Threats, Big data and Predictive Analytics Big data and Predictive Analytics https://smallbiztrends.com/2016/08/predictive-analytics-examples.html

Cybersecurity and Big Data, Seminar big Data Design, Code, Test, Repeat dl.acm.org/citation.cfm?id=1523428 by B Myers – ‎2008

Reviewer: Lili Saghafi. As a professor and consultant in the industry for many years, I know that programming does not come naturally to everyone. Good programmers can earn six-digit salaries with only bachelor’s degrees and, every day, have a chance to be creative in de more… Computing Reviews logo. Access critical …

A Review: “A New Approach to Modular Database Systems”
ISBN: 978-0-9920569-0-2, Journal of IRCB

Design, code, test, repeat  Journal of ACM http://www.computingreviews.com/review/review_review.cfm?review_id=137120
Quantum Information Processing https://www.ucalgary.ca/qip2016/home/accepted-posters
PDF]Download – Covenant University covenantuniversity.edu.ng/…/E-Government+Proceedings+Published+2015+ECEG_P…

Oct 17, 2011 – Lili Saghafi (Canadian International College, Egypt); Dr. Ilias Said (Universiti Sains Malaysia, Malaysia); Dr. Reiter Sandrine (CRP Henri Tudor, Luxembourg); Prof. Chaudhary Imran Sarwar (Mixed Reality University, Paki-stan); Angel Saz (Institute on Public Governance and Management, ESADE, Spain); …

BI-DW & Predictive Analytics Journal of Scoop http://www.scoop.it/t/predictitive-analytics
Factors influencing knowledge sharing and knowledge management among undergraduate students: Comparative studies between Middle eastern students versus North American Students (focuses on a study of knowledge sharing behavior among undergraduate students in two different continents.) ISBN: 978-0-9920569-2-6 ECKM 2012
Implementation of Digital Public Library of America, Berkman Center of Internet & Society, at Harvard University, 2011

Social Networking in Higher Education and Distance learning SIEC-ISBE 978-0-9920569-3-3 2011

Usage of RFID and nanotechnology for Crowd Control

Development and measuring the effectiveness of RFID tracker software in Crowd Control
RFID Host Software development for Crowd Control, Counting, Access Control, and Asset Control.

RFID tags/ tag readers developments that can read off sight and miles distance and persistently broadcasting its contents.

Working research on VRS Virtual and Augmented Reality Systems especially in the medical field and biomedical and on Image reconstruction and modeling techniques which allow instant processing of 2D signals to create 3D images.

BI and Data Mining for Analytic, ISBN: 978-0-9920569-4-0, ITC-AP 2013
Research on mobile capability in teaching and as part of distance education (2009-2011)

Survey of student’s satisfaction during 2008-2010 ( Universities newsletters)

Research on Student’s Learning Style ( Universities newsletters)

Securing & Protecting Crowd By Implication of RFID For Crowd Control

Finding the effectiveness of RFID to protect & secure the crowd

Survey of student’s satisfaction (COB 2007)
Study of student’s level of gratitude toward the university’s course and programs

Testing and verification Mobile Device Security with Nanotechnology Scientific Journals International (SJI), ISBN: 978-0-9920569-5-7, 2009

Automated program specifications (ISBE, 2002) “Application writing requires good program specifications, which is a tiresome process, making it automatically reduce the trouble of this process”.

Test suites (ISBE, 2003)

Artificial intelligence Nanotechnology and Security (ACM, 2008)

VRS (ACM, 2008) PC based virtual reality system for hospitals, universities and research centers

Theory Social Media, why training can be a key? ( ACM, 2010)

Review: Design, Code, TEST, repeat ( Review ACM, 2009)

Culture of Security ( ACM, 2008)

Watermarking (ACM Journal 2002)

Intellectual property: should software be protected? (ACM Journal 2004)

E-Commerce and notion of trust (ACM Journal 2005)

The notion of trust based on various consideration of watermarking, digital

certificate and … are discussed.

E-Commerce and Cyber Crime (Business Week- Panel 2008)
While most IS professionals recognize the benefits of protecting and securing data, the business leaders in the organization still sees security as a ‘nice to have’ rather than a ‘need to have,’…

E-Commerce and Security (Bahamas Agricultural Corporation 2008)
With the increased reliance on the Internet, companies have become dependent on electronic transactions, communications and capabilities. When these resources are affected by security breaches, it can cripple many businesses — and bring others down completely…

Training trainers (ISBE Conference, 2007)
IT Strategic Planning for Higher Education (ISBI, 2008)
Modeling the IT value Paradox (Review ACM, 2008) http://dl.acm.org/citation.cfm?doid=1278201.1278204

Seven steps to better e-Learning (Review ACM, 2008)
Modular Database Systems (Review ACM, 2008)
Intellectual property in computing: (How) should software be protected? An industry perspective (ACM Journal 2004)
E-Commerce and notion of trust (ACM Journal 2005)
Review E-Learning (ACM 2006)
Improving Learning Process (ACM 2005)
Different learning styles and classroom technology, (ISBI, 2003)
Developmental studies and student success (ISBI, 2004)
Review A new approach to modular database systems (ACM 2008)
Review: Design, Code, TEST, repeat ( Review ACM, 2009)
Translation of Structured COBOL Programming from English to Persian

Assisted in producing this workbook, which is used by more than 500 students each quarter.
Translation of System Analysis & Design from English to Persian, Writing and Producing COBOL workbook for students.
Writing and Producing SQL workbook for students.
Writing and Producing Networking & Troubleshooting workbook In Education

Training Trainers (International Journal of multicultural education, 2008)
Test suites (ISBE, 2003)

Teaching interests
Professor Saghafi’s teaching interest is on any COM or CIS/MIS subject which provides tangible outcomes for students in Computer Science, CIS. Various courses in Cybersecurity, Databases /Data Science /Blockchain Technology, Software Engineering, Quantum Computing, and AI.    List of the courses she taught and Developed:  https://proflilisaghafi.wixsite.com/prof-lili-saghafi/course-list-taught-developed