About
227
Publications
94,338
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,514
Citations
Introduction
Dr. Abdul Razaque's research interests include wireless sensor networks and ambient intelligence.
Dr. Abdul has chaired more than dozen of highly reputed international conferences and delivered lectures as Keynote Speaker. Dr. Abdul also served as IT project Director funded by UNESCO and world Bank in rural areas. He also worked as Chair for Strategic and Planning Committee IEEE SAC Region-1, USA and Relational officer IEEE SAC R-1 for Europe, Africa and Middle East.
Additional affiliations
January 2011 - May 2015
January 2011 - December 2014
Publications
Publications (227)
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves...
The revolution of wireless sensors networks (WSNs) has highly augmented the
expectations of people to get the work done efficiently, but there is little
bit impediment to deal with deployed nodes in WSNs. The nature of used routing
and medium access control (MAC) protocols in WSNs is completely different from
wireless adhoc network protocols. Senso...
The purpose of this research is to contribute to the development of approaches for the classification and segmentation of various gastrointestinal (GI) cancer diseases, such as dyed lifted polyps, dyed resection margins, esophagitis, normal cecum, normal pylorus, normal Z line, polyps, and ulcerative colitis. This research is relevant and essential...
The fight against cancer, a relentless global health crisis, emphasizes the urgency for efficient and automated early detection methods. To address this critical need, this review assesses recent advances in non-invasive cancer prediction techniques, comparing conventional machine learning (CML) and deep neural networks (DNNs). Focusing on these se...
Background: The modern credit card system is critical, but it has not been fully examined to meet the unique financial needs of a constantly changing number of manufacturers and importers. Methods: An intelligent credit card system integrates the features of artificial intelligence and blockchain technology. The decentralized and unchangeable ledge...
The ubiquitous problem of electrical energy waste is driven by human error, in which people regularly forget to turn off appliances when they leave a room, resulting in excessive consumption. The paper presents an energy-efficient TRIZ-inspired (EETRIZ) paradigm to automate consumer electronic devices in order to address this problem. Employing mot...
Low-speed internet can negatively impact incident response by causing delayed detection, ineffective response, poor collaboration, inaccurate analysis, and increased risk. Slow internet speeds can delay the receipt and analysis of data, making it difficult for security teams to access the relevant information and take action, leading to a fragmente...
Robotic process automation (RPA) is a popular process automation technology that leverages software to play the function of humans when employing graphical user interfaces. RPA’s scope is limited, and various requirements must be met for it to be applied efficiently. Business process management (BPM), on the other hand, is a well-established area o...
Introduction
Chronic venous insufficiency is a common condition that leads to the development of incompetent great or short saphenous veins (GSV or SSV) resulting in varicose vein development. Conservative management is initially employed for its treatment; however, the varicosities that do not respond to conservative management may require interve...
Diabetes is a chronic disease that affects people all over the world and raises the glucose level in the blood as a result of a lack of insulin. Diabetic Retinopathy causes retinal eye disease, which impairs vision and eventually results in blindness. The two classifications of Diabetic Retinopathy based on retinal indicators are Non-Proliferative...
Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN),...
Introduction Hepatocellular carcinoma (HCC) is a common primary hepatic cancer. Its early diagnosis can aid in its treatment by curative means such as surgery or ablation. Advanced-stage diagnosis limits these treatment options, and such cases can be treated with transarterial chemoembolization (TACE). Conventional transarterial chemoembolization (...
Finding reliable and efficient routes is a persistent problem in megacities. To address this problem, several algorithms have been proposed. However, there are still areas of research that require attention. Many traffic-related problems can be resolved with the help of smart cities that incorporate the Internet of Vehicles (IoV). On the other hand...
Cloud-based processes store enormous amounts of data to support several daily applications, especially in intelligent systems and the Industrial Internet of Things (IIoT) applications. The advancement of hosted cloud storage services endorses the productivity of IIoT applications. It is critical to enabling businesses to increase data security, pri...
Precise data input classification and identification are essential for developing high-quality intelligent systems, including defending systems against cyberattacks and guaranteeing data protection. The Internet of Things (IoT), in particular, offers specific problems for cybersecurity not because of the volumes of data generated in a short time bu...
Mobile technologies are an essential part of people’s everyday lives since they are utilized for a variety of purposes, such as communication, entertainment, commerce, and education. However, when these gadgets are misused, the human body is exposed to continuous radiation from the electromagnetic field created by them. The communication services a...
The Quality-of-Service (QoS) provision in machine learning is affected by lesser accuracy, noise, random error, and weak generalization (ML). The Parallel Turing Integration Paradigm (PTIP) is introduced as a solution to lower accuracy and weak generalization. A logical table (LT) is part of the PTIP and is used to store datasets. The PTIP has elem...
The overall purpose of this study is to explore the potential of quantum-based communication networks, leveraging the unique properties of quantum entanglement and superposition, to address critical applications, such as image processing, machine learning, data mining, and encryption. Additionally, this research aims to overcome the limitations of...
Currently, fraud detection is employed in numerous domains, including banking, finance, insurance, government organizations, law enforcement, and so on. The amount of fraud attempts has recently grown significantly, making fraud detection critical when it comes to protecting your personal information or sensitive data. There are several forms of fr...
Time series data are significant, and are derived from temporal data, which involve real numbers representing values collected regularly over time. Time series have a great impact on many types of data. However, time series have anomalies. We introduce an anomaly detection paradigm called novel matrix profile (NMP) to solve the all-pairs similarity...
The rapid development of the emerging Internet of things (IoT) regime and of smart applications has given rise to many new wireless security vulnerabilities in consumer electronic environment networks, which compromises the integrity of the whole environment. Attacks often encompass the abuse of vulnerable wireless IoT consumer electronics devices,...
Drones/unmanned aerial vehicles (UAVs) have recently grown in popularity due to their inexpensive cost and widespread commercial use. The increased use of drones raises the possibility that they may be employed in illicit activities such as drug smuggling and terrorism. Thus, drone monitoring and automated detection are critical for protecting rest...
In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User aut...
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and...
Wi-Fi plays an important role in promoting several application domains such as business, education, industry, etc. On the other hand, if not handled properly, vulnerabilities of Wi-Fi cause damage to the privacy and confidentiality of the users. Some of the hackers use the Linux tool to exploit the vulnerability of Wi-Fi that allows of the hacking...
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on cloud servers without additional waiting time. However, the limited battery power of mobile devices limits access to ample data. To address this problem, job scheduling algorithms based on completion time constraints are introduced to reduce energy consump...
Objective: To depict and characterize CT patterns of omental pathology and to determine the validity of omental caking in diagnosis of ovarian cancer. Methodology: A cross-sectional study was conducted in a tertiary care center between January 2020 to February 2021. In this study, 64 consecutive female patients with omental pathology, scheduled for...
Recently, the use of drones/unmanned aerial vehicles (UAVs) has notably increased due to their broad commercial spread and low cost. The wide diffusion of drones increases the hazards of their misuse in illegitimate actions such as drug smuggling and terrorism. Thus, the surveillance and automated detection of drones are crucial for safeguarding re...
People who use social networks often fall prey to clickbait, which is commonly exploited by scammers. The scammer attempts to create a striking headline that attracts the majority of users to click an attached link. Users who follow the link can be redirected to a fraudulent resource, where their personal data are easily extracted. To solve this pr...
Cyber-physical systems (CPS) have developed rapidly in recent years, contributing to an efficient integration between the cyber and physical worlds in intelligent and connected city environments. However, efficient mobility in a CPS is not well solved. Here, we present a prototype for a privacy-aware secure human-centric mobility-aware (SHM) model...
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud com...
Cyber-physical systems (CPSs) have greatly contributed to many applications. A CPS is capable of integrating physical and computational capabilities to interact with individuals through various new modalities. However, there is a need for such a paradigm to focus on the human central nervous system to provide faster data access. This paper introduc...
When people use social networks, they often fall prey to a clickbait scam. The scammer attempts to create a striking headline that attracts the majority of users and attaches a link. The user follows the link and can be redirected to a fraudulent resource where the user easily loses personal data. To solve this problem, a Blockchain-enabled deep re...
Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive c...
Time series data are significant and are derived from temporal data, which involve real numbers representing values collected regularly over time. Time series have a great impact on many types of data. However, time series have anomalies. We introduce hybrid algorithm named novel matrix profile (NMP) to solve the all-pairs similarity search problem...
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity....
Citation: Razaque, A.; Frej, M.B.H.; Alotaibi, B.; Alotaibi, M. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics 2021, 10, 2721. Abstract: Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individua...
The fifth-generation (5G) wireless communication systems associating with the high achievable data-transfer speeds will significantly affect the performance of IoT networks. On one hand, the internet goes through a dramatic transaction period that shapes every aspect of our lives, industry, and business where cloud computing, smart cities, and the...
Online social networks (OSNs) play an integral role in facilitating social interaction; however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbully...
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity....
Lightweight physical unclonable functions (LPUFs) exploit manufacturing process variations of semiconductor integrated circuits (ICs) to protect IoT-based electronic and smart devices from new cyberattacks. This paper proposes two novel security techniques to enhance the robustness of LPUFs using configurable-based ring oscillator PUFs (CF-ROPUFs)....
Online social networks (OSNs) play an integral role in facilitating social interaction; however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbully...
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest deve...
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is highly suitable for obtaining virtualized data without additional waiting time. However, the limited battery power of mobile devices limits access to abundant data. To address this problem, an energy-efficient and secure algorithm should be introduced to re...
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these thr...
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers; however, their use provides new opportunities for money launderers and terrorist organizations. This paper proposes a blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for o...
A person’s sentiment is rigorously influenced by his emotional feelings which is evoked from every single incident, occurring every day in his surroundings. In this case, the decision that he makes is greatly affected by his sentiment rather than facts. Sentimental behavior can be applied to many applications in health, business, education, etc. Th...
The ignorance of or lack of knowledge about cybersecurity aspects causes a critical problem regarding confidentiality and privacy. This security problem will continue to exist even if the user possesses less expertise in information security. The modern IT technologies are well developed, and almost everyone uses the features of IT technologies and...
Objectives: A prospective observational study was aimed to assess the role of plain radiographs and computed tomography in detecting head injuries presented at the medicolegal office at the Forensics and Radiology Departments, Gambat Medical Hospital, Sindh. Material and Methods: All cases referred from the Medicolegal Office (MLO) with head injury...
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have succe...
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers; however, their use provides new opportunities for money launders and terrorist organizations. This paper proposes a Blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for out...
This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the si...
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to...
Objective: Electrolyte imbalance is common in acute stroke; it may cause severe morbidity and mortality, so timely management of electrolyte imbalance may improve morbidity and mortality in cerebro-vascular accident. The purpose of this study was to evaluate electrolyte imbalance in acute stroke and its effect on the outcome of patients. Material a...
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause money loss, and identity theft. In this paper, we contribute to solving the phishing problem by developing an extension for the Google Chrome...