Abdul Razaque

Abdul Razaque

PhD Computer Science & Engineering

About

227
Publications
94,338
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,514
Citations
Introduction
Dr. Abdul Razaque's research interests include wireless sensor networks and ambient intelligence. Dr. Abdul has chaired more than dozen of highly reputed international conferences and delivered lectures as Keynote Speaker. Dr. Abdul also served as IT project Director funded by UNESCO and world Bank in rural areas. He also worked as Chair for Strategic and Planning Committee IEEE SAC Region-1, USA and Relational officer IEEE SAC R-1 for Europe, Africa and Middle East.
Additional affiliations
January 2011 - May 2015
University of Bridgeport
Position
  • Researcher & Adjunct Professor
January 2011 - December 2014
University of Bridgeport
Position
  • Researcher

Publications

Publications (227)
Article
Full-text available
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves...
Conference Paper
Full-text available
The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Senso...
Article
Full-text available
The purpose of this research is to contribute to the development of approaches for the classification and segmentation of various gastrointestinal (GI) cancer diseases, such as dyed lifted polyps, dyed resection margins, esophagitis, normal cecum, normal pylorus, normal Z line, polyps, and ulcerative colitis. This research is relevant and essential...
Article
The fight against cancer, a relentless global health crisis, emphasizes the urgency for efficient and automated early detection methods. To address this critical need, this review assesses recent advances in non-invasive cancer prediction techniques, comparing conventional machine learning (CML) and deep neural networks (DNNs). Focusing on these se...
Data
Current certifications.
Article
Full-text available
Background: The modern credit card system is critical, but it has not been fully examined to meet the unique financial needs of a constantly changing number of manufacturers and importers. Methods: An intelligent credit card system integrates the features of artificial intelligence and blockchain technology. The decentralized and unchangeable ledge...
Preprint
Full-text available
The ubiquitous problem of electrical energy waste is driven by human error, in which people regularly forget to turn off appliances when they leave a room, resulting in excessive consumption. The paper presents an energy-efficient TRIZ-inspired (EETRIZ) paradigm to automate consumer electronic devices in order to address this problem. Employing mot...
Article
Full-text available
Low-speed internet can negatively impact incident response by causing delayed detection, ineffective response, poor collaboration, inaccurate analysis, and increased risk. Slow internet speeds can delay the receipt and analysis of data, making it difficult for security teams to access the relevant information and take action, leading to a fragmente...
Article
Full-text available
Robotic process automation (RPA) is a popular process automation technology that leverages software to play the function of humans when employing graphical user interfaces. RPA’s scope is limited, and various requirements must be met for it to be applied efficiently. Business process management (BPM), on the other hand, is a well-established area o...
Article
Full-text available
Introduction Chronic venous insufficiency is a common condition that leads to the development of incompetent great or short saphenous veins (GSV or SSV) resulting in varicose vein development. Conservative management is initially employed for its treatment; however, the varicosities that do not respond to conservative management may require interve...
Article
Full-text available
Diabetes is a chronic disease that affects people all over the world and raises the glucose level in the blood as a result of a lack of insulin. Diabetic Retinopathy causes retinal eye disease, which impairs vision and eventually results in blindness. The two classifications of Diabetic Retinopathy based on retinal indicators are Non-Proliferative...
Article
Full-text available
Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN),...
Article
Introduction Hepatocellular carcinoma (HCC) is a common primary hepatic cancer. Its early diagnosis can aid in its treatment by curative means such as surgery or ablation. Advanced-stage diagnosis limits these treatment options, and such cases can be treated with transarterial chemoembolization (TACE). Conventional transarterial chemoembolization (...
Article
Full-text available
Finding reliable and efficient routes is a persistent problem in megacities. To address this problem, several algorithms have been proposed. However, there are still areas of research that require attention. Many traffic-related problems can be resolved with the help of smart cities that incorporate the Internet of Vehicles (IoV). On the other hand...
Chapter
Cloud-based processes store enormous amounts of data to support several daily applications, especially in intelligent systems and the Industrial Internet of Things (IIoT) applications. The advancement of hosted cloud storage services endorses the productivity of IIoT applications. It is critical to enabling businesses to increase data security, pri...
Chapter
Precise data input classification and identification are essential for developing high-quality intelligent systems, including defending systems against cyberattacks and guaranteeing data protection. The Internet of Things (IoT), in particular, offers specific problems for cybersecurity not because of the volumes of data generated in a short time bu...
Article
Full-text available
Mobile technologies are an essential part of people’s everyday lives since they are utilized for a variety of purposes, such as communication, entertainment, commerce, and education. However, when these gadgets are misused, the human body is exposed to continuous radiation from the electromagnetic field created by them. The communication services a...
Article
Full-text available
The Quality-of-Service (QoS) provision in machine learning is affected by lesser accuracy, noise, random error, and weak generalization (ML). The Parallel Turing Integration Paradigm (PTIP) is introduced as a solution to lower accuracy and weak generalization. A logical table (LT) is part of the PTIP and is used to store datasets. The PTIP has elem...
Article
Full-text available
The overall purpose of this study is to explore the potential of quantum-based communication networks, leveraging the unique properties of quantum entanglement and superposition, to address critical applications, such as image processing, machine learning, data mining, and encryption. Additionally, this research aims to overcome the limitations of...
Article
Full-text available
Currently, fraud detection is employed in numerous domains, including banking, finance, insurance, government organizations, law enforcement, and so on. The amount of fraud attempts has recently grown significantly, making fraud detection critical when it comes to protecting your personal information or sensitive data. There are several forms of fr...
Article
Full-text available
Time series data are significant, and are derived from temporal data, which involve real numbers representing values collected regularly over time. Time series have a great impact on many types of data. However, time series have anomalies. We introduce an anomaly detection paradigm called novel matrix profile (NMP) to solve the all-pairs similarity...
Article
The rapid development of the emerging Internet of things (IoT) regime and of smart applications has given rise to many new wireless security vulnerabilities in consumer electronic environment networks, which compromises the integrity of the whole environment. Attacks often encompass the abuse of vulnerable wireless IoT consumer electronics devices,...
Article
Full-text available
Drones/unmanned aerial vehicles (UAVs) have recently grown in popularity due to their inexpensive cost and widespread commercial use. The increased use of drones raises the possibility that they may be employed in illicit activities such as drug smuggling and terrorism. Thus, drone monitoring and automated detection are critical for protecting rest...
Article
Full-text available
In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User aut...
Article
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and...
Article
Wi-Fi plays an important role in promoting several application domains such as business, education, industry, etc. On the other hand, if not handled properly, vulnerabilities of Wi-Fi cause damage to the privacy and confidentiality of the users. Some of the hackers use the Linux tool to exploit the vulnerability of Wi-Fi that allows of the hacking...
Article
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on cloud servers without additional waiting time. However, the limited battery power of mobile devices limits access to ample data. To address this problem, job scheduling algorithms based on completion time constraints are introduced to reduce energy consump...
Article
Objective: To depict and characterize CT patterns of omental pathology and to determine the validity of omental caking in diagnosis of ovarian cancer. Methodology: A cross-sectional study was conducted in a tertiary care center between January 2020 to February 2021. In this study, 64 consecutive female patients with omental pathology, scheduled for...
Preprint
Full-text available
Recently, the use of drones/unmanned aerial vehicles (UAVs) has notably increased due to their broad commercial spread and low cost. The wide diffusion of drones increases the hazards of their misuse in illegitimate actions such as drug smuggling and terrorism. Thus, the surveillance and automated detection of drones are crucial for safeguarding re...
Article
Full-text available
People who use social networks often fall prey to clickbait, which is commonly exploited by scammers. The scammer attempts to create a striking headline that attracts the majority of users to click an attached link. Users who follow the link can be redirected to a fraudulent resource, where their personal data are easily extracted. To solve this pr...
Article
Full-text available
Cyber-physical systems (CPS) have developed rapidly in recent years, contributing to an efficient integration between the cyber and physical worlds in intelligent and connected city environments. However, efficient mobility in a CPS is not well solved. Here, we present a prototype for a privacy-aware secure human-centric mobility-aware (SHM) model...
Article
Full-text available
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud com...
Article
Full-text available
Cyber-physical systems (CPSs) have greatly contributed to many applications. A CPS is capable of integrating physical and computational capabilities to interact with individuals through various new modalities. However, there is a need for such a paradigm to focus on the human central nervous system to provide faster data access. This paper introduc...
Article
Full-text available
When people use social networks, they often fall prey to a clickbait scam. The scammer attempts to create a striking headline that attracts the majority of users and attaches a link. The user follows the link and can be redirected to a fraudulent resource where the user easily loses personal data. To solve this problem, a Blockchain-enabled deep re...
Preprint
Full-text available
Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive c...
Preprint
Full-text available
Time series data are significant and are derived from temporal data, which involve real numbers representing values collected regularly over time. Time series have a great impact on many types of data. However, time series have anomalies. We introduce hybrid algorithm named novel matrix profile (NMP) to solve the all-pairs similarity search problem...
Article
Full-text available
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity....
Article
Full-text available
Citation: Razaque, A.; Frej, M.B.H.; Alotaibi, B.; Alotaibi, M. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics 2021, 10, 2721. Abstract: Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individua...
Article
Full-text available
The fifth-generation (5G) wireless communication systems associating with the high achievable data-transfer speeds will significantly affect the performance of IoT networks. On one hand, the internet goes through a dramatic transaction period that shapes every aspect of our lives, industry, and business where cloud computing, smart cities, and the...
Article
Full-text available
Online social networks (OSNs) play an integral role in facilitating social interaction; however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbully...
Preprint
Full-text available
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity....
Article
Full-text available
Lightweight physical unclonable functions (LPUFs) exploit manufacturing process variations of semiconductor integrated circuits (ICs) to protect IoT-based electronic and smart devices from new cyberattacks. This paper proposes two novel security techniques to enhance the robustness of LPUFs using configurable-based ring oscillator PUFs (CF-ROPUFs)....
Preprint
Full-text available
Online social networks (OSNs) play an integral role in facilitating social interaction; however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbully...
Preprint
Full-text available
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest deve...
Article
Full-text available
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is highly suitable for obtaining virtualized data without additional waiting time. However, the limited battery power of mobile devices limits access to abundant data. To address this problem, an energy-efficient and secure algorithm should be introduced to re...
Article
Full-text available
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these thr...
Article
Full-text available
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers; however, their use provides new opportunities for money launderers and terrorist organizations. This paper proposes a blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for o...
Chapter
Full-text available
A person’s sentiment is rigorously influenced by his emotional feelings which is evoked from every single incident, occurring every day in his surroundings. In this case, the decision that he makes is greatly affected by his sentiment rather than facts. Sentimental behavior can be applied to many applications in health, business, education, etc. Th...
Preprint
Full-text available
The ignorance of or lack of knowledge about cybersecurity aspects causes a critical problem regarding confidentiality and privacy. This security problem will continue to exist even if the user possesses less expertise in information security. The modern IT technologies are well developed, and almost everyone uses the features of IT technologies and...
Article
Full-text available
Objectives: A prospective observational study was aimed to assess the role of plain radiographs and computed tomography in detecting head injuries presented at the medicolegal office at the Forensics and Radiology Departments, Gambat Medical Hospital, Sindh. Material and Methods: All cases referred from the Medicolegal Office (MLO) with head injury...
Article
Full-text available
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have succe...
Preprint
Full-text available
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers; however, their use provides new opportunities for money launders and terrorist organizations. This paper proposes a Blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for out...
Book
This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the si...
Article
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to...
Article
Full-text available
Objective: Electrolyte imbalance is common in acute stroke; it may cause severe morbidity and mortality, so timely management of electrolyte imbalance may improve morbidity and mortality in cerebro-vascular accident. The purpose of this study was to evaluate electrolyte imbalance in acute stroke and its effect on the outcome of patients. Material a...
Conference Paper
Full-text available
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause money loss, and identity theft. In this paper, we contribute to solving the phishing problem by developing an extension for the Google Chrome...