Abdul Razaque

Abdul Razaque
International University of Information Technology | IITU

PhD Computer Science & Engineering
Full Professor and IT Director

About

190
Publications
66,978
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,099
Citations
Introduction
Dr. Abdul Razaque's research interests include wireless sensor networks and ambient intelligence. Dr. Abdul has chaired more than dozen of highly reputed international conferences and delivered lectures as Keynote Speaker. Dr. Abdul also served as IT project Director funded by UNESCO and world Bank in rural areas. He also worked as Chair for Strategic and Planning Committee IEEE SAC Region-1, USA and Relational officer IEEE SAC R-1 for Europe, Africa and Middle East.
Additional affiliations
January 2011 - December 2014
University of Bridgeport
Position
  • Researcher
January 2011 - May 2015
University of Bridgeport
Position
  • Researcher & Adjunct Professor

Publications

Publications (190)
Article
Full-text available
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves...
Conference Paper
Full-text available
The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Senso...
Article
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and...
Article
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on cloud servers without additional waiting time. However, the limited battery power of mobile devices limits access to ample data. To address this problem, job scheduling algorithms based on completion time constraints are introduced to reduce energy consump...
Preprint
Full-text available
Recently, the use of drones/unmanned aerial vehicles (UAVs) has notably increased due to their broad commercial spread and low cost. The wide diffusion of drones increases the hazards of their misuse in illegitimate actions such as drug smuggling and terrorism. Thus, the surveillance and automated detection of drones are crucial for safeguarding re...
Article
Full-text available
People who use social networks often fall prey to clickbait, which is commonly exploited by scammers. The scammer attempts to create a striking headline that attracts the majority of users to click an attached link. Users who follow the link can be redirected to a fraudulent resource, where their personal data are easily extracted. To solve this pr...
Article
Full-text available
Cyber-physical systems (CPS) have developed rapidly in recent years, contributing to an efficient integration between the cyber and physical worlds in intelligent and connected city environments. However, efficient mobility in a CPS is not well solved. Here, we present a prototype for a privacy-aware secure human-centric mobility-aware (SHM) model...
Article
Full-text available
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud com...
Article
Cyber-physical systems (CPSs) have greatly contributed to many applications. A CPS is capable of integrating physical and computational capabilities to interact with individuals through various new modalities. However, there is a need for such a paradigm to focus on the human central nervous system to provide faster data access. This paper introduc...
Article
Full-text available
When people use social networks, they often fall prey to a clickbait scam. The scammer attempts to create a striking headline that attracts the majority of users and attaches a link. The user follows the link and can be redirected to a fraudulent resource where the user easily loses personal data. To solve this problem, a Blockchain-enabled deep re...
Preprint
Full-text available
Nowadays, cloud computing is one of the important and rapidly growing paradigms that extend its capabilities and applications in various areas of life. The cloud computing system challenges many security issues, such as scalability, integrity, confidentiality, and unauthorized access, etc. An illegitimate intruder may gain access to the sensitive c...
Preprint
Full-text available
Time series data are significant and are derived from temporal data, which involve real numbers representing values collected regularly over time. Time series have a great impact on many types of data. However, time series have anomalies. We introduce hybrid algorithm named novel matrix profile (NMP) to solve the all-pairs similarity search problem...
Article
Full-text available
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity....
Article
Full-text available
Citation: Razaque, A.; Frej, M.B.H.; Alotaibi, B.; Alotaibi, M. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics 2021, 10, 2721. Abstract: Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individua...
Article
Full-text available
The fifth-generation (5G) wireless communication systems associating with the high achievable data-transfer speeds will significantly affect the performance of IoT networks. On one hand, the internet goes through a dramatic transaction period that shapes every aspect of our lives, industry, and business where cloud computing, smart cities, and the...
Article
Full-text available
Online social networks (OSNs) play an integral role in facilitating social interaction; however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbully...
Preprint
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity....
Article
Full-text available
Lightweight physical unclonable functions (LPUFs) exploit manufacturing process variations of semiconductor integrated circuits (ICs) to protect IoT-based electronic and smart devices from new cyberattacks. This paper proposes two novel security techniques to enhance the robustness of LPUFs using configurable-based ring oscillator PUFs (CF-ROPUFs)....
Preprint
Full-text available
Online social networks (OSNs) play an integral role in facilitating social interaction; however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbully...
Preprint
Full-text available
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest deve...
Article
Full-text available
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is highly suitable for obtaining virtualized data without additional waiting time. However, the limited battery power of mobile devices limits access to abundant data. To address this problem, an energy-efficient and secure algorithm should be introduced to re...
Article
Full-text available
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these thr...
Article
Full-text available
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers; however, their use provides new opportunities for money launderers and terrorist organizations. This paper proposes a blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for o...
Chapter
Full-text available
A person’s sentiment is rigorously influenced by his emotional feelings which is evoked from every single incident, occurring every day in his surroundings. In this case, the decision that he makes is greatly affected by his sentiment rather than facts. Sentimental behavior can be applied to many applications in health, business, education, etc. Th...
Preprint
Full-text available
The ignorance of or lack of knowledge about cybersecurity aspects causes a critical problem regarding confidentiality and privacy. This security problem will continue to exist even if the user possesses less expertise in information security. The modern IT technologies are well developed, and almost everyone uses the features of IT technologies and...
Article
Full-text available
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have succe...
Preprint
Full-text available
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers; however, their use provides new opportunities for money launders and terrorist organizations. This paper proposes a Blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for out...
Book
This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the si...
Article
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to...
Article
Objective: Electrolyte imbalance is common in acute stroke; it may cause severe morbidity and mortality, so timely management of electrolyte imbalance may improve morbidity and mortality in cerebro-vascular accident. The purpose of this study was to evaluate electrolyte imbalance in acute stroke and its effect on the outcome of patients. Material a...
Conference Paper
Full-text available
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause money loss, and identity theft. In this paper, we contribute to solving the phishing problem by developing an extension for the Google Chrome...
Article
Full-text available
Predicting students’ performance is one of the crucial issue for learning contexts, since it helps to develop alternative recommendation systems for academically weak students. Thus, several methods and practices have been applied for educational improvement. However, most of the existing methods do not determine the performance of the students. In...
Article
Full-text available
Abstract Cloud computing is a model for on-demand delivery of IT resources (e.g., servers, storage, databases, etc.) over the Internet with pay-as-you-go pricing. Although it provides numerous benefits to cloud service users (CSUs) such as flexibility, elasticity, scalability, and economies of scale, there is a large trust deficit between CSUs and...
Article
Full-text available
The cloud computing environment provides easy-to-access service for private and confidential data. However, there are many threats to the leakage of private data. This paper focuses on investigating the vulnerabilities of cloud service providers (CSPs) from three risk aspects: management risks, law risks, and technology risks. Additionally, this pa...
Conference Paper
Full-text available
Expected and unexpected risks in cloud computing, which included data security, data segregation, and the lack of control and knowledge, have led to some dilemmas in several fields. Among all of these dilemmas, the privacy problem is even more paramount, which has largely constrained the prevalence and development of cloud computing. There are seve...
Article
The main objective of the present study is to make different blends of neem and castor biodiesel in order to eliminate the deficiency of the higher cloud point and pour point in case of neem biodiesel and higher kinematic viscosity and density in case of castor biodiesel. The extracted castor and neem seed oil were first converted into biodiesel th...
Article
Full-text available
Worldwide, tuberculosis (TB) is one of the top 10 causes of death, and the leading cause from a single infectious agent. Pakistan has an overwhelming burden of TB and it is a major health hazard for the majority of the rural population. The lung continues to be the most common site of involvement and even after completion of treatment residual chan...
Article
As a results of the large scale development of the Internet of Things (IoT), cloud computing capabilities including networking, data storage, management, and analytics are brought very close to the edge of networks forming Fog computing and enhancing transferring and processing of tremendous amount of data. As the Internet becomes more deeply integ...
Book
Full-text available
As the capabilities of mobile devices increase, their security is becoming more of an issue. Passwords and PINs are the lowest forms of security, yet they are the most widely used. Continuous authentication using behavioral biometrics and multimodal biometrics provides a way to greatly increase security. Using behavioral biometrics, such as linguis...
Article
As a results of the large scale development of the Internet of Things (IoT), cloud computing capabilities including networking, data storage, management, and analytics are brought very close to the edge of networks forming Fog computing and enhancing transferring and processing of tremendous amount of data. As the Internet becomes more deeply integ...
Article
Full-text available
Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary...
Book
Malware involves the worms, Trojan horses and viruses that do malicious activities on mobile and computers by controlling and destroying software processes. Data from Tencent Mobile Security Laboratory reveal that malware consists of various threats and will continue to pop up. Many methods and techniques are necessary for protection against malwar...
Article
Full-text available
With the development of information society and network technology, people increasingly depend on information found on the Internet. At the same time, the models of information diffusion on the Internet are changing as well. However, these models experience the problem due to the fast development of network technologies. There is no thorough resear...
Conference Paper
Full-text available
Advancement in technology improved living standard. Several known and unknown threats are handled using emerging technology. However, burglary threat is not fully addressed. In this paper, we introduce burglary detection (BD) framework to reduce the house thievery crime rate. BD involves secure home application, and framework. Secure home applicati...
Article
Cybercriminal activities over computer network systems are considered one of the preponderant issues that humanity will face in the coming two decades. The development steps in the design of intrusion detection systems must be carried out in analogous manner to sophistication levels of intrusions developed by hackers. This work proposes a layered h...
Chapter
Full-text available
This paper aims to analyze the technology of chatbots and investigate its development, which is becoming a popular trend now. A chatbot can simulate a human being to interact with the people in real-time, using the natural language and sends its response from a knowledge base and a set of business rules. Firstly, by using a few examples of the famo...