
Mohd Shahid Husain- Doctor of Philosophy
- Professor (Assistant) at University of Technology and Applied Sciences (CAS - Ibri) Oman
Mohd Shahid Husain
- Doctor of Philosophy
- Professor (Assistant) at University of Technology and Applied Sciences (CAS - Ibri) Oman
About
85
Publications
38,705
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
460
Citations
Introduction
I am a Research professional and Faculty member with more than 14 years of teaching & research experience. My focus has been on Information Retrieval, Natural Language Processing, Soft Computing, Computer Networks & Security, Cloud Computing, Big Data Analytic, Data Mining and Ad-Hoc Networks. I enjoy networking with professionals from any industry on a global scale and encourage you to contact me at any time…. Thanks!
Current institution
University of Technology and Applied Sciences (CAS - Ibri) Oman
Current position
- Professor (Assistant)
Additional affiliations
October 2018 - present
University of Technology & Applied Sciences Oman
Position
- Professor (Assistant)
July 2008 - June 2010
July 2010 - October 2018
Education
November 2012 - November 2017
June 2008 - June 2010
Publications
Publications (85)
The risk from natural disasters is incessantly growing with the complex nature of advancing globalization. The escalating change in global climate is a driving factor in increasing floods and hence, flood damage assessment and controls is an utmost necessity. Synthetic aperture radar satellite images have a high spatial resolution acquired in all w...
Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a greater need for privacy in terms of data, and utilizing secure services is highly recommended. So, data...
In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside. Secure communications rely on the sender and receiver devices having self-sustaining authentication methods. The perquisites of the authentication methods are to grip communication without being falsified...
Energy theft is a significant problem that needs to be addressed for effective energy management in smart cities.
Smart meters are highly utilized in smart cities that help in monitoring the energy utilization level and provide
information to the users. However, it is not able to detect energy theft or over-usage. Therefore, we have proposed
a mult...
This book will provide in depth knowledge about the concepts, technologies and application areas of big data analytics. The book will deal with the important attention regarding the state of the art technologies in use for big data analytics. It will provide in-depth discussion about the important sectors where big data analytics is proved to be ve...
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effective...
Deepfake technology is an emerging technology prevailing in today's digital world. It is used to create fake videos by exploiting some of the artificial intelligence (AI) based techniques and deep learning methodology. The facial expressions and motion effects are primarily used to train and manipulate the seed frame of someone to generate the desi...
The untimely monsoon floods and the rise in the level of rivers in the north Indian state of Uttar Pradesh (UP) is a major challenge for coordinating relief and rescue operations. To address this challenge, the experts that are deploying a variety of techniques to evaluate the damages might get useful information from synthetic aperture radar (SAR)...
We are delighted to intimate you that after the resounding success of past fifteen editions of INDIACom, since its inception in 2007; INDIACom – 2023; 17th INDIACom – 2023 10th International Conference on Computing for Sustainable Global Development, Technically approved by IEEE Delhi Section and supported and promoted by GGSIP University, New Delh...
Floods in India is among the perilous natural disasters with a high impact on its economic sectors. One of the critical factors to handle such hazardous events is monitoring the affected areas and changes in flood patterns. Flood management is a very complex issue, largely owing to the growing population and investments in flood-affected regions. S...
Currently, I am in the process of editing a forthcoming publication entitled to be published by IGI Global (www.igi-global.com) and scheduled for release in 2023. I would like to take this opportunity to cordially invite you to submit your work for consideration in this publication.
Please visit https://lnkd.in/da_DFQdE for more details regarding t...
Man have always been, inherently, curious creatures. They ask questions in order to satiate their insatiable curiosity. For example, kids ask questions to learn more from their teachers, teachers ask questions to assist themselves to evaluate student performance, and we all ask questions in our daily lives. Numerous learning exchanges, ranging from...
Deep-Fake Technique is a new scientific method that uses Artificial-Intelligince to make fake videos with an affect of facial expressions and coordinated movement of lips. This technology is frequently employed in a variety of contexts with various goals. Deep-Fake technology is being used to generate an extremely realistic fake video that can be w...
Deep-Fake Technique is a new scientific method that uses Artificial-Intelligince to make fake videos with an affect of facial expressions and coordinated movement of lips. This technology is frequently employed in a variety of contexts with various goals. Deep-Fake technology is being used to generate an extremely realistic fake video that can be w...
In this modern and technological world, medical field has also enhanced and digitized itself to help patients and medical professionals as per the need of the time. Most of the time, patients do not have serious medical problems. They only need some expert suggestions from a medical professional. In these times of crisis, medical professionals can...
This book provides in depth knowledge about critical factors involved in the success of pervasive healthcare. The book first presents critical components and importance of pervasive healthcare. The authors then give insight into the pervasive healthcare information systems and key consideration related to remote patient monitoring and safety. The b...
Requirement specification is the major activity in software development. Since requirements are gathered from the customers
in natural languages they are prone to ambiguities. Ambiguous requirements give many interpretations of the same word or sentence. In
order to reduce the problems faced due to requirement ambiguities, many techniques have been...
This figure shows the performance of SFS and SBS method in terms of accuracy with different feature sets.
Breast cancer is commonest type of cancers among women. Early diagnosis plays a significant role in reducing the fatality rate. The main objective of this study is to propose an efficient approach to classify breast cancer tumor into either benign or malignant based on digitized image of a fine needle aspirate (FNA) of a breast mass represented by...
Breast cancer is commonest type of cancers among women. Early diagnosis plays a significant role in reducing the fatality rate. The main objective of this study is to propose an efficient approach to classify breast cancer tumor into either benign or malignant based on digitized image of a fine needle aspirate (FNA) of a breast mass represented by...
Double auction is becoming the preferred negotiation protocol for cloud service negotiation due to its economic efficiency, capability in facilitating dynamic pricing, and suitability for handling a large number of customers and service providers. However, as far as this research work is concerned, there is no framework using double auction that si...
Double auction is becoming the preferred negotiation protocol for cloud service negotiation due to its economic efficiency, capability in facilitating dynamic pricing, and suitability for handling a large number of customers and service providers. However, as far as this research work is concerned, there is no framework using double auction that si...
Recently, the promotion of Science, technology, engineering and mathematics (STEM) education has become the highlight due to the shortage in the STEM workforce. Surprisingly, the enrolment rates in STEM degrees are still low in many countries. Social media has been identified as one of the main platforms that can help to increase prospective studen...
Cloud Computing is becoming a rapidly accepted and deployed paradigm both by individuals and organizations alike. The government of various countries is also moving its services to cloud to offer better and just in time services to the users. This chapter explores the basic concepts of Cloud Computing, which includes the main features of Cloud Comp...
Recent works using hyper-heuristics for solving clustering problems have been focusing on Genetic Algorithm. However, to the best of this research knowledge, no work is using hyper-heuristics dedicated for tuning the Genetic algorithm`s chromosome size for automatic clustering problem. The ability to tune the chromosome size is important because it...
This is the era of Information Technology. Today the most important thing is to get the right information in right time. The users of internet and other communication technologies are increasing exponentially. Hence more and more data repositories are now being made available online. Information retrieval systems or search engines are used to acces...
Unauthorized access of network resources is one of the major security issues in communication network. Intrusion detection systems are used to identify any intruder in a network by monitoring the activities over a communication network. When these Intruder detection systems find any abnormal activity in a network, it sends signals to administrators...
The cloud computing environment is one of the most promising technologies in the development of computing resources. The cloud service providers provide almost every resource for computing to their users through the internet. With all its advantages, cloud computing has major security issues. Especially in the case of public clouds, anyone can misu...
With the advent of information and communication technologies, e-mail is one of the prime tools for communication. Almost everyone uses emails for business communications as well as for sharing personal information. E-mail is vulnerable against cybercrimes. This chapter focuses on the basic concepts of web forensics and then provides an insight abo...
Digital forensic experts need to identify and collect the data stored in electronic devices. Further, this acquired data has to be analyzed to produce digital evidence. Data mining techniques have been successfully implemented in various applications across the domains. Data mining techniques help us to gain insight from a large volume of data. It...
Digital forensic experts need to identify and collect the data stored in electronic devices. Further, this acquired data has to be analyzed to produce digital evidence. Data mining techniques have been successfully implemented in various applications across the domains. Data mining techniques help us to gain insight from a large volume of data. It...
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing d...
As people around the world are spending increasing amounts of time online, the question of how online experiences are linked to health and wellbeing is essential. Depression has become a public health concern around the world. Traditional methods for detecting depression rely on self-report techniques, which suffer from inefficient data collection...
All aspects of big data need to be thoroughly investigated, with emphasis on e-governance, needs, challenges and its framework. This chapters recognizes that e-governance needs big data to be reliable, fast and efficient. Another principle is that the trust of a citizen is the main concern. The extraction of meaningful data from large variety of da...
Cybercrimes have become a daily menace with the unprecedented progress made in Information Technology (IT). Cyber infrastructures are exposed to serious Cybercrimes and attacks every day. Physical devices and human intervention have not been fully successful in monitoring and protection of these infrastructures; hence, there comes a need of highly...
Cloud Computing is becoming a rapidly accepted and deployed paradigm both by individuals and organizations alike. The government of various countries is also moving its services to cloud to offer better and just in time services to the users. This chapter explores the basic concepts of Cloud Computing, which includes the main features of Cloud Comp...
All aspects of big data need to be thoroughly investigated, with emphasis on e-governance, needs, challenges and its framework. This chapters recognizes that e-governance needs big data to be reliable, fast and efficient. Another principle is that the trust of a citizen is the main concern. The extraction of meaningful data from large variety of da...
In VANETs, vehicles broadcast messages to other nearby vehicles to exchange information among them about their surroundings. This broadcasting of messages may enhance road safety and traffic efficiency, which is possible only if the messages announced are true and could be relied upon. However, the presence of faulty and malicious messages in the n...
In VANETs, vehicles broadcast messages to other nearby vehicles to exchange information among them about their surroundings. This broadcasting of messages may enhance road safety and traffic efficiency, which is possible only if the messages announced are true and could be relied upon. However, the presence of faulty and malicious messages in the n...
Vehicular Adhoc Network (VANET) is one among the
latest emerging and promising technologies of our near future
that provides Network on Wheels (NOW). Providing security to
VANET is important and essential in terms of having efficient
and secure communication. Vehicular ad hoc networks are
receiving increasing attentions from the field of acade...
Vehicular Adhoc Network (VANET) is one among the latest emerging and promising technologies of our near future that provides Network on Wheels (NOW). Providing security to VANET is important and essential in terms of having efficient and secure communication. Vehicular ad hoc networks are receiving increasing attentions from the field of academics...
The most significant phase in the development of a quality software project is Requirement engineering. The objective of the software requirement engineering is the elicitation of the requirements of the clients and their analysis. In general the requirements are expressed in natural languages which are ambiguous in nature. Ambiguity means the same...
The recent advancements in wireless communication technologies allow for information exchange in high mobility. Such a mobile network that comprises of vehicles and the road side units as the nodes and allows information exchange among them is called Vehicular ad Hoc Network (VANET). In VANETs, vehicles broadcast information to other nearby vehicle...
With the rapid growth of data amount, it is very crucial to reduce the storage space that data occupies and the bandwidth consumption during network transmission. As an important means of information security, data backup technology has attained increasing attention. This paper proposes the types of data backup and a comparative study of the techni...
Load in network is rapidly increases day by day by the user input or by the machine communication, so it will affect the performance of the computing nodes, if we will not justify the load of the computing node, it means we will not consider a desirable output from the computing node, load of the computing node is calculated on the basis of queue l...
Humans are curious by nature. They ask questions to satisfy their never-ending quest for knowledge. For
instance, students ask questions to learn more from their teachers, teachers ask questions to help themselves
evaluate performance of the students, and our day-to-day lives involve asking questions in conversations. Questions are the significant...
Humans are curious by nature. They ask questions to satisfy their never-ending quest for knowledge. For instance, students ask questions to learn more from their teachers, teachers ask questions to help themselves evaluate performance of the students, and our day-today lives involve asking questions in conversations. Questions are the significant c...
Studies have found that a vital root cause of software project failure is the poor quality of the requirement specifications document. As the requirements are typically captured in natural languages like English, they can be ambiguous and inconsistent as ambiguity is an intrinsic characteristic of natural languages. Ambiguity occurs when different...
Data over the internet has been rapidly increasing day by day. Automatically mine useful information from the massive data has been a common concern for the organizations having large dataset. In order to reduce risk in future valuable information can be extracted from the sentiments of the message. Big Data has mainly three characteristics namely...
Studies have found that a vital root cause of software project failure is the poor quality of the requirement specifications document. As the requirements are typically captured in natural languages like English, they can be ambiguous and inconsistent as ambiguity is an intrinsic characteristic of natural languages. Ambiguity occurs when different...
Data over the internet has been rapidly increasing day by day. Automatically mine useful information from the massive data has been a common concern for the organizations having large dataset. In order to reduce risk in future valuable information can be extracted from the sentiments of the message. Big Data has mainly three characteristics namely...
Cloud computing has gathered great attention as it reduces maintenance cost and expensive setup of computing resources. It has many characteristics such as reliability, multi-tenancy, resource availability and elasticity etc. Elasticity is one of the key features which deliver services over the internet. We can say that it is an essential character...
A Multi-agent System (MAS) is comprised of multiple interacting intelligent agents. Agents in the MAS could all be of same type (homogeneous) or different (heterogeneous). MAS are used to solve problems which are either difficult for an individual agent to solve or when the problem is inherently comprised of multiple actors interacting together. Ho...
Cloud computing is an emerging and revolutionary approach towards the computing and becoming more risk prone than ever before. It is an evolutionary approach of using resources and services on demand and as per need of consumers. Cloud computing providing a platform rose on the Internet for usage of IT services and flexible infrastructure to the co...
To recognize handwritten Hindi characters automatically is a very difficult because of characters written in different ways like curves and cursively written are differently in various ways. Therefore, these characters are written in distinct sizes, dimension, orientation, format and thickness. Offline written text images from a piece of paper are...
In computational linguistics, word sense disambiguation (WSD) is an open problem of natural language
processing, which governs the process of identifying which sense of a word (i.e. meaning) is used in a sentence, when the word has multiple meanings. In this paper, We introduce the reader to the motivations for solving the ambiguity of words and pr...
Decision making both on individual and organizational level is always accompanied by the search of
other’s opinion on the same. With tremendous establishment of opinion rich resources like, reviews, forum
discussions, blogs, micro-blogs, Twitter etc provide a rich anthology of sentiments. This user generated
content can serve as a benefaction to ma...
Na¨ıve Bayes Classifier is a supervised and statistical technique for extraction of opinions and
sentiments of people. This method works on the occurrence of a word in a sentence and classifies the
selected word in positive, negative or neutral class according to the polarization of that word. Clustering is an
unsupervised technique, where programm...
In natural language processing (NLP), word sense disambiguation (WSD) is defined as the task of assigning the appropriate meaning (sense) to a given word in a text or discourse. Natural language is ambiguous, so that many words can be interpreted in multiple ways depending on the context in which they occur. The computational identification of mean...
This is the era of Information Technology. Today the most important thing is how one gets the
right information at right time. More and more data repositories are now being made available
online. Information retrieval systems or search engines are used to access electronic
information available on the internet. These information retrieval systems d...
Web Search Engines are best gifts to the mankind by Information and Communication Technologies.
Without the search engines it would have been almost impossible to make the efficient access of the
information available on the web today. They play a very vital role in the accessibility and usability of the
internet based information systems. As the i...
Although opinion mining is in a nascent stage of de
velopment but still the ground is set for
dense growth of researches in the field. One of the
important activities of opinion mining is to
extract opinions of people based on characteristics
of the object under study. Feature extraction
in opinion mining can be done by various ways like
that o...
These days inter-domain routing protocol, i.e., BGP (Border Gateway Protocol), is getting complicated day by day due to policy mis-configuration by individual autonomous systems. Existing configuration analysis techniques are either manual or tedious, or do not scale beyond a small number of nodes due to the state explosion problem. To aid the diag...
This paper presents an unsupervised approach for the development of a stemmer (For the case of Urdu & Marathi language). Especially, during last few years, a wide range of information in Indian regional languages has been made available on web in the form of e-data. But the access to these data repositories is very low because the efficient search...
Especially, during last few years, a wide range of information in Indian regional languages like Hindi, Urdu, Bengali, Oriya, Tamil and Telugu has been made available on web in the form of e-data. But the access to these data repositories is very low because the efficient search engines/retrieval systems supporting these
languages are very limited....
The proposed system highlights an approach for encrypting data using the concept of memetic algorithm and cryptography. This approach yields high data security ,integrity and feasibility for practical implementation.
Questions
Questions (5)
Currently, I am in the process of editing a forthcoming publication entitled “Advances in Cyberology and the Advent of the Next-Gen Information Revolution”, to be published by IGI Global (www.igi-global.com), an international publisher of progressive academic research. The book is scheduled for release in 2023. I would like to take this opportunity to cordially invite you to submit your work for consideration in this publication.
I am familiar with your research interests and expertise in the domain, and I am certain that your contribution on this topic and/or other related research areas would make an excellent addition to this publication.
Please visit https://www.igi-global.com/publish/call-for-papers/call-details/6191 for more details regarding this publication and to submit your chapter proposal.
If you have any questions or concerns, please do not hesitate to contact me.
Thank you very much for your consideration of this invitation, and I hope to hear from you by Oct 26, 2022.
You are also requested to kindly circulate the same among the peer group interested in the same domain
Best wishes,
Editors
Advances in Cyberology and the Advent of the Next-Gen Information Revolution
Now a days, I am getting lots of news of people attempting suicides'. We are technically advancing coming up with sophisticated and state of the art technologies to facilitate people in almost every phase of life still the number of depressed peoples around the world are increasing at a very fast speed.
I want to know the major causes of stress which leads to depression in general and specifically at workplace, so that we can come up with some measure to handle this growing issue.
Dear Researchers,
Greetings !!
Currently, I am in the process of editing a forthcoming publication entitled “Pervasive Healthcare: A Compendium of Critical Factors for success”, to be published by Springer, (an international publisher of progressive academic research) as part of "EAI/Springer Innovations in Communication and Computing - EAISICC" . I would like to take this opportunity to cordially invite you to submit your work for consideration in this publication.
I am certain that your contribution on this topic and/or other related research areas would make an excellent addition to this publication.
Please visit https://sites.google.com/view/pervasive-healthcare for more details regarding this publication and to submit your work.
If you have any questions or concerns, please do not hesitate to contact me.
I request you to kindly help me in reaching potential contributors by circulating this CFC in your professional groups.
Best wishes,
With Warm Regards
Controlled languages like "Attempto Controlled English" (ACE), PENG (Processable ENGlish), Common Logic Controlled English (CLCE), Prosper, Semantics of Business Vocabulary and Business Rules (SBVBR) etc.
How should I formulate antigens and antibodies to train my system for clustering using AIS?