• Home
  • Mohd Shahid Husain
Mohd Shahid Husain

Mohd Shahid Husain
University of Technology and Applied Sciences (CAS - Ibri) Oman · College of Computing and Information Sciences

Doctor of Philosophy

About

83
Publications
34,146
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
392
Citations
Introduction
I am a Research professional and Faculty member with more than 14 years of teaching & research experience. My focus has been on Information Retrieval, Natural Language Processing, Soft Computing, Computer Networks & Security, Cloud Computing, Big Data Analytic, Data Mining and Ad-Hoc Networks. I enjoy networking with professionals from any industry on a global scale and encourage you to contact me at any time…. Thanks!
Additional affiliations
October 2018 - present
University of Technology & Applied Sciences Oman
Position
  • Professor (Assistant)
July 2010 - October 2018
Integral University
Position
  • Professor (Assistant)
July 2010 - October 2018
Integral University
Position
  • Professor (Assistant)
Education
November 2012 - November 2017
Integral University
Field of study
  • Computer Science & Engineering
June 2008 - June 2010
Indian Institute of Information Technology Allahabad
Field of study
  • M.Tech (Intelligent Systems)

Publications

Publications (83)
Article
Full-text available
Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a greater need for privacy in terms of data, and utilizing secure services is highly recommended. So, data...
Article
Full-text available
In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside. Secure communications rely on the sender and receiver devices having self-sustaining authentication methods. The perquisites of the authentication methods are to grip communication without being falsified...
Article
Full-text available
Energy theft is a significant problem that needs to be addressed for effective energy management in smart cities. Smart meters are highly utilized in smart cities that help in monitoring the energy utilization level and provide information to the users. However, it is not able to detect energy theft or over-usage. Therefore, we have proposed a mult...
Book
Full-text available
This book will provide in depth knowledge about the concepts, technologies and application areas of big data analytics. The book will deal with the important attention regarding the state of the art technologies in use for big data analytics. It will provide in-depth discussion about the important sectors where big data analytics is proved to be ve...
Article
Full-text available
One of the most frequently occurring calamities around the world is a flood. For flood prone areas or countries, an essential part of their governance is flood management. The necessity to continuously review and analyze the adverse or ambient environmental conditions in real-time demands developing a monitoring system so that floods could be detec...
Book
Full-text available
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effective...
Chapter
Deepfake technology is an emerging technology prevailing in today's digital world. It is used to create fake videos by exploiting some of the artificial intelligence (AI) based techniques and deep learning methodology. The facial expressions and motion effects are primarily used to train and manipulate the seed frame of someone to generate the desi...
Conference Paper
Full-text available
The untimely monsoon floods and the rise in the level of rivers in the north Indian state of Uttar Pradesh (UP) is a major challenge for coordinating relief and rescue operations. To address this challenge, the experts that are deploying a variety of techniques to evaluate the damages might get useful information from synthetic aperture radar (SAR)...
Poster
Full-text available
We are delighted to intimate you that after the resounding success of past fifteen editions of INDIACom, since its inception in 2007; INDIACom – 2023; 17th INDIACom – 2023 10th International Conference on Computing for Sustainable Global Development, Technically approved by IEEE Delhi Section and supported and promoted by GGSIP University, New Delh...
Article
Full-text available
Floods in India is among the perilous natural disasters with a high impact on its economic sectors. One of the critical factors to handle such hazardous events is monitoring the affected areas and changes in flood patterns. Flood management is a very complex issue, largely owing to the growing population and investments in flood-affected regions. S...
Poster
Full-text available
Currently, I am in the process of editing a forthcoming publication entitled to be published by IGI Global (www.igi-global.com) and scheduled for release in 2023. I would like to take this opportunity to cordially invite you to submit your work for consideration in this publication. Please visit https://lnkd.in/da_DFQdE for more details regarding t...
Article
Full-text available
Man have always been, inherently, curious creatures. They ask questions in order to satiate their insatiable curiosity. For example, kids ask questions to learn more from their teachers, teachers ask questions to assist themselves to evaluate student performance, and we all ask questions in our daily lives. Numerous learning exchanges, ranging from...
Article
Full-text available
Deep-Fake Technique is a new scientific method that uses Artificial-Intelligince to make fake videos with an affect of facial expressions and coordinated movement of lips. This technology is frequently employed in a variety of contexts with various goals. Deep-Fake technology is being used to generate an extremely realistic fake video that can be w...
Article
Full-text available
Deep-Fake Technique is a new scientific method that uses Artificial-Intelligince to make fake videos with an affect of facial expressions and coordinated movement of lips. This technology is frequently employed in a variety of contexts with various goals. Deep-Fake technology is being used to generate an extremely realistic fake video that can be w...
Chapter
In this modern and technological world, medical field has also enhanced and digitized itself to help patients and medical professionals as per the need of the time. Most of the time, patients do not have serious medical problems. They only need some expert suggestions from a medical professional. In these times of crisis, medical professionals can...
Book
Full-text available
This book provides in depth knowledge about critical factors involved in the success of pervasive healthcare. The book first presents critical components and importance of pervasive healthcare. The authors then give insight into the pervasive healthcare information systems and key consideration related to remote patient monitoring and safety. The b...
Article
Full-text available
Requirement specification is the major activity in software development. Since requirements are gathered from the customers in natural languages they are prone to ambiguities. Ambiguous requirements give many interpretations of the same word or sentence. In order to reduce the problems faced due to requirement ambiguities, many techniques have been...
Experiment Findings
Full-text available
This figure shows the performance of SFS and SBS method in terms of accuracy with different feature sets.
Article
Full-text available
Breast cancer is commonest type of cancers among women. Early diagnosis plays a significant role in reducing the fatality rate. The main objective of this study is to propose an efficient approach to classify breast cancer tumor into either benign or malignant based on digitized image of a fine needle aspirate (FNA) of a breast mass represented by...
Article
Full-text available
Breast cancer is commonest type of cancers among women. Early diagnosis plays a significant role in reducing the fatality rate. The main objective of this study is to propose an efficient approach to classify breast cancer tumor into either benign or malignant based on digitized image of a fine needle aspirate (FNA) of a breast mass represented by...
Article
Full-text available
Double auction is becoming the preferred negotiation protocol for cloud service negotiation due to its economic efficiency, capability in facilitating dynamic pricing, and suitability for handling a large number of customers and service providers. However, as far as this research work is concerned, there is no framework using double auction that si...
Article
Double auction is becoming the preferred negotiation protocol for cloud service negotiation due to its economic efficiency, capability in facilitating dynamic pricing, and suitability for handling a large number of customers and service providers. However, as far as this research work is concerned, there is no framework using double auction that si...
Article
Full-text available
Recently, the promotion of Science, technology, engineering and mathematics (STEM) education has become the highlight due to the shortage in the STEM workforce. Surprisingly, the enrolment rates in STEM degrees are still low in many countries. Social media has been identified as one of the main platforms that can help to increase prospective studen...
Chapter
Cloud Computing is becoming a rapidly accepted and deployed paradigm both by individuals and organizations alike. The government of various countries is also moving its services to cloud to offer better and just in time services to the users. This chapter explores the basic concepts of Cloud Computing, which includes the main features of Cloud Comp...
Article
Full-text available
Recent works using hyper-heuristics for solving clustering problems have been focusing on Genetic Algorithm. However, to the best of this research knowledge, no work is using hyper-heuristics dedicated for tuning the Genetic algorithm`s chromosome size for automatic clustering problem. The ability to tune the chromosome size is important because it...
Chapter
This is the era of Information Technology. Today the most important thing is to get the right information in right time. The users of internet and other communication technologies are increasing exponentially. Hence more and more data repositories are now being made available online. Information retrieval systems or search engines are used to acces...
Chapter
Unauthorized access of network resources is one of the major security issues in communication network. Intrusion detection systems are used to identify any intruder in a network by monitoring the activities over a communication network. When these Intruder detection systems find any abnormal activity in a network, it sends signals to administrators...
Chapter
The cloud computing environment is one of the most promising technologies in the development of computing resources. The cloud service providers provide almost every resource for computing to their users through the internet. With all its advantages, cloud computing has major security issues. Especially in the case of public clouds, anyone can misu...
Chapter
With the advent of information and communication technologies, e-mail is one of the prime tools for communication. Almost everyone uses emails for business communications as well as for sharing personal information. E-mail is vulnerable against cybercrimes. This chapter focuses on the basic concepts of web forensics and then provides an insight abo...
Chapter
Digital forensic experts need to identify and collect the data stored in electronic devices. Further, this acquired data has to be analyzed to produce digital evidence. Data mining techniques have been successfully implemented in various applications across the domains. Data mining techniques help us to gain insight from a large volume of data. It...
Chapter
Full-text available
Digital forensic experts need to identify and collect the data stored in electronic devices. Further, this acquired data has to be analyzed to produce digital evidence. Data mining techniques have been successfully implemented in various applications across the domains. Data mining techniques help us to gain insight from a large volume of data. It...
Book
Full-text available
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing d...
Chapter
As people around the world are spending increasing amounts of time online, the question of how online experiences are linked to health and wellbeing is essential. Depression has become a public health concern around the world. Traditional methods for detecting depression rely on self-report techniques, which suffer from inefficient data collection...
Chapter
All aspects of big data need to be thoroughly investigated, with emphasis on e-governance, needs, challenges and its framework. This chapters recognizes that e-governance needs big data to be reliable, fast and efficient. Another principle is that the trust of a citizen is the main concern. The extraction of meaningful data from large variety of da...
Conference Paper
Full-text available
Cybercrimes have become a daily menace with the unprecedented progress made in Information Technology (IT). Cyber infrastructures are exposed to serious Cybercrimes and attacks every day. Physical devices and human intervention have not been fully successful in monitoring and protection of these infrastructures; hence, there comes a need of highly...
Chapter
Cloud Computing is becoming a rapidly accepted and deployed paradigm both by individuals and organizations alike. The government of various countries is also moving its services to cloud to offer better and just in time services to the users. This chapter explores the basic concepts of Cloud Computing, which includes the main features of Cloud Comp...
Chapter
All aspects of big data need to be thoroughly investigated, with emphasis on e-governance, needs, challenges and its framework. This chapters recognizes that e-governance needs big data to be reliable, fast and efficient. Another principle is that the trust of a citizen is the main concern. The extraction of meaningful data from large variety of da...
Conference Paper
Full-text available
In VANETs, vehicles broadcast messages to other nearby vehicles to exchange information among them about their surroundings. This broadcasting of messages may enhance road safety and traffic efficiency, which is possible only if the messages announced are true and could be relied upon. However, the presence of faulty and malicious messages in the n...
Article
Full-text available
In VANETs, vehicles broadcast messages to other nearby vehicles to exchange information among them about their surroundings. This broadcasting of messages may enhance road safety and traffic efficiency, which is possible only if the messages announced are true and could be relied upon. However, the presence of faulty and malicious messages in the n...
Article
Full-text available
Vehicular Adhoc Network (VANET) is one among the latest emerging and promising technologies of our near future that provides Network on Wheels (NOW). Providing security to VANET is important and essential in terms of having efficient and secure communication. Vehicular ad hoc networks are receiving increasing attentions from the field of acade...
Conference Paper
Full-text available
Vehicular Adhoc Network (VANET) is one among the latest emerging and promising technologies of our near future that provides Network on Wheels (NOW). Providing security to VANET is important and essential in terms of having efficient and secure communication. Vehicular ad hoc networks are receiving increasing attentions from the field of academics...
Conference Paper
The most significant phase in the development of a quality software project is Requirement engineering. The objective of the software requirement engineering is the elicitation of the requirements of the clients and their analysis. In general the requirements are expressed in natural languages which are ambiguous in nature. Ambiguity means the same...
Article
Full-text available
The recent advancements in wireless communication technologies allow for information exchange in high mobility. Such a mobile network that comprises of vehicles and the road side units as the nodes and allows information exchange among them is called Vehicular ad Hoc Network (VANET). In VANETs, vehicles broadcast information to other nearby vehicle...
Conference Paper
With the rapid growth of data amount, it is very crucial to reduce the storage space that data occupies and the bandwidth consumption during network transmission. As an important means of information security, data backup technology has attained increasing attention. This paper proposes the types of data backup and a comparative study of the techni...
Conference Paper
Full-text available
Load in network is rapidly increases day by day by the user input or by the machine communication, so it will affect the performance of the computing nodes, if we will not justify the load of the computing node, it means we will not consider a desirable output from the computing node, load of the computing node is calculated on the basis of queue l...
Article
Full-text available
Humans are curious by nature. They ask questions to satisfy their never-ending quest for knowledge. For instance, students ask questions to learn more from their teachers, teachers ask questions to help themselves evaluate performance of the students, and our day-to-day lives involve asking questions in conversations. Questions are the significant...
Article
Full-text available
Humans are curious by nature. They ask questions to satisfy their never-ending quest for knowledge. For instance, students ask questions to learn more from their teachers, teachers ask questions to help themselves evaluate performance of the students, and our day-today lives involve asking questions in conversations. Questions are the significant c...
Conference Paper
Full-text available
Studies have found that a vital root cause of software project failure is the poor quality of the requirement specifications document. As the requirements are typically captured in natural languages like English, they can be ambiguous and inconsistent as ambiguity is an intrinsic characteristic of natural languages. Ambiguity occurs when different...
Conference Paper
Full-text available
Data over the internet has been rapidly increasing day by day. Automatically mine useful information from the massive data has been a common concern for the organizations having large dataset. In order to reduce risk in future valuable information can be extracted from the sentiments of the message. Big Data has mainly three characteristics namely...
Conference Paper
Full-text available
Studies have found that a vital root cause of software project failure is the poor quality of the requirement specifications document. As the requirements are typically captured in natural languages like English, they can be ambiguous and inconsistent as ambiguity is an intrinsic characteristic of natural languages. Ambiguity occurs when different...
Conference Paper
Full-text available
Data over the internet has been rapidly increasing day by day. Automatically mine useful information from the massive data has been a common concern for the organizations having large dataset. In order to reduce risk in future valuable information can be extracted from the sentiments of the message. Big Data has mainly three characteristics namely...
Conference Paper
Full-text available
Cloud computing has gathered great attention as it reduces maintenance cost and expensive setup of computing resources. It has many characteristics such as reliability, multi-tenancy, resource availability and elasticity etc. Elasticity is one of the key features which deliver services over the internet. We can say that it is an essential character...
Article
Full-text available
A Multi-agent System (MAS) is comprised of multiple interacting intelligent agents. Agents in the MAS could all be of same type (homogeneous) or different (heterogeneous). MAS are used to solve problems which are either difficult for an individual agent to solve or when the problem is inherently comprised of multiple actors interacting together. Ho...
Article
Full-text available
Cloud computing is an emerging and revolutionary approach towards the computing and becoming more risk prone than ever before. It is an evolutionary approach of using resources and services on demand and as per need of consumers. Cloud computing providing a platform rose on the Internet for usage of IT services and flexible infrastructure to the co...
Article
Full-text available
To recognize handwritten Hindi characters automatically is a very difficult because of characters written in different ways like curves and cursively written are differently in various ways. Therefore, these characters are written in distinct sizes, dimension, orientation, format and thickness. Offline written text images from a piece of paper are...
Article
Full-text available
In computational linguistics, word sense disambiguation (WSD) is an open problem of natural language processing, which governs the process of identifying which sense of a word (i.e. meaning) is used in a sentence, when the word has multiple meanings. In this paper, We introduce the reader to the motivations for solving the ambiguity of words and pr...
Article
Full-text available
Decision making both on individual and organizational level is always accompanied by the search of other’s opinion on the same. With tremendous establishment of opinion rich resources like, reviews, forum discussions, blogs, micro-blogs, Twitter etc provide a rich anthology of sentiments. This user generated content can serve as a benefaction to ma...
Conference Paper
Full-text available
Na¨ıve Bayes Classifier is a supervised and statistical technique for extraction of opinions and sentiments of people. This method works on the occurrence of a word in a sentence and classifies the selected word in positive, negative or neutral class according to the polarization of that word. Clustering is an unsupervised technique, where programm...
Article
Full-text available
In natural language processing (NLP), word sense disambiguation (WSD) is defined as the task of assigning the appropriate meaning (sense) to a given word in a text or discourse. Natural language is ambiguous, so that many words can be interpreted in multiple ways depending on the context in which they occur. The computational identification of mean...
Conference Paper
Full-text available
This is the era of Information Technology. Today the most important thing is how one gets the right information at right time. More and more data repositories are now being made available online. Information retrieval systems or search engines are used to access electronic information available on the internet. These information retrieval systems d...
Article
Full-text available
Web Search Engines are best gifts to the mankind by Information and Communication Technologies. Without the search engines it would have been almost impossible to make the efficient access of the information available on the web today. They play a very vital role in the accessibility and usability of the internet based information systems. As the i...
Conference Paper
Full-text available
Although opinion mining is in a nascent stage of de velopment but still the ground is set for dense growth of researches in the field. One of the important activities of opinion mining is to extract opinions of people based on characteristics of the object under study. Feature extraction in opinion mining can be done by various ways like that o...
Article
Full-text available
These days inter-domain routing protocol, i.e., BGP (Border Gateway Protocol), is getting complicated day by day due to policy mis-configuration by individual autonomous systems. Existing configuration analysis techniques are either manual or tedious, or do not scale beyond a small number of nodes due to the state explosion problem. To aid the diag...
Article
Full-text available
This paper presents an unsupervised approach for the development of a stemmer (For the case of Urdu & Marathi language). Especially, during last few years, a wide range of information in Indian regional languages has been made available on web in the form of e-data. But the access to these data repositories is very low because the efficient search...
Conference Paper
Especially, during last few years, a wide range of information in Indian regional languages like Hindi, Urdu, Bengali, Oriya, Tamil and Telugu has been made available on web in the form of e-data. But the access to these data repositories is very low because the efficient search engines/retrieval systems supporting these languages are very limited....
Article
Full-text available
The proposed system highlights an approach for encrypting data using the concept of memetic algorithm and cryptography. This approach yields high data security ,integrity and feasibility for practical implementation.

Questions

Questions (5)
Question
Currently, I am in the process of editing a forthcoming publication entitled “Advances in Cyberology and the Advent of the Next-Gen Information Revolution”, to be published by IGI Global (www.igi-global.com), an international publisher of progressive academic research. The book is scheduled for release in 2023. I would like to take this opportunity to cordially invite you to submit your work for consideration in this publication.
I am familiar with your research interests and expertise in the domain, and I am certain that your contribution on this topic and/or other related research areas would make an excellent addition to this publication.
Please visit https://www.igi-global.com/publish/call-for-papers/call-details/6191 for more details regarding this publication and to submit your chapter proposal.
If you have any questions or concerns, please do not hesitate to contact me.
Thank you very much for your consideration of this invitation, and I hope to hear from you by Oct 26, 2022.
You are also requested to kindly circulate the same among the peer group interested in the same domain
Best wishes,
Editors Advances in Cyberology and the Advent of the Next-Gen Information Revolution
Question
Now a days, I am getting lots of news of people attempting suicides'. We are technically advancing coming up with sophisticated and state of the art technologies to facilitate people in almost every phase of life still the number of depressed peoples around the world are increasing at a very fast speed.
I want to know the major causes of stress which leads to depression in general and specifically at workplace, so that we can come up with some measure to handle this growing issue.
Question
Dear Researchers,
Greetings !!
Currently, I am in the process of editing a forthcoming publication entitled Pervasive Healthcare: A Compendium of Critical Factors for success, to be published by Springer, (an international publisher of progressive academic research) as part of "EAI/Springer Innovations in Communication and Computing - EAISICC" . I would like to take this opportunity to cordially invite you to submit your work for consideration in this publication.
I am certain that your contribution on this topic and/or other related research areas would make an excellent addition to this publication.
Please visit https://sites.google.com/view/pervasive-healthcare for more details regarding this publication and to submit your work.
If you have any questions or concerns, please do not hesitate to contact me.
I request you to kindly help me in reaching potential contributors by circulating this CFC in your professional groups.
Best wishes,
With Warm Regards
Question
Controlled languages like "Attempto Controlled English" (ACE), PENG (Processable ENGlish), Common Logic Controlled English (CLCE), Prosper, Semantics of Business Vocabulary and Business Rules (SBVBR) etc.
Question
How should I formulate antigens and antibodies to train my system for clustering using AIS?

Network

Cited By