Omar Khadeer Hussain

Omar Khadeer Hussain
  • PhD
  • Lecturer at Australian Defence Force Academy

About

310
Publications
118,633
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,900
Citations
Current institution
Australian Defence Force Academy
Current position
  • Lecturer
Additional affiliations
December 2013 - present
Curtin University
Position
  • Senior Researcher
January 2012 - December 2013
Curtin University
Position
  • Research Associate
April 2008 - December 2011
Curtin University
Position
  • Research Associate

Publications

Publications (310)
Preprint
Full-text available
Taking out a loan is a significant financial decision, often complicated by varying lender conditions, hidden costs, individual financial preferences and the risk of credit score impacts from multiple inquiries. Although loan brokers assist with affordability assessments and offer comparisons, applicants still struggle to find the best match due to...
Article
Full-text available
Purpose Supply chain risk management (SCRM) is a multi-stage process that handles the adverse impact of disruptions in the supply chain network (SCN), and various SCRM techniques have been widely developed in the literature. As artificial intelligence (AI) techniques advance, they are increasingly applied in SCRM to enhance risk management’s capabi...
Conference Paper
A hashtag on X (Twitter) can attract a range of stakeholders with diverse perceptions on the hashtag. Understanding and considering the differences between these stakeholders' perceptions on specific hashtags can be highly valuable for policy making in both public and private sectors. This paper proposes a framework to analyse the depth and width o...
Conference Paper
The rapid evolution of risk landscapes in supply chains necessitates innovative management tools that enhance decision-making and process efficiency. Building on our previously proposed framework, this paper introduces a software prototype named LARD-SC (LLMs for Automated Risk Detection in Supply Chains). LARD-SC utilizes Large Language Models (LL...
Article
Full-text available
Event identification is important in many areas of the business world. In the supply chain risk management domain, the timely identification of risk events is vital to ensure the success of supply chain operations. One of the important sources of real-time information from across the world is news sources. However, the analysis of large amounts of...
Article
Full-text available
Robotic Process Automation (RPA) is an emerging software technology for automating business processes. RPA uses software robots to perform repetitive and error‐prone tasks previously done by human actors quickly and accurately. These robots mimic humans by interacting with existing software applications through user interfaces (UI). The goal of RPA...
Article
Recommender systems have seen wide adoption in different domains. The motive of such systems has evolved from providing generic recommendations in the past to providing customized and user-focused recommendations. To achieve this aim, the complexity and sophistication of the underlying techniques such systems use have evolved. Current recommender s...
Article
Blockchain-based multi-factor authentication (BMFA) combines multi-factor authentication with blockchain technology to provide a reliable and secure authentication mechanism. In other words, it adds a layer of protection and creates a comprehensive system that protects sensitive credentials in a decentralized ledger. This makes it challenging for u...
Chapter
Supply Chain Risk Management (SCRM) is necessary for economic development and the well-being of society. Therefore, many researchers and practitioners focus on developing new methods to identify, assess, mitigate and monitor supply chain risks. This paper developed the Risk Management by Counterfactual Explanation (RMCE) framework to manage risks i...
Article
Blockchain technology has the potential to be applied widely in supply chain operations. One such area is proactive supply chain risk management (SCRM). In this area, existing researchers have highlighted the fraudulent behaviour of supply chain partners who do not disclose information on the risks that impact their operations. Blockchain can addre...
Article
The ongoing COVID-19 pandemic has created an unprecedented predicament for the global supply chains (SCs). Shipments of essential and life-saving products, ranging from pharmaceuticals, agriculture, healthcare, to manufacturing, have been significantly impacted or delayed, making the global SCs vulnerable. A better understanding of the shipment ris...
Article
Decision support systems (DSS) assist in a wide array of decision-making tasks in different domains. However, one of their common drawbacks is that their working is back box in nature. This means that while they recommend a decision, they cannot explain the ’why’ behind reaching that decision. In prescriptive tasks such as risk management, this doe...
Article
Fog computing has been proposed as a mechanism to address certain issues in cloud computing such as latency, storage, network bandwidth, etc. Fog computing brings the processing, storage, and networking to the edge of the network near the edge devices, which we called fog consumers. This decreases latency, network bandwidth, and response time. Disc...
Chapter
Full-text available
Supply chain management (SCM) and its disruptions and risks have been the focus of many researchers in recent times. It is important how to identify these disruptions and risks to avoid them, therefore many risk mitigation strategies have been developed. Artificial intelligence (AI) is a powerful tool to identify and predict the occurrence of risks...
Article
Considering customer reviews is one of the challenges of real-world decision models. These reviews can be on different platforms and include a large amount of information and may also include incomprehensible and unrelated phrases. The main advantage of customer reviews is the realistic view that it provides a realistic view of the product or servi...
Article
Fog computing is a new computing paradigm that extends cloud services by providing computing resources in the form of fog nodes closer to the edge devices. Fog computing supports mobility, location-awareness, low latency, and saves network bandwidth to efficiently process and store the data generated by edge devices. A prerequisite to achieve these...
Article
Blockchain is being used in various global supply chains with its ever-increasing maturity and popularity. However, in the presence of subjective information that does not have a digital footprint, blockchain application is a grey area. This is due to the difficulty in confirming the authenticity or legitimacy of information before achieving consen...
Article
Vehicular fog computing (VFC) has been proposed as a promising solution to overcome the limitations of edge computing. In VFC, the idle resources of moving and parked vehicles can be used for compute-intensive applications of resource-limited vehicles by offloading their tasks to them. For this to succeed, selecting an appropriate target fog node n...
Article
It is important to manage operational disruptions to ensure the success of supply chain operations. To achieve this aim, researchers have developed techniques that determine the occurrence of operational risk events which assists supply chain operational risk managers develop plans to manage them by detection/monitoring, mitigation/management, or o...
Article
Full-text available
The rapid, increasing adoption of businesses to deliver their services in Software as a Service (SaaS) products in the marketplace presents selection challenges to users. Recently, major cloud service providers such as Amazon Web Services and Microsoft Azure have introduced well-architected frameworks that assess SaaS products in different pillars...
Article
Risk management is one of the critical activities which needs to be done well to ensure supply chain activities operate smoothly. The first step in risk management is risk identification, in which the risk manager identifies the risk events of interest for further analysis. The timely identification of risk events in the risk identification step is...
Article
Purpose This study aims to assess the following question: “which information processing approach, formalization or centralization, responds to procurement complexity and how does this affect procurement performance in knowledge-intensive procurements?” Design/methodology/approach This study draws on a survey of 294 Project Managers with recent exp...
Article
Full-text available
Developing an intelligent chatbot has evolved in the last few years to become a trending topic in the area of computer science. However, a chatbot often fails to understand the user’s intent, which can lead to the generation of inappropriate responses that cause dialogue breakdown and user dissatisfaction. Detecting the dialogue breakdown is essent...
Article
Full-text available
Blockchain, with its ever-increasing maturity and popularity, is being used in many different applied computing domains. To document the advancements made, researchers have conducted surveys on blockchain from many different viewpoints. However, one perspective which is missing from such surveys is how to assess the authenticity of subjective infor...
Article
Ensuring end-to-end Quality of Services (QoS) is a challenging aspect in traditional network architectures. Software-Defined Network (SDN), as the new norm of the network, has ascended in response to a traditional network’s limitations. SDN’s benefits are its ability to provide a global networking view, programmability, decouple the data plane with...
Article
Risk management is a necessary consideration in any decision-making activity. In global supply chains that are increasingly becoming internetworked and data-centric, risk management assists risk managers in making smart decisions to achieve their desired outcomes. Because of its importance, there are many studies in the literature on supply chain r...
Article
Due to its simplicity, versatility and the diversity of applications to which it can be applied, k-means is one of the well-known algorithms for clustering data. The foundation of this algorithm is based on the distance measure. However, the traditional k-means has some weaknesses that appear in some data sets related to real applications, the most...
Article
Full-text available
Easing transport congestion within a crowded urban environment requires management of travel demand. Managing traffic congestion in urban areas requires a set of effective policies and knowing when to apply them. In this paper, we focus on the managers' need to determine the most effective policies to respond to changing travel demands. We propose...
Article
Full-text available
Evaluating the innovation of a new idea before its implementation is a complicated but important phenomenon as it plays a critical role in the success of a product. The literature widely uses sentiment analysis as a technique for product designers to ascertain users’ opinion toward an idea before its implementation. However, that technique focuses...
Article
Ideation is an important phase in the new product development process at which product designers innovate and select novel ideas that can be added as features to an existing product. One way to find novel ideas is to transfer uncommon features of products of other domains and integrate them into the product to be improved. However, before incorpora...
Article
Current information services are constructed by new technologies like intelligent Edge, Fog and Internet of Things (IoT)-based computing and networking. The intersection of these research areas with artificial intelligence (AI) is an extremely important topic and an area of very high research interest in the research community. With the formalizati...
Article
Reputation systems offer a medium where users can quantify the trustworthiness or reliability of individuals providing online services or products. In the past, researchers have used blockchain technology for reputation systems. Smart contracts are computer protocols which have the primary objective to supervise, implement, or validate performances...
Article
Purpose This study aims to examine buying center members’ information control (IC) in complex organizational buying contexts to uncover the effect of IC on overall procurement performance (PP) and the effects of expert power (EP), legitimate power (LP) and referent power as antecedents to IC. Design/methodology/approach The study uses confirmatory...
Chapter
Organizations build information systems to support their business processes. Today’s business processes often cross the organizations’ boundaries and become increasingly complex. Therefore, information systems that automate these business processes must take into account collaborative and complex scenarios involving distributed partners. Designing...
Chapter
Customers prefer the availability of a range of products when they shop online. This enables them to identify their needs and select products that best match their desires. This is addressed through assortment planning. Some customers have strong awareness of what they want to purchase and from which provider. When considering customer taste as an...
Book
This book presents the latest trends in scientific methods and enabling technologies to advance e-business. It consists of selected high-quality papers from the 16th International Conference on E-Business Engineering (ICEBE 2019), held in Shanghai, China, on 11–13 October 2019. ICEBE is a leading international forum for researchers, engineers, and...
Article
Full-text available
While organisations in the current era of big data are generating massive volumes of data, they also need to ensure that its quality is maintained for it to be useful in decision-making purposes. The problem of dirty data plagues every organisation. One aspect of dirty data is the presence of duplicate data records that negatively impact an organis...
Article
Software as a Service (SaaS) has emerged as the most widely used of all the current software delivery models. With the growth of edge computing, as SaaS services increasingly become distributed, selecting the best SaaS provider from those available is challenging but it is of critical importance. In the recent past, well-known cloud service provide...
Conference Paper
Question answering (QA) is one of the most significant tasks in artificial intelligence (AI) that not yet solved completely. It is a task which requires building data models capable of providing answers to questions expressed in human language. Full question answering involves some form of labelling. Sequence labelling is an important problem in na...
Poster
Question answering (QA) is one of the most significant tasks in artificial intelligence (AI) that not yet solved completely. It is a task which requires building data models capable of providing answers to questions expressed in human language. Full question answering involves some form of labelling. Sequence labelling is an important problem in na...
Article
Internet of Things (IoT) is an emerging paradigm that connects various physical sensor devices spread across different locations. IoT-enabled supply chain provides a natural combination to achieve supply chain visibility (SCV) which refers to ability of supply chain partners to collect and analyse distributed supply chain data for the planning and...
Article
Full-text available
In this paper, an enhanced quantum-based neural network learning algorithm (EQNN-S) which constructs a neural network architecture using the quantum computing concept is proposed for signature verification. The quantum computing concept is used to decide the connection weights and threshold of neurons. A boundary threshold parameter is introduced t...
Article
Assortment Planning (AP) is one of the most significant and challenging decision for online retailers (e-tailers) to make. This decision becomes even more complex when a supplier is considered as a distinctive participant in decision making model. In the bricks and mortar mode of retailing, retailers are more powerful than suppliers in getting the...
Article
Full-text available
Operational risk management in supply chain activities is important for the successful achievement of the desired outcomes. Although it is an active area of research with an aim of improving a firm's success in its operations, a drawback of existing approaches is that they analyse it from only the perspective of events local to the supply chain. In...
Conference Paper
In recent past, there is a growing trend of interest among the downstream stakeholders of a dairy chain to receive milk (and dairy products) of high quality. Moreover, the rejection of milk and other dairy products by customers due to its poor quality has severe negative impacts on the dairy chain's upstream stakeholders. "Smart Farm" is a system f...
Chapter
Sentiment analysis techniques are widely used to capture the voice of customers about different products/services. Aspect or feature-based sentiment detection tools as one of the sentiment analyses’ types are developed to find the customers’ opinions about various features of a product. However, as a product may contain many features, presenting th...
Preprint
The cloud of things (CoT) is an emerging paradigm that has merged and combined cloud computing and the Internet of Things (IoT). Such a paradigm has enabled service providers to provide on-demand computing resources from devices spread across different locations for service users to be dynamically connected to them. While this benefits the CoT serv...
Chapter
Since most supply chain processes include operational risks, the effectiveness of a corporation’s success depends mainly on identifying, analyzing and managing them. Currently, supply chain risk management (SCRM) is an active research field for enhancing a corporation’s efficiency. Although several techniques have been proposed, they still face a b...
Article
Full-text available
Existing cloud service selection techniques assume that service evaluation criteria are independent. In reality, there are different types of interactions between criteria. These interactions influence the performance of a service selection system in different ways. In addition, a lack of measurement indices to validate the performance of service s...
Article
Full-text available
Milk is a highly perishable product whose quality degrades while moving downstream in an imperfect cold dairy supply chain. Existing literature adopts a reactive approach for evaluating and preventing milk with a high microbial index from moving further downstream in a dairy supply chain. In this paper, we argue that such an approach is not the bes...
Conference Paper
New Product Development (NPD) is a multi-step process by which novel products are introduced in the market. Sentiment analysis, which ascertains the popularity of each new feature added to the product, is one of the key steps in this process. In this paper we present an approach by which product designers analyze users’ reviews from social media pl...
Conference Paper
Full-text available
Procurement is one of the most important activities in any organization. Hence it is vital for an organization to track procurement practices. Through performance measurement, the organization will have a clear understanding on how it’s performing as well as the effect of any action that it makes towards improvement. In our previous work, we propos...
Conference Paper
This study presents a novel Bayesian Network (BN) based model for improving organizational regulations effectiveness (OREF) through concurrent modelling of organizational resilience engineering (ORE) and macro-ergonomics (ME) indicators in an organization. Six indicators namely teamwork, preparedness, fault tolerance, flexibility, redundancy and se...
Conference Paper
Although we live in an information overwhelmed era, in many applications it is still difficult to collect meaningful data due to data scarcity issues, time constraints and the cost in getting the data available. In such scenarios, we need to make better use of the scarce data available so that it can be utilized for performing further analysis. Exi...
Article
Full-text available
Wireless Sensor Network (WSN) technology has gained importance in recent years due to its various benefits, practicability and extensive utilization in diverse applications. The innovation helps to make real-time automation, monitoring, detecting and tracking much easier and more effective than previous technologies. However, as well as their benef...
Article
Due to the increasing number of cloud services, service selection has become a challenging decision for many organisations. It is even more complicated when cloud users change their preferences based on the requirements and the level of satisfaction of the experienced service. The purpose of this paper is to overcome this drawback and develop a clo...
Article
We propose an interactive decision-making framework to assist a Customer Service Representative (CSR) in the efficient and effective recognition of customer records in a database with many ambiguous entries. Our proposed framework consists of three integrated modules. The first module focuses on the detection and resolution of duplicate records to...
Article
Full-text available
In cloud computing, service level agreements (SLAs) are legal agreements between a service provider and consumer that contain a list of obligations and commitments which need to be satisfied by both parties during the transaction. From a service provider's perspective, a violation of such a commitment leads to penalties in terms of money and reputa...
Article
Sentiment knowledge extraction is a growing area of research in the literature. It helps in analyzing users’ opinions about different entities or events, which can then be utilized by analysts for various purposes. Particularly, feature-based sentiment analysis is one of the challenging research areas that analyzes users’ opinions on various featur...
Book
Full-text available
This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students in the fields of information technology, computer science...
Article
Full-text available
The growth and adoption of the Internet of Things (IoT) is increasing day by day. The large number of IoT devices increases the risk of security threats such as (but not limited to) viruses or cyber-attacks. One possible approach to achieve IoT security is to enable a trustworthy IoT environment in IoT wherein the interactions are based on the trus...
Article
Best Worst Method (BWM) has recently been proposed as a Multi Criteria Decision Making (MCDM) method. Studies show that BWM compared with other methods such as Analytic Hierarchy Process (AHP), leads to lower inconsistency of the results while reducing the number of required pairwise comparisons. MCDM methods such as BWM require accurate informatio...
Article
In a dynamic environment such as the cloud-of-things, one of the most critical factors for successful service delivery is the QoS under defined constraints. Even though guarantees in the form of service level agreements (SLAs) are provided to users, many services exhibit dynamic Quality of Service (QoS) variations. This QoS variation as well as cha...
Chapter
As emphasized in the previous chapters, web ontologies are being developed and deployed to describe information in a semantically rich fashion, but to benefit from the deployment of ontologies, it is important to understand which components of an ontology are being used and how they are being used. Such understanding can improve the utilization of...
Chapter
Analysing ontology usage, as we have noted in the previous chapter, is comprised of four phases: identification, investigation, representation and utilization. The identification phase, which is the focus of this chapter, is responsible for identifying different ontologies that are being used in a particular application area or in a given dataset f...

Questions

Question (1)
Question
I want to know the numerical process (by using an example) of calculating the Lyapunov Exponents of a time series.

Network

Cited By