Syed Hamid

Syed Hamid
King Abdulaziz University · Department of Information Systems

Doctor of Philosophy

About

50
Publications
38,164
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
176
Citations
Citations since 2017
20 Research Items
148 Citations
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
Additional affiliations
October 2010 - present
King Abdulaziz University
Position
  • Professor

Publications

Publications (50)
Chapter
The proliferation in the research of recommender systems especially in the healthcare domain raised up several problems particularly security and privacy of patients’ medical data. Majority of the existing work depends on third parties that manage healthcare systems. Access of the PII, i.e., “personally identifiable information,” of the patients to...
Article
Full-text available
Recently, the concept of e-commerce product review evaluation has become a research topic of significant interest in sentiment analysis. The sentiment polarity estimation of product reviews is a great way to obtain a buyer’s opinion on products. It offers significant advantages for online shopping customers to evaluate the service and product quali...
Article
Full-text available
Recently, cloud computing resources have become one of the trending technologies that permit the user to manage diverse resources and a huge amount of data in the cloud. Task scheduling is considered one of the most significant challenges and ineffective management results in performance degradation. It is necessary to schedule the task effectively...
Article
Full-text available
In this paper, we propose an approach to recommender systems that incorporates human-centric aggregation via Ordered Weighted Aggregation (OWA) to prioritize the suggestions of expert rankers over the usual recommendations. We advocate for ranked recommendations where rankers are assigned weights based on their ranking position. Our approach recomm...
Article
Full-text available
Researchers have made great progress in developing cutting-edge solar energy forecasting methods. However, these methods are far from optimal in terms of their accuracy, generalizability, benchmarking, and other requirements. Particularly, no single method performs well across all climates and weather due to the large variations in meteorological d...
Preprint
Full-text available
The sustainability of the planet and its inhabitants is in dire danger and is among the highest priorities on global agendas such as the Sustainable Development Goals (SDGs) of the United Nations (UN). Solar energy -- among other clean, renewable, and sustainable energies -- is seen as essential for environmental, social, and economic sustainabilit...
Article
Full-text available
In recent times, organisations in a variety of businesses, such as healthcare, education, and others, have been using the Internet of Things (IoT) to produce more competent and improved services. The widespread use of IoT devices makes our lives easier. On the other hand, the IoT devices that we use suffer vulnerabilities that may impact our lives....
Article
Full-text available
Applications based on Wireless Sensor Networks (WSN) have shown to be quite useful in monitoring a particular geographic area of interest. Relevant geometries of the surrounding environment are essential to establish a successful WSN topology. But it is literally hard because constructing a localization algorithm that tracks the exact location of S...
Article
Detecting the anomalous entity in real-Time network traffic is a popular area of research in recent times. Very few researches have focused on creating malware that fools the intrusion detection system and this paper focuses on this topic. We are using Deep Convolutional Generative Adversarial Networks (DCGAN) to trick the malware classifier to bel...
Article
Full-text available
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing sp...
Preprint
Full-text available
The popularity of the online media-driven social network relation is proven in today's digital era. The many challenges that these emergence has created include a huge growing network of social relations, and the large amount of data which is continuously been generated via the different platform of social networking sites, viz. Facebook, Twitter,...
Article
Full-text available
The term “mobile learning” (or “m-learning”) refers to using handheld phones to learn and wireless computing as a learning tool and connectivity technology. This paper presents and explores the latest mobile platform for teaching and studying programming basics.The M-Learning tool was created using a platform-independent approach to target the larg...
Preprint
Full-text available
The primary objective of this paper is to present an approach for recommender systems that can assimilate ranking to the voters or rankers so that recommendation can be made by giving priority to experts suggestion over usual recommendation. To accomplish this, we have incorporated the concept of human-centric aggregation via Ordered Weighted Aggre...
Article
Full-text available
Widespread development of system software, the process of learning, and the excellence in profession of teaching are the formidable challenges faced by the learning behavior prediction system. The learning styles of teachers have different kinds of content designs to enhance their learning. In this learning environment, teachers can work together w...
Chapter
The use of open source software has increased tremendously in the last few decades paving the way for many innovations such as Internet of Things (IoT) and smart cities. The open data licenses have also become prevalent with the emergence of big data and relevant technologies. These developments have given rise to the “Share more—Develop less” cult...
Article
Full-text available
The widespread use of mobile phones among students supposes possibility to develop mobile learning tools. This paper discusses the design and development of a mobile courseware using project-based learning approach. The aim of designing the courseware is to study how feasible it is to adopt the learning pedagogies based on projects for mobile learn...
Article
Full-text available
notions related to TQM that assist in coping with problems affecting employee’s empowerment, in terms of their practicing desires, proposals and alternative associated problems within Total Quality Management practice. TQM is an administration approach utilized mostly by organizations in the manufacturing field. TQM normally is shown as a framework...
Article
Full-text available
Task execution in cloud computing requires obtaining stored data from remote data centers. Though this storage process reduces the memory constraints of the user’s computer, the time dead line is a serious concern. In this paper, Adaptive Cost-based Task Scheduling (ACTS) is proposed to provide data access to the virtual machines (VMs) within the d...
Article
Full-text available
The repository of any learning management system (LMS) keeps growing and becomes a rich source of learning materials with the passage of time. This learning resource may serve subject experts by allowing them to reuse the existing material while preparing online insnvctional materials. At the same time it may help the learners by allowing them to r...
Conference Paper
Full-text available
Word Sense Disambiguation (WSD) is one of the core challenging area for researchers since several decades and it plays a crucial role in all natural language processing (NLP) applications viz. Information Retrieval, Information Extraction, Question Answering, Text Mining, Machine Translation etc. Researchers defined WSD as to identify the actual me...
Article
Increasing usage of mobile technology has brought a widespread awareness in the field of mobile learning as well. One of the main topic of study in the domain of mobile learning is Context. The following paper, presents the major benefits offered by context in the field of mobile learning, along with presenting a review of the current research and...
Article
Full-text available
This paper aims at providing an overview of the evolution, current research and the history of continuous improvement over time through reviewing the literature extensively. The paper covers the inception of continuous improvement and its evolution into today's worlds sophisticated methodologies. The research covers the well known programs of conti...
Conference Paper
Full-text available
Word Sense Disambiguation (WSD) is one of the core challenging areas for researchers of both academia and industry since last few decades. It plays a crucial role in various natural language processing (NLP) applications viz. Information Retrieval, Information Extraction, Question Answering, Text Mining, Machine Translation etc. Besides single moda...
Article
Full-text available
M-Learning with its various advantages has been recognized as the need of the hour by the various organizations and universities and they are resorting to online education. However, though it may seem a very simple task the need of security and privacy in the domain is essential and it has been ignored for quite some time. In few of the exceptions...
Article
Full-text available
Sensor Networks have emerged as the next big thing to succeed in the times to come and it posed to dominate the trend of technology, however they bring in their own share of challenges. Most of these network consists of thousands or more of minute sensors that work independently. Limitation of cost availability and the requirement of abundant, unde...
Article
Full-text available
Hardware based ciphers are most suitable for resource constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this study is to present a comprehensive survey and review of Grain family of stream ciphers that is one of the portfolio candidates in the hard...
Article
Full-text available
The following paper is an attempt to showcase the amalgamation of three technologies, namely, system security standards, multi agents and e-learning systems. It is agreed that the security is an important aspect of open, interactive and distributed learning systems. We have seen considerable effort being put into development of the content and infr...
Article
Full-text available
An organization's flexibility, effectiveness and competitiveness can be improved through TQM. We can find a number of organization who have utilized TQM in order to achieve growth and cost effectiveness, we can also find some business that have not been so successful in realizing the benefit of TQM. There has been ample research done on the reason...
Article
Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today’s world. Even though most of the organizations have realized the value of information and the part it plays i...
Conference Paper
Advanced Encryption Standard (AES) has been the focus of Cryptanalysis since it was released in the 2001, November. The research gained more important when AES as declared as the Type-1 Suite-B Encryption Algorithm, by the NSA in 2003(CNSSP-15). Which makes it deemed suitable for being utilized for encryption of the both Classified & Un Classified...
Article
Full-text available
The process of protecting the accessibility, reliability, and secrecy of information is called Information security. We see a great increase in accessing of computer databases for stored information. Increasing number of companies are storing individual and business information on computers. Most of this information is not meant for the public eyes...
Article
Full-text available
Nowadays most of known organizations are obsessed with product and service " quality " since customer's orientation has been shifted from product & service price to its quality. Thus, most of the organizations are willing to adopt the TQM concept and processes in order to achieve their objectives, meet their customer's expectations and attain compe...
Article
In the latest past, research work has been done in the region of steam ciphers and as a answer of which, several design models for stream ciphers were projected. In Order to appreciate a international standard for data encryption that would prove good in the due course of time, endure the action of cryptanalysis algorithms and reinforce the securit...
Article
Full-text available
The following paper highlights the domination of quality service and adaptation of Total Quality Management in the service Industry. It tries to explain that along with the increasing awareness in the society in respect to culture, education and the living standard, there is an increasing demand for quality service. It is one of the factors that is...
Article
Cloud computing is in its preliminary stages when we respect to its implementation & usage. The reason for this is that the technology is heavily dependent on the high-tech resources that the academicians and researchers find it practically impossible to analyze & test the technology. The basis of the cloud computing process is a desire to have ano...
Article
This paper presents a novel non-interactive deniable authentication protocol with message recovery. The protocol is based on generalized ECDSA and security is based on difficulty of breaking Elliptic Curve Dis- crete Logarithm Problem. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to pro...
Article
Wireless Network Systems are usually deployed in hostile environments where they en-countered a wide variety of malicious attacks. A wireless sensor network (WSN) is a wire-less network composed of a large number of sensor nodes. In WSNs the scarcest resource is energy which includes low power, less storage space, low computation ability and short...
Conference Paper
This paper describes an efficient simple proxy blind signature scheme. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem(ECDLP). This can be implemented in low power and small processor mobile devices such as smart card, PDA etc. A proxy blind signature scheme is a special form of blind signature which allows a design...
Article
A proxy blind signature scheme is a special form of blind signature which allows a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature, blind signature and multi-signature scheme and satisfies the security proper...

Network

Cited By