Tariq Hussain

Tariq Hussain
Zhejiang Gongshang University · School of Computer Science and Information Engineering

Ph.D Information Technology

About

44
Publications
40,652
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
300
Citations
Education
September 2020 - September 2023
Zhejiang Gongshang University
Field of study
  • Big Data

Publications

Publications (44)
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) consist of several sensor nodes deployed underwater and gathering information from the underwater situation. Sometimes during a communication void regions occur when a forwarder node is unable to find the next forwarder node closer to the sink within the transmission ranges which results from its took ext...
Article
Full-text available
Underwater Wireless Sensor Network (UWSN) accomplishes the consideration of a few scientists and academicians towards itself. Because of the brutality of the climate lies submerged represents various difficulties, i.e., high transmission delay, outstanding piece mistake rate, more expense in usage, sinks development and energy imperatives, unequal...
Article
Full-text available
Real-time violence detection with the use of surveillance is the process of using live videos to detect violent and irregular behavior. In organizations, they use some potential procedures for recognition the activity in which normal and abnormal activities can be found easily. In this research, multiple key challenges have been oncorporated with t...
Article
Full-text available
A novel ad-hoc network called a flying ad-hoc network (FANET) has recently emerged, in which the flying nodes are referred to as unmanned aerial vehicles (UAVs) that are operated remotely live from a distance or using some determined approach in perspective of algorithms. Due to their high degree of mobility and flying nature with dynamic topology,...
Article
Full-text available
The amalgamation of Smart IoT and Machine learning is an emerging research area. In this context, a new trend in IoT called Social IoT has been considered for this study. The Social IoT has benefits of connectivity exhibited within the network of connected objects through the Internet of Things (IoT). It covers the entire world and provides innovat...
Article
Full-text available
The intricate relationship between COVID-19 and diabetes has garnered increasing attention within the medical community. Emerging evidence suggests that individuals with diabetes may experience heightened vulnerability to COVID-19 and, in some cases, develop diabetes as a post-complication following the viral infection. Additionally, it has been ob...
Article
Full-text available
The intricate relationship between COVID-19 and diabetes has garnered increasing attention within the medical community. Emerging evidence suggests that individuals with diabetes may experience heightened vulnerability to COVID-19 and, in some cases, develop diabetes as a post-complication following the viral infection. Additionally, it has been ob...
Article
Full-text available
The concept of 2 Dimensional (2D) and 3 Dimensional (3D) are represented by different bodies for diverse applications. The 2D is an old concept of image representation as it displays only the x and y axis, whereas the 3D image displays the x, y, and z axis simultaneously. The image of 3D on a screen looks like an image in the real world. With the r...
Article
Full-text available
One of the most widely used smartphone operating systems, Android, is vulnerable to cutting-edge malware that employs sophisticated logic. Such malware attacks could lead to the execution of unauthorized acts on the victims' devices, stealing personal information and causing hardware damage. In previous studies, machine learning (ML) has shown its...
Article
Full-text available
2023) Corrigendum: An advanced deep learning models-based plant disease detection: a review of recent research.
Article
Full-text available
Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
Article
Full-text available
This paper proposes a Cooperative-Relay Neighboring-Based Energy-Efficient Routing (CR-NBEER) protocol with advanced relay optimization for MUSN. The utilization of the relay nodes, among all other sensor nodes, makes it possible to achieve node-to-node deployment. The proposed method focuses only on cooperation and relay optimization schemes. Both...
Article
Full-text available
Driver emotion classification is an important topic that can raise awareness of driving habits because many drivers are overconfident and unaware of their bad driving habits. Drivers will acquire insight into their poor driving behaviors and be better able to avoid future accidents if their behavior is automatically identified. In this paper, we us...
Article
Full-text available
Plants play a crucial role in supplying food globally. Various environmental factors lead to plant diseases which results in significant production losses. However, manual detection of plant diseases is a time-consuming and error-prone process. It can be an unreliable method of identifying and preventing the spread of plant diseases. Adopting advan...
Article
Full-text available
In medical environments, a wireless body sensor network (WBSN) is used to operate remotely, and sensor nodes are employed. It consists of sensor nodes installed on a human body to monitor a patient’s condition, such as heartbeat, temperature, and blood sugar level, and are functionalized and controlled by remote devices. A WBSN consists of nodes th...
Article
Full-text available
Underwater acoustic sensor networks (UWASNs) aim to find varied offshore ocean monitoring and exploration applications. In most of these applications, the network is composed of several sensor nodes deployed at different depths in the water. Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface...
Article
Full-text available
Plants are the primary source of food for world’s population. Diseases in plants can cause yield loss, which can be mitigated by continual monitoring. Monitoring plant diseases manually is difficult and prone to errors. Using computer vision and artificial intelligence (AI) for the early identification of plant illnesses can prevent the negative co...
Preprint
Full-text available
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
Preprint
Full-text available
In recent years the increase of mobile devices and users of the internet lead to an increase in the burden on the network, low connectivity, and low bandwidth, and less throughput. With lots of advantages in the 5G cellular network, this network suffers from signal interference which causes a huge problem to the network. There are lots of challenge...
Article
Full-text available
Bacteriosis is one of the most prevalent and deadly infections that affect peach crops globally. Timely detection of Bacteriosis disease is essential for lowering pesticide use and preventing crop loss. It takes time and effort to distinguish and detect Bacteriosis or a short hole in a peach leaf. In this paper, we proposed a novel LightWeight (WLN...
Article
Full-text available
The video retrieval system refers to the task of retrieving the most relevant video collection, given a user query. By applying some feature extraction models the contents of the video can be extracted. With the exponential increase in video data in online and offline databases as well as a huge implementation of multiple applications in health, mi...
Article
Full-text available
Plants contribute significantly to the global food supply. Various Plant diseases can result in production losses, which can be avoided by maintaining vigilance. However, manually monitoring plant diseases by agriculture experts and botanists is time-consuming, challenging and error-prone. To reduce the risk of disease severity, machine vision tech...
Article
Full-text available
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, have attracted everyone’s attention. The attackers took advantage of this and can caused serious problems, such as malware attack, ransomware, SQL injection attack, etc. One of the dominant attacks, known as distributed deni...
Article
Full-text available
Medical Image Analysis (MIA) is one of the active research areas in computer vision, where brain tumor detection is the most investigated domain among researchers due to its deadly nature. Brain tumor detection in magnetic resonance imaging (MRI) assists radiologists for better analysis about the exact size and location of the tumor. However, the e...
Article
Full-text available
The concept of data mining is to classify and analyze the given data and to examine it clearly understandable and discoverable for the learners and researchers. The different types of classifiers are there exist to classify a data accordingly for the best and accurate results. Taking a primary data, and then classifying it into different portions o...
Article
Full-text available
Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance in which there is no human personnel involved. It is an ad-hoc network in which the UAVs can more in 3D ways simultaneously in t...
Article
Full-text available
In recent years, the huge amount of information and users of the internet service, it is hard to know quickly and accurately what the user wants. This phenomenon leads to an extremely low utilization of information, also known as the information overload problem. Traditionally, keywords are used to retrieve images, but such methods require a lot of...
Article
Full-text available
Flying Ad-hoc Network (FANET) is a new class of Mobile Ad-hoc Network in which the nodes move in three-dimensional (3-D) ways in the air simultaneously. These nodes are known as Unmanned Aerial Vehicles (UAVs) that are operated live remotely or by the pre-defined mechanism which involves no human personnel. Due to the high mobility of nodes and dyn...
Poster
Full-text available
https://sie.zjgsu.edu.cn/2021/0402/c449a14856/page.htm
Preprint
Full-text available
Vehicular Ad-hoc Network (VANET) is the subtype of Mobile Ad-hoc Network (MANET) where every node is represented as the vehicle. Although, VANETs and MANETs have some common properties still have a difference in their properties and behaviors i.e. nodes of VANETs have unlimited resources in terms of energy, memory, and computational power. Advanced...
Article
Full-text available
A Mobile Ad-hoc Network (MANET) is a group of nodes connected via ad-hoc fashion for communicating with each other through a wireless interface. The communication among the nodes in such a network takes place by using multi-hop in the absence of fixed infrastructure. TCP faces some hurdles and complexities in multi-hop ad-hoc networks particularly...
Article
Full-text available
KEYWORD ABSTRACT MANET; OLSR; Propagation Models; Sparse; Dense Mobile Ad-hoc Network (MANET) is the most emerging and fast-expanding technology in the last two decades. One of the major issues and challenging areas in MANET is the process of routing due to dynamic topologies and high mobility of mobile nodes. The efficiency and accuracy of a proto...
Article
Full-text available
KEYWORD ABSTRACT MANET, CW, TCP, MAC. IEEE 802.11 A Mobile Ad-hoc Network (MANET) is a group of nodes connected via ad-hoc fashion for communicating with each other through a wireless interface. The communication among the nodes in such a network takes place by using multi-hop in the absence of fixed infrastructure. TCP faces some hurdles and compl...
Article
Full-text available
Mobile Ad-hoc Networks (MANETs) is a decentralized, self-configure autonomous network having no fixed infrastructure. It consists of a mobile node that can move freely. In MANETs, there is no centralized control and authority system. Routing protocols enable the discovery of routes among different nodes and facilitate communication within the netwo...
Article
Full-text available
Opinion mining is the technique of analyzing the sentiment, behavior, feelings, emotions, and attitudes of customers about a product, topic, comments on social media, etc. Online shopping has revolutionized the way customers do shopping. The customer likes to visit the online store to find their product of interest. It is becoming more difficult fo...
Article
Full-text available
Opinion mining is the technique of analyzing the sentiment, behavior, feelings, emotions, and attitudes of customers about a product, topic, comments on social media, etc. Online shopping has revolutionized the way customers do shopping. The customer likes to visit the online store to find their product of interest. It is becoming more difficult fo...
Conference Paper
Full-text available
Abstract— In this modern era the use of computer and internet has dramatically increased. Nowadays it is not only the source of education and communication, but it is also a source of enjoyment and refreshment because of various social websites, online movie and games etc. Increase in the usage of computer and internet is the source of congestion....
Thesis
The paradigm Social Internet of Things (SIoT) is a new trend in Social Network Service (SNS). It has benefits of connectivity that are exhibited within the network of connected objects through the Internet of Things (IoT). It covers the entire world and provides innovative services to improve life standards, establishes novel businesses, makes buil...
Article
Full-text available
Mobile Ad-hoc Networks (MANETs) could be setup frequently without the need of pre-established infrastructure. The nodes in MANETs are free to move and they can join as well as leave the network. Due to the dynamic nature of nodes in MANETs, routing protocols in MANET are extremely vulnerable to different security attacks. Like other different secur...

Questions

Questions (11)
Question
In general, Journals Impact Factor is released in the fourth week of June every year?
Question
Is there any statistical method where a variable can perform free movement in different statistical equation.
Question
Are there any databases that share Crime and COVID-19 data prediction?
Question
Hello,
I'm a graduate student in information technology. I'm trying to do my research on Bioinformatics, a multi-disciplinary and rapidly emerging field of biomedical data sciences and informatics technologies. but really i'm new to Bioinformatics and also don't know much about Biology. I already read some research papers but still i could not get an idea. please suggest me IT&Bioinformatics research area ?
Question
In your opinion what are the technically key difference between SIoT and IOT.
Question
Hello
There is anyone working on Source Location Privacy in wireless sensor network in SIoT ?
Question
Hello
Any source code for Internet of things (IoT) in MATLAB ?
Thank you
Question
Hello everyone, I am working on network security for SIoT. I am using MATLAB, I need some help in the how to implement Internet of things (IoT) in matlab . Has anyone worked to ? I need SIoT code.
Regards
Tariq
Question
Hello
Is there any smart city open "Dataset" available for researchers?
thank you

Network

Cited By