
Tariq HussainZhejiang Gongshang University · School of Computer Science and Information Engineering
Tariq Hussain
Ph.D Information Technology
About
44
Publications
40,652
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
300
Citations
Introduction
Education
September 2020 - September 2023
Publications
Publications (44)
Underwater Wireless Sensor Networks (UWSNs) consist of several sensor nodes deployed underwater and gathering information from the underwater situation. Sometimes during a communication void regions occur when a forwarder node is unable to find the next forwarder node closer to the sink within the transmission ranges which results from its took ext...
Underwater Wireless Sensor Network (UWSN) accomplishes the consideration of a few scientists and academicians towards itself. Because of the brutality of the climate lies submerged represents various difficulties, i.e., high transmission delay, outstanding piece mistake rate, more expense in usage, sinks development and energy imperatives, unequal...
Real-time violence detection with the use of surveillance is the process of using live videos to detect violent and irregular behavior. In organizations, they use some potential procedures for recognition the activity in which normal and abnormal activities can be found easily. In this research, multiple key challenges have been oncorporated with t...
A novel ad-hoc network called a flying ad-hoc network (FANET) has recently emerged, in which the flying nodes are referred to as unmanned aerial vehicles (UAVs) that are operated remotely live from a distance or using some determined approach in perspective of algorithms. Due to their high degree of mobility and flying nature with dynamic topology,...
The amalgamation of Smart IoT and Machine learning is an emerging research area. In this context, a new trend in IoT called Social IoT has been considered for this study. The Social IoT has benefits of connectivity exhibited within the network of connected objects through the Internet of Things (IoT). It covers the entire world and provides innovat...
The intricate relationship between COVID-19 and diabetes has garnered increasing attention within the medical community. Emerging evidence suggests that individuals with diabetes may experience heightened vulnerability to COVID-19 and, in some cases, develop diabetes as a post-complication following the viral infection. Additionally, it has been ob...
The intricate relationship between COVID-19 and diabetes has garnered increasing attention within the medical community. Emerging evidence suggests that individuals with diabetes may experience heightened vulnerability to COVID-19 and, in some cases, develop diabetes as a post-complication following the viral infection. Additionally, it has been ob...
The concept of 2 Dimensional (2D) and 3 Dimensional (3D) are represented by different bodies for diverse applications. The 2D is an old concept of image representation as it displays only the x and y axis, whereas the 3D image displays the x, y, and z axis simultaneously. The image of 3D on a screen looks like an image in the real world. With the r...
One of the most widely used smartphone operating systems, Android, is vulnerable to cutting-edge malware that employs sophisticated logic. Such malware attacks could lead to the execution of unauthorized acts on the victims' devices, stealing personal information and causing hardware damage. In previous studies, machine learning (ML) has shown its...
2023) Corrigendum: An advanced deep learning models-based plant disease detection: a review of recent research.
Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
This paper proposes a Cooperative-Relay Neighboring-Based Energy-Efficient Routing
(CR-NBEER) protocol with advanced relay optimization for MUSN. The utilization of the relay
nodes, among all other sensor nodes, makes it possible to achieve node-to-node deployment. The
proposed method focuses only on cooperation and relay optimization schemes. Both...
Driver emotion classification is an important topic that can raise awareness of driving habits because many drivers are overconfident and unaware of their bad driving habits. Drivers will acquire insight into their poor driving behaviors and be better able to avoid future accidents if their behavior is automatically identified. In this paper, we us...
Plants play a crucial role in supplying food globally. Various environmental factors lead to plant diseases which results in significant production losses. However, manual detection of plant diseases is a time-consuming and error-prone process. It can be an unreliable method of identifying and preventing the spread of plant diseases. Adopting advan...
In medical environments, a wireless body sensor network (WBSN) is used to operate
remotely, and sensor nodes are employed. It consists of sensor nodes installed on a human body
to monitor a patient’s condition, such as heartbeat, temperature, and blood sugar level, and are
functionalized and controlled by remote devices. A WBSN consists of nodes th...
Underwater acoustic sensor networks (UWASNs) aim to find varied
offshore ocean monitoring and exploration applications. In most of these applications, the network is composed of several sensor nodes deployed at different
depths in the water. Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface...
Plants are the primary source of food for world’s population. Diseases in plants can cause yield loss, which can be mitigated by continual monitoring. Monitoring plant diseases manually is difficult and prone to errors. Using computer vision and artificial intelligence (AI) for the early identification of plant illnesses can prevent the negative co...
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
In recent years the increase of mobile devices and users of the internet lead to an increase in the burden on the network, low connectivity, and low bandwidth, and less throughput. With lots of advantages in the 5G cellular network, this network suffers from signal interference which causes a huge problem to the network. There are lots of challenge...
Bacteriosis is one of the most prevalent and deadly infections that affect peach crops globally. Timely detection of Bacteriosis disease is essential for lowering pesticide use and preventing crop loss. It takes time and effort to distinguish and detect Bacteriosis or a short hole in a peach leaf. In this paper, we proposed a novel LightWeight (WLN...
The video retrieval system refers to the task of retrieving the most relevant video collection, given a user query. By applying some feature extraction models the contents of the video can be extracted. With the exponential increase in video data in online and offline databases as well as a huge implementation of multiple applications in health, mi...
Plants contribute significantly to the global food supply. Various Plant diseases can result in production losses, which can be avoided by maintaining vigilance. However, manually monitoring plant diseases by agriculture experts and botanists is time-consuming, challenging and error-prone. To reduce the risk of disease severity, machine vision tech...
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, have attracted everyone’s attention. The attackers took advantage of this and can caused serious problems, such as malware attack, ransomware, SQL injection attack, etc. One of the dominant attacks, known as distributed deni...
Medical Image Analysis (MIA) is one of the active research areas in computer vision, where brain tumor detection is the most investigated domain among researchers due to its deadly nature. Brain tumor detection in magnetic resonance imaging (MRI) assists radiologists for better analysis about the exact size and location of the tumor. However, the e...
The concept of data mining is to classify and analyze the given data and to examine it clearly understandable and discoverable for the learners and researchers. The different types of classifiers are there exist to classify a data accordingly for the best and accurate results. Taking a primary data, and then classifying it into different portions o...
Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance in which there is no human personnel involved. It is an ad-hoc network in which the UAVs can more in 3D ways simultaneously in t...
In recent years, the huge amount of information and users of the internet service, it is hard to know quickly and accurately what the user wants. This phenomenon leads to an extremely low utilization of information, also known as the information overload problem. Traditionally, keywords are used to retrieve images, but such methods require a lot of...
Flying Ad-hoc Network (FANET) is a new class of Mobile Ad-hoc Network in which the nodes move in three-dimensional (3-D) ways in the air simultaneously. These nodes are known as Unmanned Aerial Vehicles (UAVs) that are operated live remotely or by the pre-defined mechanism which involves no human personnel. Due to the high mobility of nodes and dyn...
Vehicular Ad-hoc Network (VANET) is the subtype of Mobile Ad-hoc Network (MANET) where every node is represented as the vehicle. Although, VANETs and MANETs have some common properties still have a difference in their properties and behaviors i.e. nodes of VANETs have unlimited resources in terms of energy, memory, and computational power. Advanced...
A Mobile Ad-hoc Network (MANET) is a group of nodes connected via ad-hoc fashion for communicating with each other through a wireless interface. The communication among the nodes in such a network takes place by using multi-hop in the absence of fixed infrastructure. TCP faces some hurdles and complexities in multi-hop ad-hoc networks particularly...
KEYWORD ABSTRACT MANET; OLSR; Propagation Models; Sparse; Dense Mobile Ad-hoc Network (MANET) is the most emerging and fast-expanding technology in the last two decades. One of the major issues and challenging areas in MANET is the process of routing due to dynamic topologies and high mobility of mobile nodes. The efficiency and accuracy of a proto...
KEYWORD ABSTRACT MANET, CW, TCP, MAC. IEEE 802.11 A Mobile Ad-hoc Network (MANET) is a group of nodes connected via ad-hoc fashion for communicating with each other through a wireless interface. The communication among the nodes in such a network takes place by using multi-hop in the absence of fixed infrastructure. TCP faces some hurdles and compl...
Mobile Ad-hoc Networks (MANETs) is a decentralized, self-configure
autonomous network having no fixed infrastructure. It consists of a mobile node that
can move freely. In MANETs, there is no centralized control and authority system.
Routing protocols enable the discovery of routes among different nodes and facilitate
communication within the netwo...
Opinion mining is the technique of analyzing the sentiment, behavior, feelings, emotions, and attitudes of customers about a product, topic, comments on social media, etc. Online shopping has revolutionized the way customers do shopping. The customer likes to visit the online store to find their product of interest. It is becoming more difficult fo...
Opinion mining is the technique of analyzing the sentiment, behavior, feelings, emotions, and attitudes of customers about a product, topic, comments on social media, etc. Online shopping has revolutionized the way customers do shopping. The customer likes to visit the online store to find their product of interest. It is becoming more difficult fo...
Abstract— In this modern era the use of computer and internet has dramatically increased. Nowadays it is not only the source of education and communication, but it is also a source of enjoyment and refreshment because of various social websites, online movie and games etc. Increase in the usage of computer and internet is the source of congestion....
The paradigm Social Internet of Things (SIoT) is a new trend in Social Network Service (SNS). It has benefits of connectivity that are exhibited within the network of connected objects through the Internet of Things (IoT). It covers the entire world and provides innovative services to improve life standards, establishes novel businesses, makes buil...
Mobile Ad-hoc Networks (MANETs) could be setup frequently without the
need of pre-established infrastructure. The nodes in MANETs are free to move and
they can join as well as leave the network. Due to the dynamic nature of nodes in
MANETs, routing protocols in MANET are extremely vulnerable to different security
attacks. Like other different secur...
Questions
Questions (11)
In general, Journals Impact Factor is released in the fourth week of June every year?
Is there any statistical method where a variable can perform free movement in different statistical equation.
Are there any databases that share Crime and COVID-19 data prediction?
Hello,
I'm a graduate student in information technology. I'm trying to do my research on Bioinformatics, a multi-disciplinary and rapidly emerging field of biomedical data sciences and informatics technologies. but really i'm new to Bioinformatics and also don't know much about Biology. I already read some research papers but still i could not get an idea. please suggest me IT&Bioinformatics research area ?
In your opinion what are the technically key difference between SIoT and IOT.
Hello
There is anyone working on Source Location Privacy in wireless sensor network in SIoT ?
Hello everyone, I am working on network security for SIoT. I am using MATLAB, I need some help in the how to implement Internet of things (IoT) in matlab . Has anyone worked to ? I need SIoT code.
Regards
Tariq
Hello
Is there any smart city open "Dataset" available for researchers?
thank you