Verified email at gmail.com
Assistant Professor IT Department
College of Applied Sciences, University of Technology & Applied Sciences, Oman
Dr. Mohd. Shahid Husain is a Research professional and Faculty member with 14 years of teaching & research experience. He is currently working as Assistant Professor in College of Applied Sciences, UTAS, Oman.
His area of interest includes Artificial Intelligence, Information Retrieval, Data Mining, Web mining, Sentiment Analysis and Computer Networks & Security.
He has published 4 books, 10 book chapters & more than 30 research papers in Journals/conferences of international repute. He was involved with many sponsored projects as PI/Co-PI. Currently he is involved in ongoing project sponsored by CAS, MoHE. He is also contributing his knowledge and experience as member of Editorial Board/Advisory committee and TPC in various international Journals/Conferences of repute. He is active member of different professional bodies including ACM, IEEE young professionals, IEEE-TCII, ISTE, CSTA, IACSIT.
PhD (Computer Science & Engineering)
M. Tech. (Information Technology)
B. Tech. (Information Technology)
Natural Language Processing
Computer Networks & Security
M H Adnan, M F Hassan, I A Aziz, O Nurika, and M S Husain
IOP Conference Series: Materials Science and Engineering, ISSN: 17578981, eISSN: 1757899X, Volume: 932, Published: 18 December 2020 IOP Publishing
Mohd. Shahid Husain and M. Akheela Khanum
Securing Government Information and Data in Developing Countries, Pages: 104-114, Published: 27 February 2017 IGI Global
Cloud Computing is becoming a rapidly accepted and deployed paradigm both by individuals and organizations alike. The government of various countries is also moving its services to cloud to offer better and just in time services to the users. This chapter explores the basic concepts of Cloud Computing, which includes the main features of Cloud Computing, the cloud deployment models, the services offered by the cloud, motivations behind adoption of cloud by organizations, in general and by the Government, in particular. We also lay an insight into the various Cloud Computing initiatives taken by the Government of India to facilitate its citizens with easy access to information/services.
Mohd. Shahid Husain and Neha Khan
Securing Government Information and Data in Developing Countries, Pages: 27-36, Published: 27 February 2017 IGI Global
All aspects of big data need to be thoroughly investigated, with emphasis on e-governance, needs, challenges and its framework. This chapters recognizes that e-governance needs big data to be reliable, fast and efficient. Another principle is that the trust of a citizen is the main concern. The extraction of meaningful data from large variety of data is a critical issue in big data hence new approaches must be developed. This chapter basically discusses the key concepts of veracity in big data on e-governance. Its main aim is to provide the comprehensive overview big data in e-governance. E-government is still struggling to move advanced level of development. Current e-government applications handle only structured data and sharing between the applications is also difficult.
Mohd Shahid Husain and M. Akheela Khanum
ACM International Conference Proceeding Series, Volume: 04-05-March-2016, Published: 4 March 2016 ACM Press
The most significant phase in the development of a quality software project is Requirement engineering. The objective of the software requirement engineering is the elicitation of the requirements of the clients and their analysis. In general the requirements are expressed in natural languages which are ambiguous in nature. Ambiguity means the same word or sentence can be interpreted differently by different persons. The Word Sense Disambiguation (WSD) system assigns the correct meaning to the words having multiple interpretations, depending on the context of use. In this paper, we propose a framework, for removing ambiguities in an SRS (Software Requirement Specifications) document in an efficient way. This framework uses the WordNet and the concept of Association rule mining for assigning the correct interpretation of a word in given context.
Rumaisa Akbar, Mohd. Shahid Husain, and Mohammad Suaib
Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, Pages: 1530-1537, Published: 12 January 2016 IEEE
With the rapid growth of data amount, it is very crucial to reduce the storage space that data occupies and the bandwidth consumption during network transmission. As an important means of information security, data backup technology has attained increasing attention. This paper proposes the types of data backup and a comparative study of the techniques available for data backup with their pros and cons.
International Journal of Control Theory and Applications, ISSN: 09745572, Pages: 8499-8508, Published: 2016
Riyazuddin Khan, Mohd Haroon, and Mohd Shahid Husain
Global Conference on Communication Technologies, GCCT 2015, Pages: 371-375, Published: 30 November 2015 IEEE
Load in network is rapidly increases day by day by the user input or by the machine communication, so it will affect the performance of the computing nodes, if we will not justify the load of the computing node, it means we will not consider a desirable output from the computing node, load of the computing node is calculated on the basis of queue length and available memory. The main objective of this work is to improve the throughput as well as minimized the CPU time. Load balancing can be defined as a method of improving the performance of a distributed and parallel system by redistributing the load among the processors. Load balancing is control word wide wave for increasing demands so fast and Precise Load balancing is an important point in increasing efficiency of distributed system operation. But it is a difficult task in very large scale distributed system because the distributed systems always have dynamically changed global state. For high availability, throughput, and scalability the distributed system needs better and efficient load balancing. In this paper, we present an overview of the different techniques and methodology given by different researchers throughout the globe and try to analyse their effectiveness in improving the methods of load balancing.
Mohd. Shahid Husain, Faiyaz Ahamad, and Saba Khalid
Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 178, Pages: 45-53, Published: 2013 Springer Berlin Heidelberg
Especially, during last few years, a wide range of information in Indian regional languages like Hindi, Urdu, Bengali, Tamil and Telugu has been made available on web in the form of e-data. But the access to these data repositories is very low because the efficient search engines/retrieval systems supporting these languages are very limited. Hence automatic information processing and retrieval is become an urgent requirement. This paper presents an unsupervised approach for the development of an Urdu stemmer. To train the system a training dataset, taken from CRULP , consists of 111,887 words is used. For generating suffix rules two different approaches, namely, frequency based stripping and length based stripping have been proposed. The evaluation has been made on 1200 words extracted from the Emille corpus. The experiment results shows that these are very efficient algorithms having accuracy of 85.36% and 79.76%.