Dr. MOHD SHAHID HUSAIN

Verified email at gmail.com

Assistant Professor IT Department
College of Applied Sciences, University of Technology & Applied Sciences, Oman



                                                           

http://researchid.co/mshusain

Dr. Mohd. Shahid Husain is a Research professional and Faculty member with 14 years of teaching & research experience. He is currently working as Assistant Professor in College of Applied Sciences, UTAS, Oman.
His area of interest includes Artificial Intelligence, Information Retrieval, Data Mining, Web mining, Sentiment Analysis and Computer Networks & Security.
He has published 4 books, 10 book chapters & more than 30 research papers in Journals/conferences of international repute. He was involved with many sponsored projects as PI/Co-PI. Currently he is involved in ongoing project sponsored by CAS, MoHE. He is also contributing his knowledge and experience as member of Editorial Board/Advisory committee and TPC in various international Journals/Conferences of repute. He is active member of different professional bodies including ACM, IEEE young professionals, IEEE-TCII, ISTE, CSTA, IACSIT.

EDUCATION

PhD (Computer Science & Engineering)
M. Tech. (Information Technology)
B. Tech. (Information Technology)

RESEARCH INTERESTS

Artificial Intelligence
Data Mining
Sentiment Analysis
Natural Language Processing
Computer Networks & Security

8

Scopus Publications

242

Scholar Citations

8

Scholar h-index

7

Scholar i10-index

Scopus Publications

  • Modified ISR hyper-heuristic for tuning automatic genetic clustering chromosome size
    M H Adnan, M F Hassan, I A Aziz, O Nurika, and M S Husain

    IOP Conference Series: Materials Science and Engineering, ISSN: 17578981, eISSN: 1757899X, Volume: 932, Published: 18 December 2020 IOP Publishing

  • Cloud computing in E-governance: Indian perspective
    Mohd. Shahid Husain and M. Akheela Khanum

    Securing Government Information and Data in Developing Countries, Pages: 104-114, Published: 27 February 2017 IGI Global
    Cloud Computing is becoming a rapidly accepted and deployed paradigm both by individuals and organizations alike. The government of various countries is also moving its services to cloud to offer better and just in time services to the users. This chapter explores the basic concepts of Cloud Computing, which includes the main features of Cloud Computing, the cloud deployment models, the services offered by the cloud, motivations behind adoption of cloud by organizations, in general and by the Government, in particular. We also lay an insight into the various Cloud Computing initiatives taken by the Government of India to facilitate its citizens with easy access to information/services.

  • Big data on E-government
    Mohd. Shahid Husain and Neha Khan

    Securing Government Information and Data in Developing Countries, Pages: 27-36, Published: 27 February 2017 IGI Global
    All aspects of big data need to be thoroughly investigated, with emphasis on e-governance, needs, challenges and its framework. This chapters recognizes that e-governance needs big data to be reliable, fast and efficient. Another principle is that the trust of a citizen is the main concern. The extraction of meaningful data from large variety of data is a critical issue in big data hence new approaches must be developed. This chapter basically discusses the key concepts of veracity in big data on e-governance. Its main aim is to provide the comprehensive overview big data in e-governance. E-government is still struggling to move advanced level of development. Current e-government applications handle only structured data and sharing between the applications is also difficult.

  • Word sense disambiguation in software requirement specifications using Wordnet and association mining rule
    Mohd Shahid Husain and M. Akheela Khanum

    ACM International Conference Proceeding Series, Volume: 04-05-March-2016, Published: 4 March 2016 ACM Press
    The most significant phase in the development of a quality software project is Requirement engineering. The objective of the software requirement engineering is the elicitation of the requirements of the clients and their analysis. In general the requirements are expressed in natural languages which are ambiguous in nature. Ambiguity means the same word or sentence can be interpreted differently by different persons. The Word Sense Disambiguation (WSD) system assigns the correct meaning to the words having multiple interpretations, depending on the context of use. In this paper, we propose a framework, for removing ambiguities in an SRS (Software Requirement Specifications) document in an efficient way. This framework uses the WordNet and the concept of Association rule mining for assigning the correct interpretation of a word in given context.

  • Comparative study of various backup and monitoring techniques
    Rumaisa Akbar, Mohd. Shahid Husain, and Mohammad Suaib

    Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, Pages: 1530-1537, Published: 12 January 2016 IEEE
    With the rapid growth of data amount, it is very crucial to reduce the storage space that data occupies and the bandwidth consumption during network transmission. As an important means of information security, data backup technology has attained increasing attention. This paper proposes the types of data backup and a comparative study of the techniques available for data backup with their pros and cons.

  • CTS: A credit based threshold system to minimize the dissemination of faulty data in vehicular adhoc networks
    International Journal of Control Theory and Applications, ISSN: 09745572, Pages: 8499-8508, Published: 2016

  • Different technique of load balancing in distributed system: A review paper
    Riyazuddin Khan, Mohd Haroon, and Mohd Shahid Husain

    Global Conference on Communication Technologies, GCCT 2015, Pages: 371-375, Published: 30 November 2015 IEEE
    Load in network is rapidly increases day by day by the user input or by the machine communication, so it will affect the performance of the computing nodes, if we will not justify the load of the computing node, it means we will not consider a desirable output from the computing node, load of the computing node is calculated on the basis of queue length and available memory. The main objective of this work is to improve the throughput as well as minimized the CPU time. Load balancing can be defined as a method of improving the performance of a distributed and parallel system by redistributing the load among the processors. Load balancing is control word wide wave for increasing demands so fast and Precise Load balancing is an important point in increasing efficiency of distributed system operation. But it is a difficult task in very large scale distributed system because the distributed systems always have dynamically changed global state. For high availability, throughput, and scalability the distributed system needs better and efficient load balancing. In this paper, we present an overview of the different techniques and methodology given by different researchers throughout the globe and try to analyse their effectiveness in improving the methods of load balancing.

  • A language independent approach to develop urdu stemmer
    Mohd. Shahid Husain, Faiyaz Ahamad, and Saba Khalid

    Advances in Intelligent Systems and Computing, ISSN: 21945357, eISSN: 21945365, Volume: 178, Pages: 45-53, Published: 2013 Springer Berlin Heidelberg
    Especially, during last few years, a wide range of information in Indian regional languages like Hindi, Urdu, Bengali, Tamil and Telugu has been made available on web in the form of e-data. But the access to these data repositories is very low because the efficient search engines/retrieval systems supporting these languages are very limited. Hence automatic information processing and retrieval is become an urgent requirement. This paper presents an unsupervised approach for the development of an Urdu stemmer. To train the system a training dataset, taken from CRULP [22], consists of 111,887 words is used. For generating suffix rules two different approaches, namely, frequency based stripping and length based stripping have been proposed. The evaluation has been made on 1200 words extracted from the Emille corpus. The experiment results shows that these are very efficient algorithms having accuracy of 85.36% and 79.76%.

RECENT SCHOLAR PUBLICATIONS

  • A Social Media Analytics Framework to Increase Prospective Students’ Interests in STEM and TVET Education
    MHM Adnan, SA Ariffin, HF Hanafi, MS Husain, IY Panessai
    Asian Journal of University Education 16 (4), 82-90 2021

  • Critical Concepts and Techniques for Information Retrieval System
    MS HUSAIN
    Natural Language Processing in Artificial Intelligence, 29 2020

  • Modified ISR hyper-heuristic for tuning automatic genetic clustering chromosome size
    MH Adnan, MF Hassan, IA Aziz, O Nurika, MS Husain
    IOP Conference Series: Materials Science and Engineering 932 (1), 012065 2020

  • Nature Inspired Approach for Intrusion Detection Systems
    MS Husain
    Design and Analysis of Security Protocol for Communication, 171-182 2020

  • Introduction to Email, Web, and Message Forensics
    MZ Khan, MS Husain, M Shoaib
    Critical Concepts, Standards, and Techniques in Cyber Forensics, 174-186 2020

  • A Compendium of Cloud Forensics
    M Akbar, M Suaib, MS Husain, S Shukla
    Critical Concepts, Standards, and Techniques in Cyber Forensics, 215-227 2020

  • Digital Forensics and Data Mining
    M Suaib, M Akbar, MS Husain
    Critical Concepts, Standards, and Techniques in Cyber Forensics, 240-247 2020

  • Critical Concepts, Standards, and Techniques in Cyber Forensics
    MS Husain, MZ Khan
    IGI Global 2019

  • Social media Analytics to predict depression level in the users
    MS Husain
    Early Detection of Neurological Disorders Using Machine Learning Systems 2019

  • Application of artificial intelligence in fighting against cyber crimes: A REVIEW
    MZ Siddiqui, S Yadav, MS Husain
    International Journal of Advanced Research in Computer Science 9 (2) 2018

  • Analysis of mental state of users using social media to predict depression! A survey
    A Khan, MS Husain, A Khan
    International Journal of Advanced Research in Computer Science 9 (2), 100-106 2018

  • Expert System for Crop Selection in Agriculture: A Critical Review
    PK Singh, MS Hussain
    International Journal of Advanced Research in Computer Science 9 (2) 2018

  • Analysis of DDOS attack detection and prevention in cloud environment: A review
    A Verma, M Arif, MS Husain
    International Journal of Advanced Research in Computer Science 9 (0), 107-113 2018

  • CLASSIFICATION OF JOBS USING LIVE DATA IN CLOUD COMPUTING.
    F Khursheed, M Hussain
    International Journal of Advanced Research in Computer Science 8 (7) 2017

  • AN APPROACH TOWARDS AMBIGUITY RESOLUTION IN SOFTWARE REQUIREMENT SPECIFICATIONS
    MS HUSAIN
    INTEGRAL UNIVERSITY, LUCKNOW, INDIA 2017

  • Opinion mining with Spam Detection using Real Time data on cloud
    MSH TS
    International Journal of Advanced Research in Computer Science 8 (7), 910-914 2017

  • Big data on E-government
    MS Husain, N Khan
    Securing Government Information and Data in Developing Countries, 27-36 2017

  • Cloud Computing in E-Governance: Indian Perspective
    MS Husain, MA Khanum
    Securing Government Information and Data in Developing Countries, 104-114 2017

  • Word Sense Disambiguation in Software Requirement Specifications Using WordNet and Association Mining Rule
    MS Husain, MA Khanum
    Proceedings of the Second International Conference on Information and 2016

  • Proposal for Avoiding Ambiguity in Requirement Engineering using Artificial Intelligence
    MSH Sinha S
    proceedings of international conference on advancement in computer 2016

MOST CITED SCHOLAR PUBLICATIONS

  • Methodological study of opinion mining and sentiment analysis techniques
    PK Singh, MS Husain
    International Journal on Soft Computing 5 (1), 11 2014
    Citations: 90

  • An Unsupervised Approach to Develop a Stemmer
    MS Husain
    International Journal on Natural Language Computing (IJNLC) 1 (2), 15-23 2012
    Citations: 25

  • Analytical study of feature extraction techniques in opinion mining
    PK Singh, MS Husain
    Computer Science 85 2013
    Citations: 12

  • Big Data Classification using Evolutionary Techniques: A Survey
    N Khan, M S Husain, M R Beg
    IEEE International Conference on Engineering and Technology (ICETECH), 243-247 2015
    Citations: 11

  • A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues
    Neha Mishra, M Shahid Husain, Jitesh P Tripathi
    BIJIT - BVICAM’s International Journal of Information Technology 7 (1), 810-814 2015
    Citations: 11

  • Word Sense Ambiguity: A Survey
    MS Husain, MR Beg
    International Journal of Computer & Information Technology 2 (6), 1161-1168 2013
    Citations: 11

  • A language Independent Approach to develop Urdu stemmer
    MS Husain, F Ahamad, S Khalid
    Advances in computing and information technology, 45-53 2013
    Citations: 10

  • Application of artificial intelligence in fighting against cyber crimes: A REVIEW
    MZ Siddiqui, S Yadav, MS Husain
    International Journal of Advanced Research in Computer Science 9 (2) 2018
    Citations: 8

  • Analysis of security challenges in vehicular adhoc network
    N Siddiqui, MS Husain, M Akbar
    Proceedings of International Conference on Advancement in Computer 2016
    Citations: 8

  • Advances in Ambiguity less NL SRS: A review
    M S Husain, M R Beg
    IEEE International Conference on Engineering and Technology (ICETECH), 221-225 2015
    Citations: 7

  • Analysis of mental state of users using social media to predict depression! A survey
    A Khan, MS Husain, A Khan
    International Journal of Advanced Research in Computer Science 9 (2), 100-106 2018
    Citations: 6

  • Analysis of DDOS attack detection and prevention in cloud environment: A review
    A Verma, M Arif, MS Husain
    International Journal of Advanced Research in Computer Science 9 (0), 107-113 2018
    Citations: 5

  • Different technique of load balancing in distributed system: A review paper
    HM M Shahid Husain, Khan Riyaz
    Global Conference on Communication Technologies (GCCT), 2015, 371-375 2015
    Citations: 5

  • Books Reviews using Naıve Bayes and Clustering Classifier
    PK Singh, MS Husain
    Second International Conference on Emerging Research in Computing 2014
    Citations: 5

  • Expert System for Crop Selection in Agriculture: A Critical Review
    PK Singh, MS Hussain
    International Journal of Advanced Research in Computer Science 9 (2) 2018
    Citations: 4

  • Study of Hindi Word Sense Disambiguation Based on Hindi WorldNet
    HMS Yadav Preeti
    International Journal for Research in Applied Science & Engineering 2014
    Citations: 4

  • Encrypting Data Using The Features of Memetic Algorithm and Cryptography
    F Ahmad, S Khalid, MS Hussain
    International Journal of Engineering Research & Applications 2 (3), 3049 2012
    Citations: 3

  • Social media Analytics to predict depression level in the users
    MS Husain
    Early Detection of Neurological Disorders Using Machine Learning Systems 2019
    Citations: 2

  • Opinion mining with Spam Detection using Real Time data on cloud
    MSH TS
    International Journal of Advanced Research in Computer Science 8 (7), 910-914 2017
    Citations: 2

  • Big data on E-government
    MS Husain, N Khan
    Securing Government Information and Data in Developing Countries, 27-36 2017
    Citations: 2