Papers by Syed Hamza Hasan
Sustainability
The term “mobile learning” (or “m-learning”) refers to using handheld phones to learn and wireles... more The term “mobile learning” (or “m-learning”) refers to using handheld phones to learn and wireless computing as a learning tool and connectivity technology. This paper presents and explores the latest mobile platform for teaching and studying programming basics. The M-Learning tool was created using a platform-independent approach to target the largest available number of learners while reducing development and maintenance time and effort. Since the code is completely shared across mobile devices (iOS, Android, and Windows Phone), students can use any smartphone to access the app. To make the programme responsive, scalable, and dynamic, and to provide students with personalised guidance, the core application is based on an analysis design development implementation and assessment (ADDIE) model implemented in the Xamarin framework. The application’s key features are depicted in a prototype. An experiment is carried out on BS students at a university to evaluate the efficacy of the ge...
Sustainability
Recently, the concept of e-commerce product review evaluation has become a research topic of sign... more Recently, the concept of e-commerce product review evaluation has become a research topic of significant interest in sentiment analysis. The sentiment polarity estimation of product reviews is a great way to obtain a buyer’s opinion on products. It offers significant advantages for online shopping customers to evaluate the service and product qualities of the purchased products. However, the issues related to polysemy, disambiguation, and word dimension mapping create prediction problems in analyzing online reviews. In order to address such issues and enhance the sentiment polarity classification, this paper proposes a new sentiment analysis model, the Ensemble Random Forest-based XG boost (ERF-XGB) approach, for the accurate binary classification of online e-commerce product review sentiments. Two different Internet Movie Database (IMDB) datasets and the Chinese Emotional Corpus (ChnSentiCorp) dataset are used for estimating online reviews. First, the datasets are preprocessed thro...
Electronics
Recently, cloud computing resources have become one of the trending technologies that permit the ... more Recently, cloud computing resources have become one of the trending technologies that permit the user to manage diverse resources and a huge amount of data in the cloud. Task scheduling is considered one of the most significant challenges and ineffective management results in performance degradation. It is necessary to schedule the task effectively with maximum resource utilization and minimum execution time. Therefore, this paper proposes a novel technique for effective task scheduling with enhanced security in the cloud computing environment. A novel convolutional neural network optimized modified butterfly optimization (CNN-MBO) algorithm is proposed for scheduling the tasks, thereby maximizing the throughput and minimizing the makespan. Secondly, a modified RSA algorithm is employed to encrypt the data, thereby providing secure data transmission. Finally, our proposed approach is simulated under a cloudlet simulator and the evaluation results are analyzed to determine its perfor...
arXiv (Cornell University), May 1, 2021
The primary objective of this paper is to present an approach for recommender systems that can as... more The primary objective of this paper is to present an approach for recommender systems that can assimilate ranking to the voters or rankers so that recommendation can be made by giving priority to experts' suggestion over usual recommendation. To accomplish this, we have incorporated the concept of human-centric aggregation via Ordered Weighted Aggregation (OWA). Here, we are advocating ranked recommendation where rankers are assigned weights according to their place in the ranking. Further, the recommendation process which is presented here for the recommendation of books to university students exploits linguistic data summaries and Ordered Weighted Aggregation (OWA) technique. In the suggested approach, the weights are assigned in a way that it associates higher weights to best ranked university. The approach has been evaluated over eight different parameters. The superiority of the proposed approach is evident from the evaluation results. We claim that proposed scheme saves storage spaces required in traditional recommender systems as well as it does not need users' prior preferences and hence produce a solution for cold start problem. This envisaged that the proposed scheme can be very useful in decision making problems, especially for recommender systems; in addition, it emphasizes on how human-centric aggregation can be useful in recommendation researches, and also it gives a new direction about how various human specific tasks can be numerically aggregated.
Computers, Materials & Continua, 2022
The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backd... more The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model optimized using a Gradient-based Optimization (GBO)(ICNN-GBO) algorithm. In the ICNN-GBO model, we are injecting the triggers via a steganography and regularization technique. We are generating triggers using a single-pixel, irregular shape, and different sizes. The performance of the proposed methodology is evaluated using different performance metrics such as Attack success rate, stealthiness, pollution index, anomaly index, entropy index, and functionality. When the CNN-GBO model is trained with the poisoned dataset, it will map the malicious code to the target label. The proposed scheme's effectiveness is verified by the experiments conducted on both the benchmark datasets namely CIDAR-10 and MSCELEB 1M dataset. The results demonstrate that the proposed methodology offers significant defense against the conventional backdoor attack detection frameworks such as STRIP and Neutral cleanse.
Smart Infrastructure and Applications, 2019
Data Licenses CreaƟve Commons Licences Public Domain (CC0) AƩribuƟon (CC-BY v4.0) AƩribuƟon & Sha... more Data Licenses CreaƟve Commons Licences Public Domain (CC0) AƩribuƟon (CC-BY v4.0) AƩribuƟon & Share-Alike (CC-BY-SA v4.0) AƩribuƟon & Non Commercial (CC BY-NC) AƩribuƟon & No DerivaƟves (CC BY-ND) Linux FoundaƟon Data Licenses CDLA-Permissive-1.0 CDLA-Sharing-1.0 Governmental Open Data Licenses OGL v2.0 Licence Ouverte
Wireless Network Systems are usually deployed in hostile environments where they encountered a wi... more Wireless Network Systems are usually deployed in hostile environments where they encountered a wide variety of malicious attacks. A wireless sensor network (WSN) is a wireless network composed of a large number of sensor nodes. In WSNs the scarcest resource is energy which includes low power, less storage space, low computation ability and short communication range. For this reason, algorithmic research in WSN mostly focuses on the study and design of energy aware algorithms for data computation. This problem becomes harder in the case of security, as most of the security algorithms are quite heavy. Although symmetric cryptography may be one of the approaches to solve the problem due to their small computation requirement. In order to further reduce the computational cost of any protocol for WSN, Elliptic curve cryptography (ECC) has been attractive to the researcher due to its smaller key size and its high strength of security. Scalar multiplication is most important cryptographic ...
This paper describes an efficient simple proxy blind signature scheme. The security of the scheme... more This paper describes an efficient simple proxy blind signature scheme. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem(ECDLP). They claim that this system can be implemented in low power and small processor mobile devices such as smart card, PDA etc.
Applied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, univer... more The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach utilizes an adaptive tunicate slime-mold (ATS) algorithm to generate optimal key value. Thus, the data uploaded in the cloud system are secured with high authentication, data integrity and confidentiality. The study investigation employed a survey consisting of 50 students and the questionnaire was sent to all fifty students. In addition to th...
INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY, 2014
An organizations flexibility, effectiveness and competitiveness can be improved through TQM. We c... more An organizations flexibility, effectiveness and competitiveness can be improved through TQM. We can find a number of organization who have utilized TQM in order to achieve growth and cost effectiveness, we can also find some business that have not been so successful in realizing the benefit of TQM. There has been ample research done on the reason of the failure of TQM implementation in organizations and some of the reason for failure are quoted as: low employee involvement; no support from senior management and scarcity of resources. Whereas there are a number of other factors that have been covered by very few researchers, like lack of proper communication and handling of the transformation brought in the organization, improper training and awareness methods; that lead to failure of TQM in any organization. There were a number of studies done for evaluating the process of successful implementation of TQM in SMB manufacturing companies and this paper would cover such an exercise per...
Indian Journal of Pathology and Oncology, 2019
Context: Breast cancer is the most common cause of cancer related deaths among women worldwide, t... more Context: Breast cancer is the most common cause of cancer related deaths among women worldwide, thus forming a significant burden of disease. Various epithelial markers like ER, PR, and Her2/neu are well established factors predicting prognosis and treatment response in breast cancer. However, stroma has a definite role in tumor invasion and metastasis. Novel stromal markers are now emerging which aid in assessing the prognosis and treatment of invasive breast lesions. Objectives: The present study aims to assess the frequency of stromal CD10 expression in malignant breast lesions and evaluate its prognostic significance and correlation with other clinico-pathological factors. Design: Of the 172 cases of breast carcinoma, 158 were that of infiltrating ductal carcinoma (NOS) and were selected for CD10 staining forming the study group. Stromal CD10 was assessed immunohistochemically in these breast lesions and statistically correlated with known prognostic markers of breast carcinoma. Results: Stromal CD10 significantly correlated with increasing tumor grade (P=0.0026), nodal positivity (P=0.0016), ER negativity (P=0.0007), Her2/neu positivity (P=0.0061), and worsening prognosis (P=0.04). No correlation was found between stromal CD10 expression with age, increasing tumor size and tumor stage. A higher CD10 positivity was seen in the triple negative group as compared to the non-triple negative group, but was statistically insignificant (P=0.0994). Conclusion: Stromal CD10 expression showed a positive correlation with well-known poor prognostic factors in breast cancer [higher tumor grade, nodal positivity, ER negativity, Her2/neu positivity and worsening prognosis (NPI)], suggesting its definite role on tumor aggressiveness and its potential use as an independent prognostic marker.
Gastroenterology research, 2018
We present a case of a 60-year-old female patient who has significant medical history of renal ce... more We present a case of a 60-year-old female patient who has significant medical history of renal cell carcinoma diagnosed 2 years back and had undergone right nephrectomy and chemotherapy. She presented to the hospital with complaints of abdominal pain and jaundice of 2 weeks duration and was found to have periampullary mass lesion causing compression of distal common bile duct on imaging with computed tomography of abdomen. Endoscopic retrograde cholangiography and endoscopic ultrasound showed ampullary mass lesion causing biliary obstruction along with abdominal lymphadenopathy. A temporary plastic stent was placed to relieve obstruction. Fine needle aspiration cytology of the periampullary mass along with immunohistochemical staining confirmed the diagnosis of metastatic renal cell carcinoma.
Internal and emergency medicine, Jan 25, 2018
There were no research involved animals performed by any author. All procedures performed in huma... more There were no research involved animals performed by any author. All procedures performed in human participants were approved by the ethical standards of the institutional committee and in accordance with the 1964 Helsinki Declaration and its later amendments. Informed consent Informed consent was obtained from the legal representative of the patient included in the case report.
Humans have produced far greater impact on the environment than any other living form. The impact... more Humans have produced far greater impact on the environment than any other living form. The impact has been so significant-particularly during the past 50 years-that a new word, Anthrposphere has started appearing in recent literature. It is now being used along with the four major components of the system earth to underscore humans' influence on the environment. Human activities have produced a myriad of impacts on the environment that span the scale from local to global. The slow process that brought humanity to the present environmental crisis began with the Industrial Revolution and has greatly accelerated since the World War II. The past 50 years mark a unique period in human history that is characterized by rapid technological advances and unprecedented population growth. While the use of technology has been very effective in meeting the needs of the growing population, it has also produced serious impact on the environment. Large scale exploitation of mineral, fuel, water,...
Advances in Condensed Matter Physics, 2015
Highly dense pore structure was generated by simple sequential routes using NaCl and PVA as porog... more Highly dense pore structure was generated by simple sequential routes using NaCl and PVA as porogens in conventional PbTe thermoelectric materials, and the effect of pores on thermal transport properties was investigated. Compared with the pristine PbTe, the lattice thermal conductivity values of pore-generated PbTe polycrystalline bulks were significantly reduced due to the enhanced phonon scattering by mismatched phonon modes in the presence of pores (200 nm–2 μm) in the PbTe matrix. We obtained extremely low lattice thermal conductivity (~0.56 W m−1 K−1at 773 K) in pore-embedded PbTe bulk after sonication for the elimination of NaCl residue.
Journal of Nanomaterials, 2013
We herein report the electronic and thermal transport properties of p-type Bi0.5Sb1.5Te3polycryst... more We herein report the electronic and thermal transport properties of p-type Bi0.5Sb1.5Te3polycrystalline bulks with dense pore structure. Dense pore structure was fabricated by vaporization of residual Te during the pressureless annealing of spark plasma sintered bulks of Te coated Bi0.5Sb1.5Te3powders. The lattice thermal conductivity was effectively reduced to the value of 0.35 W m−1 K−1at 300 K mainly due to the phonon scattering by pores, while the power factor was not significantly affected. An enhancedZTof 1.24 at 300 K was obtained in spark plasma sintered and annealed bulks of 3 wt.% Te coated Bi0.5Sb1.5Te3by these synergetic effects.
2009 IEEE 35th Annual Northeast Bioengineering Conference, 2009
Abstract We created 3D tissue constructs epitaxially by printing cell-laden hydrogel droplets. Th... more Abstract We created 3D tissue constructs epitaxially by printing cell-laden hydrogel droplets. The ability to bioengineer 3D tissues is a powerful new approach to treat diverse diseases such as cancer, loss of tissue function, or organ failure. Inspired by the molecular beam epitaxy technique, a common semiconductor manufacturing technology, we present a platform that prints the first example of a 3D smooth muscle (SMC) patch (5 mm times 5 mm times 81 m) consisting of multiple cell-laden hydrogel layers. The bioprinting platform that ...
2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014
Advanced Encryption Standard (AES) has been the focus of Cryptanalysis since it was released in t... more Advanced Encryption Standard (AES) has been the focus of Cryptanalysis since it was released in the 2001, November. The research gained more important when AES as declared as the Type-1 Suite-B Encryption Algorithm, by the NSA in 2003(CNSSP-15). Which makes it deemed suitable for being utilized for encryption of the both Classified & Un Classified security documents and system. The following papers discusses the Cryptanalysis research being carried out on the AES and discusses the different techniques being used establish the advantages of the algorithm being used in Security systems. It would conclude by the trying to assess the duration in which AES can be effectively used in the National Security Applications.
International Journal of Computer Network and Information Security, 2014
Hardware based ciphers are most suitable for resource constrained environments to provide informa... more Hardware based ciphers are most suitable for resource constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this study is to present a comprehensive survey and review of Grain family of stream ciphers that is one of the portfolio candidates in the hardware based category of eSTREAM. Security features and different attacks on these ciphers have been studied in this paper to analyze the strengths and weaknesses of these designs.
Uploads
Papers by Syed Hamza Hasan