Abdul
Razaque

Bio:

Dr. Abdul Razaque is an information technology expert, researcher, reviewer, and Editor. He has authored over 170 articles in the domain of cybersecurity, Secure cloud computing, Machine learning, Wireless sensor networks, IoT, and Big data. Also, he is author of four books in the domain of cybersecurity, network, biometric authentication, and cryptographic methods. Dr. Razaque is a technology designer and solution expert. Dr. Razaque worked as a programmer for Google Incorporation, Network IT Director for AT&T USA, Project IT Director for the projects of United Nations Educational, Scientific and Cultural Organization, and World Bank. 

Dr. Razaque worked for the University of Bridgeport, Cleveland State University, New York Institute of Technology, and the University of Arizona as a Researcher/Academician. Dr. Razaque has obtained total grant US$ 3,548,270.00 while working on several interdisciplinary research projects funded by the National Science Foundation, USA, United States Agency for International Development (USAID), USA, National Institute of Health, USA, ICT, GE Lightning, Channel Products and Orbital Research, USA. 

He received several prestigious awards, including distinguished research award from the Commonwealth of Nations, distinguished Globe award, outstanding Alumnus award in leadership from the Eisenhower fellowships, Inspirational award from the Shell, Cultural exchange Fellowship award. He is currently working for International IT University, Kazakhstan.

Abdul Razaque

Research Interests:

The central objective of Dr. Razaque’s current research is divided into five major research domains, but not limited. Firstly, his research is focused on the design, implementation, and performance evaluation of Cyber Security, Data Analytics, Secure Cloud Computing models, Internet-of-things, and Wireless Sensor Networks. These areas enable a broad spectrum of applications in the commercial, national security, military, disaster recovery, medical, social network, sociology, education, etc. In his research, protocols, mathematical models, and algorithms have been developed for safety, energy consumption, scalability, mobility, data redundancy, and quality of service provisioning. More precisely, he has worked extensively on five main research topics: cyber-physical systems, Big data analytics, and machine learning, secure clouding computing models for three stakeholderslow-duty-cycled medium access control protocols for wireless sensor networks and Biometric authentication. Secondly, he has designed programming models for privacy-preserving, cyber-physical systems for medical and grid monitoring, energy efficiency, task-scheduling, and social networks, which help to improve safety, improving energy efficiency, identifying the location, speed, providing the scalability, complexity, and mobility. These models could contribute to identify diseases, track the missed objects, notably planes, ships, and vehicles, Finally, privacy-preserving and loss minimization models are designed and implemented to secure the cloud computing environment and handle the data breach. Razaque is highly passionate about working on multidisciplinary domains by integrating the medical, social, cybersecurity, and cloud computing domains. Also, Razaque is quite intrigued to integrate the features of supervised, non-supervised, semi-supervised machine learning algorithms to address and solve the symptoms of different diseases and applies the magic of the machine learning algorithms on Big data providing the state-of-the-art solutions for data classification, the customer insights of transparent and simpler products, by analyzing and predicting customer behavior through data derived from social media, GPS-enabled devices, and CCTV footage, providing the significant information for the entertainment & media, fraud detection, malware detection, politics, myocarditis attack, and infectious diseases.

Key Terms:

  • Modeling of Cybersecurity Vulnerabilities and Threats
  • Deep Learning and Convolutional Neural Network
  • Machine Intelligence
  • Secure Cloud Computing
  • Security of Wireless Sensor Networks and Persuasive Objects
  • Man-Computer Synergy
  • Internet-of-the-Things
  • Mindfulness and Well Being
  • Sentiment Perception using Data Mining 
  • Deployment of Multibiometric Authentication for Multidisciplinary Applications