Mahaboob Sharief Shaik

Work place: Faculty of Computing & Information Technology, King Abdul Aziz, University, Jeddah, KSA

E-mail: mshaik@kau.edu.sa

Website:

Research Interests: Information Security, Network Security, Image Processing, Information-Theoretic Security

Biography

Mr. Mahaboob Sharief Shaik has completed master’s degree in computer applications in the year 1998 and presently working as lecturer at faculty of computing & information technology, King abdulaziz university, Jeddah, Saudi Arabia. His area of interest is network/information security, image processing and database.

Author Articles
Study of Blended Learning Process in Education Context

By Asif Irshad Khan Noor-ul-Qayyum Mahaboob Sharief Shaik Abdullah Maresh Ali Ch.Vijaya Bebi

DOI: https://doi.org/10.5815/ijmecs.2012.09.03, Pub. Date: 8 Sep. 2012

Education is one of the areas that are experiencing phenomenal changes as a result of the advancement and use of information technology. Mobile and e-learning are already facilitating the teaching and learning experience with the use of latest channels and technologies. Blended learning is a potential outcome of advanced technology based learning system. The charm of blended learning approach lies in the adaptation of technology aided learning methods in addition to the existing traditional based learning. With the introduction of technology, the overall learning as well as teaching experience is considerably enhanced by covering negative aspects of the traditional approach. In this paper a blended learning model for higher education where traditional classroom lectures are supported via e-learning.

[...] Read more.
Classification and Recognition of Printed Hindi Characters Using Artificial Neural Networks

By B.Indira M.Shalini M.V. Ramana Murthy Mahaboob Sharief Shaik

DOI: https://doi.org/10.5815/ijigsp.2012.06.03, Pub. Date: 8 Jul. 2012

Character Recognition is one of the important tasks in Pattern Recognition. The complexity of the character recognition problem depends on the character set to be recognized. Neural Network is one of the most widely used and popular techniques for character recognition problem. This paper discusses the classification and recognition of printed Hindi Vowels and Consonants using Artificial Neural Networks. The vowels and consonants in Hindi characters can be divided in to sub groups based on certain significant characteristics. For each group, a separate network is designed and trained to recognize the characters which belong to that group. When a test character is given, appropriate neural network is invoked to recognize the character in that group, based on the features in that character. The accuracy of the network is analyzed by giving various test patterns to the system.

[...] Read more.
Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

By Omar M.Barukab Asif Irshad Khan Mahaboob Sharief Shaik M.V. Ramana Murthy Shahid Ali Khan

DOI: https://doi.org/10.5815/ijieeb.2012.02.06, Pub. Date: 8 Apr. 2012

Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel methodology for safe and secure data transmission over satellite. In this paper a methodology is proposed to ensure safe and secured transferred of data or information for satellite based communication using symmetric and asymmetric Cryptographic techniques.

[...] Read more.
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

By M. Rizwan Jameel Qureshi Mahaboob Sharief Shaik Nayyar Iqbal

DOI: https://doi.org/10.5815/ijitcs.2012.02.07, Pub. Date: 8 Mar. 2012

A new approach, to measure normalization completeness for conceptual model, is introduced using quantitative fuzzy functionality in this paper. We measure the normalization completeness of the conceptual model in two steps. In the first step, different normalization techniques are analyzed up to Boyce Codd Normal Form (BCNF) to find the current normal form of the relation. In the second step, fuzzy membership values are used to scale the normal form between 0 and 1. Case studies to explain schema transformation rules and measurements. Normalization completeness is measured by considering completeness attributes, preventing attributes of the functional dependencies and total number of attributes such as if the functional dependency is non-preventing then the attributes of that functional dependency are completeness attributes. The attributes of functional dependency which prevent to go to the next normal form are called preventing attributes.

[...] Read more.
Other Articles