+88 01929125856

Prof. Dr. Mohammed Nasir

Advisor

Prof. Dr. Mohammed Nasir working as an advisor in the department of computer science & Engineering at ADUST.

Biography

He is a Professor in the Department of Computer Science and Engineering at Jagannath University, Bangladesh. He was a faculty member in the Department of Computer Science and Engineering at Moscow Power Engineering Institute (Technical University) Moscow, Russia from February 2001 to June 2010. He also served as a faculty member of the Santo-Mariam University of Creative Technology and Uttara University in Bangladesh.

He received his PhD. in Computer Science from Moscow Power Engineering Institute (Technical University), Moscow. Russia. Masters of Science in Computer Engineering, and Bachelor of Engineering in Computer Engineering from the State University of Lvivska Polytechnica, Lvov, Ukraine. His research interest includes Cyber Security and Digital Forensic.

Education

  • Ph.D, Moscow Power Engineering Institute(Technical University), Moscow, Russia
  • M.Sc in Computer Engineering, State University of Lvivska Polytechnica, Ukraine
  • B.Sc. in Computer Engineering, State University of Lvivska Polytechnica, Ukraine

Publications

  • Relational model of access control system, “Information Resources and Technologies” 16-18/10/2001 3-x t.t.T2 “Stankin” p.34-37, 2001, Moscow- Russia, ISBN 4-7028-0510-1
  • Relational model of network objects security system “Information Resources and Technologies”, 15-18/10/2002 3-x t.t.T2“Stankin” p.34-37, ISSB 2002, Moscow- Russia, ISBN 5-7028-0510-02
  • The use of object oriented approach to the model of security System “Information Resources and Technologies”, 16-18/10/2001 5-x t.t.T2“Stankin” p.39-42, 2002, Moscow- Russia, ISBN 5-7028-0510-02
  • Security System of Wireless Network"International Journal of Research and Review in Wireless Communication", Vol.1,No. 2, June 2011 ISSN:2046-6447,Science Academy Publisher, UK
  • A survey of Biometrics Security System International Journal of Computer Science and Network security, Vol. 11,No. 10, October 2011 ISSN : 1738-7906, Korea
  • USB key as an Active Device of Security System "International Journal of Computer Science and Network security", Vol. 11,No. 10, October 2011 ISSN : 1738-7906, Korea
  • Network Security Middleware with USB key International Journal of Emerging Technologies in Science and Engineering Issue, Vol. 5, Issue. 2, November 2011, ISSN : 1923-9181, Canada
  • A Comprehensive Study of Digital Image Processing for finding image quality dependencies International Journal of Scientific and Research Publications, Volume-2, Issue 3, March 2012, ISSN 2250-3153, France.
  • Problems and prospects of E – Banking in Bangladesh International Journal of Scientific and Research Publications, Volume-2, Issue 7, July 2012, ISSN 2250-3153, France.
  • Do Aesthetic Matter in Long Established Trust? International Journal of Computer Application, volume-77 No. 13, September 2013, ISSN 0975-8887, Foundation of Computer Science, NY-10001, USA.
  • Multi-cycle deadlock detection and recovery technique. Jagannath University Journal of Science, Volume 4, Issue 1, January 2015.
  • An explicit loss and handoff Notification scheme in TCP for cellular mobile system International Journal of Computer networks and communications, Vol. 8, No. 6, November 2016, AIRCC Publishing Corporation,2nd Cross street, Mogappair, Chenni, TamilNadu, India. ISSN 09752293(print); 09749322(online)
  • Bangladeshi Road Sign Recognition Based on DtBs Vector and Artificial Neural Network IEEE International Conference on Electrical Computer and Communication Engineering,2017, 16-18 will Oral Presentation Chittagang University of Engineering and Technology, Paper will published in IEEE Xplore
  • Occlusion handling and human detection based on histogram of oriented gradients for automatic video surveillance IEEE International Conference on Innovations in Science, Engineering and Technology 2016, 28th & 29th October 2016, International Islamic University Chittagong. published in IEEE explorer.
  • Comparison of the performance of IEEE802.11a, IEEE802.11b, IEEE802.11g and IEEE802.11n wireless LAN standard Jagannath University Journal of Science, ISSN 2224-1698, Vol. 05 No. 01 January 2016
  • A highly secured symmetric key cryptographic algorithm-SKES Jagannath University Journal of Science, ISSN 2224-1698, Vol. 05 No. 01 January 2016
  • Development of a Relational Security Model Jagannath University Journal of Science, ISSN 2224-1698, Vol. 05 No. 01 January 2016
  • Modified Expected Transmission Time for Calculating Effective Transmission Time" 4th International Conference on Advances in Electrical Engineering(ICAEE) 28-30 September, 2017 published in IEEE explorer.
  • “Three-Layered Incentive Framework for Mobile Crowdsourcing” 10th International Conference on Electrical and Computer Engineering (ICECE-2018), published in IEEE explorer
  • “Development of a Relational Security Model with Ensuring Availability in the System " 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT 2018), published in IEEE explorer
  • A Quality-Aware Reverse Auction-Based Incentive Model for Mobile Crowdsourcing. 5th International Conference for Convergence in Technology (I2CT 2019), IEEE, (Scopus Indexed).
  • “Development of an effective cryptographic algorithm using random matrix shared key 3rd International Conference on Computer Science and Artificial Intelligence (CSAI)-2019, Beijing, China. Published in ACM electronic journal
  • Obstacles of Mobile Crowdsourcing 2nd IEEE International Conference on Innovating Technology for Humanity (IEEE Punecon 2019), Pune, India, published in IEEE xplore
  • Malicious Nodes Detection based on Artificial Neural Network in IoT Environments 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, published in IEEE xplore
  • A Secure Mutual Authentication Protocol for IoT using ID Verifier Based on ECC 2019 International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh, published in IEEE xplore
  • Digital Voting: A Blockchain-based E-Voting System using Biohash and Smart Contract 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, published in IEEE xplore