Designed with ♥ at Skróts
.01

ABOUT

Dr. Mohammed Abdul Bari
bari_bari11@rediffmail.com; me@drmohammedabdulbari.com
+91 96524 44404
More then 11 years of teaching experience in reputed engineering college in India, Europe and Gulf University. Co-Author of 2(two) book published in Germany and USA. 2 Patent,Double Masters. Available as freelance

Dr. Mohammed Abdul Bari

For me, teaching is a passion and one of the primary reasons that I decided to pursue a career in academia. I enjoy helping beginners, gain a deep understanding of difficult concepts, and develop enthusiasm for the material. This permits them to enjoy learning and to develop the drive to build upon their previous understanding. I have involved in many different teaching roles at (different engineering colleges, university’s: - B.Tech, MTech,PhD, B.sc, M.sc). These teaching roles are: Supervising undergraduate projects for students and summer scholarship; Delivering workshops to Graduate Students on how to succeed in Graduate School; In each of these teaching environments I take my role as an educator seriously, and I continually strive to improve my teaching skills.

.02

RESUME

  • 2014
    2018
    Raipur

    COMPUTER SCIENCE & ENGINEERING - PHD

    Kalinga University

  • 2011
    2013
    Hyderabad

    M.Tech in Computer Science

    JNTU-H

  • 2003
    2005
    UK

    Msc Business Information Technology

    London South Bank University

  • Bangalore

    B.E in Computer Science

    Ghousia College of Engineering

ACADEMIC AND PROFESSIONAL POSITIONS
  • 2019
    HYDERABAD

    HOD CSE & IT Department

    ISL ENGINEERING COLLEGE

  • 2018
    2019
    Secunderabad

    HOD IT Determent

    Swami Vivekananda Institute of Technology (SVIT)

  • 2016
    2017
    Hyderabad

    Associate Professor in IT Department

    Nawab Shah Alam Khan College of Engineering and Technology

  • 2009
    2011
    Saudi Arabia

    Lecturer of Computer Science Department

    Al-Kharj University

  • 2006
    2008
    Hyderabad

    Associate Professor of Computer Science Department

    Deccan Collage of Engineering & Technology

  • 2003
    2005
    United Kingdom(UK)

    Lecturer in Computer Science (Part time)

    Corydon College

  • 2001
    2002
    Hyderabad

    Lecturer in Computer Science Department

    Shadan College of Engineering

  • 2019
    Hyderabad

    HOD CSE Department

    ISL ENGINEERING COLLEGE

HONORS AND AWARDS
  • 2018
    Hyderabad

    Urdu Anmol Ratan Award

    Telengana Urdu Academy

  • 2018
    Hyderabad

    Publication Chair

    ICAPPM-2018 ;International Conference on Applied Physics, Power and Material science

.03

PATENT & BOOKS

BOOKS
  • April 2017

    Data Structure Made Easy

    CreateSpace Independent Publishing Platform; ISBN NO : 978154670019

  • Aug 2016

    I.T.Organization Design & Security Model

    Lambert Academic Publication ; ISBNNO:978-3-659-93020-1

PATENT
  • ABDUL BARI

.05

PUBLICATIONS

12 Dec 2016

A Comparative Study and Performance Analysis of Routing Algorithms

India


Conferences Mohammed Abdul Bari,Sanjay Kalkal Shahanawaj Ahmad

A Comparative Study and Performance Analysis of Routing Algorithms

Mohammed Abdul Bari,Sanjay Kalkal Shahanawaj Ahmad
Conferences
About The Publication

The mobility for communication devices has generated the requirement of next generation wireless network technology development, several type of wireless technologies have been developed and implemented, one of them is ad hoc mobile network system which facilitates to a cluster of mobile terminals which are animatedly and randomly changing locations in such a way that the interconnections need to be handled continually. A routing procedure is used to find the routes between the mobile terminals in the set of connections for easy and reliable communication; main purpose of this protocol is to find a proper route from caller to called terminals with minimum of overhead and bandwidth consumption during construction of route. This paper provides an impression of a broad range of routing protocols projected in the literature and has in addition provided a piece comparison of all routing protocols with discussion of their respective merits and drawbacks.

01 Apr 2011

Code Cloning: The Analysis, Detection and Removal

USA


Journal Paper M.A.Bari . Shahanawaj Ahamad

Code Cloning: The Analysis, Detection and Removal

M.A.Bari . Shahanawaj Ahamad
Journal Paper
About The Publication

The coping, modifying a block of code is identified as cloning and is the most basic means of software reuse. It has been extensively used within the software development community. An official survey which is carried out within
large, long term software development project suggested that 25-30% of modules in system may be cloned. This paper begins with background concept of code cloning, presents overcall taxonomy of current techniques and tools, and classify evolution tools in two different format as static code clone and dynamic code cloning, this together presented with program analysis, secondly as a solution the static code is divided into four parts as T1, T2, T3, T4, to finally develop a process to detect and remove code cloning

01 Apr 2011

Managing Knowledge in Development of Agile Software

USA


Journal Paper M.A.Bari & Shahanawaj Ahamad

Managing Knowledge in Development of Agile Software

M.A.Bari & Shahanawaj Ahamad
Journal Paper
About The Publication

Software development is a knowledge-intensive work and the main attention is how to manage it. The systematic reviews of empirical studies presents, how knowledge management is used in software engineering and development work. This paper presents how knowledge is used in agile software development and how knowledge is transferred to agile software using agile manifesto. It then argues for the need to scale agile development strategies in knowledge management to address the full delivery. The paper explores the eight agile software scaling factors with knowledge management and their implication for successfully scaling of agile software delivery to meet the real world needs of software development organization

01 Jun 2011

Object Identification for Renovation of Legacy Code

UK


Journal Paper M.A.Bari , Shahanawaj Ahamad

Object Identification for Renovation of Legacy Code

M.A.Bari , Shahanawaj Ahamad
Journal Paper
About The Publication

Software is critical assets for modern enterprises and incorporates key knowledge over the life of an organization. Although this software must be update continuously to reflect evolving business practices, repeated modification has cumulative effect on system complexity and too fragile to modify and too important to discard. However  organization must consider modernizing this software to remain viable. Many approaches used to analyze legacy code, unfortunately, as the legacy code tend to grow over time, many unrelated field come at the time of migration. This paper presents how different techniques used to identify object in legacy code by using the concept of functions, modules and metrics. The methodology uses measurement of change to benefits the system development process and to generate insights about software evolution

01 Sep 2011

Process of Reverse Engineering of Enterprise Information System Architecture

Republic of Mauritius


Journal Paper M.A.Bari , Shahanawaj Ahamad

Process of Reverse Engineering of Enterprise Information System Architecture

M.A.Bari , Shahanawaj Ahamad
Journal Paper
About The Publication

The availability of computer-aided systems-engineering environments has redefined the organization system development. Pace of change accelerates in the twenty-first century as a result of technological opportunities, liberalization of the world markets, demands for innovation and continually decreasing life cycle of software. Organizations have to continuously re-adjust and re-align their operation to meet all these challenges. This pace of changes has increasingly forced organization to be more outward looking, market-oriented and knowledge driven. This paper present integrated framework of how reverse engineering process work goes in Enterprise Information System(EIS).The essential functions in reverse engineering, how they are associated with EIS, what will be the impact on the organization which is using reverse engineering

01 Nov 2016

Study of Ethical Hacking and Management of Associated Risks

UK


Journal Paper M.A.Bari Shahanawaj Ahamad

Study of Ethical Hacking and Management of Associated Risks

M.A.Bari Shahanawaj Ahamad
Journal Paper
About The Publication

Hacking has become an extensive trouble with the beginning of the digital age, almost worldwide access to the internet and other digital media. It is significant for individuals, corporations, and the government to guard them from being susceptible to such attacks. The purpose of this paper is to provide information about ethical hacking; their skill to share advanced security knowledge and capabilities with organization and pointing out their vulnerabilities.

01 Mar 2017

Sheltered Energy Aware Routing Against Black Hole Attack

India


Journal Paper Mohammed Abdul Bari, Sanjay Kalkal & Shahanawaj Ahamad

Sheltered Energy Aware Routing Against Black Hole Attack

Mohammed Abdul Bari, Sanjay Kalkal & Shahanawaj Ahamad
Journal Paper
About The Publication

Mobile ad-hoc network tools are blueprints to set up internet access anywhere and anytime, describes by not having infrastructure, nodes in a system free to portable and categorized themselves in an critic advance, Communication may have additional than one link and diverse radio, can operate in a stand-alone mode. Due to its distinguishing, it needs an proficient dynamic routing protocol in terms of energy as well as refuge due to its characteristic.We propose a “sheltered energy aware routing against black hole attack”. It improves the life time of arrangement and shield from black hole attack. It considers the node’s power reduction ratio with esteem to current energy & traffic circumstances for -energy awareness, and loose mode for -securing against black hole attack. The results produced by replication have shown that this work is better than existing MBCR and MRPC interns of network lifetime and sheltered interns of black hole attack using NS2.

01 Jun 2017

Averting Grey Hole Attacks Using Secure Data Protocol in Mobile Ad-Hoc Networks

India


Journal Paper M.A.Bari,Sunjay Kalkal, Shahanawaj Ahamad

Averting Grey Hole Attacks Using Secure Data Protocol in Mobile Ad-Hoc Networks

M.A.Bari,Sunjay Kalkal, Shahanawaj Ahamad
Journal Paper
About The Publication

MANETs (Mobile Ad-hoc networks) are a group of self-forming and self-healing mobile hosts communicating with each other, which do not require central authority or fixed infrastructure. MANETs are mobile and heterogeneous networks. Due to their mobility and heterogeneity, they are more vulnerable to attacks. Grey hole attack is an attack, in which all the packets in a network are forwarded to the attacker node by neighbour nodes and are intentionally dropped. In this work, we proposed a secure data protocol which intends to identify and avert the grey hole attacks by considering the causes of packet drop in promiscuous mode. We improved an existing AODV based routing protocol for detection and prevention of grey hole attacks. The results of this experiments show that MANETs are secure against grey hole attacks with our proposed algorithm with AODV based routing protocol.

01 Nov 2017

A Duplicate Active Storage Indexes for Multiple Client Environments

India


Journal Paper Sumiyah Khaja, Mohammed Abdul Bari

A Duplicate Active Storage Indexes for Multiple Client Environments

Sumiyah Khaja, Mohammed Abdul Bari
Journal Paper
About The Publication

As opposed to the present authenticated structures, for example skip list and Merkle tree, we design a singular authenticated structure known as Homomorphic Authenticated Tree, we present additional information about PoS and dynamic PoS. Whenever a verifier wants to determine the integrity of the file, it at random selects some block indexes from the file, and transmits these to the cloud server. To the very best of our understanding, no existing dynamic PoSs supports this method. We developed a novel tool known as HAT which is an excellent authenticated structure. We suggested the excellent needs in multi-user cloud storage systems and introduced the type of deduplicatable dynamic PoS. Existing dynamic PoSs can’t be extended towards the multi-user atmosphere. Because of the problem of structure diversity and tag generation, existing system can’t be extended to dynamic PoS. An operating multi-user cloud storage system needs the secure client-side mix-user deduplication technique, which enables a person to skip the uploading process and acquire the possession from the files immediately, when other proprietors of the identical files have submitted these to the cloud server. to lessen the communication cost both in the evidence of storage phase and also the deduplication phase concentrating on the same computation cost. We prove the safety in our construction, and also the theoretical analysis and experimental results reveal that our construction is efficient used. Within this paper, we introduce the idea of deduplicatable dynamic evidence of storage and propose a competent construction known as DeyPoS, to attain dynamic PoS and secure mix-user deduplication, concurrently.

10 Jan 2018

‘Future Generation’ Mobile Protection

India


Journal Paper M.A.Bari, I. Sultana, N. Fathima, S. Ahamad

‘Future Generation’ Mobile Protection

M.A.Bari, I. Sultana, N. Fathima, S. Ahamad
Journal Paper
About The Publication

The future of mobile wireless communication networks will be experiencing several generations. This kind of development will drive the researches of information technology in industrial area of continuous development and evolution. In this paper, we have explored future generations of mobile wireless communication networks including 4th, 5th,and so forth. If looking to past, wireless access technologies have been followed different evolutionary paths with aim at unified target related to performance and efficiency in high mobile environment. Android develops one of the most popular mobile operating system in the whole world, as a side effect of this popularity, Android becomes the most preferred destination of hackers with different aims, some of them looking for making money and others are just having fun by raid the privacy of the others without their authorization. Nowadays, Android security has become a major problem because of the free application provided and functionalities that make it very easy for anyone to progress it. However, various systems have been planned by a large number of scholars to address these problems.

.06

Time Table

.09

Membership/Certifications/Workshops

.010

GALLERY

.011

CONTACT

Get in touch with me through this form.





error: Content is protected !