Designed with ♥ at Skróts
.01

ABOUT

Dr. Mohammed Abdul Bari
bari_bari11@rediffmail.com; me@drmohammedabdulbari.com
+91 96524 44404
More then 14 years of teaching experience in reputed engineering college in India, Europe and Gulf University. Co-Author of 3(Three) books published in Germany ,USA,India . 3 Patent,Double Masters. Available as freelance

Dr. Mohammed Abdul Bari

For me, teaching is a passion and one of the primary reasons that I decided to pursue a career in academia. I enjoy helping beginners, gain a deep understanding of difficult concepts, and develop enthusiasm for the material. This permits them to enjoy learning and to develop the drive to build upon their previous understanding. I have involved in many different teaching roles at (different engineering colleges, university’s: - B.Tech, MTech,PhD, B.sc, M.sc). These teaching roles are: Supervising Undergraduates, Postgraduates and PhD students , projects for students and summer scholarship; Delivering workshops to Graduate Students on how to succeed in Graduate School; In each of these teaching environments I take my role as an educator seriously, and I continually strive to improve my teaching skills.

.02

RESUME

  • 2014
    2018
    Raipur

    COMPUTER SCIENCE & ENGINEERING - PHD

    Kalinga University

  • 2011
    2013
    Hyderabad

    M.Tech in Computer Science

    JNTU-H

  • 2003
    2005
    UK

    Msc Business Information Technology

    London South Bank University

  • Bangalore

    B.E in Computer Science

    Ghousia College of Engineering

ACADEMIC AND PROFESSIONAL POSITIONS
  • 2019
    HYDERABAD

    HOD CSE Department

    ISL ENGINEERING COLLEGE

  • 2018
    2019
    Secunderabad

    HOD IT Department

    Swami Vivekananda Institute of Technology (SVIT)

  • 2016
    2017
    Hyderabad

    Associate Professor in IT Department

    Nawab Shah Alam Khan College of Engineering and Technology

  • 2009
    2011
    Saudi Arabia

    Lecturer of Computer Science Department

    Al-Kharj University

  • 2006
    2008
    Hyderabad

    Associate Professor of Computer Science Department

    Deccan Collage of Engineering & Technology

  • 2003
    2005
    United Kingdom(UK)

    Lecturer in Computer Science (Part time)

    Corydon College

  • 2001
    2002
    Hyderabad

    Lecturer in Computer Science Department

    Shadan College of Engineering

  • 2019
    Hyderabad

    HOD CSE Department

    ISL ENGINEERING COLLEGE

HONORS AND AWARDS
  • 2018
    Hyderabad

    Urdu Anmol Ratan Award

    Telengana Urdu Academy

  • 2018
    Hyderabad

    Publication Chair

    ICAPPM-2018 ;International Conference on Applied Physics, Power and Material science

.03

PATENT & BOOKS

BOOKS
  • December 2020

    Data Science Through Visualization

    ImmortalPublications; ISBN NO : 978-93-5426-516-7

  • April 2017

    Data Structure Made Easy

    CreateSpace Independent Publishing Platform; ISBN NO : 978154670019

  • Aug 2016

    I.T.Organization Design & Security Model

    Lambert Academic Publication ; ISBNNO:978-3-659-93020-1

PATENT
  • ABDUL BARI

.05

PUBLICATIONS

01 Mar 2021

Performance evaluation of reactive routing protocol using simulation knowledge

India

ScienceDirect ;Elsevier

Journal Paper Selected Dr.Mohammed Abdul Bari,Dr.Shahanawaj Ahmed ,Dr. Arshed

Performance evaluation of reactive routing protocol using simulation knowledge

Dr.Mohammed Abdul Bari,Dr.Shahanawaj Ahmed ,Dr. Arshed
Journal Paper Selected
About The Publication

Mobile ad-hoc network technology is developed to establish the internet connectivity regardless of geographical location all the time. It is an infrastructure less network and allows the nodes to move freely and organize in an arbitral manner. Nodes in a network are autonomous, self-organize and act in a peer to peer fashion. MANET needs an effective dynamic routing protocol to achieve efficient communication. The paper analyzes the performance of various reactive routing protocols designed for MANET. The aim is to achieve a broad understanding of reactive routing protocols developed for MANET and Pave the path for future research. The paper evaluates the performance with respect to different scenarios, and analyzes the results with different performance metrics. The analysis shows the systematic evaluation of reactive routing protocols performance in terms of dynamic and static topology with multi hop communication, and variable data rates.

03 May 2020

IMPACT OF BOTTLENECK INTERMEDIATE NODE ON IDSPERFORMANCE IN MANETS

India


Journal Paper Dr. Mohammed Abdul Bari ,Dr. Arshad Ahmad Khan

IMPACT OF BOTTLENECK INTERMEDIATE NODE ON IDSPERFORMANCE IN MANETS

Dr. Mohammed Abdul Bari ,Dr. Arshad Ahmad Khan
Journal Paper
About The Publication

Routing is the process to establish the communication path between
communicating entities to enable communication in any networking model by
forwarding the information in terms of packets. MANET is wireless
infrastructure free peer to peer network. Routing in MANET is establish based
on consideration that the nodes are cooperative. Malicious nodes do not
cooperate for communication activities such as they drop the packets. In order
to prevent malicious routing activities various intrusion detection and
prevention systems designed for MANET. The main objective of these systems
is to identify the malicious activities of the nodes by their packet operations. If
node drops the packet more than the predefined value than it considered as
malicious. But in MANET, reputed nodes also drops the packets if itbecomes
bottleneck intermediate node. Thus the work aims to examine the IDS
performance in the presence of bottleneck intermediate node. Further, the work
shows the importance of considering bottleneck intermediate nodeduring the
design of novel IDS.

12 Dec 2016

A Comparative Study and Performance Analysis of Routing Algorithms

India


Conferences Mohammed Abdul Bari,Sanjay Kalkal Shahanawaj Ahmad

A Comparative Study and Performance Analysis of Routing Algorithms

Mohammed Abdul Bari,Sanjay Kalkal Shahanawaj Ahmad
Conferences
About The Publication

The mobility for communication devices has generated the requirement of next generation wireless network technology development, several type of wireless technologies have been developed and implemented, one of them is ad hoc mobile network system which facilitates to a cluster of mobile terminals which are animatedly and randomly changing locations in such a way that the interconnections need to be handled continually. A routing procedure is used to find the routes between the mobile terminals in the set of connections for easy and reliable communication; main purpose of this protocol is to find a proper route from caller to called terminals with minimum of overhead and bandwidth consumption during construction of route. This paper provides an impression of a broad range of routing protocols projected in the literature and has in addition provided a piece comparison of all routing protocols with discussion of their respective merits and drawbacks.

01 Apr 2011

Code Cloning: The Analysis, Detection and Removal

USA


Journal Paper M.A.Bari . Shahanawaj Ahamad

Code Cloning: The Analysis, Detection and Removal

M.A.Bari . Shahanawaj Ahamad
Journal Paper
About The Publication

The coping, modifying a block of code is identified as cloning and is the most basic means of software reuse. It has been extensively used within the software development community. An official survey which is carried out within
large, long term software development project suggested that 25-30% of modules in system may be cloned. This paper begins with background concept of code cloning, presents overcall taxonomy of current techniques and tools, and classify evolution tools in two different format as static code clone and dynamic code cloning, this together presented with program analysis, secondly as a solution the static code is divided into four parts as T1, T2, T3, T4, to finally develop a process to detect and remove code cloning

01 Apr 2011

Managing Knowledge in Development of Agile Software

USA


Journal Paper M.A.Bari & Shahanawaj Ahamad

Managing Knowledge in Development of Agile Software

M.A.Bari & Shahanawaj Ahamad
Journal Paper
About The Publication

Software development is a knowledge-intensive work and the main attention is how to manage it. The systematic reviews of empirical studies presents, how knowledge management is used in software engineering and development work. This paper presents how knowledge is used in agile software development and how knowledge is transferred to agile software using agile manifesto. It then argues for the need to scale agile development strategies in knowledge management to address the full delivery. The paper explores the eight agile software scaling factors with knowledge management and their implication for successfully scaling of agile software delivery to meet the real world needs of software development organization

01 Jun 2011

Object Identification for Renovation of Legacy Code

UK


Journal Paper M.A.Bari , Shahanawaj Ahamad

Object Identification for Renovation of Legacy Code

M.A.Bari , Shahanawaj Ahamad
Journal Paper
About The Publication

Software is critical assets for modern enterprises and incorporates key knowledge over the life of an organization. Although this software must be update continuously to reflect evolving business practices, repeated modification has cumulative effect on system complexity and too fragile to modify and too important to discard. However  organization must consider modernizing this software to remain viable. Many approaches used to analyze legacy code, unfortunately, as the legacy code tend to grow over time, many unrelated field come at the time of migration. This paper presents how different techniques used to identify object in legacy code by using the concept of functions, modules and metrics. The methodology uses measurement of change to benefits the system development process and to generate insights about software evolution

01 Sep 2011

Process of Reverse Engineering of Enterprise Information System Architecture

Republic of Mauritius


Journal Paper M.A.Bari , Shahanawaj Ahamad

Process of Reverse Engineering of Enterprise Information System Architecture

M.A.Bari , Shahanawaj Ahamad
Journal Paper
About The Publication

The availability of computer-aided systems-engineering environments has redefined the organization system development. Pace of change accelerates in the twenty-first century as a result of technological opportunities, liberalization of the world markets, demands for innovation and continually decreasing life cycle of software. Organizations have to continuously re-adjust and re-align their operation to meet all these challenges. This pace of changes has increasingly forced organization to be more outward looking, market-oriented and knowledge driven. This paper present integrated framework of how reverse engineering process work goes in Enterprise Information System(EIS).The essential functions in reverse engineering, how they are associated with EIS, what will be the impact on the organization which is using reverse engineering

01 Nov 2016

Study of Ethical Hacking and Management of Associated Risks

UK


Journal Paper M.A.Bari Shahanawaj Ahamad

Study of Ethical Hacking and Management of Associated Risks

M.A.Bari Shahanawaj Ahamad
Journal Paper
About The Publication

Hacking has become an extensive trouble with the beginning of the digital age, almost worldwide access to the internet and other digital media. It is significant for individuals, corporations, and the government to guard them from being susceptible to such attacks. The purpose of this paper is to provide information about ethical hacking; their skill to share advanced security knowledge and capabilities with organization and pointing out their vulnerabilities.

01 Mar 2017

Sheltered Energy Aware Routing Against Black Hole Attack

India


Journal Paper Mohammed Abdul Bari, Sanjay Kalkal & Shahanawaj Ahamad

Sheltered Energy Aware Routing Against Black Hole Attack

Mohammed Abdul Bari, Sanjay Kalkal & Shahanawaj Ahamad
Journal Paper
About The Publication

Mobile ad-hoc network tools are blueprints to set up internet access anywhere and anytime, describes by not having infrastructure, nodes in a system free to portable and categorized themselves in an critic advance, Communication may have additional than one link and diverse radio, can operate in a stand-alone mode. Due to its distinguishing, it needs an proficient dynamic routing protocol in terms of energy as well as refuge due to its characteristic.We propose a “sheltered energy aware routing against black hole attack”. It improves the life time of arrangement and shield from black hole attack. It considers the node’s power reduction ratio with esteem to current energy & traffic circumstances for -energy awareness, and loose mode for -securing against black hole attack. The results produced by replication have shown that this work is better than existing MBCR and MRPC interns of network lifetime and sheltered interns of black hole attack using NS2.

01 Jun 2017

Averting Grey Hole Attacks Using Secure Data Protocol in Mobile Ad-Hoc Networks

India


Journal Paper M.A.Bari,Sunjay Kalkal, Shahanawaj Ahamad

Averting Grey Hole Attacks Using Secure Data Protocol in Mobile Ad-Hoc Networks

M.A.Bari,Sunjay Kalkal, Shahanawaj Ahamad
Journal Paper
About The Publication

MANETs (Mobile Ad-hoc networks) are a group of self-forming and self-healing mobile hosts communicating with each other, which do not require central authority or fixed infrastructure. MANETs are mobile and heterogeneous networks. Due to their mobility and heterogeneity, they are more vulnerable to attacks. Grey hole attack is an attack, in which all the packets in a network are forwarded to the attacker node by neighbour nodes and are intentionally dropped. In this work, we proposed a secure data protocol which intends to identify and avert the grey hole attacks by considering the causes of packet drop in promiscuous mode. We improved an existing AODV based routing protocol for detection and prevention of grey hole attacks. The results of this experiments show that MANETs are secure against grey hole attacks with our proposed algorithm with AODV based routing protocol.

01 Nov 2017

A Duplicate Active Storage Indexes for Multiple Client Environments

India


Journal Paper Sumiyah Khaja, Mohammed Abdul Bari

A Duplicate Active Storage Indexes for Multiple Client Environments

Sumiyah Khaja, Mohammed Abdul Bari
Journal Paper
About The Publication

As opposed to the present authenticated structures, for example skip list and Merkle tree, we design a singular authenticated structure known as Homomorphic Authenticated Tree, we present additional information about PoS and dynamic PoS. Whenever a verifier wants to determine the integrity of the file, it at random selects some block indexes from the file, and transmits these to the cloud server. To the very best of our understanding, no existing dynamic PoSs supports this method. We developed a novel tool known as HAT which is an excellent authenticated structure. We suggested the excellent needs in multi-user cloud storage systems and introduced the type of deduplicatable dynamic PoS. Existing dynamic PoSs can’t be extended towards the multi-user atmosphere. Because of the problem of structure diversity and tag generation, existing system can’t be extended to dynamic PoS. An operating multi-user cloud storage system needs the secure client-side mix-user deduplication technique, which enables a person to skip the uploading process and acquire the possession from the files immediately, when other proprietors of the identical files have submitted these to the cloud server. to lessen the communication cost both in the evidence of storage phase and also the deduplication phase concentrating on the same computation cost. We prove the safety in our construction, and also the theoretical analysis and experimental results reveal that our construction is efficient used. Within this paper, we introduce the idea of deduplicatable dynamic evidence of storage and propose a competent construction known as DeyPoS, to attain dynamic PoS and secure mix-user deduplication, concurrently.

10 Jan 2018

‘Future Generation’ Mobile Protection

India


Journal Paper M.A.Bari, I. Sultana, N. Fathima, S. Ahamad

‘Future Generation’ Mobile Protection

M.A.Bari, I. Sultana, N. Fathima, S. Ahamad
Journal Paper
About The Publication

The future of mobile wireless communication networks will be experiencing several generations. This kind of development will drive the researches of information technology in industrial area of continuous development and evolution. In this paper, we have explored future generations of mobile wireless communication networks including 4th, 5th,and so forth. If looking to past, wireless access technologies have been followed different evolutionary paths with aim at unified target related to performance and efficiency in high mobile environment. Android develops one of the most popular mobile operating system in the whole world, as a side effect of this popularity, Android becomes the most preferred destination of hackers with different aims, some of them looking for making money and others are just having fun by raid the privacy of the others without their authorization. Nowadays, Android security has become a major problem because of the free application provided and functionalities that make it very easy for anyone to progress it. However, various systems have been planned by a large number of scholars to address these problems.

.06

Time Table

.07

Notes

 

.08

Membership/Certifications/Workshops

     

.09

GALLERY

.010

CONTACT

Get in touch with me through this form.





error: Content is protected !