M. Afshar Alam

Work place: Department of Computer Science, Jamia Hamdard University, New Delhi, India

E-mail: aalam@Jamiahamdard.ac.in

Website: https://www.researchgate.net/profile/Afshar-Alam

Research Interests: Data Structures and Algorithms, Cloud computing, Data Mining, Network Security, Artificial Intelligence, Wireless Communication


Professor Mohammad Afshar Alam completed his Post graduation in MCA (Master of Computer Application) from the Aligarh Muslim University and Ph.D. from Jamia Milia Islamia. Presently he is working as Vice- Chancellor and Professor and Dean of School of Engineering Sciences and Technology at Jamia Hamdard, New Delhi.

His research areas include Software Re-engineering, Data Mining, Bio-Informatics, Fuzzy databases, and Sustainable Development. In his 25 years of experience in teaching and research, he was invited to many countries across the globe including UAE, Nepal, Syria, Yemen and many more for delivering Special Lectures and as Keynote speakers in Conferences. He has authored 10 books, supervised more than 30 Doctoral students and more than 200 Post Graduate research projects and has more than 160 research papers in reputed journals to his credit.

He is conferred with many prestigious awards like Bharat Samaj Ratna Award, AMP Award for Excellence in Education, Cooperative Citizen Award, World Environment Day Award, and Spardha Shree Award. He is also the member of various government bodies at both National and International level including University Grants Commission (UGC), All India Council of Technical Education (AICTE), National Assessment and Accreditation Council (NAAC), Department of Science & Technology (DST).

Author Articles
Novel Secured Biometric System Procuring Miniaturized Prorogation

By Sherin Zafar Ayesha Hena Afzal M. Afshar Alam

DOI: https://doi.org/10.5815/ijcnis.2018.11.04, Pub. Date: 8 Nov. 2018

Different organizations in today’s scenario are fully dependent on information technology for their survival, suffer from various security challenges like unauthorized access, physical damages etc. To avoid various security breaches and concerns, robust mechanism for user access need to be adopted that not only secure of valuable data but can also be utilized for developing various other security applications. “Biometric” secured technology is gaining attention for over traditional security mechanism like password, smart card etc. because information related to biometric are difficult to steal as compared to other mechanisms. In this research analysis “strong biometric approach” is proposed to overcome security apprehensions of various organizations& society through iris recognition system. Iris recognition system is a mechanism to identify a person through analyzing his or her iris pattern. This recognition system includes iris image acquisition, segmentation, normalization, encoding, matching and finally validation of iris templates. The iris recognition system developed and simulated in this research study has taken IIT database iris images as inputs and utilized hamming distance as the matching parameter. The simulated results depict an efficient and novel secured approach that will overcome various unauthorized accesses across the internet. The most novel approach of this iris based recognition system as compared to other traditional systems is that, if selected images are matched with trained iris images present in database then the resultant hamming distance as most of the iris recognition systems directly accept or reject images and causes huge congestion and execution prorogations.

[...] Read more.
C₂DF: High Rate DDOS filtering method in Cloud Computing

By Pourya Shamsolmoali M. Afshar Alam Ranjit Biswas

DOI: https://doi.org/10.5815/ijcnis.2014.09.06, Pub. Date: 8 Aug. 2014

Distributed Denial of Service (DDOS) attacks have become one of the main threats in cloud environment. A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. Old-established defending system cannot be easily applied in cloud computing due to their relatively low competence and wide storage. In this paper we offered a data mining and neural network technique, trained to detect and filter DDOS attacks. For the simulation experiments we used KDD Cup dataset and our lab datasets. Our proposed model requires small storage and ability of fast detection. The obtained results indicate that our model has the ability to detect and filter most type of TCP attacks. Detection accuracy was the metric used to evaluate the performance of our proposed model. From the simulation results, it is visible that our algorithms achieve high detection accuracy (97%) with fewer false alarms.

[...] Read more.
Other Articles