Work place: Aligarh Muslim University, Aligarh, India
E-mail: abdussamadamu@gmail.com
Website:
Research Interests: Algorithm Design, Data Structures and Algorithms, Parallel Computing, Distributed Computing, Computer Architecture and Organization, Computer systems and computational processes
Biography
Dr. Samad is working as an Associate Professor in Computer Engineering at University Women's Polytechnic, AMU, Aligarh and having teaching experience of more than 20 years.
He is currently serving as Head of the Section. He completed his Ph.D from Dept. of Computer Engineering, AMU, Aligarh in the year 2010. His research areas include Parallel and Distributed Systems, Algorithm Design, Microprocessor and Parallel System Design. He has supervised PhD as well as M.Tech. Dissertations.
He has contributed and attended various National and International Conferences in India and abroad, and published papers in reputed journals. He has also delivered keynote addresses and invited talks in Conferences and Workshops.
Dr. Samad is a Member of IE (India), IETE and also serving as Honorary Secretary of IETE Aligarh Centre. He is also a member of Curriculum Design Committee of University Polytechnic, JMI, New Delhi.
He sharing various responsibilities in the department and also actively participated in various positions in the University administration, such as Assistant Proctor, Warden of various Halls of residence.
By Lalit Mohan Gupta Hitendra Garg Abdus Samad
DOI: https://doi.org/10.5815/ijcnis.2019.07.03, Pub. Date: 8 Jul. 2019
An essential parameter of information security during data transmission is a secure cryptographic system. In this paper a new cryptographic security technique is proposed to secure data from un-authorized access. The proposed system incorporate cryptology technique of encryption inherits the concept of DNA based encryption using a 128-bit key. Besides this key, round key selection technique, random series of DNA based coding and modified DNA based coding are followed by unique method of substitutions. The proposed technique increases size of the cipher text by 33% as compared to conventional DNA and non DNA based algorithms where size of the cipher text becomes almost double of the original file. This reduction in cipher text improves memory utilization along with data security.
The paper is organized in six Sections. Section 1, gives the introduction and also briefly describes related work. In Section 2, the proposed model for solving the problem is described. Various steps involved during encryption and decryption are explained in Section 3, and the results obtained by implementing the proposed algorithm are presented and discussed in Section 4. The Section 5 concludes the work and brief outline of the future work is given in Section 6.
By Abdus Samad Mohammed Shuaib Mohd Rizwan Beg
DOI: https://doi.org/10.5815/ijcnis.2017.12.05, Pub. Date: 8 Dec. 2017
Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures.
[...] Read more.By Zaki A. Khan Jamshed Siddiqui Abdus Samad
DOI: https://doi.org/10.5815/ijcnis.2015.03.03, Pub. Date: 8 Feb. 2015
Scalability and Complexity are crucial performance parameters in the design of Interconnection networks for multiprocessor system. This paper proposed and analyzed a new scalable interconnection network topology named as Linear Crossed Cube (LCQ). LCQ designed is based on the principle of hypercube architecture however, it improves some of the drawbacks of hypercube such as complex extensibility and its VLSI Layout. It inherits most of the desirable properties of hypercube type architectures; the most notably are small diameter and symmetry. LCQ has linear extension at each level of the extension while preserving all the desired topological properties. To evaluate the performance of proposed LCQ, standard scheduling algorithms are being implemented on it. The performance parameters such as Load Imbalance Factor (LIF) and balancing time are evaluated on the proposed LCQ as well as on other similar multiprocessor architectures. To compare the performance of proposed LCQ, standard scheduling scheme is also implemented on other similar multiprocessor architectures. The comparative simulation study shows that the proposed network can be considered as low-cost multiprocessor architecture for parallel system when appropriate scheduling algorithm is implemented onto it.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals