Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where M. M. A. Hashem is active.

Publication


Featured researches published by M. M. A. Hashem.


International Journal of Advanced Computer Science and Applications | 2012

A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture

Kawser Wazed Nafi; Tonny Shekha Kar; Sayed Anisul Hoque; M. M. A. Hashem

The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. AES based file encryption system and asynchronous key system for exchanging information or data is included in this model. This structure can be easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS. This model also includes onetime password system for user authentication process. Our work mainly deals with the security system of the whole cloud computing platform.


international conference on computer and communication engineering | 2010

Design and development of a heart rate measuring device using fingertip

M. M. A. Hashem; Rushdi Shams; Md. Abdul Kader; Md. Abu Sayed

In this paper, we presented the design and development of a new integrated device for measuring heart rate using fingertip to improve estimating the heart rate. As heart related diseases are increasing day by day, the need for an accurate and affordable heart rate measuring device or heart monitor is essential to ensure quality of health. However, most heart rate measuring tools and environments are expensive and do not follow ergonomics. Our proposed Heart Rate Measuring (HRM) device is economical and user friendly and uses optical technology to detect the flow of blood through index finger. Three phases are used to detect pulses on the fingertip that include pulse detection, signal extraction, and pulse amplification. Qualitative and quantitative performance evaluation of the device on real signals shows accuracy in heart rate estimation, even under intense of physical activity. We compared the performance of HRM device with Electrocardiogram reports and manual pulse measurement of heartbeat of 90 human subjects of different ages. The results showed that the error rate of the device is negligible.


Journal of Networks | 2009

A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation Wireless Systems

Presila Israt; Namvi Chakma; M. M. A. Hashem

In the integrated next-generation wireless systems (NGWS), users are always connected to the best available networks and used to switch between different networks based on their service needs. It is an important and challenging issue to support seamless handoff management in NGWS. The objective of this paper is to develop a seamless handoff management protocol for NGWS. In this paper, a fuzzy logic-based adaptive handoff (FLAH) management protocol is developed which is then integrated with an existing cross layer handoff protocol. Afterward, the handoff performance comparison of the existing protocol and our proposed protocol is carried out. The simulation results exhibit that, proposed fuzzy logic-based handoff management protocol has much better performance than conventional protocols for both intra and intersystem handoffs.


International Journal of Advanced Computer Science and Applications | 2012

An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory

Kawser Wazed Nafi; Tonny Shekha Kar; Md. Amjad Hossain; M. M. A. Hashem

Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating. In this paper we have proposed an Extension of Certain Trust Model, mainly the representation portion based on probabilistic logic and fuzzy logic. This extended model can be applied in a system like cloud computing, internet, website, e-commerce, etc. to ensure trustworthiness of these platforms. The model uses the concept of fuzzy logic to add fuzziness with certainty and average rating to calculate the trustworthiness of a system more accurately. We have proposed two new parameters - trust T and behavioral probability P, which will help both the users and the developers of the system to understand its present condition easily. The linguistic variables are defined for both T and P and then these variables are implemented in our laboratory to verify the proposed trust model. We represent the trustworthiness of test system for two cases of evidence value using Fuzzy Associative Memory (FAM). We use inference rules and defuzzification method for verifying the model.


computer and information technology | 2008

A fuzzy logic-based adaptive handoff management protocol for next-generation wireless systems

Presila Israt; Namvi Chakma; M. M. A. Hashem

In the integrated next-generation wireless systems (NGWS), users are always connected to the best available networks and used to switch between different networks based on their service needs. It is an important and challenging issue to support seamless handoff management in NGWS. The objective of this paper is to develop a seamless handoff management protocol for NGWS. In this paper, a fuzzy logic-based adaptive handoff (FLAH) management protocol is developed which is then integrated with an existing cross layer handoff protocol. Afterward, the handoff performance comparison of the existing protocol and our proposed protocol is carried out. The simulation results exhibit that, proposed fuzzy logic-based handoff management protocol has much better performance than conventional protocols for both intra and intersystem handoffs.


computer and information technology | 2007

An empirical analysis of software systems for measurement of design quality level based on design patterns

Md. Abul Khaer; M. M. A. Hashem; Md. Raihan Masud

In this paper, we propose a new, simple and quantitative approach to specify design level of object oriented software systems. The exploratory analysis method proposed here uses GoF (gang of four) design patterns as our assessment criteria. We formulate an empirical study and develop a method to measure software quality. We tested our proposed method on several open source projects and also validate it by making a comparison with current approach. Our approach that addresses design patterns can be an excellent alternative to current systems such as OO metric, software fault proneness, visualization and anti-pattern based approaches. Our approach also can be helpful to practitioners for software quality assurance.


International Journal of Computer Science and Information Technology | 2010

A GENERALIZED HYBRID REAL -CODED QUANTUM EVOLUTIONARY ALGORITHM BASED ON PARTICLE SWARM THEORY WITH ARITHMETIC CROSSOVER

Md. Amjad Hossain; Md. Kawser Hossain; M. M. A. Hashem

This paper proposes a generalized Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions as well as combinatorial optimization. The main idea of HRCQEA is to devise a new technique for mutation and crossover operators. Using the evolutionary equation of PSO a Single-Multiple gene Mutation (SMM) is designed and the concept of Arithmetic Crossover (AC) is used in the new Crossover operator. In HRCQEA, each triploid chromosome represents a particle and the position of the particle is updated using SMM and Quantum Rotation Gate (QRG), which can make the balance between exploration and exploitation. Crossover is employed to expand the search space, Hill Climbing Selection (HCS) and elitism help to accelerate the convergence speed. Simulation results on Knapsack Problem and five benchmark complex functions with high dimension show that HRCQEA performs better in terms of ability to discover the global optimum and convergence speed .


international conference on computer and communication engineering | 2008

On use of design patterns in empirical assessment of software design quality

M. Abul Khaer; M. M. A. Hashem; M. Raihan Masud

This paper describes the results of a statistical analysis where the impact of design patterns on object oriented software system is experimentally evaluated. We used GoF (Gang of Four) design patterns as our assessment criteria. For empirical analysis data is collected from nine different size open source java projects. The results obtained in this experiment show how design quality of software systems can be affected by proper usage of design patterns. In this paper, we also propose an approach for measuring design quality of software using design patterns. We validate our proposed approach against quality metrics based approach.


computer and information technology | 2010

Quantum Evolutionary Algorithm based on Particle Swarm theory in multiobjective problems

Md. Kowsar Hossain; Md. Amjad Hossain; M. M. A. Hashem; Md. Mohsin Ali

Quantum Evolutionary Algorithm (QEA) is an optimization algorithm based on the concept of quantum computing and Particle Swarm Optimization (PSO) algorithm is a population based intelligent search technique. Both these techniques have good performance to solve optimization problems. PSEQEA combines the PSO with QEA to improve the performance of QEA and it can solve single objective optimization problem efficiently and effectively. In this paper, PSEQEA is studied to solve multi-objective Optimization (MO) problems. Some well-known non-trivial functions are used to observe the performance of PSEQEA to detect the Pareto optimal points and the shape of the Pareto front using both Fixed Weighted Aggregation method and Adaptive Weighted Aggregation method. Moreover, Vector Evaluated PSEQEA (VEPSEQEA) borrows concept from Schaffers Vector Evaluated Genetic Algorithm (VEGA) that can also cope with MO problems. Simulation results show that PSEQEA and VEPSEQEA perform better than PSO and VEPSO to discover the Pareto frontier.


computer and information technology | 2012

Development of a device for remote monitoring of heart rate and body temperature

Mohammad Ashekur Rahman; Atanu Barai; Md. Asadul Islam; M. M. A. Hashem

We present a new integrated, portable device to provide a convenient solution for remote monitoring heart rate at the fingertip and body temperature using Ethernet technology and widely spreading internet. Now a day, heart related disease is rising. Most of the times in these cases, patients may not realize their actual conditions and even it is a common fact that there are no doctors by their side, especially in rural areas, but now a days most of the diseases are curable if detected in time. We have tried to make a system which may give information about ones physical condition and help him/her to detect these deadly but curable diseases. The system gives information of heart rate and body temperature simultaneously acquired on the portable side in realtime and transmits results to web. In this system, the condition of heart and body temperature can be monitored from remote places. Eventually, this device provides a low-cost, easily accessible human health monitor solution bridging the gaps between patients and doctors.

Collaboration


Dive into the M. M. A. Hashem's collaboration.

Top Co-Authors

Avatar

Kawser Wazed Nafi

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Md. Abul Khaer

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Md. Kowsar Hossain

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Md. Raihan Masud

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Tonny Shekha Kar

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Gazi Abdullah Shahriar

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Hussain Mohammed

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Md. Amjad Hossain

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Md. Asadul Islam

Khulna University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Moslema Jahan

Khulna University of Engineering

View shared research outputs
Researchain Logo
Decentralizing Knowledge