Mohammad Mahfuzul Islam

Learn More
Security and privacy issues have become critically important with the fast expansion of multiagent systems. Most network applications such as pervasive computing, grid computing, and P2P networks can be viewed as multiagent systems which are open, anonymous, and dynamic in nature. Such characteristics of multiagent systems introduce vulnerabilities and(More)
In this paper, an advanced call admission control strategy is proposed in which bandwidth is allocated more efficiently and effectively to neighbouring cells by exploiting key mobility parameters to provide consistent Quality of Service (QoS) guarantees for multimedia traffic. Concomitantly, to ensure continuity of on-going calls with better utilization of(More)
Abstract—Problem-based e-Learning (PBeL) can be a highly successful model for the teaching and learning of Database, one of the core courses of Computer Science and Engineering in undergraduate level. There are very few e-Learning systems found to support the learning of the different components of Database course. Existing systems provide only the partial(More)
Most network applications such as pervasive computing, grid computing, P2P etc. can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. Due to such nature multi-agent systems present potential threats in ensuring secured communication. One of the key feasible ways to minimize threats is to evaluate the trust and reputation of(More)
The applications and adoption of wireless sensor networks (WSNs) in social and environmental purposes are increasing because of monitoring different infrastructures such as military, scientific, environmental, and domestic infrastructures. Low energy adaptive clustering hierarchy (LEACH) and its variants use some intermediate nodes, known as cluster heads,(More)
This paper proposes a new advanced Call Admission Control (CAC) strategy involving for the first time, a bandwidth reservation scheme that is influenced by the direction attribute of a mobile terminal (MT). Aside from the Quality-of-Service (QoS) parameters, the direction attribute plays a key role in efficiently reserving resources for MTs supporting(More)
Energy is one of the main obstacles to deploying wireless sensor networks (WSNs) because tiny sensor nodes cannot accommodate sufficient energy for achieving the desired level of usage. The clustering protocols of wireless sensor network attain the acme popularity among researchers because of effective usage clustering concepts based on locality and the(More)
Ensuring sufficient power in a sensor node is a challenging problem now-a-days to provide required level of security and data processing capability demanded by various applications scampered in a wireless sensor network. The size of sensor nodes and the limitations of battery technologies do not allow inclusion of high energy in a sensor. Recent(More)