M.Sc. in MIS, Dept. Of CSE
Daffodil International University, Dhaka
B.Sc in Computer Information System
London Metropolitan University, UK
1. Training: Training on Teaching-Learning, Curriculum and Quality Assurance
Trainer: Dr. Md. Mozahar Ali, Director
Venue: GTI BAU, Mymensingh
Date: 24 to 29 October, 2015
Training: How to Create Media that Entertains and Inspire
Trainer: Mr. Mark Shekter & Ms. Nancy Trites Botkin Jointly
Venue: Dhaka Chamber ofCommerce & Industries with Canada Bangladesh
Chamber of Commerce and Industry
Date: 24/01/2013
2. Training: Design of Innovative Online Learning Environment
Trainer: Professor Dr Abtar Kaur
Venue: Daffodil International University, Dhaka
Date: 29/12/2011
3. Training: Time Management and Introduction to HRM
Trainer: Ad van der Steld, Senior Expert, Netherlands Management
Cooperation Programme (PUM)
Venue:Daffodil International University, Dhaka
Date: 22/03/2008
MIS, Systems Analysis and Design, Project Management, Discrete Math, DBMS, ICT Project & Quality Management, Software Engineering Method and Management, Systems Development, Computer Fundamentals, e-Commerce, Business Communication
Journals:
1. 'Implementing RFID Technology for vehicle tracking in Bangladesh' Journal of Science and Technology, 3(2):351-359, July 2013 Mawlana Bhashani Science and Technology University, ISSN 2079-472X.
2. “A Review on Position Based Routing Protocol in Vehicular Ad-hoc Network” American journal of Engineering Research (AJER) Manuscript Id: 21023, Url: http://www.ajer.org/papers/v2(2)/B0220713.pdf
ISSN (e) : 2320-0847, ISSN (p): 2320-0936, Vol No: 2, Issue No. : 2 (February 2013)
3. Taxonomy of Security in Vehicular Ad-Hoc Network International Journal of Scientific and Research Publications, Volume 3, Issue 3, March 2013, ISSN 2250-3153,
Url: www.ijsrp.org , http://www.ijsrp.org/research-paper-0313/ijsrp-p1593.pdf.
4. Routing Strategies in Cognitive Radio Network: A Comprehensive Review International Journal of Advanced Scientific and Technical Research Issue 3 volume 1, January-February 2013,
http://www.rspublication.com/ijst/feb13/28.pdf
Conference Papers:
1. Vehicle tracking system design and development using RFID technology for Dhaka City. NCCIS Conference 2009, Daffodil International University.
1. Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack
A Begum, AH Tareq, M Sultana, MK Sohel, T Rahman, AH Sarwar
International Journal of Machine Learning and Computing 10 (2), 352-357, 2020
2. Distributed Database Problems, Approaches and Solutions—A Study
MS Rana, MK Sohel, MS Arman
International Journal of Machine Learning and Computing 8 (5), 2018
3. SAISAN: An Automated Local File Inclusion Vulnerability Detection Model
MM Hassan, T Bhuyian, MK Sohel, MH Sharif, S Biswas
International Journal of Engineering & Technology 7 (2-3), 4, 2018
4. A review on position based routing protocol in vehicular adhoc network
MK Nasir, MK Sohel, MT Rahman, AKMK Islam
American Journal of Engineering Research 2 (2), 7-13, 2013
5. A systematic study on classical cryptographic cypher in order to design a smallest cipher
MSH Biswas, MA Ali, M Rahman, MMK Sohel
Int. J. Sci. Res. Publ 9 (12), 507-11, 2019
6. An Approach of Teachers' Quality Improvement by Analyzing Teaching Evaluations Data
PK Chaki, MMH Sazal, B Barua, MS Hossain, KS Mohammad
2019 Second International Conference on Advanced Computational and …, 2019
7. Taxonomy of security in vehicular ad-hoc network
MK Nasir, AKMK Islam, MT Rahman, K Sohel
8. Designing and implementing RFID technology for vehicle tracking in Bangladesh
MF Hossain, MK Sohel, AS Arefin
Dhaka, Bangladesh: National Conference on Communication and Information Security, 2009
9. Routing Strategies in Cognitive Radio Network: A Comprehensive Review
MK Nasir, MT Rahman, MK Sohel, AKMK Islam
IEEE International Journal of Advanced Scientific and Technical Research, 2012
10. Retrospective Analysis of Hematological Cancer by Correlating Hematological Malignancy with Occupation, Residence, Associated Infection, Knowledge and Previous Cancer History …
KS Mohammad, N Sultana, H Touhid, A Esha
ICONCS 2020 1 (Cyber Security and Computer Science), 343-353, 2020
11. Patterns, Predictions applied to seismic zone of Bangladesh: A Naïve Bayes Classifier
MN Sakib, MK Sohel, AN Fatema, MA Rahman
1. CICC Scholarship in Information Technology (Japan)
Name of Scholarship Training : Bridge System Engineer Training Course (BET). (Off-Shore Project Management Training Scholarship)
Institute: Center of the International Cooperation for Computerization (CICC).
Organized by : Association for Overseas Technical Scholarship (AOTS).
Entrusted by : Ministry of Economy, Trade and Industry (METI) Japan.
Place : Tokyo (Japan);
Duration : Two Months (November 6 to December 22, 2006).
2. DGF-KTC Scholarship (Korea)
Field of Training : e-Business Model and Strategy.
Institute : Korea Information Strategy Development Institute (KISDI).
Organized by : DGF-KTC (Development Gateway Foundation - Korea Training
Center), Seoul, Korea.
Sponsored by : Ministry of Information and Communication Technology of Republic of Korea.
Place & Duration : Seoul (Korea); Twelve Days (04 April 2005 to 15 April (2005).
Faculty and Deputy Director
Daffodil Institute of IT (DIIT)