Md Sohel Rana

Md Sohel Rana
Dhaka University of Engineering & Technology | DUET · Institute of Information & Communication Technology

Master of Science
Looking for fully funded Ph.D. offer

About

21
Publications
16,076
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67
Citations
Introduction
In 2018, I received a B.Sc. (Engg.) in computer science and engineering from Dhaka University of Engineering and Technology (DUET), Gazipur, Dhaka-1707, Bangladesh, and in 2021, I received an M.Sc. in information and communication technology (ICT) from Bangladesh University of Engineering and Technology (BUET), Palashi, Dhaka, Bangladesh.I am currently employed as a faculty member at IICT of DUET. My research interests are in cryptography, network security, and machine learning.
Additional affiliations
June 2018 - September 2020
Bangladesh University of Business and Technology
Position
  • Lecturer
Description
  • To deliver Lectures to students; To Evaluate answer scripts; To supervise Thesis and project Group; To Council the students; And Official responsibilities.
Education
August 2013 - February 2018
Dhaka University of Engineering & Technology
Field of study
  • Computer Science and Engineering

Publications

Publications (21)
Conference Paper
This paper introduces a new lightweight cryptographic algorithm with a hybrid architecture that is specifically designed for securing Internet of Things (IoT) devices. The hybrid architecture uses a unique combination of one-hot encoding (OHE) and substitution-permutation network (SPN) structures to encrypt data in a computationally and memory-effi...
Conference Paper
Full-text available
In this research, the standard replication strategies in the distributed cloud computing storage system are investigated and assessed. To guarantee data availability and dependability in cloud storage, replication is a fundamental strategy. Analyzing the effectiveness, scalability, and fault tolerance of different widely used replication strategies...
Conference Paper
Full-text available
This research provides a thorough investigation of the self-balancing capabilities of long-range jumping robots. The study focuses on the concepts underlying jumping robots' self-balancing mechanisms and their capacity to retain stability during lengthy jumps. The existing literature on self-balancing robots is reviewed, with an emphasis on the var...
Conference Paper
Full-text available
With the emergence of big data and predictive analytics, the fourth industrial revolution (4IR) has transformed the field of supply chain management, providing new opportunities and challenges for organizations. The purpose of this systematic literature review is to investigate the challenges and opportunities of big data and predictive analytics f...
Article
Full-text available
Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorit...
Article
Full-text available
COVID-19 is the most used and significant word in this year. It has taken many lives, created fear among people and changed people's and country's perspective and decision. The virus has kept people isolated in their homes, and borders have been blocked. The third wave of Covid-19 variants has finally come to an end. Based on an online questionnair...
Article
Full-text available
A mobile application, sometimes known as an app, is a form of software designed to operate on a mobile device such as a mobile phone or tablet and is commonly used to deliver user services similar to those accessible on PCs. Mobile applications have become an important part of our lives, allowing us to communicate with people all over the world whi...
Conference Paper
Full-text available
In the era of the Internet, faster communication is the most desirable aspect of wireless channels to meet the need for high-speed data transmission. However, for dealing with high-speed data rates as well as multipath fading channels such as AWGN and Rayleigh, orthogonal frequency division multiplexing (OFDM) is the most frequently used and succes...
Article
Full-text available
In December 2019 the novel coronavirus which first appeared in Wuhan City of China spread rapidly around the world and became a pandemic. It has caused a devastating effect on daily lives, public health, and the global economy. As soon as possible we have to detect the affected patient and quickly treat them. There are no accurate automated toolkit...
Article
Full-text available
In recent years, small computing devices used in wireless sensors, radio frequency identification (RFID) tags, Internet of Things (IoT) are increasing rapidly. However, the resources and capabilities of these devices are limited. Conventional encryption ciphers are computationally expensive and not suitable for lightweight devices. Hence, research...
Preprint
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
Experiment Findings
Full-text available
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
Experiment Findings
Full-text available
The concept of OFDM is quite simple but the practical implementation have many complexities. Many authors of paper represent the basic OFDM Implementation and Performance Evaluation of different fading channels with the MATLAB simulation. But simulation in MATLAB has huge complexities such as Installation, closed-source software, quite expensive et...
Experiment Findings
Full-text available
Preprint
The novel coronavirus 2019 (COVID-2019), which first prevailed in Wuhan city of China in December 2019, be scattered rapidly around the world and turned into a pandemic. It has caused a subversive effect on both daily lives, public health, and the global economy of a country. It is so critical to detect the positive cases as early as possible so...
Preprint
Full-text available
It’s a key scheduling based on neural networks for lightweight block ciphers. Most of the modern ciphers are designed on number theory. So streangth of ciphers depends on complexity of number theory used in the ciphers. Hence, more complexities hinder the performance of the lightweight device. So neural network can be a solution for this problem.
Article
Full-text available
Now-a-days, Security in communication over Internet has turned out to be complex as technology becomes faster and more efficient rapidly especially for resources limited devices like embedded devices, wireless sensors, RFID (Radio Frequency Identification) tags, Internet of Things (IoT) devices. Lightweight cryptographic algorithms provide security...
Article
Full-text available
Abstract—In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited....

Questions

Question (1)
Question
I need to check and compare strength of my modified block cipher algorithm. Which tool can I used?

Network

Cited By