Muhammad Iqbal Hossain

Muhammad Iqbal Hossain
BRAC University | BU · Department of Computer Science and Engineering (CSE)

PhD

About

33
Publications
133,461
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
27
Citations
Introduction
"Be alone, that is the secret of invention; be alone, that is when ideas are born." Nikola Tesla
Additional affiliations
January 2018 - present
BRAC University
Position
  • Professor (Assistant)
September 2010 - December 2017
Kyungpook National University
Position
  • Researcher
September 2008 - April 2009
University of Asia Pacific
Position
  • Research Assistant
Education
September 2012 - June 2017
Kyungpook National University
Field of study
  • Computer Science and Engineering
September 2009 - September 2011
Kyungpook National University
Field of study
  • Computer Science and Engineering
April 2004 - April 2008
The University of Asia Pacific
Field of study
  • Computer Science and Engineering

Publications

Publications (33)
Article
Full-text available
span>Embedded systems comprise several modules that exchange data by interacting among themselves. Exchanging wrong resource data among modules may lead to execution errors or anomalies. Interacting resources produce dependencies between two modules where any change of resources by one module affects the functionality of another module. Several inv...
Article
In this modern era of technology, securing and protecting one’s data has been a major concern and needs to be focused on. Malware is a program that is designed to cause harm and malware analysis is one of the paramount focused points under the sight of cyber forensic professionals and network administrations. The degree of the harm brought about by...
Conference Paper
Full-text available
In this modern, technological age, the internet has been adopted by the masses. And with it, the danger of malicious attacks by cybercriminals have increased. These attacks are done via Malware, and have resulted in billions of dollars of financial damage. This makes the prevention of malicious attacks an essential part of the battle against cyberc...
Article
Full-text available
Machine learning is now becoming a widely used mechanism and applying it in certain sensitive fields like medical and financial data has only made things easier. Accurate Diagnosis of cancer is essential in treating it properly. Medical tests regarding cancer in recent times are quite expensive and not available in many parts of the world. CryptoNe...
Conference Paper
Full-text available
The number of IoT devices around the world isincreasing exponentially with the growth of technology. But theresources we have at hand may prove difficult to accommodateall of them. To make efficient use of all the resources, we need toensure that we get maximum output while decreasing networkcongestion. In this paper, we deal with such an IoT devic...
Chapter
An electronic health record (EHR) typically contains sensitive medical records, personal information, doctors’ provided prescription, and other physical histories of a patient. This digital approach remodeled the health sector while increasing privacy concerns and possibility of security breaches. This paper proposes an EHR system based on blockcha...
Chapter
Over the decades, a typical imaging test that has been used is an X-ray. It allows doctors to see into the body without an incision. As a result, an X-ray can aid in diagnosing, monitoring, and treating a variety of medical disorders by detecting diseases beforehand. Among the diseases, pneumonia got major heed because of its intensity. As the lung...
Conference Paper
There are three critical aspects of cyber security: authentication, safety, and secrecy. Consumers have access to a wide range of alternatives for improving the safety of password-based login systems. With two-factor authentication, the majority of this was done. Two-factor authentication combines single-factor authentication processes. Two-factor...
Conference Paper
Full-text available
In the current ongoing world of IoT (Internet of things) devices, it is vital to have a safe, secure and reliable cyberspace. Cyberspace or network is free from all sorts of unethical activities like hacked systems, data breaches and stolen data. For that goal to be accomplished, we need to have a modern, solid and rigid cybersecurity system to sta...
Conference Paper
Full-text available
As the deadly COVID-19 outbreak spreads across the globe, the utilization of IoT in the surveillance of patients can prevent us from facing catastrophic repercussions. This paper aims to develop a real-time health monitoring system where sensors are used to continuously observe the patient’s body temperature, heart rate, and oxygen level. A compari...
Conference Paper
Full-text available
Predicting the risk while lending money has always been a challenge for financial institutions. To make such decisions many banks or financial organizations follow different techniques to analyze a set of data. Manual prediction and analysis of credit risk can not only be very hectic but also quite time-consuming. To solve this issue, what is neede...
Conference Paper
Full-text available
According to recent studies across the world, we can see that a healthy diet is the key to having a sound health and body. People nowadays are more concerned with their diets than ever before. With the advancement of science, it is now viable to construct a unique food identification system for keeping track of day to day calorie intake. However, b...
Conference Paper
Full-text available
Getting calls for ransoms are common phenomena in kidnapping and abduction related incidents where the life of the victim remains extremely vulnerable. These phone calls are often analyzed in real-time by law enforcement authorities to quickly identify the suspects and get crucial information for quick action. However, it is often difficult to manu...
Conference Paper
Full-text available
Traffic jams are a common phenomenon all over the world, especially in a densely populated country like Bangladesh. Due to this, people try heart and soul to tackle this problem by any means necessary to save time to reach their desired destination. Hence the traffic related research is a hot topic now a days which will be quite beneficial for all...
Conference Paper
Full-text available
The suitable crop for a particular location is necessary for agriculture to bring the most productivity. Here we have designed a model that contains prediction and recommendation with machine learning approaches that determines productivity based on the parameters humidity, rainfall, and temperature. For the prediction, we have applied k-nearest ne...
Conference Paper
Full-text available
Embedded system covers a large range of highly sensitive area where a slightest error can damage large number of resources even cost human life. So testing embedded system is extremely essential concern in computer science industry. Errors can lies between interacting software and hardware module of embedded system. This interactions can be modeled...
Data
Full-text available
Object-oriented paradigm has rapidly become the preferred model for system design by its structuring mechanism. Usually an object invokes some method of another object by sending messages to one another. Besides interaction based on calling relation, there exists several dataflow driven interaction patterns which may contain complex interactions be...
Article
Full-text available
Embedded systems are used to design and control variety of complex system. Now-a-days embedded system has been used in every aspect of our daily life such as automobiles, home appliances, cell phones, security system etc. It is also being used in highly safety critical system like aerospace, medical devices, military equipment etc. So it is necessa...
Data
Full-text available
Object-oriented paradigm has rapidly become the preferred model for system design by its structuring mechanism. But Object oriented program causes dependency among the classes which makes the testing procedure difficult. Although traditional testing techniques, based on UML diagram, are used widely to test Object oriented program in isolation but t...
Data
Global variables can be read or modified by any part of the program, making it difficult to remember or reason about every possible use. Sometime it has tight couplings between some of other variables, and couplings between variables and functions. The main focus of this paper is to use call graph and the control flow analysis to design a model fro...
Data
In embedded software global variables potentially cause many issues such as lack of access control, implicit coupling and dependencies with different module of the source code. Large number of integration module and its associated global variables introduce the problem of scalability. This paper propose an automated test case generation approach to...
Conference Paper
Full-text available
A medical system is complicated because it has many sub-modules and is connected with many kinds of other systems. Because software faults tend to occur in interoperation among modules, a safety-critical medical system should be tested strictly in terms of integration. At integration testing phase, there are too many execution path of software to t...
Data
Software verification methods are used widely in commercial and industrial development. To formally verify a large software application we can extract a model from the source code and verify that model with any verification mechanism or human contribution. So there are two things extraction and verification. There are two main problems in this appr...
Data
Full-text available
This paper presents a technique for recognition of voice command (say) by analyzing and matching word with a number of words stored in the computer. Such a technique of recognition of a word is useful in the execution of a voice command in the process control, robot system or for any other industrial operations. Here the word given as input for exe...
Data
Full-text available
This paper presents a technique for recognition of voice command (say) by analyzing and matching word with a number of words stored in the computer. Such a technique of recognition of a word is useful in the execution of a voice command in the process control, robot system or for any other industrial operations. Here the word given as input for exe...

Questions

Questions (71)
Question
Currently, no desired dataset is available for traffic forecasting. can I use a random dataset to show the effectiveness of the proposed model?
Question
In google map, we can see the travel time from a source address to destination address. I want to store those data. Is there any tool gor this?
Question
I want to predict crops using machine learning based on climate, soil i.e. environmental data. Can you please suggest any dataset regarding this?
Question
Can you please recommend some Research topics on Iot/cloud security for undergraduates?
Question
Recently I was trying to submit my manuscript in a journal. While submission it requires the names of 4 potential reviewers. How can I find reviewer?
Main keyword of my works are Software engineering, Model based testing, Embedded system.
Question
Can anyone suggest some research direction for quantum cryptography?
Question
As testing means to compare result with expected one for some input values. Most of the time producing large test data set is difficult. I am planning to use Machine learning technique for generating test cases. With some predefined test cases I will train the system and after that it will generate test cases.
But I am now sure where should I start.
Any recommendation is appreciable.
Question
Hello everybody,
I am testing response time of a file system (text file). I select (randomly) files of different size and calculate total reading time. Then I compare the actual time with expected time.
For example: I am taking 100KB, 10MB, 500MB, 1GB file for testing. for reading 100KB file it takes 0.05s, for 1GB it take 345s.
But I need some variant or criteria by which I can select files of different size. I do not want to select file size randomly. Please reply me if you have any idea.
Question
IEEE have defined a standard for all activity of software development. Software specification, design, testing, implementation all process should follow a standard procedure. In testing phase there can be errors which need to covered. Is there any fault/error list for call based system? Is so, can anyone provide any link?
Question
Definition-Use coverage is used in data flow testing. I have generated test paths that covers all definition-use chain of a variable. But my question is, how to prove that? How can I prove that all DU is covered by the test paths?
Question
A couple of months ago I had submitted my manuscript in a journal paper but canceled due to English writings. I have already checked and not sure how to improve English writing. 
I have seen that there are many online services which provide English checking service but those are very expensive. 
What do you do before submitting a manuscript? Can you share your experience here?
Question
I have already submitted a manuscript to a Journal and it is still under review.
By this time I have made some extension of my submitted manuscript. Developed some new idea on verifying some new criteria.
Now I want to how can I write another manuscript which will be the extension of the previous manuscript. I want to know, what percentage of old literature can I use? How to structure the manuscript?
Question
As we know, The sensors carry the inputs into the system from its environment, and the actuators carry the outputs out of the system to its environment. So there are two kinds of timing constraint. 
1. sensor-system
2. system-actuator.
Both of these cases there is a timing constraint. My question is how to test timing constraints?
Question
Many databases are used in embedded system. My questions are: 
1. Why we need a database?
2. What are the functionalities of the database?
3. What type of data are stored in a database?
4. What can be the testing aspect of a database in embedded system?
Question
Hello,
Currently my research is on testing medical device software system. I have done analytic and feasibility part but when i go for actual case study i could not find any suitable example for that.
Is it alright if i use other example as case study? I mean i am talking about medical system all over my paper but use some simple example is case study because source code of medical system is not available.
I have seen some researcher use embedded system as their main focus domain but use normal windows code or kernel code for case study. Do you think it is alright?

Network

Cited By

Projects

Projects (4)
Project
Our goal is to detect DDoS attack on real time using machine learning approaches. Currently the research is on progress.
Project
Market sales prediction.