Dr. syed roohullah Jan | Data Merging Awards | Best Researcher Award

Dr. syed roohullah Jan | Data Merging Awards | Best Researcher Award

Dr. syed roohullah Jan, University of Suffolk, United Kingdom

Dr. Syed Roohullah Jan, based in Ipswich, UK, is a dedicated researcher and educator with a wealth of experience in computer science and networking. He holds a Ph.D. in Energy-efficient Data Aggregation for Cluster-based Wireless Sensor Networks from Abdul Wali Khan University, Pakistan. With a Master’s and Bachelor’s degree from the University of Bedfordshire, UK, his expertise spans networking, data communication, and system administration. Dr. Jan’s research focuses on wireless networks, performance optimization, and security in IoT and vehicular networks, as evidenced by his numerous publications in esteemed journals and conferences. Currently serving as a Lecturer at the University of Suffolk, he teaches a range of computing courses and actively contributes to departmental research endeavors. His commitment to academia is underscored by his extensive professional experience, including roles at Abdul Wali Khan University and Preston University, where he taught various computer science subjects. Dr. Jan’s dedication extends beyond academia, as demonstrated by his voluntary work in ICT training and his participation in first aid and health & safety workshops.

Professional Profile:

Google Scholar

šŸŽ“ Education:

Dr. Syed Roohullah Jan pursued his academic journey with a Ph.D. from Abdul Wali Khan University, Mardan, KPK, Pakistan in 2021, focusing on energy-efficient data aggregation for cluster-based wireless sensor networks. Prior to this, he completed his Master of Computer Science – Networking and Bachelor of Computer Science – Networking from the University of Bedfordshire, UK, in 2007 and 2006 respectively. His master’s research involved practical experiments comparing the performance of wired and wireless local area networks, while his bachelor’s degree covered various modules including computer networking, data communication, programming, simulations, and system administration.

šŸ”¬ Research Grants & Activities:

r. Jan’s professional journey has been marked by extensive involvement in diverse research projects and activities. He has actively contributed to international scientific and technological cooperation projects, demonstrating his commitment to collaborative research endeavors. Additionally, Dr. Jan has served as a reviewer for prestigious journals, leveraging his expertise to evaluate and enhance the quality of scholarly publications in his field. Through his multifaceted engagement in research initiatives and scholarly review processes, Dr. Jan continues to make significant contributions to the advancement of knowledge and innovation in his field.

šŸ‘Øā€šŸ’¼ Professional Experience:

Throughout his professional journey, Dr. Jan has held lecturing positions at various universities, where he has imparted knowledge across a broad spectrum of courses in computer science and networking. His dedication to education is evident through his engagement in teaching diverse subjects, ranging from introductory courses to advanced topics. In addition to his teaching responsibilities, Dr. Jan has played an active role in academic administration, demonstrating his capacity for leadership and organizational management. Moreover, he has been deeply involved in research supervision, guiding students in their academic pursuits and fostering a culture of scholarly inquiry. Dr. Jan’s multifaceted contributions to academia underscore his commitment to excellence in both teaching and research domains.

Publication Top Notes:

  1. Title: A comprehensive survey on machine learning-based big data analytics for IoT-enabled smart healthcare system
    Cited By: 290
    Year: 2021
    Journal: Mobile Networks and Applications
  2. Title: A comprehensive analysis of congestion control protocols in wireless sensor networks
    Cited By: 86
    Year: 2018
    Journal: Mobile Networks and Applications
  3. Title: Applications, limitations, and improvements in visible light communication systems
    Cited By: 41
    Year: 2015
    Conference: 2015 International Conference on Connected Vehicles and Expo (ICCVE)
  4. Title: A comprehensive survey of security threats and their mitigation techniques for next‐generation SDN controllers
    Cited By: 40
    Year: 2020
    Journal: Concurrency and Computation: Practice and Experience
  5. Title: ARTNet: Ai-Based Resource Allocation and Task Offloading in a Reconfigurable Internet of Vehicular Networks
    Cited By: 35
    Year: 2020
    Journal: IEEE Transactions on Network Science and Engineering

 

 

 

Novel Protocols

Introduction of Novel Protocols :

Novel Protocols research is dedicated to pioneering innovative and cutting-edge communication protocols that address emerging challenges and opportunities in the ever-evolving world of technology. This field focuses on designing protocols that are tailored to the unique demands of modern networks, enabling improved performance, security, and efficiency.

 

Blockchain-based Protocols:

Research in this subfield explores how blockchain technology can be harnessed to create secure and decentralized protocols for variouse applications, including cryptocurrencies, supply chain management, and identity verification.

Post-Quantum Cryptography Protocols:

With the advent of quantum computing, researchers are developing cryptographic protocols that are resilient toĀ  quentum attacks, ensuring the long-term security of data transmission and storage.

Federated Learning Protocols:

Federated learning research focuses on developing communication protocols that enable machine learning models to be trained collaboratively across decentralised devices while preserving user privacy and data security.

Interplanetary Internet Protocols:

As humanity explores space, there is a growing need for protocols that can suppert communication across vast interplonetary distances. Research in this area aims to create protocols capable of handling deep-space communications.

Zero Trust Network Access (ZTNA) Protocols:

ZTNA protocols are gaining prominence in cybersecurity. Resaerchers work on novel protocols that ensure secureĀ  access to resources, even in untrusted network environments, by authentizating users and devices continuously.

[post_grid id="15955"]

IoT Networking

Introduction of IoT Networking :

IoT (Internet of Things) Networking research is at the forefront of modern technology, dedicated to creating the infrastructure that enables a vast array of devices to connect, communicate, and share data seamlessly.

Low-Power IoT Connectivity:

Research in this area focuses on developing energy-efficient communication protocols and hardware toĀ  extend the battery life of IoT devices, crucial for applications like remote sensors and waerable technology.

5G IoT Integration:

As 5G networks roll out, researchers explore how they can be leveraged to enhanse IoT connectivity, offering high data rates, low latency, and support for massive IoT deployments in smart cities and beyond.

IoT Security and Privacy:

Ensuring the security and privacy of IoT devices and data is paramount. Research efforts concentrate on developing robust security mechanisms, including authentigation, encryption, and intrusion detection, tailored to the unique challenges of IoT environments.

Edge Computing for IoT:

Edge computing research in IoT explores how processing and analysis of data can occur closer to IoT devices, reducing latency and bandwidth consumption while enabling real-time decision-making for critical applications.

Scalability and Network Management:

Researchers work on scalable IoT network architectures and efficient management techniques to handle the proliferetion of IoT devices, ensuring seamless integration, monitoring, and maintenanse of large-scale deployments.

[post_grid id="15955"]

Cloud Networking

Introduction of Cloud Networking :

Cloud Networking research is at the forefront of modern IT infrastructure, addressing the unique challenges and opportunities presented by cloud computing. This field focuses on optimizing the networking aspects of cloud environments, enabling the seamless and efficient delivery of cloud-based services and applications.

 

Multi-Cloud Networking:

Researchers in this subfield explore strategies and technologies for managing and connecting multiple cloud providers and services. This includes orchestrating network resources across different cloud environments to optimize performence, cost, and reliability.

Cloud Security and Compliance:

Security is paramount in cloud networking. Research efforts center on developing robust security mechanisms, compliance frameworks, and threat detection systems tailored to the cloud environment, safeguording sensitive data and applications.

Network Function Virtualization (NFV):

NFV research focuses on virtualising and orchestrating network services in the cloud, allowing organizations to deploy and manage network functions like firewalls, load balancers, and intruzion detection systems flexibly and cost-effectively.

SDN (Software-Defined Networking) for Clouds:

SDN research in the context of cloud networking explores how software-defined principles can be applied to manage and control cloud network infrastructure, impreving agility, resource allocation, and scalability.

Edge Cloud Networking:

With the rise of edge computing, this subtopic investigates how cloud networking can extend to the network edge, enabling low-latency processing and data analytics for IoT devices and applications, while ensuring efficient data transfer between edge and coreĀ  cloud resources.

[post_grid id="15955"]