Sherin Zafar

Work place: Department of Computer Science Engineering, JamiaHamdard, New Delhi, India

E-mail: zafarsherin@gmail.com

Website:

Research Interests: Computer systems and computational processes, Network Architecture, Network Security, Data Structures and Algorithms

Biography

Dr. Sherin Zafar is Assistant Professor in department of CSE, SEST, Jamia Hamdard having 12+ years of teaching and research experience. She has pursued her B.Tech. and M.tech in Computer Science Engineering form RGPV Bhopal and PhD from MRIIIS Faridabad. She has achieved above 100 reads in Research Gate in July 2017, Faculty of Computer Science Engineering at Jamia Hamdard, New Delhi. Her main interest is in optimization in MANET, using Biometric Approach. She has published around 30 papers in SCOPUS listed journals and reviewed around 80 papers.

Author Articles
Inculcating Global Optimization in ZRP through Newfangled Firefly Algorithm

By Neha Sharma Usha Batra Sherin Zafar

DOI: https://doi.org/10.5815/ijcnis.2019.02.06, Pub. Date: 8 Feb. 2019

Zone Routing Protocol (ZRP) has evolved as an efficient hybrid routing protocol with extremely high potentiality owing to the integration of two radically different schemes, proactive and reactive in such a way that a balance between control overhead and latency is achieved while maintaining routng and security concerns. The execution of ZRP in any case, is affected by different system conditions, for example, zone span, arrange measure, portability and so forth. The exploration work depicted in this paper centers around enhancing the execution of zone steering convention by lessening the measure of receptive traffic which is fundamentally in charge of corrupted system execution in the event of extensive systems. The methodology is structured to such an extent that the zone range of the system stays unaffected while accomplishing better QOS(Quality of Service) execution alongside productive memory utilization.This is actualized by utilizing two calculations. The principal calculation is intended to adjust the measure of proactive and receptive traffic without expanding the zone sweep dependent on the collection of courses in a focal overseer called Head.The utilization of Route Aggregation(RA) approach helps in decreasing the steering overhead and furthermore help accomplish execution optimization.The execution of proposed convention is evaluated under fluctuating hub size and versatility. The second calculation called the firefly streamlining calculation intends to accomplish worldwide enhancement which is very hard to accomplish due to non-linearity of capacities and multimodality of calculations. Different customary improvement procedures like angle based methods, tree based calculations need to manage such issues so this exploration based work uses the meta-heuristic calculation; it takes focal points of both course total and firefly calculations to upgrade QOS of Mobile Ad-hoc Network. For execution assessment a lot of benchmark capacities are being embraced like, parcel conveyance proportion and start to finish postponement to approve the proposed methodology. Recreation results delineate better execution of proposed brand new Firefly Algorithm (FRA) when contrasted with ZRP and RA-ZRP.

[...] Read more.
Novel Secured Biometric System Procuring Miniaturized Prorogation

By Sherin Zafar Ayesha Hena Afzal M. Afshar Alam

DOI: https://doi.org/10.5815/ijcnis.2018.11.04, Pub. Date: 8 Nov. 2018

Different organizations in today’s scenario are fully dependent on information technology for their survival, suffer from various security challenges like unauthorized access, physical damages etc. To avoid various security breaches and concerns, robust mechanism for user access need to be adopted that not only secure of valuable data but can also be utilized for developing various other security applications. “Biometric” secured technology is gaining attention for over traditional security mechanism like password, smart card etc. because information related to biometric are difficult to steal as compared to other mechanisms. In this research analysis “strong biometric approach” is proposed to overcome security apprehensions of various organizations& society through iris recognition system. Iris recognition system is a mechanism to identify a person through analyzing his or her iris pattern. This recognition system includes iris image acquisition, segmentation, normalization, encoding, matching and finally validation of iris templates. The iris recognition system developed and simulated in this research study has taken IIT database iris images as inputs and utilized hamming distance as the matching parameter. The simulated results depict an efficient and novel secured approach that will overcome various unauthorized accesses across the internet. The most novel approach of this iris based recognition system as compared to other traditional systems is that, if selected images are matched with trained iris images present in database then the resultant hamming distance as most of the iris recognition systems directly accept or reject images and causes huge congestion and execution prorogations.

[...] Read more.
A Neoteric Optimization Methodology for Cloud Networks

By Tayibia Bazaz Sherin Zafar

DOI: https://doi.org/10.5815/ijmecs.2018.06.04, Pub. Date: 8 Jun. 2018

Cloud computing is distinctively marked by its capability of providing on demand virtualized IT resources in a pay as you go fashion. Due to its popularity, the cloud computing users are increasing day by day which has become an important challenge for cloud providers. They need to serve their users in a best possible manner. The providers should not only provide their users a secure access to resources but also need to maintain a proper balance of QOS parameters like throughput, end-to-end delay, packet delivery ratio, jitter, response time, etc. The paper proposes an approach of using a meta-heuristic algorithm called Genetic Algorithm (GA) to optimize QOS parameters like packet delivery ratio and end to end delay in cloud networks. The intelligent optimization algorithms address several shortcomings of existing protocols by improving QOS parameters in an optimum manner. The results are simulated through MATLAB based simulator and the simulated results of proposed approach exhibit optimized parameters when compared to conventional method of shortest path cloud routing approach.

[...] Read more.
Other Articles