Md Julfiker Ali Jewel

I'm Md Julfiker Ali Jewel, a Software Programmer Analyst at the West Virginia Department of Health and Human Resources (DHHR). I design and ship secure, high-performance C#/.NET web applications, tune SQL Server for reliability at scale, and modernize enterprise systems with a strong focus on cybersecurity and operational resilience.

Previously I contributed to the State Highway Crash Database at the West Virginia Department of Transportation, automating analytics pipelines, and served as a Graduate Research & Teaching Assistant at West Virginia State University, conducting research in AI/ML, Cybersecurity, and HCI.

I hold an MS in Computer Science from West Virginia State University (USA) and a BS in CSE from Daffodil International University (Bangladesh), including an academic exchange at SIAS International University (China).

0

Years of Experience

0

Projects Completed

0

Research Publications

Technical Skills

Language Proficiency

C#, C++, Java, Python

C# โ€“ 95%
C++ โ€“ 85%
Java โ€“ 85%
Python โ€“ 95%
Frameworks

PyTorch, TensorFlow, NumPy, Ruby on Rails, .NET

PyTorch โ€“ 90%
TensorFlow โ€“ 92%
.NET โ€“ 85%
Internet Technologies

HTML, CSS, JavaScript, PHP, UI/UX, MySQL, VBA

HTML/CSS โ€“ 95%
JavaScript โ€“ 85%
MySQL โ€“ 80%
Security Domains

IDS/IPS, Vulnerability Scanning, Network Traffic Analysis, Incident Response

IDS/IPS โ€“ 92%
Vulnerability Scanning โ€“ 88%
Network Traffic Analysis โ€“ 86%
Incident Response โ€“ 84%
Mainframe Technologies
  • JCL
  • COBOL
  • Natural
Operating Systems
  • Windows
  • iOS
  • Linux
Microsoft Tools
  • Word
  • Excel
  • PowerPoint
  • MS Access
Spoken Languages
  • Bengali (Bangla) Advanced
  • English Advanced
  • Hindi Moderate
  • Urdu Moderate
  • Arabic Reading

Education

M.S. in Computer Science
Cybersecurity AI/ML Systems

West Virginia State University โ€” Institute, WV, USA

Graduated: Dec 2024
Advisors

Academic Advisor & Research Supervisor: Dr. Ali Al-Sinayyid

Co-Supervisor: Dr. Heng Wu (in memoriam)

Funding & Grants
  • Worked under the HBCU R&D Grant in Cybersecurity & AI research
  • Worked under the WV State Cybersecurity Grant

Graduate Coursework
  • Theory of Computation
  • Parallel & Distributed Computing
  • Computer Graphics
  • Analysis of Algorithms
  • Advanced Computer Architecture
  • Computer Security
  • Advanced Operating Systems
  • Advanced Database Management Systems
  • Advanced Cybersecurity (Special Topics)
Transfer Courses (University of Memphis)
  • Machine Learning
  • Foundations of Software Engineering
  • Humanโ€“Computer Interaction
Internship Experience

Internship in Computer Science (3 terms): Spring 2023, Summer 2024, Fall 2024

B.Sc. in Computer Science & Engineering
CSE Embedded/Networks Software Eng

Daffodil International University โ€” Dhaka, Bangladesh

Graduated: Mar 2019 โ€ข Supervisor: Dr. Nazmun Nessa Moon
Undergraduate Coursework (All Courses)
  • Computer Fundamentals
  • Mathematics-I: Differential and Integral Calculus
  • Basic Functional English and English Spoken
  • Physics-I: Mechanics, Heat and Thermodynamics, Waves & Oscillations, Optics
  • Mathematics-II: Complex Variable, Linear Algebra and Coordinate Geometry
  • Programming and Problem Solving
  • Problem Solving Lab
  • Physics-II: Electricity, Magnetism and Modern Physics
  • Physics-II Lab
  • Writing and Comprehension
  • Discrete Mathematics
  • Electrical Circuits
  • Electrical Circuits Lab
  • Data Structure
  • Data Structure Lab
  • Ordinary and Partial Differential Equations
  • Engineering Mathematics
  • Digital Electronics
  • Digital Electronics Lab
  • Object Oriented Programming
  • Object Oriented Programming Lab
  • Bangladesh Studies
  • Algorithms
  • Algorithms Lab
  • Statistics and Probability
  • Electronic Devices and Circuits
  • Electronic Devices and Circuits Lab
  • Microprocessor and Assembly Language
  • Microprocessor and Assembly Language Lab
  • Data Communication
  • Numerical Methods
  • Introduction to Bio-Informatics
  • Database Management System
  • Database Management System Lab
  • Computer Networks
  • Computer Networks Lab
  • Economics
  • System Analysis and Design
  • Computer Architecture and Organization
  • Operating Systems
  • Operating Systems Lab
  • Art of Effective Living
  • Compiler Design
  • Compiler Design Lab
  • Software Engineering
  • Wireless Programming
  • Financial and Managerial Accounting
  • Artificial Intelligence
  • Artificial Intelligence Lab
  • Simulation and Modeling
  • Simulation and Modeling Lab
  • Web Engineering
  • Web Engineering Lab
  • Computer Graphics
  • Computer Graphics Lab
  • Embedded Systems
  • Digital Image Processing
  • Data Mining
  • Social and Professional Issues in Computing
  • Project
Additional Coursework (SIAS International University, China)
  • Elementary Chinese Comprehensive I
  • Elementary Chinese Speaking I
  • Elementary Chinese Listening I
  • Chinese Character I

Total: 16 credits accepted

Professional Experience

Software Programmer
May 2024 โ€“ Present

West Virginia Department of Health and Human Resources
Department of MIS

  • Develop dynamic web applications using C# .NET, ASP.NET MVC, and SQL Server, optimizing data retrieval and performance.
  • Collaborate with the Cybersecurity Analysis Team to perform advanced threat detection, system vulnerability assessments, and proactive incident response.
  • Enhance mainframe system operations by debugging and refactoring COBOL, JCL, and Natural (Software AG) programs.
  • Design RESTful APIs and integrate cloud-based solutions for scalability and reliability.
  • Work with Software AG Natural and Adabas to design and maintain business logic for mainframe-based systems.
Graduate Assistant (RA & TA)
Jan 2023 โ€“ Dec 2024

West Virginia State University
Department of Math & Computer Science

Research Supervisor: Dr. Ali Al-Sinayyid โ€” Cybersecurity Innovation Center
Research & Teaching Assistantship Supervisor: Dr. Heng Wu โ€” AI & Embedded Systems Lab
  • Conduct research in AI/ML-driven cybersecurity at the Cybersecurity Innovation Center.
  • Designed intelligent prosthetic control systems using 1D CNNs and embedded AI.
  • Built predictive models for flood forecasting and groundwater prediction (LSTM, BiLSTM, GRU).
  • Contributed to research on multimodal LLMs for security and communication.
  • Assisted in teaching Data Structures, Software Engineering, and Database Management.
IT Analyst โ€“ Intern
May 2023 โ€“ Aug 2023

West Virginia Department of Transportation
Traffic Engineering Division

Supervisor: Marsha Mays, P.E. โ€” Traffic Engineering Division
  • Automated crash data analysis processes using C++ and VBA, reducing manual effort by 40%.
  • Provided IT support and optimized system operations for traffic engineering software.

Publications

  • โ€œAdvancing AI: Exploring the Potentials of Multimodal Large Language Modelsโ€ CSCIโ€™24 โ€” Published in Springer Nature (๐Ÿ“„ View Publication)

    Abstract: Recently, the advent of multimodal large language models (MLLMs) which integrate text with other modalities such as images, audio, and video, promise to revolutionize various fields ranging from natural language processing to computer vision and beyond. However, while MLLMs have shown remarkable performance across a wide range of tasks, their inner workings remain largely opaque, presenting significant challenges in terms of interpretability, robustness, and ethical considerations. This paper investigates the next frontier in artificial intelligence research: understanding multimodal large language models. We explore the architecture and applications of MLLMs, shedding light on their capabilities and limitations. By delving into the intricacies of multimodal large language models, this paper aims to show the potential use of LLM in biomedical and advanced machine learning algorithms to extract valuable features and improve the prediction accuracy of clinical analysis. Therefore, it will pave the way for future research directions and facilitate the development of more transparent, equitable, and trustworthy AI systems.

    ๐Ÿ”ฝ Read Less

  • โ€œReinforcing a Monitoring System of a Regulated River using LSTMโ€ ICAI'23 and CSCE'23 โ€” Published in IEEE Xplore (๐Ÿ“„ View Publication)
    Abstractโ€” Accurate methods predicting flow in a river require high performance computing systems providing only short-term early warnings. To address these limitations, we propose an optimized Long Short Term Memory layer combined with a Fully connected layer within a six-layer architecture to estimate flows based on readings of three neighboring river gage heights. This study assessed the number of cells in the LSTM and the number of neurons in the Fully connected layer as well as the probability in the Dropout layer to avoid overfitting. Identification of the best settings by means of the RMSE evaluated six different input datasets to estimate flow. Our study proved that relying on the river gage height from neighboring sensors is possible to predict flow which is crucial when a sensor may fail and a reliable neural network at low computational cost can handle that.
    ๐Ÿ”ฝ Read Less

  • โ€œIntelligent Upper Limbs Prosthetics with 1D Convolutional Neural Networks and Quick Trainingโ€ BIOENG'23 and CSCE'23 โ€” Published in IEEE Xplore (๐Ÿ“„ View Publication)
    Abstractโ€” Upper limb amputation can severely restrict the mobility and ability of amputees to perform daily activities. In addressing this issue, deep learning algorithms and electromyography pattern recognition have emerged as promising clinical solutions for functional upper-limb prosthetics. This article presents the use of EMG sensors to capture muscle movement signals and applies the pattern recognition function of a 1D convolutional neural network to identify these signals and control the movement of prosthetics. Experimental results demonstrate that the convolutional neural network exhibits fast training and high-precision recognition capabilities enabling it to accurately identify muscle signals and effectively control prosthetic movements.
    ๐Ÿ”ฝ Read Less

  • โ€œDefending Characteristics and Attribution Analysis for Phishing Attacksโ€ CSCIโ€™23 (CSCI-RTCW) โ€” Published in IEEE Xplore (๐Ÿ“„ View Publication)
    Abstractโ€” In recent years, phishing attacks have become widespread cyber threats affecting people, governments, private sectors, service providers, and internet users globally. Attackers collect personal information about the targeted victims through emails or fake websites, such as user account login details, bank card numbers, etc. The victim is manipulated using a combination of technical and social engineering techniques. This paper provides a review of recent existing research on various phishing attacks, including HTTPS phishing, spear phishing, whale phishing, pop-up phishing, and email spoofing hacking. It also explores how to identify such attacks using Artificial Intelligence (AI) techniques, including Machine Learning and Deep Learning. Additionally, the paper investigates the benefits and drawbacks of different defense approaches and provides an overview of the challenges related to phishing attack detection.
    ๐Ÿ”ฝ Read Less

  • โ€œA Literature Survey and Analysis of Defending Cyber Attacks Targeting IoT in Critical Infrastructureโ€ CSCIโ€™23 (CSCI-RTCW) โ€” Published in IEEE Xplore (๐Ÿ“„ View Publication)
    Abstractโ€” In an era defined by the relentless advancement of technology, the critical infrastructure that sustains our daily lives has become increasingly reliant on complex digital systems like Internet of Things (IoT). While these complex digital systems have brought convenience and efficiency to critical infrastructure, they have also become prime targets for malicious parties seeking to exploit vulnerabilities, raising concerns across vital sectors like energy, healthcare, transportation, and beyond. Through systematic literature review, historical incident analysis, and examination of recent attacks, this paper aims to deepen our understanding of the evolving threat landscape, emphasizing the urgency of strengthening defenses, particularly in the IoT realm to secure the foundations of modern society. This literature survey encompasses a spectrum of defending technologies and methodologies, including Artificial Intelligence (AI)-based defenses, and anomaly-based intrusion detection systems. Analyzing variations techniques and evaluates their efficiency and complexity.
    ๐Ÿ”ฝ Read Less

  • โ€œAnalytical Study of Cybersecurity Attacks and Defenses Characteristicsโ€ CSCIโ€™23 (CSCI-RTCW) โ€” Published in IEEE Xplore (๐Ÿ“„ View Publication)
    Abstractโ€” As technology continues to advance rapidly, society becomes increasingly reliant on digital systems. The cybersecurity landscape becomes progressively intricate and fraught with challenges. This paper conducts an in-depth exploration of the contemporary cybersecurity threat landscape, charting its evolution and examining the defensive strategies in play. By synthesizing insights from a broad spectrum of literature and presenting real-world cases, this work comprehensively analyzes the key characteristics of various threat categories, including malware, phishing, ransomware, and denial-of-service attacks, among others. As a conclusion, this paper strongly advocates the adoption of a multi-faceted and multi-layered defense approach to yield a high accuracy and efficient cyber defense.
    ๐Ÿ”ฝ Read Less

Accomplishments

Presentation
CSCIโ€™23 Conference Presentation

Presented on Critical Infrastructure in cybersecurity, covering phishing detection, defending attacks on IoT, and characteristics of attacks and defenses.

Presentation
SecureWV 2023 Presentation

Delivered an in-depth analysis on โ€œPhishing Cyber Attacks Characteristics and Attribution.โ€

Poster
Poster: Intelligent Upper-Limb Multifunctional Prostheses

Showcased research on EMG pattern recognition control method for prosthetic applications.

Volunteer
Mentorship in AI-driven Prosthetic Hand Research

Mentored undergraduate students โ€“ Summer Undergraduate Research Experience (SURE) Program 2023.

Mentorship
Mentorship in AI and Cybersecurity

Mentored undergraduate students in AI for cybersecurity problem-solving โ€“ SURE Program 2024.

Volunteer
CS_for_all Conference Volunteer

Volunteered at the CS_for_all Conference, Memphis, 2022.

Certification
Advanced Anti-Phishing

WVOT Cybersecurity, July 17, 2025

Certification
2025 Common Threats

WVOT Cybersecurity, July 16, 2025

Certification
Danger Zone

WVOT Cybersecurity, July 16, 2025

Certification
Data Protection

WVOT Cybersecurity, July 16, 2025

Certification
A New Hire's Guide to Security Awareness

WVOT Cybersecurity, July 17, 2025

Certification
2025 Your Role: Internet Security and You

WVOT Cybersecurity, July 16, 2025

Certification
Micro-module โ€“ Introduction to Ransomware

WVOT Cybersecurity, July 17, 2025

Certification
2025 Social Engineering Red Flags

WVOT Cybersecurity, July 16, 2025

Certification
Google IT Support Professional Certificate

Coursera / Google, May 23, 2025

Certification
Technical Support Fundamentals

Coursera / Google, May 23, 2025

Certification
The Bits and Bytes of Computer Networking

Coursera / Google, May 23, 2025

Certification
Operating Systems and You: Becoming a Power User

Coursera / Google, May 23, 2025

Certification
System Administration and IT Infrastructure Services

Coursera / Google, May 23, 2025

Certification
IT Security: Defense Against the Digital Dark Arts

Coursera / Google, May 23, 2025

Training
Federal Tax Information Training

FITX, July 12, 2025

Linux
Linux: I/O Redirection for DevOps

Coursera Project Network, July 17, 2025

Linux
Linux: Introduction to Shell Scripting for DevOps

Coursera Project Network, July 17, 2025

UX
Draw an Interactive Wireframe in Mockplus

Coursera Project Network, May 21, 2025

Cybersecurity
Foundations of Cybersecurity

Coursera / Google, March 19, 2025

Networking
Connect and Protect: Networks and Network Security

Coursera / Google, March 19, 2025

Risk
Assets, Threats, and Vulnerabilities

Coursera / Google, March 20, 2025

Python
Automate Cybersecurity Tasks with Python

Coursera / Google, April 12, 2025

Tools
Tools of the Trade: Linux and SQL

Coursera / Google, April 12, 2025

Risk
Play It Safe: Manage Security Risks

Coursera / Google, March 19, 2025

Career
Put It to Work: Prepare for Cybersecurity Jobs

Coursera / Google, April 12, 2025

IR
Sound the Alarm: Detection and Response

Coursera / Google, April 12, 2025

AI
Artificial Intelligence Fundamentals

IBM SkillsBuild, September 8, 2024

Cybersecurity
Cybersecurity Fundamentals

IBM SkillsBuild, September 26, 2023

Data
Getting Started with Enterprise Data Science

IBM, April 24, 2024

Threat Intel
Getting Started with Threat Intelligence and Hunting

IBM, September 16, 2023

Zero Trust
IBM Security Zero Trust Principles

IBM, September 21, 2023

Certification
Software AG Certified Natural Associate

Software AG, August 14, 2024 (valid until August 14, 2026)

Training
Mobile Application Development โ€“ Android

BITM (SEIP Program), August 24, 2019

Membership
ISC2 Candidate Member

Candidate ID: ....749 (2025โ€“2026) โ€“ Global cybersecurity professional community affiliation

Membership
IEEE Graduate Student Member

In good standing through December 2025

Membership
IEEE Young Professional Member

West Virginia Section (Member #...5875)

Membership
ACM Member

Association for Computing Machinery (Member #....742)

Membership
ROTRACT CLUB Bangladesh

Member, volunteer, awarded for contribution

Editor
Technical Editor โ€“ Springer Nature

โ€œCompTIA Network+ (N10-009) Certification Companionโ€ โ€“ Editing all 14 chapters for technical accuracy in cybersecurity and networking (4 chapters completed, 10 chapters in progress).
July 2025 โ€“ Present

Reviewer
Reviewer โ€“ IEEE PES ISGT-LATAM 2025

Peer-reviewed a technical paper in the area of adaptive power system protection (July 2025).

Reviewer
Journal Reviewer โ€“ Business and Management Theory and Practice

Asia Pacific Academy of Science and PTE. LTD

Award
Travel Award โ€“ 6th National HBCU Blockchain, FinTech, and AI Conference (Sept 2025)

Selected participant with full support (travel, hotel, and meals covered).

Projects

Scuba_Diving_Hawaii

Ruby on Rails 7 web app for scuba diving enthusiasts: location & tour listings, photo sharing, posts with comments/likes, and Devise-based authentication.

Ruby on Rails 7 License: MIT
turtle-mandala-art

Python notebook that generates colorful turtle-inspired mandalas using overlapping circles and rotational symmetry.

Python (Jupyter Notebook)
Python-based-Process-Scheduler-simulation

Priority-based round-robin OS scheduler simulation: create, block, fork, terminate, and replace programs via interactive commands.

Python License: MIT
Tower-of-hanoi

Classic recursive Tower of Hanoi implementation with step-by-step solution logic.

Python License: MIT
MemoryAllocationSimulator

Simulates First Fit, Next Fit, Best Fit, and Worst Fit strategies; compares efficiency and fragmentation.

Python License: MIT
QuickSort-Analysis

QuickSort implementation with benchmarking and performance visualization (Matplotlib); includes comparison against binary search.

Python License: MIT
calorie-tracker

Simple daily calorie tracker to log foods and compare intake against personal goals.

Python
Flood-Prediction-Intelligent-Flood-Forecasting-Model-Kanawha-River-WV-by-Machine-Learning

Long-term flood forecasting for the Kanawha River (WV) using LSTM, BiLSTM, GRU, and ARIMA for multi-level predictions.

Python (Jupyter Notebook)
Dental_Records

Project related to dental record management or analysis. Details not publicly available.

Private / Internal
House Price Predictive Model

Built linear & logistic regression models to predict house prices from real-estate features.

Python / Regression
Expression Regression Model

Used classification and dimensionality reduction to evaluate expression regression performance.

ML / Classification & DR
Google Stock Price Prediction โ€” RNN

Recurrent Neural Network trained on historical market data to forecast Google stock prices.

Python / RNN
Dimensionality Reduction & Unsupervised Methods

Clustering and feature embeddings to visualize and group unlabeled samples.

ML / Clustering
Prototypes & Click-through Demos โ€” HCI

Interactive click-through demos for usability testing informed by HCI principles.

UX / Prototyping
Ship Booking Management Website

Reservation site with integrated search and booking for ship trips.

Web

Research Experience

  • AI-Powered Intrusion Detection & Prevention (IDS/IPS) Ongoing
    Developing real-time defensive models using ML/DL (Random Forest, LSTM, CNN) with SHAP-based explainability and Optuna hyperparameter tuning.
  • AI Security for Public-Health Surveillance: Robust Detection & Defense on CDC Case Surveillance Ongoing
    Policy-simple, auditable pipeline on monthly CDC stateร—month counts: Per-state 5โ€“95% winsorization Rolling MAD YoY Residual-MAD EWMA. Produces baseline / attacked / defended streams, heatmaps, |z| distributions, and sensitivity sweeps over Wโˆˆ{4,6,8}, kโˆˆ{2.0,2.5,3.0}. Results (W=6, k=2.5): โˆ’24.5% alert load (220โ†’166) with 74.1% sensitivity retention and p95(|z|) 3.665/3.688โ†’3.031. FOIA-compatible run manifests; no PHI/PII (server-side aggregation via CDC Open Data).
  • Multimodal Large Language Model (LLM) Research
    Exploring fusion of text, audio, and visual modalities for richer contextual understanding in AI systems.
  • Cybersecurity in Critical Infrastructure
    Investigated human-induced risks and defense mechanisms (e.g., phishing, ransomware) using deep neural networks within critical infrastructure domains.
  • Intelligent Flood Forecasting for Kanawha River Basin
    Built a long-term, feedback-enabled flood prediction system using LSTM, BiLSTM, GRU, and ARIMA models.
  • AI-Driven Robotic Prosthetic Limbs
    Designed upper-limb prosthetics using 1D CNNs on embedded Coral Accelerator hardware; accelerated training with PyTorch and GPU.
  • Groundwater Level Prediction
    Developed multivariate forecasting models for groundwater trends using LSTM, BiLSTM, GRU, and ARIMA.

Resume

Education
  • MS, Computer Science โ€” West Virginia State University, Dec 2024
  • BS, CSE โ€” Daffodil International University
  • Academic Exchange โ€” SIAS International University (China)
Experience
  • Software Programmer โ€” WV DHHR (May 2024โ€“Present)
  • Graduate Assistant (RA & TA) โ€” WVSU (Jan 2023โ€“Dec 2024)
  • IT Analyst Intern โ€” WV DOT (Mayโ€“Aug 2023)
Skills
.NET & DB: C#, ASP.NET Core, EF, SQL Server
Python/ML: TensorFlow, PyTorch, Optuna, SHAP
Security: IDS/IPS, Zero Trust, OAuth/OIDC, OWASP
C#/.NET SQL Server Python ML/DL Cybersecurity Cloud-ready

Contact Me

Send Me a Message

Privacy

This is a personal portfolio website. No tracking cookies are used beyond basic hosting logs.