Md. Imdadul Islam
YOU?
Author Swipe
View article: Short Term Electrical Load Forecasting Based on Weather Parameters under Multiple FIS of Processing
Short Term Electrical Load Forecasting Based on Weather Parameters under Multiple FIS of Processing Open
The electrical load forecasting plays a vital role on the economy of a country in context of fuel saving, working hours of employee and depreciation cost of equipment of power generating station. In this paper, we use several machine learn…
View article: Comparison of Data Rate and Energy Per Node of Wireless Sensor Network Under Small Scale Fading
Comparison of Data Rate and Energy Per Node of Wireless Sensor Network Under Small Scale Fading Open
In this paper two widely used algorithms: Maximum Flow and Open Shortest Path First (OSPF) are applied in a Wireless Sensor Network (WSN) to send information from a member node to a cluster Head (CH).Two parameters of wireless link: Shanno…
View article: Detection of Diabetes using Combined ML Algorithm
Detection of Diabetes using Combined ML Algorithm Open
Recently data clustering algorithm under machine learning are used in ‘real-life data’ to segregate them based on the outcome of a phenomenon. In this paper, diabetes is detected from pathological data of 768 patients using four clustering…
View article: Large Pólya groups in simplest cubic fields and consecutive bi-qaudratic fields
Large Pólya groups in simplest cubic fields and consecutive bi-qaudratic fields Open
The Pólya group of an algebraic number field is the subgroup generated by the ideal classes of the products of prime ideals of equal norm inside the ideal class group. Inspired by a recent work on consecutive quadratic fields with large cl…
View article: The Performance Analysis of Digital Filters and ANN in De-noising of Speech and Biomedical Signal
The Performance Analysis of Digital Filters and ANN in De-noising of Speech and Biomedical Signal Open
A huge number of algorithms are found in recent literature to de-noise a signal or enhancement of signal.In this paper we use: static filters, digital adaptive filters, discrete wavelet transform (DWT), backpropagation, Hopfield neural net…
View article: Disease detection of apple leaf with combination of color segmentation and modified DWT
Disease detection of apple leaf with combination of color segmentation and modified DWT Open
In this paper, we proposed a machine learning and computer vision-based automated apple disease detection and recognition system based on leaf symptoms. The proposed method is composed of three parts: diseased region segmentation, feature …
View article: Improving signal detection accuracy at FC of a CRN using machine learning and fuzzy rules
Improving signal detection accuracy at FC of a CRN using machine learning and fuzzy rules Open
The performance of a cognitive radio network (CRN) mainly depends on the faithful signal detection at fusion center (FC). In this paper, the concept of weighted Fuzzy rule in Iris data classification, as well as, four machine learning tech…
View article: Data Classification Using Combination of Five Machine Learning Techniques
Data Classification Using Combination of Five Machine Learning Techniques Open
Data clustering plays a vital role in object identification. In real life we mainly use the concept in biometric identification and object detection. In this paper we use Fuzzy Weighted Rules, Fuzzy Inference System (FIS), Fuzzy C-Mean clu…
View article: Bangla Handwritten Character Recognition Using Extended Convolutional Neural Network
Bangla Handwritten Character Recognition Using Extended Convolutional Neural Network Open
The necessity of recognizing handwritten characters is increasing day by day because of its various applications. The objective of this paper is to provide a sophisticated, effective and efficient way to recognize and classify Bangla handw…
View article: Performance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow Algorithm Open
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity …
View article: Object Detection using Convolutional Neural Network and Extended SURF with FIS
Object Detection using Convolutional Neural Network and Extended SURF with FIS Open
The aim of the paper is to detect object using the combination of three algorithms: convolutional neural network (CNN) and extended speeded up robust features (SUFR) and Fuzzy inference system (FIS). Here three types of objects are conside…
View article: Human face recognition with combination of DWT and machine learning
Human face recognition with combination of DWT and machine learning Open
To enhance the accuracy of object recognition, various combination of recognition algorithms are used in recent literature. In this paper coherence of Discrete Wavelet Transform (DWT) is combined with four different algorithms: error vecto…
View article: Recognition of Bangla Handwritten Number Using Combination of PCA and FIS with the Aid of DWT
Recognition of Bangla Handwritten Number Using Combination of PCA and FIS with the Aid of DWT Open
The structure of any Bangla numerical character is more complex compared to English numerical character. Two pairs of numerical character in Bangla resembles to be closed and they are: “one and nine” and “five and six”. We found that, hand…
View article: Data Prediction Model Using Combination of Clustering and Fuzzy Technique
Data Prediction Model Using Combination of Clustering and Fuzzy Technique Open
The analysis of environmental daily evaporation plays a vital role in the field of agriculture. It is very essential to know the daily evaporation rate of a particular area for proper cultivation. So, we need a standard prediction model wh…
View article: Complexity Analysis and Accuracy of Image Recovery Based on Signal Transformation Algorithms
Complexity Analysis and Accuracy of Image Recovery Based on Signal Transformation Algorithms Open
In this paper we compare and analyze the complexity of three functions: Fast Fourier transform (FFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT), used in image transformation. The purpose of all the algorithms is …
View article: Combination of SVM, LDA, PCA and linear regression under fuzzy system in human face recognition
Combination of SVM, LDA, PCA and linear regression under fuzzy system in human face recognition Open
One of the main applications of image processing is recognition of human face. In this paper, we worked on several benchmark databases of human face to identify a person based on Linear Regression, SVM (Support Vector Machine and Viola-Jon…
View article: Performance Analysis of Multi-Hop Wireless Link under Maximum Flow Algorithm
Performance Analysis of Multi-Hop Wireless Link under Maximum Flow Algorithm Open
To enhance link capacity of a wireless link one or more repeater is used between the sender and the receiver. Recent literature deals with multiple parallel links to enhance throughput instead of conventional single path. In case of a mult…
View article: Traffic Modelling of Low Dense Femtocellular Network for Long Term Evolution
Traffic Modelling of Low Dense Femtocellular Network for Long Term Evolution Open
One of the features of Long Term Evolution (LTE) is the deployment of femtocells as the underlain cell of a macrocell without any intervention of frequency planning to offload the traffic. In this paper we used Markov chain to derive the e…
View article: Electrical Load Forecasting Using Fuzzy System
Electrical Load Forecasting Using Fuzzy System Open
To cope with the demand and supply of electrical load of an interconnected power system of a country, we need to forecast its demand in advance. In this paper, we use a fuzzy system to forecast electrical load on short-term basis. Here, we…
View article: Determination of Array Gain of Single Hop to Achieve the Performance of a 2-Hop Wireless Link
Determination of Array Gain of Single Hop to Achieve the Performance of a 2-Hop Wireless Link Open
In adaptive beamforming system adaptive algorithm of digital filter is applied to update the weighting vector of the antenna elements to get antenna gain along the desired direction and attenuation along the jammer. The objective of the pa…
View article: Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm Open
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and …
View article: Performance Evaluation of Cognitive Radio Network Based on 2-D Markov Chain
Performance Evaluation of Cognitive Radio Network Based on 2-D Markov Chain Open
The objective of cognitive radio network is to enhance the wireless network spectrum utilization. In such a network, two types of users are enlisted, namely primary user (PU) and secondary user (SU). The PU can access any channel in case o…
View article: Preliminary Identification of Fingerprint based on Shape Features
Preliminary Identification of Fingerprint based on Shape Features Open
The objective of this paper is to extract some distinct shape features of an image with combination of morphological operation and Gabor filtering. The main application of shape feature is to recognize a geometric shape, for example detect…
View article: Selection of the Best Two-Hop AF Wireless Link under Multiple Antenna Schemes over a Fading Channel
Selection of the Best Two-Hop AF Wireless Link under Multiple Antenna Schemes over a Fading Channel Open
In evaluating the performance of a dual-hop wireless link, the effects of large and small scale fading has to be considered. To overcome this fading effect, several schemes, such as multiple-input multiple-output (MIMO) with orthogonal spa…
View article: Performance Evaluation of Two-Hop Wireless Network under Asymmetric Fading Environment
Performance Evaluation of Two-Hop Wireless Network under Asymmetric Fading Environment Open
To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1st hop and relay to receiver called 2nd hop; such arrangement is called …