
M. Ruhul Amin- PhD
- Professor at East West University
M. Ruhul Amin
- PhD
- Professor at East West University
About
174
Publications
31,505
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,102
Citations
Introduction
M. Ruhul Amin currently works at the Department of Mathematical and Physical Sciences, East West University (Bangladesh). He does research in Communication Engineering and Plasma Physics. His current research project is Nonlinear Waves in Plasmas, particularly, the Modulation Instability in Plasmas.
Skills and Expertise
Current institution
Additional affiliations
May 2017 - present
May 2002 - May 2017
May 2002 - present
Education
September 1987 - September 1990
January 1985 - December 1985
January 1981 - December 1984
Publications
Publications (174)
Using the standard reductive perturbation technique, a nonlinear Schrodinger equation is derived to study the modulational instability of finite amplitude dust-acoustic (DA) and dust-ion-acoustic (DIA) waves against oblique perturbations (with respect to the propagation direction of the carrier waves) in an unmagnetized dusty plasma. It is shown th...
The parametric interaction of an intense laser beam with ion plasma modes in a two-dimensional Cartesian geometry has been studied for the first time by avoiding the paraxial optics approximation. This model allows investigation of the competition between forward, sideward, and backward stimulated Brillouin scattering (SBS) along with filamentation...
A system of electromagnetic and ion acoustic wave equations coupled via the ponderomotive force are solved numerically in a two-dimensional planar geometry. The competition between forward, side, and backward Brillouin scattering of the finite size laser beam is studied for the first time without the standard paraxial optics approximation. Simulati...
In recent literature on traffic scheduling, the combination of the twodimensional discrete-time Markov chain (DTMC) and the Markov modulated Poisson process (MMPP) is used to analyze the capacity of VoIP traffic in the cognitive radio system. The performance of the cognitive radio system solely depends on the accuracy of spectrum sensing techniques...
Amplitude modulation of a compressional electromagnetic wave in a strongly magnetized electron-positron
pair plasma is considered in the quantum magnetohydrodynamic regime. The important ingredients of this study
are the inclusion of the external strong magnetic field, Fermi quantum degeneracy pressure, particle exchange
potential, quantum diffract...
The nonlinear propagation of dust-acoustic (DA) waves in an unmagnetized dusty and collisional (damped) plasmas (consisting of nonthermal electrons and ions, and mobile negative dust) has been investigated by employing the reductive perturbation technique. It has been found that the presence of dust-ion collisions, the effects of nonthermal electro...
In wired communication, the point-to-point traffic model is used to determine the blocking probability for four different types of network topology: i) links are in series, ii) links are in parallel, iii) links are in a combination of series and parallel and iv) complex topology where links are neither series nor parallel like the delta-star networ...
One of the major challenges of the dual-hop energy harvesting (EH) a link is, to optimize the link parameters to achieve maximum signal to noise ratio (SNR) at the receiving end. In this paper, the optimum condition of three parameters: ‗power supply at source terminal', ‗power splitting ratio', and ‗gain of relay' is achieved in four ways. In the...
In the present paper we study the static and spherically symmetric dilaton-axion black hole in the testing ground of the Solar system. We constrain the parameters of the string motivated dilaton-axion form of the classical tests of general relativity, viz., the perihelion precession of the planet Mercury and the deflection of light by the Sun. In t...
In dual-hop wireless link, the cooperative relayed link shows better performance compared to single relayed communication case. In this paper we consider the received SNR (signal to noise ratio) of cooperative relay network as a random variable (r.v.) then we derive cdf (cumulative distribution function) and pdf (probability density function) of re...
Recently power saving is a vital issue for wireless devices of 4G and 5G networks. A device enters in sleeping mode (short and long sleep cycle) when there is no arrival of traffic but wakeup once the arrival of traffic. Before wakeup, the UE user equipment (UE) spends the rest of the sleeping cycle which incurs a delay of service. There is a trade...
To enhance the accuracy of object recognition, various combination of recognition algorithms are used in recent literature. In this paper coherence of Discrete Wavelet Transform (DWT) is combined with four different algorithms: error vector of principal component analysis (PCA), eigen vector of PCA, eigen vector of Linear Discriminant Analysis (LDA...
A self-gravitating opposite polarity dust plasma (SGOPDP) medium (containing both positively and negatively charged dust, vortex-like distributed ions and Maxwellian electrons) has been considered in order to examine the effect of vortex-like (trapped) ion distribution on dust-acoustic (DA) solitary waves (SWs) propagating in SGOPDP medium. The red...
To cope with the demand and supply of electrical load of an interconnected power system of a country, we need to forecast its demand in advance.In this paper, we use a fuzzy system to forecast electrical load on short-term basis. Here, we consider temperature, humidity, seasons of a year and time segments of a day as the parameters, which govern th...
Digital filter bank of DWT (discrete wavelet transform) provides the approximate and detail components of a signal, whereas the perfection of the filter bank depends on recovery of the signal. In this paper, we convert an image into a one dimensional signal vector then the perfection of the filter bank is observed on recovery of signal vector hence...
The performance of a cognitive radio network depends on, how successfully the secondary user (SU) can detect the presence of the primary user (PU) and recognize the false alarm which arises from interferences. In this paper, we determine the profile of the probability of detection (P d) and the probability of false alarm (P f) of a secondary user u...
One of the features of Long Term Evolution (LTE) is the deployment of fem-tocells as the underlain cell of a macrocell without any intervention of fre-quency planning to offload the traffic. In this paper we used Markov chain to derive the expression of blocking probability for both macro and femtocell in terms of traffic parameters of the network....
One of the major objectives of wireless network is to save energy of UE and radio equipment of Node-B. The discontinuous reception (DRX) is widely used in LTE-A mobile communication system. The recent literature use 3 to 5 state Markov chain to model DRX and show that the performance of N state model is better than N-1 state. This paper provides a...
In many applications, it is necessary to compare two or more images to identify the originality of them. For example, verification of fake logo of an organization or fake signature of an official can be considered in this context. The cross correlation and wavelet transform are widely used techniques to compare two images but they are low sensitive...
In this paper, we show the explicit analytical model of CSI (Channel State Information) and Fixed Gain Relay of 2-hop wireless link under dissimilar fading environment. The two schemes can be compared in context of common fading condition and common amplitude of signal. The CSI scheme is alike adaptive algorithm to provide optimum result at the exp...
In this paper, we deal with physical layer security of a wireless network where the secrecy capacity of the link is considered as the parameter. The impact of received signal to noise ratio (SNR) of legitimate/authorized user, the number of transmitting/receiving antenna elements of multiple input multiple output (MIMO) along with antenna elements...
One of the major objectives of wireless network is to save energy of UE and radio equipment of Node-B.
The discontinuous reception (DRX) is widely used in LTE-A mobile communication system. The recent literature use 3 to 5 states Markov chain to model DRX and show that the performance of N state model is better than N-1 state. This paper provides...
The relation between offered traffic and the length of frame taking the batch size as a parameter are nonlinearly related under Batch Markovian Arrival Process (BMAP). Therefore the prediction of carried traffic and blocking probability against the length of frames or the batched size becomes more complicated compared to conventional packet or circ...
The prime objective of LTE (Long-term evolution) mobile cellular network is to ensure high speed data with good QoS. In LTE femtocellular network the tiny femtocell are integrated with macrocell to transfer overflow traffic (off loading) from macrocell to femtocell. A dense femtocellular network experiences frequent handover and huge interferences....
The basic features of linear and nonlinear quantum electron-acoustic (QEA) waves in a degenerate quantum plasma (containing non-relativistically degenerate electrons, superthermal or $\kappa$-distributed electrons, and stationary ions) are theoretically investigated. The nonlinear Sch\"{o}dinger (NLS) equation is derived by employing thereductive p...
The digital filter bank is an alternative method of discrete wavelet transform (DWT). The LP (lowpass) and HP (highpass) filters of a filter bank can be either Finite Impulse Response (FIR) or Infinite Impulse Response (IIR) filter. The objective of this paper is to compare the relative performance of Butterworth, Chebyshev Type I, Chebyshev Type I...
One of the breakthroughs of LTE is the incorporation of MIMO (multiple input multiple output) between UE (user equipment) and eNB (Evolved node-B) to enhance the performance of wireless communication system. The adaptive beamforming of MIMO can minimize both transmitted power of UE/eNB and interference at the receiving end. In this paper, we emphas...
To achieve end-to-end maximum throughput, the wireless Internet access requires (a) sufficient SNR at evolved Node-Bs and UEs (user equipment) at physical layer and (b) congestion control algorithm in determining appropriate window size at transport layer. Considering above, the paper deals with both the layers for Femto cellular LTE network and re...
Power saving is one of the key factors of emerging 4G mobile network as well as in IEEE 802.16e wireless metropolitan area networks (Wireless MAN). An efficient power saving mechanism is the heart for the guarantee of a long operating lifetime for a mobile subscriber station (MS), because MSs are normally driven by rechargeable batteries. It is a v...
Energy efficiency plays vital roles in wireless communication system due to the “energy limited battery service” of a mobile station (MS). To ensure longer battery life in WiMAX, a new protocol has been introduced in its IEEE802.16m version. This new sleep mode has extended listening window and adjustable sleep cycle length. In this paper, we analy...
Objective of this paper is to identify a person taking fingerprint as a biometric parameter using wavelet packet transform. Here both conventional discrete wavelet transform (DWT) and discrete wavelet packet transform (WPT) are used considering special basis function/matrix to extract the coefficients of basis functions those convey the most of the...
Conventionally fading analysis of wireless LAN or MAN means small scale fading i.e. wide fluctuation of received signal with small variation of time and distance. In analysis of fading channel we consider the received signal in power, voltage or SNR as a random variable then statistical probability density function (pdf) like Rayleigh, Rician or Na...
The paper deals with the packet scheduling of voice traffic of IEEE 802.16e under femto cellular network where the length of wireless link is few meters. Instead of distribution of MCS (Modulation and Coding Scheme) levels of previous literature, only availability of traffic channel is considered in packet scheduling since the short wireless link o...
Amplitude modulation of a positron acoustic
wave is considered in a four-component electron–positron
plasma in the quantum magnetohydrodynamic regime. The
important ingredients of this study are the inclusion of the
particle exchange-correlation potential, quantum diffraction
effects via the Bohm potential, and dissipative effect due to
viscosity i...
The main objective of source coding is to represent the symbols or messages generated from an information source in a suitable form so that the size of the data is reduced. In image compression we use JPEG where huge number of zero is generated in medium and high frequency region of transformed image using the combination of DCT (Discrete Cosine Tr...
Amplitude modulation of a compressional Alfven wave in compensated electron-hole semiconductor plasmas is considered in the quantum magnetohydrodynamic regime in this paper. The important ingredients of this study are the inclusion of the particle degeneracy pressure, exchange-correlation potential, and the quantum diffraction effects via the Bohm...
In evaluating the performance of a dual-hop wireless link, the effects of large and small scale fading has to be considered. To overcome this fading effect, several schemes, such as multiple-input multiple-output (MIMO) with orthogonal space time block codes (OSTBC), different combining schemes at the relay and receiving end, and orthogonal frequen...
Amplitude modulation of electrostatic Langmuir waves in a quantum electron–hole semiconductor plasma is considered in the quantum magnetohydrodynamic regime. The important ingredients of this study are the inclusion of the particle degeneracy pressure, exchange-correlation potential, and the quantum diffraction effects via the Bohm potential. A non...
To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1 st hop and relay to receiver called 2 nd hop; such arrangement is called two hop wireless links. In two-hop wireless communication sometimes 1 st and 2 nd hops are affected by differ...
The performance of a cognitive radio network (CRN) solely depends on how precisely the secondary users can sense the presence or absence of primary users. The incorporation of a spatial false alarm makes deriving the probability of a correct decision a cumbersome task. Previous literature performed this task for the case of a received signal under...
To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we...
In recent days intense research is taking place on energy efficiency (EE) of a multi-user wireless network. In this paper we propose a model to detect EE based on limited user
traffic model. We observe the variation of EE against the number of users and energy signal to noise ratio engaged by the user. The impact of enhancement of subcarriers on EE...
In this paper, the average probability of the symbol error rate (SER) and throughput are studied in the presence of joint spectrum sensing and data transmission in a cognitive relay network, which is in the environment of an optimal power allocation strategy. In this investigation, the main component in calculating the secondary throughput is the i...
Rao-Wilton-Glisson (RWG) edge elements are widely used to determine the performance of an antenna specially the distribution of elemental dipole on the antenna surface, surface current distribution, profile of input impedance and radiation pattern. In this paper the impact of geometry and position of feed point of a patch antenna is analyzed in ter...
The Kadomtsev-Petviashili (KP) equation is derived for weakly nonlinear ion acoustic waves in a magnetized dusty plasma in the presence of nonthermal electrons. Soliton solutions are obtained in both the one-dimensional and two-dimensional framework. For the one-dimensional soliton solution the ‘tanh’ method is considered while the two-dimensional...
The nonlinear propagation of electrostatic ion modes in a dense relativistic degenerate strongly coupled plasma has been investigated by employing the reductive perturbation technique. It has been shown that the amplitude of the nonlinear electrostatic wave is not significantly changed when different ion viscosity is considered and that is slightly...
Now-a-days, intense research is going on two-hop wireless link under
different fading conditions with its remedial measures. In this paper work, a
two-hop link under three different conditions is considered: (i) MIMO on both
hops, (ii) MISO in first hop and SIMO in second hop and finally (iii) SIMO in
first hop and MISO in second hop. The three mod...
The nonlinear propagation of dust-acoustic (DA) waves in an unmagnetized
dusty plasma consisting of nonthermal electrons, vortex-like (trapped)
distributed ions and mobile negative dust have been investigated by
employing the reductive perturbation technique. The effects of
nonthermal electrons and trapped ions are found to modify the properties
of...
With the advent of 4G mobile communication system the traffic of wired and wireless network becomes voice/video-data integrated service. In this paper traffic model of Markov Modulated Poisson Process (MMPP) is applied for bursty traffic of Wireless LAN (WLAN), especially in IEEE 802.11 WLAN, known as WiFi, and IEEE 802.16e WLAN is known as WiMAX....
Nonlinear propagation of electrostatic modes in ultrarelativistic dense
elelectron-positron gravito-plasma at the polar cap region of pulsar
magnetosphere is considered. A nonlinear Schr\"{o}dinger equation is obtained
from the reductive perturbation method which predicts the existence of Langmuir
dark solitons. Relevance of the propagating dark so...
In this paper, traffic cost of VoIP under IEEE 802.16e/m with adaptive multi-rate (AMR) speech codec is estimated based on state transition chain of Engset model. Impact of different traffic parameters like:
length of queue, mean service time, mean waiting time, probability of immediate service, probability of delay are incorporated to evaluate the...
In Orthogonal Frequency Division Multiplexing (OFDM) carriers among users are orthogonally related. Hence no guard band is necessary like Frequency Division Multiplexing even spectrums of users can overlap, enhances the spectrum efficiency of the network. In this paper different window functions in frequency domain are considered in pulse shaping o...
Multicast network is widely used for effective communication, transmission and performance optimizations of a network. In this paper, a new model has been developed to determine a suitable value of the fold k of a k-fold multicast network under different traffic loads under Poisson traffic with finite queue at each node. We have derived stationary...
Recovery of a signal under noisy environment can be done in several ways. Most widely used techniques are adaptive algorithms (LMS, RLS, Kalman filter, FDAF) and filtering of noise grain based on discrete wavelet transform (DWT). In this paper, denoising of ECG signal is performed using adaptiveneuro fuzzy inference system (ANFIS) model which is a...
Different types of fingerprint detection algorithms that are based on extraction of minutiae points are prevalent in recent literature. In this paper, we propose a new algorithm to locate the virtual core point/centroid of an image. The Euclidean distance between the virtual core point and the minutiae points is taken as a random variable. The mean...
It is shown that a strongly magnetized isothermal pair plasma near the surface of a pulsar supports low-frequency (in comparison
to electron cyclotron frequency) toroidal electrostatic plasma modes in the equatorial region. Physically, the thermal pressure
coupled with the magnetic pressure creates the low frequency oscillations which may grow for...
Dust negative ion acoustic (DNIA) shock wave in a dusty multi-ion plasma consisting of electrons, light positive ions, heavy negative ions and extremely massive charge fluctuating negative dust in a non-planar geometry has been investigated by employing reductive perturbation technique. For this, a modified Burger's equation is derived and numerica...
Considering the flat rotation curves as input and treating the matter content
in the galactic halo region as quark matter, we have found out a background
spacetime metric for the region of the galactic halo. We obtain fairly general
conditions that ensure that gravity in the halo region is attractive. We also
investigate the stability of circular o...
The faithful detection of presence of a primary user (PU) is the most essential requirement of a cognitive radio network. Otherwise the PU will experience jamming from a secondary user (SU) which will eventually lead to reduction in throughput of the PU. Similarly, the false detection of a PU will abstain a SU from its transmission opportunity henc...
Wireless Cost based performance of a network is very much essential for a network planner prior implementation of a network. In this paper we propose a cost based analysis of H2/D/1 and E2/D/1 traffic models based on the concept of a previous analysis of M/G/1 model. Here, the arrival rate of packets follows hyper-exponential and Erlangian distribu...
One of the major challenges in wireless communications, especially in urban areas, is to detect the digital information under different fading environments. In a two-hop wireless link, each hop is affected by fading and noise which degrades the overall performance of the communication system. In this paper, performance of a two-hop link is analyzed...
In this paper we consider a local area network (LAN) of dual mode service where one is a token bus and the other is a carrier sense multiple access with a collision detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of a dual mode LAN for finite length queue M/G/1(m) traffic. Here, the offere...
To enhance the capacity of a multiple input single output (MISO) system in wireless communications, the most widely used channel coding technique is the space time block coding (STBC). The outstanding orthogonal full rate STBC proposed by Alamouti is the most successful one and also very simple to implement, where only two transmit antennas and one...
An unmagnetized adiabatic dusty electronegative plasma (DENP) containing inertialess adiabatic electrons, inertial single-charged adiabatic positive and negative ions, and stationary arbitrarily (positively and negatively) charged dust have been theoretically considered in nonplanar (viz. cylindrical and spherical) geometry. The reductive perturbat...
The nonlinear propagation of dust-ion-acoustic (DIA) waves in a dusty electronegative plasma (consisting of inertialess electrons, nonthermal positive ions, inertial negative ions, and extremely massive charge fluctuating dust) has been investigated by employing the reductive perturbation technique. It has been shown that the effects of nonthermal...
Wireless link in mobile cellular communication system is experienced by large and small scale fading. Since the link is Non Line of Sight (NLOS), therefore, severely affected by multipath fading. Adaptive equalizer is a widely used technique to neutralize the effect of multipath fading. In this paper, Frequency Domain Adaptive Filer (FDAF) and Leas...
One of the major challenges in wireless communications, especially in urban area, is to detect the digital data under different fading environment and additive white Gaussian noise (AWGN). In a two-hop wireless links, each link is affected by fading and noise which degrades the overall performance of the communication system. In this paper performa...
With the advent of 3G mobile communication system, the traffic of wired and wireless networks become voice/video-data integrated service. For real time operation of voice and video signals, circuit switch traffic or Markovian traffic is the best fitted but for data traffic where small amount of delay is tolerable, the non-Markovian traffic like ser...
This work is an approach to solve the limitations of WiMax with three operational band frequencies. As the license fee of the frequency band goes higher and not easy to get allotment, it is wise to look for solution to make effective use of the available band. This can be done by several features that will lead to a network to the peak of performan...
Different types of noise cancellation techniques are prevalent in recent literatures. The performance of a particular technique depends on mean, variance and maximum amplitude of error. At the same time the process time of signal and complexity of practical implementation of circuits is also a measuring tool for performance of a technique. The obje...
Different types of noise cancellation techniques are prevalent in recent literatures. The performance of a particular technique depends on mean, variance and maximum amplitude of error. At the same time the process time of signal and complexity of practical implementation of circuits is also a measuring tool for performance of a technique. The obje...
In alternate routing traffic, a compromise or tradeoff is made among cost of alternate routing traffic, the number of high usage circuit and overall blocking probability. Usually, analysis of such traffic model aims on detection of the number of high usage circuit for minimum trunk cost. The optimum cost of alternate routing traffic is best fitted...
This paper proposes two new methods to detect the fingerprints of different persons based on one-dimensional and two-dimensional discrete wavelet transformations (DWTs). Recent literature shows that fingerprint detection based on DWT requires less memory space compared to pattern recognition and moment-based image recognition techniques. In this st...
We evaluate performance of hierarchical network (overlay-underlay cellular system) based on convolution method under mixed offered traffic. In most of the cases, different offered traffic of a network follows different probability density functions and they are correlated in sharing channel environment and cannot be analyzed by equivalent random th...
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level quality of service (QoS) in wireless uplink. Blocking probability and outage probability are considered as call level and packet level QoS parameters respectively. These two...
The nonlinear propagation of dust-acoustic (DA) waves in a dusty plasma consisting of Boltzmann-distributed ions, vortex-like distributed electrons and mobile charge fluctuating positive dust has been investigated by employing the reductive perturbation method. The effects of dust grain charge fluctuation and the vortex-like electron distribution a...
The three-wave nonlinear decay instability of a dust-acoustic wave (DAW) into a dust-lower-hybrid wave and a low-frequency electromagnetic wave in a homogeneous, magnetized, and collisionless dusty plasma has been investigated analytically. Fluid equations coupled with Maxwell's equations have been employed to find the nonlinear response of the pla...
One of the most convenient way of analyzing antenna parameters using Rao-Wilton-Glisson (RWG) edge elements where the antenna surface is divided into a two dimensional array of very small triangle of alternately charged in continuous fashion. In this paper, the concept of RWG edge elements and method of moment (MoM) have been explored to determine...
Modulational instability of a high power laser radiation in a homogeneous unmagnetized piezoelectric semiconductor plasma has been investigated analytically. The fluid equations of quantum hydrodynamics coupled with the Maxwell’s equations have been employed to find the nonlinear response of electrons in the piezoelectric semiconductor. The analysi...
Single element antennas have very little capability of variation of antenna gain pattern. For a desired directivity, shape of beam and steer able beam, array antenna is widely used in wireless network. Relative magnitude of feed currents, relative phases or separation between antenna elements, geometrical configuration of array are responsible for...
One of the most convenient way of analyzing antenna parameters using Rao-Wilton-Glisson (RWG) edge elements where the antenna surface is divided into a two dimensional array of very small triangle of alternately charged in continuous fashion. In this paper, the concept of RWG edge elements and method of moment (MoM) have been explored to determine...
Some antennas like bowtie, spiral, log-periodic array and conical spiral are known as frequency independent in context of antenna parameters like input impedance, reflection coefficient, gain and radiation pattern. In this paper, the work is done on bowtie and spiral antenna due to their easy construction and implementation. Although both the anten...
In a mobile cellular network, both new originating calls and handoff calls can be dropped at any time in the midst of a conversation when a user enters in a dead spot. Because of this, there is always some discrepancy between traffic originated by the mobile station (MS) and that of received by the base station (BS). A probability model is used in...
Two-dimensional (2D) and three-dimensional (3D) steady state Markov chains are widely used to analyze the traffic performance of communications networks. When the characteristics of the network changes with time, such steady state Markov chain is unable to determine different probability states. Markov Modulated Poisson Process (MMPP) is a special...
In this paper, both equal power and water filling models are simulated for comparison of their performance in a multiple-input multiple-output environment. The effects of fast fading and the shadowing effects have been incorporated in the models. Minimum eigenvalue required for successful transmission for individual link is evaluated from the proba...