Md. Imdadul Islam

Md. Imdadul Islam
Jahangirnagar University

Doctor of Philosophy

About

184
Publications
30,631
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
511
Citations
Introduction
Wireless network, machine learning, digital signal and image processing.
Additional affiliations
July 1996 - present
Jahangirnagar University
Position
  • Professor

Publications

Publications (184)
Article
Full-text available
Abstract: Recently data clustering algorithm under machine learning are used in ‘real-life data’ to segregate them based on the outcome of a phenomenon. In this paper, diabetes is detected from pathological data of 768 patients using four clustering algorithms: Fuzzy C-Means (FCM), K-means clustering, Fuzzy Inference system (FIS) and Support Vector...
Article
Full-text available
A huge number of algorithms are found in recent literature to de-noise a signal or enhancement of signal. In this paper we use: static filters, digital adaptive filters, discrete wavelet transform (DWT), backpropagation, Hopfield neural network (NN) and convolutional neural network (CNN) to de-noise both speech and biomedical signals. The relative...
Article
Full-text available
In this paper, we proposed a machine learning and computer vision-based automated apple disease detection and recognition system based on leaf symptoms. The proposed method is composed of three parts: diseased region segmentation, feature extraction, and classification. We have segmented the infected portion of the leaf using L*a*b* space-based col...
Article
Full-text available
In this paper, we use three machine learning techniques: Linear Discriminant Analysis (LDA) along different Eigen vectors of an image, Fuzzy Inference System (FIS) and Fuzzy c-mean clustering (FCM) to recognize objects and human face. Again, Fuzzy c-mean clustering is combined with multiple linear regression (MLR) to reduce the four dimensional var...
Article
Full-text available
The performance of a cognitive radio network (CRN) mainly depends on the faithful signal detection at fusion center (FC). In this paper, the concept of weighted fuzzy rule in Iris data classification, as well as, four machine learning techniques named fuzzy inference system (FIS), fuzzy c-means clustering (FCMC), support vector machine (SVM) and co...
Article
Full-text available
In wired communication, the point-to-point traffic model is used to determine the blocking probability for four different types of network topology: i) links are in series, ii) links are in parallel, iii) links are in a combination of series and parallel and iv) complex topology where links are neither series nor parallel like the delta-star networ...
Article
Full-text available
In a wireless network, it is necessary to make the security of the network so high that eavesdroppers cannot intercept the messages. If a key message is divided into several blocks and sent to different transmitters around the receiver, then the eavesdroppers cannot retrieve the actual key in case of missing any blocks of the key messages. Cooperat...
Article
Full-text available
In a mobile cellular network, users are located at a random position inside the cell. Sometimes users are highly concentrated in a region for example vicinity of a growth center on a holiday or near a stadium when a big football match is going on. In this case, a group of users under a convex hull can be covered by the beam of the adaptive Array An...
Article
Full-text available
The structure of any Bangla numerical character is more complex compared to English numerical character. Two pairs of numerical character in Bangla resembles to be closed and they are: "one and nine" and "five and six". We found that, handwritten Bangla numerical character cannot be recognized using single machine learning algorithm or discrete wav...
Article
Full-text available
One of the major challenges of the dual-hop energy harvesting (EH) a link is, to optimize the link parameters to achieve maximum signal to noise ratio (SNR) at the receiving end. In this paper, the optimum condition of three parameters: ‗power supply at source terminal', ‗power splitting ratio', and ‗gain of relay' is achieved in four ways. In the...
Article
Full-text available
In this paper, we compare the normalized channel capacity of single user and multiuser models of primary user (PU) aided cognitive radio network (CRN). The single user model gives the best performance; however, it often fails to represent the real life environment. On the other hand, multiuser model represents more realistic scenarios of wireless l...
Article
Full-text available
We consider the integrated service of LTE-WLAN network to share the common unlicensed spectrum. Recent literature shows that among different CSMA/CA, the adaptive Listen-Before-Talk (LBT) is the best fitted for coexistence of LTE and Wi-Fi network hence modified Bianchi’s state transition chain is suitable to balance two different access techniques...
Article
Full-text available
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to bridge the E-UTRAN and Evolved Packet Core (EPC). All...
Thesis
The analysis of environmental daily evaporation plays a vital role in the field of agriculture. It is very essential to know the daily evaporation rate of a particular area for proper cultivation. So, we need a standard prediction model which can predict the daily evaporation. In this paper, we use subtractive clustering and Fuzzy logic to predict...
Article
Full-text available
:The aim of the paper is to detect object using the combination of three algorithms: convolutional neural network (CNN) and extended speeded up robust features (SUFR) and Fuzzy inference system (FIS). Here three types of objects are considered: first, we consider RGB images of hundred different types of objects (for example anchor, laptop airplane,...
Article
Full-text available
In dual-hop wireless link, the cooperative relayed link shows better performance compared to single relayed communication case. In this paper we consider the received SNR (signal to noise ratio) of cooperative relay network as a random variable (r.v.) then we derive cdf (cumulative distribution function) and pdf (probability density function) of re...
Article
Full-text available
Recently power saving is a vital issue for wireless devices of 4G and 5G networks. A device enters in sleeping mode (short and long sleep cycle) when there is no arrival of traffic but wakeup once the arrival of traffic. Before wakeup, the UE user equipment (UE) spends the rest of the sleeping cycle which incurs a delay of service. There is a trade...
Article
Full-text available
To enhance the accuracy of object recognition, various combination of recognition algorithms are used in recent literature. In this paper coherence of Discrete Wavelet Transform (DWT) is combined with four different algorithms: error vector of principal component analysis (PCA), eigen vector of PCA, eigen vector of Linear Discriminant Analysis (LDA...
Article
Full-text available
The abbreviation of MANET stands for Mobile Ad hoc NETwork. Nodes in the network can organized and configured by themselves without any kind of permanent infrastructures. All of these extreme features make MANET to be used widely in this contemporary time. In MANET nodes can communicate to each other neither the need of any kind of pre-existing inf...
Conference Paper
Full-text available
Aus, Aman and Boro are the three major seasons of rice cultivation in Bangladesh. Boro rice is generally cultivated in November to March. Over half of the total production is achieved in this season. Farmers use more than the recommended seed rate in seed bed because they use excessive number of seedlings during transplanting. Number of eedling den...
Article
Full-text available
: In this paper we compare and analyze the complexity of three functions: Fast Fourier transform (FFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT), used in image transformation. The purpose of all the algorithms is to shift the signal from space or time domain to frequency domain for de-noising or compression. We compare t...
Article
Full-text available
To cope with the demand and supply of electrical load of an interconnected power system of a country, we need to forecast its demand in advance.In this paper, we use a fuzzy system to forecast electrical load on short-term basis. Here, we consider temperature, humidity, seasons of a year and time segments of a day as the parameters, which govern th...
Article
Full-text available
In this paper a set of facial image of same person is considered as the scatter points and a straight line is drawn using linear regression. The mean error against the scatter points of same image are evaluated using mean square distance of points from the line. The mean error against the scatter points of images other person is evaluated on the pr...
Article
Full-text available
Digital filter bank of DWT (discrete wavelet transform) provides the approximate and detail components of a signal, whereas the perfection of the filter bank depends on recovery of the signal. In this paper, we convert an image into a one dimensional signal vector then the perfection of the filter bank is observed on recovery of signal vector hence...
Article
Full-text available
The performance of a cognitive radio network depends on, how successfully the secondary user (SU) can detect the presence of the primary user (PU) and recognize the false alarm which arises from interferences. In this paper, we determine the profile of the probability of detection (P d) and the probability of false alarm (P f) of a secondary user u...
Article
Full-text available
One of the features of Long Term Evolution (LTE) is the deployment of fem-tocells as the underlain cell of a macrocell without any intervention of fre-quency planning to offload the traffic. In this paper we used Markov chain to derive the expression of blocking probability for both macro and femtocell in terms of traffic parameters of the network....
Article
Full-text available
The performance of a CRN (cognitive radio network) solely depends of detection of a primary user (PU) under spectrum sensing on the traffic channel. In a fusion center (FC) of a CRN the SNR (signal to noise ratio) of several CR are combined under combining scheme (MRC, EGC or SC) to take the decision of presence or absence (called Hypothesis H1 or...
Article
Full-text available
In image processing colour segmentation is used to extract features of an object in both special and frequency domains. The objective of this paper is to use colour segmentation technique to identify the defected region of fruits and corresponding percentage of frequency components from its Spectrogram. Here we separate the defective portion of fru...
Article
Full-text available
Frequency of Biomedical signals are low, hence contaminated by surrounding environmental signal and interfered by other biomedical signal of same person, conducted through his body. The main objective of this paper is to eliminate both the noise and interference part of the biomedical signal using adaptive algorithm. Here, we consider two signals:...
Article
Full-text available
Halftoning of image is a way of compressing both RGB and grayscale image where instead of continuous levels or tone of pixels, only two discrete levels of pixels are considered. Actually a halftone image resembles a binary image in context of bits of pixels but the size and shape of pixels are modified to make it better in visualization. In this pa...
Article
Full-text available
In this paper person identification is done based on sets of facial images. Each facial image is considered as the scattered point of logistic regression. The vertical distance of scattered point of facial image and the regression line is considered as the parameter to determine whether the image is of same person or not. The ratio of Euclidian dis...
Article
Full-text available
In adaptive beamforming system adaptive algorithm of digital filter is applied to update the weighting vector of the antenna elements to get antenna gain along the desired direction and attenuation along the jammer. The objective of the paper is to evaluate the threshold gain of the adaptive beam former along the line of sight (LOS) between the tra...
Article
Full-text available
One of the main applications of image processing is recognition of human face. In this paper, we worked on several benchmark databases of human face to identify a person based on Linear Regression, SVM (Support Vector Machine and Viola-Jones Object detector), LDA (linear discriminant analysis) and PCA (Principal Component Analysis). All the four me...
Article
Full-text available
One of the major objectives of wireless network is to save energy of UE and radio equipment of Node-B. The discontinuous reception (DRX) is widely used in LTE-A mobile communication system. The recent literature use 3 to 5 state Markov chain to model DRX and show that the performance of N state model is better than N-1 state. This paper provides a...
Article
Full-text available
Two widely used methods of orthogonal decomposition of image: PCA and LDA are prevalent in human face detection. The size of an eigen vector of LDA is 1×N; where the size of facial image is N×N. To reduce the size of a vector, carrying feature of an image we apply DWT n times to deduce the approximate and detail coefficient vector 2n times. The st...
Article
Full-text available
In many applications, it is necessary to compare two or more images to identify the originality of them. For example, verification of fake logo of an organization or fake signature of an official can be considered in this context. The cross correlation and wavelet transform are widely used techniques to compare two images but they are low sensitive...
Article
Full-text available
In this paper, we show the explicit analytical model of CSI (Channel State Information) and Fixed Gain Relay of 2-hop wireless link under dissimilar fading environment. The two schemes can be compared in context of common fading condition and common amplitude of signal. The CSI scheme is alike adaptive algorithm to provide optimum result at the exp...
Article
Full-text available
To simulate the distribution of surface current and radiation pattern of single antenna or array antenna system (AAS) the Rao-Wilton-Glisson (RWG) edge elements are widely used in recent literatures. In this paper we consider four different types of antenna element: linear spiral antenna (known as frequency independent antenna), slot antenna, dipol...
Article
Full-text available
In this paper, we compare the normalized channel capacity of cooperative cognitive radio network using the concept of combined SNR (signal to noise ratio) of 2-hop wireless link and the fading factor model under SIR (signal to interference ratio) of previous work. Three small scale fading models-Rayleigh, Nakagami-m and Lognormal-are used to determ...
Article
Full-text available
In this paper, we deal with physical layer security of a wireless network where the secrecy capacity of the link is considered as the parameter. The impact of received signal to noise ratio (SNR) of legitimate/authorized user, the number of transmitting/receiving antenna elements of multiple input multiple output (MIMO) along with antenna elements...
Article
Full-text available
One of the major applications of pattern recognition is human face identification; where a lot of face recognition algorithms are found in recent literature. In this paper we made human face identification using a different approach called: 'orthogonal eigen decomposition', using the concept of uncorrelated MIMO (Multiple-input Multiple-output) cha...
Article
Full-text available
The rapid changes in wireless communications are going on for last three decades. Still the major problem of wireless communication is the proper detection of signal under large and small scale fading condition of wireless link specially in dense urban area. The situation is more severe in Wireless Metropolitan Area Network (WMAN) where the length...
Conference Paper
Full-text available
One of the major objectives of wireless network is to save energy of UE and radio equipment of Node-B. The discontinuous reception (DRX) is widely used in LTE-A mobile communication system. The recent literature use 3 to 5 states Markov chain to model DRX and show that the performance of N state model is better than N-1 state. This paper provides...
Conference Paper
Full-text available
The relation between offered traffic and the length of frame taking the batch size as a parameter are nonlinearly related under Batch Markovian Arrival Process (BMAP). Therefore the prediction of carried traffic and blocking probability against the length of frames or the batched size becomes more complicated compared to conventional packet or circ...
Conference Paper
Full-text available
The prime objective of LTE (Long-term evolution) mobile cellular network is to ensure high speed data with good QoS. In LTE femtocellular network the tiny femtocell are integrated with macrocell to transfer overflow traffic (off loading) from macrocell to femtocell. A dense femtocellular network experiences frequent handover and huge interferences....
Article
Full-text available
In a mobile cellular network there are two user groups: users inside the cell responsible for newly originating call and users enter the cell from surrounding cells responsible for handover call. In this paper we assume that the number of users inside a microcell is far larger than the handover users therefore the PCT-I (Pure Chance Traffic I) traf...
Article
Full-text available
The digital filter bank is an alternative method of discrete wavelet transform (DWT). The LP (lowpass) and HP (highpass) filters of a filter bank can be either Finite Impulse Response (FIR) or Infinite Impulse Response (IIR) filter. The objective of this paper is to compare the relative performance of Butterworth, Chebyshev Type I, Chebyshev Type I...
Article
Full-text available
One of the breakthroughs of LTE is the incorporation of MIMO (multiple input multiple output) between UE (user equipment) and eNB (Evolved node-B) to enhance the performance of wireless communication system. The adaptive beamforming of MIMO can minimize both transmitted power of UE/eNB and interference at the receiving end. In this paper, we emphas...
Article
Full-text available
To ensure good traffic handling, channel allocation is one of the important mobile communication resources for quality of service. Usually, three types of channel allocations are widely used: fixed channel allocation, borrowing radio channels from surrounding calls and dynamic channel allocations. In this paper instead conventional channel allocati...
Article
Full-text available
To achieve end-to-end maximum throughput, the wireless Internet access requires (a) sufficient SNR at evolved Node-Bs and UEs (user equipment) at physical layer and (b) congestion control algorithm in determining appropriate window size at transport layer. Considering above, the paper deals with both the layers for Femto cellular LTE network and re...
Article
Full-text available
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading; hen...
Article
Full-text available
Power saving is one of the key factors of emerging 4G mobile network as well as in IEEE 802.16e wireless metropolitan area networks (Wireless MAN). An efficient power saving mechanism is the heart for the guarantee of a long operating lifetime for a mobile subscriber station (MS), because MSs are normally driven by rechargeable batteries. It is a v...
Article
Full-text available
Energy efficiency plays vital roles in wireless communication system due to the “energy limited battery service” of a mobile station (MS). To ensure longer battery life in WiMAX, a new protocol has been introduced in its IEEE802.16m version. This new sleep mode has extended listening window and adjustable sleep cycle length. In this paper, we analy...
Article
Full-text available
Objective of this paper is to identify a person taking fingerprint as a biometric parameter using wavelet packet transform. Here both conventional discrete wavelet transform (DWT) and discrete wavelet packet transform (WPT) are used considering special basis function/matrix to extract the coefficients of basis functions those convey the most of the...
Article
Full-text available
The objective of cognitive radio network is to enhance the wireless network spectrum utilization. In such a network, two types of users are enlisted, namely primary user (PU) and secondary user (SU). The PU can access any channel in case of its availability, but SU users have lower priority and can access a channel only when it is unused by PUs. Th...
Article
Full-text available
The objective of this paper is to extract some distinct shape features of an image with combination of morphological operation and Gabor filtering. The main application of shape feature is to recognize a geometric shape, for example detection of fonts of a language but here we consider fingerprint as test case. Although core and minutia points (bif...
Conference Paper
The main objective of source coding is to represent the symbols or messages generated from an information source in a suitable form so that the size of the data is reduced. In image compression we use JPEG where huge number of zero is generated in medium and high frequency region of transformed image using the combination of DCT (Discrete Cosine Tr...
Article
Full-text available
The radiation pattern of an antenna depends on the type, size and parameters of feed current. To change the direction of maximum and minimum gain the mechanical steering is necessary. Electronic steering is only possible in array antenna system with adaptive feed current system. Relative magnitude of feed currents, relative phases or separation bet...
Article
In modern wireless communication, multiple-input multiple-output (MIMO) system plays an important role as it improves channel capacity, range and reliability without requiring any additional bandwidth or transmit power. This research presents a detailed analysis of capacity performance of MIMO systems under four fading cases i.e. Gaussian, Weibull,...
Article
Full-text available
In evaluating the performance of a dual-hop wireless link, the effects of large and small scale fading has to be considered. To overcome this fading effect, several schemes, such as multiple-input multiple-output (MIMO) with orthogonal space time block codes (OSTBC), different combining schemes at the relay and receiving end, and orthogonal frequen...
Article
Full-text available
To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1 st hop and relay to receiver called 2 nd hop; such arrangement is called two hop wireless links. In two-hop wireless communication sometimes 1 st and 2 nd hops are affected by differ...
Article
Full-text available
The performance of a cognitive radio network (CRN) solely depends on how precisely the secondary users can sense the presence or absence of primary users. The incorporation of a spatial false alarm makes deriving the probability of a correct decision a cumbersome task. Previous literature performed this task for the case of a received signal under...
Article
Full-text available
To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we...
Article
Full-text available
In recent days intense research is taking place on energy efficiency (EE) of a multi-user wireless network. In this paper we propose a model to detect EE based on limited user traffic model. We observe the variation of EE against the number of users and energy signal to noise ratio engaged by the user. The impact of enhancement of subcarriers on EE...
Article
Full-text available
In this paper, the average probability of the symbol error rate (SER) and throughput are studied in the presence of joint spectrum sensing and data transmission in a cognitive relay network, which is in the environment of an optimal power allocation strategy. In this investigation, the main component in calculating the secondary throughput is the i...
Article
Full-text available
Now-a-days optimum utilization of spectrum of a wireless network is performed based on Cognitive Radio (CR) system. In this paper performance of such network is evaluated using two dimensional Markov chain under limited user case. The closed form expression for throughput and call blocking probability is derived in terms of traffic parameters. The...
Article
Full-text available
Rao-Wilton-Glisson (RWG) edge elements are widely used to determine the performance of an antenna specially the distribution of elemental dipole on the antenna surface, surface current distribution, p