Md. Imdadul IslamJahangirnagar University
Md. Imdadul Islam
Doctor of Philosophy
About
184
Publications
30,631
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
511
Citations
Introduction
Wireless network, machine learning, digital signal and image processing.
Additional affiliations
July 1996 - present
Publications
Publications (184)
Abstract: Recently data clustering algorithm under machine learning are used in ‘real-life data’ to segregate them based on the outcome of a phenomenon. In this paper, diabetes is detected from pathological data of 768 patients using four
clustering algorithms: Fuzzy C-Means (FCM), K-means clustering, Fuzzy Inference system (FIS) and Support Vector...
A huge number of algorithms are found in recent literature to de-noise a signal or enhancement of signal. In this paper we use: static filters, digital adaptive filters, discrete wavelet transform (DWT), backpropagation, Hopfield neural network (NN) and convolutional neural network (CNN) to de-noise both speech and biomedical signals. The relative...
In this paper, we proposed a machine learning and computer vision-based automated apple disease detection and recognition system based on leaf symptoms. The proposed method is composed of three parts: diseased region segmentation, feature extraction, and classification. We have segmented the infected portion of the leaf using L*a*b* space-based col...
In this paper, we use three machine learning techniques: Linear Discriminant Analysis (LDA) along different Eigen vectors of an image, Fuzzy Inference System (FIS) and Fuzzy c-mean clustering (FCM) to recognize objects and human face. Again, Fuzzy c-mean clustering is combined with multiple linear regression (MLR) to reduce the four dimensional var...
The performance of a cognitive radio network (CRN) mainly depends on the
faithful signal detection at fusion center (FC). In this paper, the concept of
weighted fuzzy rule in Iris data classification, as well as, four machine
learning techniques named fuzzy inference system (FIS), fuzzy c-means
clustering (FCMC), support vector machine (SVM) and co...
In wired communication, the point-to-point traffic model is used to determine the blocking probability for four different types of network topology: i) links are in series, ii) links are in parallel, iii) links are in a combination of series and parallel and iv) complex topology where links are neither series nor parallel like the delta-star networ...
In a wireless network, it is necessary to make the security of the network so high that eavesdroppers cannot intercept the messages. If a key message is divided into several blocks and sent to different transmitters around the receiver, then the eavesdroppers cannot retrieve the actual key in case of missing any blocks of the key messages. Cooperat...
In a mobile cellular network, users are located at a random position inside the cell. Sometimes users are highly concentrated in a region for example vicinity of a growth center on a holiday or near a stadium when a big football match is going on. In this case, a group of users under a convex hull can be covered by the beam of the adaptive Array An...
The structure of any Bangla numerical character is more complex compared to English numerical character. Two pairs of numerical character in Bangla resembles to be closed and they are: "one and nine" and "five and six". We found that, handwritten Bangla numerical character cannot be recognized using single machine learning algorithm or discrete wav...
One of the major challenges of the dual-hop energy harvesting (EH) a link is, to optimize the link parameters to achieve maximum signal to noise ratio (SNR) at the receiving end. In this paper, the optimum condition of three parameters: ‗power supply at source terminal', ‗power splitting ratio', and ‗gain of relay' is achieved in four ways. In the...
In this paper, we compare the normalized channel capacity of single user and multiuser models of primary user (PU) aided cognitive radio network (CRN). The single user model gives the best performance; however, it often fails to represent the real life environment. On the other hand, multiuser model represents more realistic scenarios of wireless l...
We consider the integrated service of LTE-WLAN network to share the common
unlicensed spectrum. Recent literature shows that among different CSMA/CA, the adaptive Listen-Before-Talk (LBT) is the best fitted for coexistence of LTE and Wi-Fi network hence modified Bianchi’s state transition chain is suitable to balance two different access techniques...
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to bridge the E-UTRAN and Evolved Packet Core (EPC). All...
The analysis of environmental daily evaporation plays a vital role in the field of agriculture. It is very essential to know the daily evaporation rate of a particular area for proper cultivation. So, we need a standard prediction model which can predict the daily evaporation. In this paper, we use subtractive clustering and Fuzzy logic to predict...
:The aim of the paper is to detect object using the combination of three algorithms: convolutional neural network (CNN) and extended speeded up robust features (SUFR) and Fuzzy inference system (FIS). Here three types of objects are considered: first, we consider RGB images of hundred different types of objects (for example anchor, laptop airplane,...
In dual-hop wireless link, the cooperative relayed link shows better performance compared to single relayed communication case. In this paper we consider the received SNR (signal to noise ratio) of cooperative relay network as a random variable (r.v.) then we derive cdf (cumulative distribution function) and pdf (probability density function) of re...
Recently power saving is a vital issue for wireless devices of 4G and 5G networks. A device enters in sleeping mode (short and long sleep cycle) when there is no arrival of traffic but wakeup once the arrival of traffic. Before wakeup, the UE user equipment (UE) spends the rest of the sleeping cycle which incurs a delay of service. There is a trade...
To enhance the accuracy of object recognition, various combination of recognition algorithms are used in recent literature. In this paper coherence of Discrete Wavelet Transform (DWT) is combined with four different algorithms: error vector of principal component analysis (PCA), eigen vector of PCA, eigen vector of Linear Discriminant Analysis (LDA...
The abbreviation of MANET stands for Mobile Ad hoc NETwork. Nodes in the network can organized and configured by themselves without any kind of permanent infrastructures. All of these extreme features make MANET to be used widely in this contemporary time. In MANET nodes can communicate to each other neither the need of any kind of pre-existing inf...
Aus, Aman and Boro are the three major seasons of rice cultivation in Bangladesh. Boro rice is generally cultivated in November to March. Over half of the total production is achieved in this season. Farmers use more than the recommended seed rate in seed bed because they use excessive number of seedlings during transplanting. Number of eedling den...
: In this paper we compare and analyze the complexity of three functions: Fast Fourier transform (FFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT), used in image transformation. The purpose of all the algorithms is to shift the signal from space or time domain to frequency domain for de-noising or compression. We compare t...
To cope with the demand and supply of electrical load of an interconnected power system of a country, we need to forecast its demand in advance.In this paper, we use a fuzzy system to forecast electrical load on short-term basis. Here, we consider temperature, humidity, seasons of a year and time segments of a day as the parameters, which govern th...
In this paper a set of facial image of same person is considered as the scatter points and a straight line is drawn using linear regression. The mean error against the scatter points of same image are evaluated using mean square distance of points from the line. The mean error against the scatter points of images other person is evaluated on the pr...
Digital filter bank of DWT (discrete wavelet transform) provides the approximate and detail components of a signal, whereas the perfection of the filter bank depends on recovery of the signal. In this paper, we convert an image into a one dimensional signal vector then the perfection of the filter bank is observed on recovery of signal vector hence...
The performance of a cognitive radio network depends on, how successfully the secondary user (SU) can detect the presence of the primary user (PU) and recognize the false alarm which arises from interferences. In this paper, we determine the profile of the probability of detection (P d) and the probability of false alarm (P f) of a secondary user u...
One of the features of Long Term Evolution (LTE) is the deployment of fem-tocells as the underlain cell of a macrocell without any intervention of fre-quency planning to offload the traffic. In this paper we used Markov chain to derive the expression of blocking probability for both macro and femtocell in terms of traffic parameters of the network....
The performance of a CRN (cognitive radio network) solely depends of detection of a primary user (PU) under spectrum sensing on the traffic channel. In a fusion center (FC) of a CRN the SNR (signal to noise ratio) of several CR are combined under combining scheme (MRC, EGC or SC) to take the decision of presence or absence (called Hypothesis H1 or...
In image processing colour segmentation is used to
extract features of an object in both special and frequency
domains. The objective of this paper is to use colour segmentation
technique to identify the defected region of fruits and
corresponding percentage of frequency components from its
Spectrogram. Here we separate the defective portion of fru...
Frequency of Biomedical signals are low, hence contaminated by surrounding environmental signal and interfered by other biomedical signal of same person, conducted through his body. The main objective of this paper is to eliminate both the noise and interference part of the biomedical signal using adaptive algorithm. Here, we consider two signals:...
Halftoning of image is a way of compressing both RGB and grayscale image where instead of continuous levels or tone of pixels, only two discrete levels of pixels are considered. Actually a halftone image resembles a binary image in context of bits of pixels but the size and shape of pixels are modified to make it better in visualization. In this pa...
In this paper person identification is done based on sets of facial images. Each facial image is considered as the scattered point of logistic regression. The vertical distance of scattered point of facial image and the regression line is considered as the parameter to determine whether the image is of same person or not. The ratio of Euclidian dis...
In adaptive beamforming system adaptive algorithm of digital filter is applied to update the weighting vector of the antenna elements to get antenna gain along the desired direction and attenuation along the jammer. The objective of the paper is to evaluate the threshold gain of the adaptive beam former along the line of sight (LOS) between the tra...
One of the main applications of image processing is recognition of human face. In this paper, we worked on several benchmark databases of human face to identify a person based on Linear Regression, SVM (Support Vector Machine and Viola-Jones Object detector), LDA (linear discriminant analysis) and PCA (Principal Component Analysis). All the four me...
One of the major objectives of wireless network is to save energy of UE and radio equipment of Node-B. The discontinuous reception (DRX) is widely used in LTE-A mobile communication system. The recent literature use 3 to 5 state Markov chain to model DRX and show that the performance of N state model is better than N-1 state. This paper provides a...
Two widely used methods of orthogonal decomposition of image: PCA and LDA are prevalent in human face detection. The size of an eigen vector of LDA is 1×N; where
the size of facial image is N×N. To reduce the size of a vector, carrying feature of an image we apply DWT n times to deduce the approximate and detail coefficient vector 2n times. The st...
In many applications, it is necessary to compare two or more images to identify the originality of them. For example, verification of fake logo of an organization or fake signature of an official can be considered in this context. The cross correlation and wavelet transform are widely used techniques to compare two images but they are low sensitive...
In this paper, we show the explicit analytical model of CSI (Channel State Information) and Fixed Gain Relay of 2-hop wireless link under dissimilar fading environment. The two schemes can be compared in context of common fading condition and common amplitude of signal. The CSI scheme is alike adaptive algorithm to provide optimum result at the exp...
To simulate the distribution of surface current and radiation pattern of single antenna or array antenna system (AAS) the Rao-Wilton-Glisson (RWG) edge elements are widely used in recent literatures. In this paper we consider four different types of antenna element: linear spiral antenna (known as frequency independent antenna), slot antenna, dipol...
In this paper, we compare the normalized channel capacity of cooperative cognitive radio network using the concept of combined SNR (signal to noise ratio) of 2-hop wireless link and the fading factor model under SIR (signal to interference ratio) of previous work. Three small scale fading models-Rayleigh, Nakagami-m and Lognormal-are used to determ...
In this paper, we deal with physical layer security of a wireless network where the secrecy capacity of the link is considered as the parameter. The impact of received signal to noise ratio (SNR) of legitimate/authorized user, the number of transmitting/receiving antenna elements of multiple input multiple output (MIMO) along with antenna elements...
One of the major applications of pattern recognition is human face identification; where a lot of face recognition algorithms are found in recent literature. In this paper we made human face identification using a different approach called: 'orthogonal eigen decomposition', using the concept of uncorrelated MIMO (Multiple-input Multiple-output) cha...
The rapid changes in wireless communications are going on for last three decades. Still the major problem of wireless communication is the proper detection of signal under large and small scale fading condition of wireless link specially in dense urban area. The situation is more severe in Wireless Metropolitan Area Network (WMAN) where the length...
One of the major objectives of wireless network is to save energy of UE and radio equipment of Node-B.
The discontinuous reception (DRX) is widely used in LTE-A mobile communication system. The recent literature use 3 to 5 states Markov chain to model DRX and show that the performance of N state model is better than N-1 state. This paper provides...
The relation between offered traffic and the length of frame taking the batch size as a parameter are nonlinearly related under Batch Markovian Arrival Process (BMAP). Therefore the prediction of carried traffic and blocking probability against the length of frames or the batched size becomes more complicated compared to conventional packet or circ...
The prime objective of LTE (Long-term evolution) mobile cellular network is to ensure high speed data with good QoS. In LTE femtocellular network the tiny femtocell are integrated with macrocell to transfer overflow traffic (off loading) from macrocell to femtocell. A dense femtocellular network experiences frequent handover and huge interferences....
In a mobile cellular network there are two user groups: users inside the cell responsible for newly originating call and users enter the cell from surrounding cells responsible for handover call. In this paper we assume that the number of users inside a microcell is far larger than the handover users therefore the PCT-I (Pure Chance Traffic I) traf...
The digital filter bank is an alternative method of discrete wavelet transform (DWT). The LP (lowpass) and HP (highpass) filters of a filter bank can be either Finite Impulse Response (FIR) or Infinite Impulse Response (IIR) filter. The objective of this paper is to compare the relative performance of Butterworth, Chebyshev Type I, Chebyshev Type I...
One of the breakthroughs of LTE is the incorporation of MIMO (multiple input multiple output) between UE (user equipment) and eNB (Evolved node-B) to enhance the performance of wireless communication system. The adaptive beamforming of MIMO can minimize both transmitted power of UE/eNB and interference at the receiving end. In this paper, we emphas...
To ensure good traffic handling, channel allocation is one of the important mobile communication resources for quality of service. Usually, three types of channel allocations are widely used: fixed channel allocation, borrowing radio channels from surrounding calls and dynamic channel allocations. In this paper instead conventional channel allocati...
To achieve end-to-end maximum throughput, the wireless Internet access requires (a) sufficient SNR at evolved Node-Bs and UEs (user equipment) at physical layer and (b) congestion control algorithm in determining appropriate window size at transport layer. Considering above, the paper deals with both the layers for Femto cellular LTE network and re...
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading; hen...
Power saving is one of the key factors of emerging 4G mobile network as well as in IEEE 802.16e wireless metropolitan area networks (Wireless MAN). An efficient power saving mechanism is the heart for the guarantee of a long operating lifetime for a mobile subscriber station (MS), because MSs are normally driven by rechargeable batteries. It is a v...
Energy efficiency plays vital roles in wireless communication system due to the “energy limited battery service” of a mobile station (MS). To ensure longer battery life in WiMAX, a new protocol has been introduced in its IEEE802.16m version. This new sleep mode has extended listening window and adjustable sleep cycle length. In this paper, we analy...
Objective of this paper is to identify a person taking fingerprint as a biometric parameter using wavelet packet transform. Here both conventional discrete wavelet transform (DWT) and discrete wavelet packet transform (WPT) are used considering special basis function/matrix to extract the coefficients of basis functions those convey the most of the...
The objective of cognitive radio network is to enhance the wireless network spectrum utilization. In such a network, two types of users are enlisted, namely primary user (PU) and secondary user (SU). The PU can access any channel in case of its availability, but SU users have lower priority and can access a channel only when it is unused by PUs. Th...
The objective of this paper is to extract some distinct shape features of an image with combination of morphological operation and Gabor filtering. The main application of shape feature is to recognize a geometric shape, for example detection of fonts of a language but here we consider fingerprint as test case. Although core and minutia points (bif...
The main objective of source coding is to represent the symbols or messages generated from an information source in a suitable form so that the size of the data is reduced. In image compression we use JPEG where huge number of zero is generated in medium and high frequency region of transformed image using the combination of DCT (Discrete Cosine Tr...
The radiation pattern of an antenna depends on the type, size and parameters of feed current. To change the direction of maximum and minimum gain the mechanical steering is necessary. Electronic steering is only possible in array antenna system with adaptive feed current system. Relative magnitude of feed currents, relative phases or separation
bet...
In modern wireless communication, multiple-input multiple-output (MIMO) system plays an important role as it improves channel capacity, range and reliability without requiring any additional bandwidth or transmit power. This research presents a detailed analysis of capacity performance of MIMO systems under four fading cases i.e. Gaussian, Weibull,...
In evaluating the performance of a dual-hop wireless link, the effects of large and small scale fading has to be considered. To overcome this fading effect, several schemes, such as multiple-input multiple-output (MIMO) with orthogonal space time block codes (OSTBC), different combining schemes at the relay and receiving end, and orthogonal frequen...
To enhance the reliability of long wireless link, a relay is placed between transmitter and receiver which break the link into two parts: transmitter to relay called 1 st hop and relay to receiver called 2 nd hop; such arrangement is called two hop wireless links. In two-hop wireless communication sometimes 1 st and 2 nd hops are affected by differ...
The performance of a cognitive radio network (CRN) solely depends on how precisely the secondary users can sense the presence or absence of primary users. The incorporation of a spatial false alarm makes deriving the probability of a correct decision a cumbersome task. Previous literature performed this task for the case of a received signal under...
To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we...
In recent days intense research is taking place on energy efficiency (EE) of a multi-user wireless network. In this paper we propose a model to detect EE based on limited user
traffic model. We observe the variation of EE against the number of users and energy signal to noise ratio engaged by the user. The impact of enhancement of subcarriers on EE...
In this paper, the average probability of the symbol error rate (SER) and throughput are studied in the presence of joint spectrum sensing and data transmission in a cognitive relay network, which is in the environment of an optimal power allocation strategy. In this investigation, the main component in calculating the secondary throughput is the i...
Now-a-days optimum utilization of spectrum of a wireless network is performed based on Cognitive Radio (CR) system. In this paper performance of such network is evaluated using two dimensional Markov chain under limited user case. The closed form expression for throughput and call blocking probability is derived in terms of traffic parameters. The...
Rao-Wilton-Glisson (RWG) edge elements are widely used to determine the performance of an antenna specially the distribution of elemental dipole on the antenna surface, surface current distribution, p