Publications of IIUC Family
Permanent URI for this communityhttp://dspace.iiuc.ac.bd/handle/88203/9
Browse
16 results
Search Results
Item Sufficient Condition and Algorithm for Hamiltonian in 3-Connected 3-Regular Planar Bipartite Graph(International Journal of Computer Applications, 2015-05) Khaliluzzaman, Md.; Islam, Md. Monirul; Hasan, Md.MonjurA graph G (V, E) is said to be Hamiltonian if it contains a spanning cycle. The spanning cycle is called a Hamiltonian cycle of G and G is said to be a Hamiltonian graph. A Hamiltonian path is a path that contains all the vertices in V (G) but does not return to the vertex in which it began. In this paper, we study Hamiltonicity of 3-connected, 3-regular planar bipartite graph G with partite sets V=M N. We shall prove that G has a Hamiltonian cycle if G is balanced with M = N. For that we present an algorithm for a bipartite graph KM,N where M>3, N>3 and M,N both are even to possess a Hamiltonian cycle. In particular, we also prove a theorem for S proper subset (M or N) of V the number of components W (G-S) = S implies the graph has a Hamiltonian pathItem Study on Performance Analysis of HQAM for DCT and DWT Based Compressed Image Transmission over AWGN Channel(International Journal of Computer Science, 2017-05) Karim, Rezaul; Pervin, Shahela; Ima, Umme Moon; Khaliluzzaman, Md.Image transmission over a noisy channel is vital in the recent time because of reliable multimedia transmission. This topic has gained importance for the purpose of achieving less storage capacity and required bandwidth during transmitting the image through a noisy channel. In this paper, prior exertions of compressed image transmission are illustrated. These exertions are based on two compressed methods i.e., Discrete Wavelet transform (DWT) and Discrete Cosine Transform (DCT). Furthermore, overviews of the polar coding are presented which are used as encoder and decoder for converting the compressed quantized values to binary code streams. In addition, the overall advantages of the HQAM over the QAM modulation scheme are demonstrated in this paper. Finally, by exploring the preceding efforts, a method is proposed for future work. In the proposed method the performance of HQAM is analyzed for DWT and DCT after transmitting the image through the noisy AWGN channel.Item Stairways detection based on approach evaluation and vertical vanishing point(Int. J. Computational Vision and Robotics, 2018) Khaliluzzaman, Md.; Deb, KaushikStair region detection and distance estimation from a stair image are challenging activities to support visually impaired navigation safely in unknown environments. In this paper, a framework is proposed for detecting stair region from a stair image utilising some natural and unique property of a stair. One unique property of them is, every stair step’s beginning and ending horizontal edge point intersects with two vertical edge points creating three connected point (TCP). The TCPs are used to validate the stair edge segments and calculate the vertical vanishing point to justify the stair edges. This justification ensures that validated edge segments are arranged in an increasing parallel order which is the other unique property of a stair. These increasing edge segments are verified by utilising the y coordinate value of the vanishing point and the detection of stair candidate region is confirmed by these properties. In addition, the triangular similarity is used for distance estimation from camera to stair. The proposed framework is tested using various stair images under a variety of conditions and results are presented to demonstrate the efficiency and effectiveness.Item Performance Analysis of Digital Communication Systems in Presence of AWGN Implementing Filter Technique(International Journal of Computer Applications, 2015-12) Chy., Deepak Kumar; Khaliluzzaman, Md.; Faruque, FaisalIn digital communication system, data must encounter in a band limited environment. The fact is that constraining the bandwidth of the transmitted signal necessarily increases the probability of BER at the receiver. The system performance in terms of BER is evaluated with as well as without filter developing digital communication model. The likelihood of BER and SER is compared. The results show that Raised Cosine filter exhibits almost equal performance in comparison with rest of the filters. The worst case scenario is obtained while introducing no filtering technique despite applying the modulation scheme QAM. Roll off factor 0.22 has taken into account as Raised cosine filter act as FIR filter at that factor. In this paper inter symbol interference (ISI) is examined and it is seen that ISI plays an important role in digital communication systems. It is also observed that overall transmission errors are less while increasing the ratio of bit energy per symbol (Eb/N0). MATLAB communication environment has been used for simulationItem Improving the Performance of Data Delivery in Wireless Sensor Networks(Journal of Telecommunications, 2011-05) Karim, Rezaul; Furhad, Hasan; Khaliluzzaman, Md.; Khandaker, Ariful IslamA wireless sensor network is a group of sensors that are geographically distributed and interconnected by wireless networks. Sen sors gather information about the state of physical world. Reliable data transfer is an important facet of dependability and quality of service (QoS) in WSNs. Supporting QoS will be of critical importance for pervasive WSNs that serve as the network infrastructure of diverse applica tions. This paper gives us idea about QoS concepts as well as how can we achieve better reliability in WSNs. Thus, we first review about WSNs as well as sensor nodes, analyze new QoS requirements in WSNs from a wide variety of applications classified by data delivery models and propose QoS in WSNs considering the packet to be small in size so that it can travel faster through the network by avoiding collision. In this way we can improve the Quality of Service in the network. Finally we presented our simulation by NS-2 (Network Simulator).Item Improving Handover Performance in HMIPv6 Using Area Border Routers in Wireless Mobile Networks(Journal of Telecommunications, 2012-03) Khaliluzzaman, Md.; Chy., Deepak Kumar; Akter, MadinaHierarchical Mobile IPv6 (HMIPv6) introduces a mobility anchor point (MAP) that localizes the signaling traffic and hence reduces the handoff latency. To support inter-area handovers, several methods have been proposed in the literature to address the challenging problems of minimizing the handoff signaling delay and call blocking probability for Hierarchical Mobile IP version 6 (HMIPV6). In this paper, we propose a new concept for inter area handovers to solve signaling delay and call blocking probability. In this concept, the border zone is made between two different neighboring cells. Each neighboring cells is assigned as MAP region. Since the border zone is an overlapping MAP region, MHs can maintain the same MAP as long as they remain inside the border zone.Item HActivityNet: A Deep Convolutional Neural Network for Human Activity Recognition(EMITTER International Journal of Engineering Technology ‐ Published by EEPIS, 2021-12) Khaliluzzaman, Md.; Sayem, Abu Bakar Siddiq; Misbah, Lutful KaderHuman Activity Recognition (HAR), a vast area of a computer vision research, has gained standings in recent years due to its applications in various fields. As human activity has diversification in action, interaction, and it embraces a large amount of data and powerful computational resources, it is very difficult to recognize human activities from an image. In order to solve the computational cost and vanishing gradient problem, in this work, we have proposed a revised simple convolutional neural network (CNN) model named Human Activity Recognition Network (HActivityNet) that is automatically extract and learn features and recognize activities in a rapid, precise and consistent manner. To solve the problem of imbalanced positive and negative data, we have created two datasets, one is HARDataset1 dataset which is created by extracted image frames from KTH dataset, and another one is HARDataset2 dataset prepared from activity video frames performed by us. The comprehensive experiment shows that our model performs better with respect to the present state of the art models. The proposed model attains an accuracy of 99.5% on HARDatase1 and almost 100% on HARDataset2 dataset. The proposed model also performed well on real data.Item Face and Hand Gesture Recognition Based Person Identification System using Convolutional Neural Network(International Journal of Intelligent Systems and Applications in Engineering, 2022-02-07) Kabisha, Mysha Sarin; Rahim, Kazi Anisa; Khaliluzzaman, Md.; Khan, Shahidul IslamPerson identification system is now become the most hyped system for security purpose. It’s also gaining a lot of attention in the field of computer vision. For verification of human, facial recognition and hand gesture recognition are the most common topics of research. In the current days, various researchers focused on facial and hand gesture recognition using various shallow techniques and Deep Convolutional Neural Network (DCNN). However, using one feature of human for person identification is the most researched topic till now. In this paper, we proposed a Convolutional Neural Network (CNN) based system which will identify a person using two traits i.e., face and hand gesture of number sign of that person. For feature extraction and recognition Neural Network have shown immense good result. This proposed system works on two models, one is a VGG16 architecture model for face recognition and another model is for hand gesture which is based on simple CNN with two convolutional layers. With two customized dataset our face model gained 98.00% accuracy and hand gesture (number sign) model gained an accuracy of 98.33%.Item Evaluation of SNR for AWGN, Rayleigh and Rician Fading Channels Under DPSK Modulation Scheme with Constant BER(International Journal of Wireless Communications and Mobile Computing, 2015-02-06) Chy., Deepak Kumar; Khaliluzzaman, Md.With the growing demand in modern communication, it has become necessary to give better and efficient service to users by using better technique. Technique such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), Differential Phase shift Keying (DPSK) and Quadrature Amplitude Modulation (QAM) are very important parts of the implementation of modern communications systems in which DPSK is the simplest and most robust of all techniques. In this paper, evaluation of SNR in terms of constant bit error rate is performed on AWGN, Rayleigh and Rician fading channels. Among these channels, Rician is showing better performance as compared to AWGN and RayleighItem Enhancing the Bandwidth of a Microstrip Patch Antenna at 4 GHz for WLAN using H-shaped Patch(International Journal of Innovative Science, Engineering & Technology, 2015-02) Khaliluzzaman, Md.; Chy., Deepak kumar; Chowdhury, Rezanul HaqueThis paper presents A H-shaped wide band micostrip patch antenna at 4 GHz for WLAN applications. Performance is improved by inserting a pair of slits in an appropriate radiating edge to form H-Shaped patch antenna. The proposed antenna designed in this paper exhibits enhanced bandwidth with multi resonant frequencies. In this work a geometric H-shaped is developed from a rectangular patch of the width (W=29.6 mm) and length (L=24.5 mm). The antenna was fabricated using Rogers RT-5880 substrate with a dielectric constant εr of 2.2 and a thickness of 1.574 mm respectively. The result of proposed antenna was obtained in terms of Return Loss and bandwidth. The simulated result shows that the H-shaped patch antenna has the highest bandwidth in comparison with Parasitic patch antenna, Stacked patch antenna, Proximity coupled patch antenna and E-shaped patch antenna.