The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A multiple delayed model of HIV infection has been proposed in this paper. The first delay explains the time for an uninfected cell to become infected. This delay is termed as intracellular delay. The second delay known as the immunological delay describes the immune activation time. The basic reproduction number for the model has been given and the local stability analysis has been performed. The...
This work presents relay selection and beamwidth adaptation algorithms for millimeter-wave communication network by selecting best relay. Due to the high path loss, the mm-Wave links suffer from shadowling. Thus improving link availability is a challenge for the system designer. In this work, the link availability is further improved by optimal power allocation and beamwidth adaptation. The channel...
Network cardinality is very crucial factor to ensure proper functionality of a network. Because of inimitable properties of underwater environment (such as strong background noise, unavoidable capture effect, limited bandwidth, long propagation delay, high path loss, node mobility etc.) network cardinality estimation of underwater environment could be a severe challenge utilizing the subsisting protocol...
In cognitive radio network (CRN) three types of spectrum sensing techniques are widely used: matched filter detection, cyclostationary detection, and energy detection. Matched filter detection technique provides maximum SNR at receiving end but the detector need to be matched with the input signal i.e. impulse response of the system need to be made as the delayed version of mirror image of input signal...
In this paper, Hybrid of Particle Swarm Optimization (PSO) and Neuro-Fuzzy (NF) has been proposed for improving Vertical Hand-off (VHO) decision for the Ubiquitous Heterogeneous Wireless Network (UHWN). The mobile users have made VHO decision based on data-rate, dwelling time and service type, residue energy and network connection time. To reduce the computational complexity, the pre-decision of VHO...
In marine science, underwater sensor networking (UWSN) is the most important and interesting arena. A novel noise aware Level Based Routing Protocol (LBRP) is proposed in this paper to contribute in this field. The LBRP is essentially a level-based routing protocol. State information is not needed to be stored and only a small portion of the total nodes are engaged in routing. It also promises the...
Recommender system refers to an information system that predicts the intuition of user observing behavior of all the users. The idea of collaborative filtering lies in producing a set of recommendations based on similarity as well as knowledge of users' relationships to items. In this paper, we combine some traditional similarity metrics to find three types of similar users which are super similar,...
This paper presents an effective and efficient method for classifying text documents in order to deliver feasible information retrieval using naïve bayes algorithm. Today lots of algorithms have earned good score in the field of information retrieval, Naïve Bayes is one of them. In this paper, a Weight Matrix is introduced during training text documents which is combination of term frequency (TF)...
In continuously upgrading world, women belief in their self-worth. They have the same participation like men in almost every sector of life. But lives of women have become so vulnerable these days. Security of their lives is one of the burning questions. Everywhere they have to face unwanted incidents. Considering all the incidents towards female, this idea of Bluetooth security device aligned with...
A robust nonlinear adaptive controller design for unmanned autonomous vehicles (UAVs) for controlling the hovering flight is presented. The controller is premeditated recursively based on the control Lyapunov theory where the mass of the UAV in the model is considered as anonymous parameter. To illustrate the forcefulness property of the designed controller, the effects of external disturbances are...
Pseudo random sequences play an important role in cryptography and network security system. This paper proposes a new approach for generation of pseudo random sequence over odd characteristic field. The sequence is generated by applying a primitive polynomial over odd characteristic field, trace function and möbius function. Then, some important properties of the newly generated sequence such as period,...
Twitter has been exceedingly a ubiquitous phenomenon with a thriving appearance in almost every country in the world. In this modern epoch, game is one of the most popular genres to tweet. Furthermore, sentiment analysis is used to analyze the patent opinion of a person by mining text units i.e. tweets. In this paper, strategy based categories of virtual games were identified; top most countries according...
This paper presents the use of a generalized learning technique to automatically generate Bangla poetry. We have trained a Long Sort Term Memory (LSTM) based recurrent neural network model on 350 poems written by Rabindranath Tagore to inspect if the recurrent neural network learns to generate poems. Using the technique described in this paper, we are able to generate poems using seed texts provided...
Lip features and contour detection is an important aspect of computer vision, having many application domains. This research conveys various aspects of the related topics and presents an elliptical mathematical approach followed by image processing methods such as morphological operation to extract lip contour. Lip contour detection starts from mouth area which is segmented from face image area and...
Each year a large number of students apply for graduate studies into well-known universities all around the world. Students trying to pursue higher study in a better institution strengthen their academic profile by obtaining better CGPA, high scores in standardized tests like GRE, TOEFL, IELTS, noteworthy publication records. Some of the applicants become successful by getting admission in desired...
Wireless sensor networks are principally categorized by insufficient energy resource. Naturally, communication between the nodes is the utmost energy consuming act that they perform. Hence, development of a well-organized clustering algorithm can play a vital part in enhancing the lifetime of network. Currently, nature inspired methodologies are very common in dealing with it. This work presents a...
Two-stage clustering based approaches has been used for sequence classification. However, certain parameters of these process are either hand picked or found through exhaustive searches. In this paper we propose a simple regression based approach, derived from parameter values found in a previous study, which generalizes the method to find values of three different parameters through proposed equations...
Traditional fingerprint matching algorithms primarily focus on minutiae points on fingertip surface. In this paper, a novel approach is proposed for fingerprint matching that is based on ridge and valley characteristics of fingerprints. At first, the input fingerprint image is normalized and the registration point of that particular fingerprint is detected. Then a line profile is generated centering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.