The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A robust nonlinear adaptive controller design for unmanned autonomous vehicles (UAVs) for controlling the hovering flight is presented. The controller is premeditated recursively based on the control Lyapunov theory where the mass of the UAV in the model is considered as anonymous parameter. To illustrate the forcefulness property of the designed controller, the effects of external disturbances are...
MySQL is an open-source very popular RDBMS to store and manage data. But it faces difficulties of prolonged response time to handle big data. On the other hand, cloud is a perfect solution for managing and querying big data but it is not suitable to process small data due to delayed response time. In this paper, we propose a cloud-based solution that will improve response time and performance of the...
In continuously upgrading world, women belief in their self-worth. They have the same participation like men in almost every sector of life. But lives of women have become so vulnerable these days. Security of their lives is one of the burning questions. Everywhere they have to face unwanted incidents. Considering all the incidents towards female, this idea of Bluetooth security device aligned with...
Segmentation of images means a great matter for the medical field treatment purpose. For the extraction of brain polyps, magnetic resonance image (MRI) processing contributes in a wide range. Usually it works in two ways: white matter and gray matter. The extraction of any type of issues helps in submissions of image segmentation like in medical report analysis, in preparation of radiotherapy, in...
People nowadays cannot think of even a single moment without the internet. Doubtlessly, web applications are currently the key to all change in the world. The features and facilities of web applications make our lives easier and also demonstrate different channels of communication and exchange of data. The number of internet user is increasing day by day in Bangladesh. Web applications are not only...
A flexible planar textile antenna suitable for wearable applications has been designed at 2.4GHz. The effects of the dielectric substrates of the micro strip antenna have been investigated. Such materials are: fleece, denim and Velcro. Both edge mounted and vertical mounted excitation configurations are considered. It is observed that for edge mount, micro strip line feeding, antenna with fleece provides...
Lip features and contour detection is an important aspect of computer vision, having many application domains. This research conveys various aspects of the related topics and presents an elliptical mathematical approach followed by image processing methods such as morphological operation to extract lip contour. Lip contour detection starts from mouth area which is segmented from face image area and...
Motor Imagery (MI) is now highly adapted to control machine or computer by interfacing with brain or mind. This paper proposes a method to differentiate left, right and feet motor imagery movement according to two and three class classification using statistical features of the EEG signal of the subjects. For this purpose the collected EEG signals of three subjects are segmented and feed to discrete...
In this paper, design and development of a multiple sensors based fire extinguisher robot is proposed and implementation is demonstrated with a brief discussion of construction and operation. The developed fire extinguisher robot can be operated in multiple modes using the DTMF and Bluetooth remote control as well as GSM and GPS technology. Basically, three different sensors of flame sensor, temperature...
The main target of the approach presented in this paper is to recognize offline Bangla conjunct characters by Stroke Matching Based Approach. At first, the approach simplifies the word into strokes. Later, it matches the strokes with the one that is stored in the dataset. The approach reduces the noise and then works over the strokes. Up to now a lot of recognizers are available to recognize BOC (Bangla...
Sentiment Analysis (SA) is an opinion mining study analyzing people's opinions, sentiments, evaluations and appraisals towards societal entities such as products, services, individuals, organizations, events, etc. Of late, most of the research works on SA in natural language processing (NLP) are focused on English language. However, it is noted that Bangla does not have a proper dataset that is both...
Twitter has been exceedingly a ubiquitous phenomenon with a thriving appearance in almost every country in the world. In this modern epoch, game is one of the most popular genres to tweet. Furthermore, sentiment analysis is used to analyze the patent opinion of a person by mining text units i.e. tweets. In this paper, strategy based categories of virtual games were identified; top most countries according...
Handwritten digit recognition is a typical image classification problem. Convolutional neural networks, also known as ConvNets, are powerful classification models for such tasks. As different languages have different styles and shapes of their numeral digits, accuracy rates of the models vary from each other and from language to language. However, unsupervised pre-training in such situation has shown...
Pseudo random sequences play an important role in cryptography and network security system. This paper proposes a new approach for generation of pseudo random sequence over odd characteristic field. The sequence is generated by applying a primitive polynomial over odd characteristic field, trace function and möbius function. Then, some important properties of the newly generated sequence such as period,...
Privacy in Online Social Network (OSN) is a very important issue in users' data sharing. Users' often share their personal information in different forms such as public, private, or in groups for developing networks and/or sharing their views. OSN applications collect users information with their permission by offering social networking services. In some cases OSN uses users data for personalization,...
This paper presents the use of a generalized learning technique to automatically generate Bangla poetry. We have trained a Long Sort Term Memory (LSTM) based recurrent neural network model on 350 poems written by Rabindranath Tagore to inspect if the recurrent neural network learns to generate poems. Using the technique described in this paper, we are able to generate poems using seed texts provided...
Digital investigation is becoming an increasing concern. Many digital forensic tools are being developed to deal with the challenge of investigating digital crimes. Acquisition of volatile memory is one of the vital steps of digital forensics process. Passwords data, indications of digital forensics methods, memory malware may be contained in volatile data which may overlooked by the investigator...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.