Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 28 )

2018 ( 190 )

2017 ( 207 )

2016 ( 265 )

Custom range...

Search Results: 1 - 10 of 144380 matches for " F. Raihan "
All listed articles are free for downloading (OA Articles)
Page 1 /144380
Display every page Item
F. Raihan, J. B. Alam
Iranian Journal of Environmental Health Science & Engineering , 2008,
Abstract: In this study, groundwater quality in Sunamganj of Bangladesh was studied based on different indices for irrigation and drinking uses. Samples were investigated for sodium absorption ratio, soluble sodium percentage, residual sodium carbonate, electrical conductance, magnesium adsorption ratio, Kelly's ratio, total hardness, permeability index, residual sodium bi-carbonate to investigate the ionic toxicity. From the analytical result, it was revealed that the values of Sodium Adsorption Ratio indicate that ground water of the area falls under the category of low sodium hazard. So, there was neither salinity nor toxicity problem of irrigation water, so that ground water can safely be used for long-term irrigation. Average Total Hardness of the samples in the study area was in the range of between 215 mg/L at Tahirpur and 48250 mg/L at Bishamvarpur. At Bishamvarpur, the water was found very hard. Average total hardness of the samples was in the range of between 215 mg/L at Tahirpur and 48250 mg/L at Bishamvarpur. At Bishamvarpur, the water was found very hard. It was shown based on GIS analysis that the groundwater quality in Zone-1 could be categorized of "excellent" class, supporting the high suitability for irrigation. In Zone-2 and Zone-3, the groundwater quality was categorized as "risky" and "poor" respectively. The study has also made clear that GIS-based methodology can be used effectively for ground water quality mapping even in small catchments.
Multiphysics Based Simulation of Damage Progression in Composites  [PDF]
Vamsee Vadlamudi, Rassel Raihan, Kenneth Reifsnider
Materials Sciences and Applications (MSA) , 2017, DOI: 10.4236/msa.2017.85027
Abstract: The long-term properties of continuous fiber reinforced composite materials are increasingly important as applications in airplanes, cars, and other safety critical structures are growing rapidly. Although a clear understanding has been established for initiation, growth and accumulation of damage, it is still unclear when and how the interactions of these local events lead to the development of a “critical” fracture path resulting in a sudden change of global properties and possible rupture. In the present paper, we simulate damage development in a neat polymeric resin using X-FEM analysis, and conduct concomitant dielectric response analysis with a COMSOLTM simulation model to study the collective defect structure as it develops in a model system. Our studies reveal inflection points in the predicted global dielectric response vs. strain that are related to changes in local damage growth rates and modes that clearly indicate impending fracture and capture the progressive change in material state.
Detecting Human Mood from Physiological Signal and Data Usage  [PDF]
Iftakhar Hossain, Tanzila Islam, Mohammad Raihan Ruhin
Journal of Computer and Communications (JCC) , 2018, DOI: 10.4236/jcc.2018.612002
Abstract: As the days go by, there are technologies that are being introduced everyday, whether it is a tiny music player iPod nano or a robot “Asimo” that runs 6 kilometers per hour. These technologies entertain, facilitate and make the day easier for the human being. It is not arguable anymore that the people need these technologies with the smart systems to lead their regular life smoothly. The smarter the system is; the more people like to use it. One major part of this smartness of the system depends on how well the system can interact with the person or the user. It is not a dream anymore that a system will be able to interact with a human just the way that one human interacts with another. To make that happen, it is obvious that the system must be intelligent enough to understand a human being. For example, if we need a Robot that can have a random conversation with a human, the system must recognize and understand the spoken word to reply the human. And the reply will be based on the current mood and behavior of the human. In this scenario, a human uses his senses to receive the inputs such as voice through the hearing senses, behavior and movement of the body parts, and facial expression through seeing sense from the speaking human. And it is now apparently possible to take such inputs for a system which can be stored as data; later it is possible to analyze the data using various algorithms and also to teach the system through Machine Learning algorithms. We will briefly discuss issues related to the relevance and the possible impact of research in the field of Artificial Intelligence, with special attention to the Computer Vision and Pattern Recognition, Natural Language Processing, Human Computer Interaction, Data Warehouse and Data Mining that is used to identify and analyze data like psychological signals, voice, conversation, geo location, and geo weather, etc. In our research, we have used heart rate that is a successful physiological signal to detect human mood and used smartphone usage data to train the system and detect mood more accurately than other methods.
Overwhelming bone marrow Leishmaniasis
Raihan Sajid,Adnan Qureshi
Turkish Journal of Hematology , 2011,
Nasal Substitution in Sarawak Malay Dialect
Sharifah Raihan Syed Jaafar
Asian Social Science , 2013, DOI: 10.5539/ass.v9n4p92
Abstract: This study discusses a phonological strategy, i.e. nasal substitution, which is regularly applied to eliminate nasal and voiceless obstruent clusters from emerging in the surface representation. As claimed in previous studies, the clusters are disallowed from emerging in the surface representation. Nasal substitution is therefore applied as a strategy to get rid of those clusters. In this paper, I will present how nasal substitution is applied in the Sarawak Malay dialect by focusing on two morphological environments in which the clusters emerge, i.e. within roots and at prefix junctures. The data obtained from interviews show that nasal and voiceless obstruent clusters are not completely disallowed in the dialect, as nasal substitution is only active at prefix junctures and not within roots. Furthermore, in this dialect, voiced obstruents also undergo nasal substitution. These phenomena are accounted for in this study by proposing CRISP-EDGE [?] and UNIFORMITY-ROOT in the grammar of the Sarawak dialect of Malay.
Actin - Technical Report
Raihan H. Kibria
Computer Science , 2007,
Abstract: The Boolean satisfiability problem (SAT) can be solved efficiently with variants of the DPLL algorithm. For industrial SAT problems, DPLL with conflict analysis dependent dynamic decision heuristics has proved to be particularly efficient, e.g. in Chaff. In this work, algorithms that initialize the variable activity values in the solver MiniSAT v1.14 by analyzing the CNF are evolved using genetic programming (GP), with the goal to reduce the total number of conflicts of the search and the solving time. The effect of using initial activities other than zero is examined by initializing with random numbers. The possibility of countering the detrimental effects of reordering the CNF with improved initialization is investigated. The best result found (with validation testing on further problems) was used in the solver Actin, which was submitted to SAT-Race 2006.
Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth  [PDF]
Parves Kamal, Saad Mustafiz, Faisal Md. Abdur Rahman, Raihan Taher
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.63018
Abstract: The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its various services including student portal Breo, Learning Resources and Student Email Access and others through the Shibboleth. Like the University of Bedfordshire the other Universities in the UK are also implementing the Shibboleth system in their access management control. Therefore, the researchers of this project have found it important to evaluate its efficiency and effectiveness of Shibboleth from different perspectives. In the first part of this paper it tries to explain the features of Shibboleth as SSO services and compares it with other SSO services like Athens, Kerberos, etc. Then in the middle section, the authors go through the steps of installation and configuration of the Shibboleth. In the end of the paper, based on the survey of real users of Shibboleth at the University of Bedfordshire, the authors give its insights on the effectiveness of the Shibboleth as SSO service. Throughout this investigation, the authors have applied a triangulation to find out user and service provider viewpoint about Shibboleth. Although there were some problems persisted, the authors also implemented the Shibboleth system successfully to figure out different problems, efficiency and effectiveness. The recommendations and conclusion have been provided at the end of this project.
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm  [PDF]
Aninda Majumder, Mohammad Raihan Ruhin, Tahsina Hashem, Md. Imdadul Islam
Journal of Computer and Communications (JCC) , 2016, DOI: 10.4236/jcc.2016.42001
Abstract: In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading; hence the received signal experiences huge distortion in case of forward error correction. Otherwise, huge service delay arises due to frequent negative acknowledgements. To combat the situation, we can choose Alamouti channel of full rate and fully orthogonal space-time block code (OSTBC). Our aim is to transmit images through Alamouti channel and to observe the quality of the recovered image, in context of bit error rate (BER). We have also observed the impact of fading and additive white Gaussian noise (AWGN) on the image without application of error correction or detection technique of channel coding. To ensure security, we apply the RSA algorithm on each pixel prior transmitting and decrypt them at the receiving end, where we found no impairment from the algorithm. Finally, we observe that the relative performance of the system changes digital modulation schemes.
An Analysis of Foraging and Echolocation Behavior of Swarm Intelligence Algorithms in Optimization: ACO, BCO and BA  [PDF]
Tanzila Islam, Md Ezharul Islam, Mohammad Raihan Ruhin
International Journal of Intelligence Science (IJIS) , 2018, DOI: 10.4236/ijis.2018.81001
Abstract: Optimization techniques are stimulated by Swarm Intelligence wherever the target is to get a decent competency of a problem. The knowledge of the behavior of animals or insects has a variety of models in Swarm Intelligence. Swarm Intelligence has become a potential technique for evolving many robust optimization problems. Researchers have developed various algorithms by modeling the behaviors of the different swarm of animals or insects. This paper explores three existing meta-heuristic methods named as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO) and Bat Algorithm (BA). Ant Colony Optimization was stimulated by the nature of ants. Bee Colony Optimization was inspired by the plundering behavior of honey bees. Bat Algorithm was emerged on the echolocation characteristics of micro bats. This study analyzes the problem-solving behavior of groups of relatively simple agents wherein local interactions among agents, are either directly or indirectly through the environment. The scope of this paper is to explore the characteristics of swarm intelligence as well as its advantages, limitations and application areas, and subsequently, to explore the behavior of ants, bees and micro bats along with its most popular variants. Furthermore, the behavioral comparison of these three techniques has been analyzed and tried to point out which technique is better for optimization among them in Swarm Intelligence. From this, the paper can help to understand the most appropriate technique for optimization according to their behavior.
Middle-East Crisis: An Overview in Bangladesh, Pakistan and Indian Perspective
Abdullah Hel Kafi,Adud Raihan
Pakistan Journal of Social Sciences , 2012,
Abstract: NA
Page 1 /144380
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.