The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we describe a multidimensional implementation scheme for developing English to Bangla dictionary using multidimensional Array. We have converted the string into an integer key and partitioned the keys based on number of letters a word. Multidimensional arrays are good to store dense data. It is hard to use multidimensional array for sparse data. We have compressed the sparse multidimensional...
In this paper we present a method for Bangla speech generation from Bangla PDF document. Our main goal is to generate almost natural speech from Bangla PDF document. For this we have proposed a method which performs three major tasks. One is PDF to text conversion, then text to ASCII conversion, and then follows the character and modifier rules while reading text and finally speech generation from...
This paper presents a Bangla phoneme recognition method for Automatic Speech Recognition (ASR). The method consists of two stages: i) a multilayer neural network (MLN), which converts acoustic features, mel frequency cepstral coefficients (MFCCs), into phoneme probabilities and ii) the phoneme probabilities obtained from the first stage and corresponding Δ and ΔΔ parameters calculated by linear regression...
Conversion from Bangla language to another native language using Universal Networking Language (UNL) is highly demanding due to increasing the usage of Internet based application. Since Bangla case structure plays a fundamental role in Bangla grammartical structures, this paper presents some rules for Bangla case structures that will be used to convert Bangla sentence to UNL expression. The theoretical...
This paper describes several feature extraction techniques, which will facilitate Automatic Speech Recognition (ASR) for Bangla speech. These techniques are applied on different sound-packets, which are essentially segments of Bangla speech. The key temporal regions in a sound-packet that contain vital information about the speech signal are identified. Some novel feature extraction methods are developed...
Multicasting is a challenging task that facilitates group communication among the nodes using the most efficient strategy to deliver the messages over each link of the network. In spite of significant research achievements in recent years, efficient and extendable multicast routing in Mobile Ad Hoc Networks (MANETs) is still a difficult issue. To enhance performance and to enable scalability we have...
Network traffic has been studied extensively since new findings by Taqqu et. al. (1994), which has shown that network traffic is not memoryless. Such traffic has been called self similar with Long Range Dependence (LRD) and their distribution is commonly known as heavy-tailed. It is very hard to estimate buffer size to protect against overflow in presence of such traffic as packet sizes and their...
Implementation of partially-parallel (Low-Density Parity-Check) LDPC decoders using unstructured random matrices is very complex and requires huge hardware resources. To alleviate the complexity and minimize resource requirements, structured LDPC matrices are used. This paper presents a novel technique for constructing a multi-level Hierarchical Quasi-Cyclic (HQC) structured matrix for LDPC decoders...
A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. Network Simulator 2 (NS2) is one of the most popular tools in academia for evaluation of network, protocols and topologies. It has become virtually the standard of network simulation. It represents a discrete, event-based simulator that has an ability to be easily extendible and...
In this paper, we propose a dynamic TDMA slot reservation (DTSR) protocol for cognitive radio ad hoc networks. Quality of Service (QoS) guarantee plays a critically important role in such networks. We consider the problem of providing QoS guarantee to users as well as to maintain the most efficient use of scarce bandwidth resources. A dynamic frame length expansion and shrinking scheme that controls...
In this paper, a theoretical analysis is presented to evaluate the influence of polarization mode dispersion (PMD) on the bit error rate (BER) performance of direct sequence optical code division multiple access system. In this analysis, intensity modulation direct detection technique is employed in single mode fiber operating at 1550nm, and optical orthogonal codes are used as address sequence. Optoelectronic...
Wireless technology is the fastest growing segment of the modern communication industry. The IEEE 802.16e standard, commonly known as mobile WiMAX, is the latest wireless technology that has promised to offer Broadband Wireless Access over long distance. The concept of OFDM is used in WiMAX to obtain high data rate in addition to reducing the effects like inter symbol interference and inter channel...
In this blooming age of information technology the web developers always intend to provide a vast information space to the Internet surfers. On the other side, the users always want to reach the desired information by least effort. As a result, the increasing volume of information in each website also enlarges the searching domain for the user. In many cases, the user fails to spot his desired information...
Mobile Ad hoc networks (MANETs) are composed of a collection of independent nodes usually connected by low bandwidth Radio Frequency (RF) links which are challenging for transmitting video and high bandwidth applications for rescue workers in emergency situations. Earlier we proposed a routing protocol, called AODVH to use for high bandwidth communication for search and rescue operations in a disaster...
Wavelength division multiplexing (WDM) optical networks are attracting more and more attention because of their ability to provide increased capacity and flexibility. Optical add-drop multiplexer (OADM) become key components for add or drop wavelengths in high bit rate optical networks. Crosstalk in OADM degrades the performance of WDM system. In this article, we have developed a fiber Bragg-grating...
Single carrier-frequency division multiple access (SC-FDMA) utilizes single carrier modulation at the transmitter and frequency domain equalization at the receiver. It has almost similar performance and essentially the same overall structure of an orthogonal frequency division multiple access (OFDMA) system with low peak to average power ratio (PAPR). Recently, the SC-FDMA has drawn great attention...
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication...
Redundant node deployment has an impact on network lifetime because redundant nodes consume excess energy by performing unnecessary repetitious tasks. A distributed node redundancy identification method, called Self-Calculated Redundancy Check (SCRC), is proposed to eliminate redundant tasks. A grid is assumed over the field to help each node to calculate its own redundancy by checking the coverage...
This paper proposes a soft computing approach to manage uncertainty and rule discovery by reasoning over inconsistent, incomplete and fragmentary information using dominance-based rough set theories. A methodological and computational basis is illustrated in a sensor network application scenario of a forest fire detection system.
Grid computing organizes geographically distributed resources under a single platform and let the users access this combined power. In this paper we have discussed the application of distributed memory caching system in the Grid computing environment to improve its computational environment. For our experiment, we used Alchemi, a .net based Grid computing framework and Memcached, a distributed memory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.