Papers by Dr. Syed Akhter Hossain
Journal of Health, Population and Nutrition, 2013
Bookmarks Related papers MentionsView impact
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017
Bookmarks Related papers MentionsView impact
ArXiv, 2013
Today-s business environment is very much dynamic, and organisations are constantly changing thei... more Today-s business environment is very much dynamic, and organisations are constantly changing their software requirements to adjust with new environment. They also demand for fast delivery of software products as well as for accepting changing requirements. In this aspect, traditional plan-driven developments fail to meet up these requirements. Though traditional software development methodologies, such as life cycle-based structured and object oriented approaches, continue to dominate the systems development few decades and much research has done in traditional methodologies, Agile software development brings its own set of novel challenges that must be addressed to satisfy the customer through early and continuous delivery of the valuable software. It is a set of software development methods based on iterative and incremental development process, where requirements and development evolve through collaboration between self-organizing, cross-functional teams that allows rapid deliver...
Bookmarks Related papers MentionsView impact
Advances in Intelligent Systems and Computing
Bookmarks Related papers MentionsView impact
2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Bookmarks Related papers MentionsView impact
2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Bookmarks Related papers MentionsView impact
2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Bookmarks Related papers MentionsView impact
2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Bookmarks Related papers MentionsView impact
Proceedings of International Joint Conference on Computational Intelligence
Bookmarks Related papers MentionsView impact
2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
Bookmarks Related papers MentionsView impact
2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Bookmarks Related papers MentionsView impact
Communications in Computer and Information Science
Bookmarks Related papers MentionsView impact
2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
Bookmarks Related papers MentionsView impact
2018 International Conference on Computing, Power and Communication Technologies (GUCON)
Bookmarks Related papers MentionsView impact
Advances in Intelligent Systems and Computing
Bookmarks Related papers MentionsView impact
2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST)
Bookmarks Related papers MentionsView impact
Global Journal of Computer Science and Technology
In the 21st century, for a digital lifestyle in a smart city, security is one of the core ingredi... more In the 21st century, for a digital lifestyle in a smart city, security is one of the core ingredients to ensure digital continuity. The existing smart security technologies use a smartphone, card, and fingerprint that need additional devices to carry or can spread out infectious diseases. Now it is high time to think about an additional device free and more time-consuming technique. So, an intelligent system is proposed in this paper to secure our doors with face authentication. The human face is a unique and easy identifying feature of a human. The registered user’s image is saved in the device as a dataset to train the lock. The system recognizes the registered faces very fast and controls the hardware part to be unlocked. The system is capable of detecting and recognizing human faces from a real-time video. It is usable in the door lock, car lock, hutch, and many more security purposes.
Bookmarks Related papers MentionsView impact
MIST INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY
In satellite communication, Link Budget analysis is the most important part to determine gains an... more In satellite communication, Link Budget analysis is the most important part to determine gains and losses of signals from the transmitter to the receiver. Most importantly, it investigates system performance and optimum power which must be received at the receiver channel. In some cases, this information could be generated, saved for past data analysis, and share with peer users which are not found in existing web tools. Thus, it is obvious to design a new Link Budget calculator with users, database, and data retrieval support. This work focuses on designing a Link Budget web tool for X-band satellite communication through literature study and comparative analysis. The X-Band calculator is designed based on HTML, PHP, Javascript, and MySQL by ensuring several security issues, and can be accessed through mobile devices. This paper also focuses on the necessary equations of Link Budget for Uplink (Tx); Satellite; Downlink (Rx); Azimuth, Elevation, Distance analysis; and Rain attenuati...
Bookmarks Related papers MentionsView impact
Procedia Computer Science
Bookmarks Related papers MentionsView impact
Procedia Computer Science
Bookmarks Related papers MentionsView impact
Uploads
Papers by Dr. Syed Akhter Hossain