Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Business

Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique Jul 2011

Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique

International Conference on Information and Communication Technologies

Rapidly growing demand in mobile communication system required technology which will provide minimum errors and maximize SNR in a particular angle/direction. Smart antenna has a system for directed a beam towards desired angle/direction and suppress/cancel interference from undesired angle/direction. MUSIC (Multiple Signal Classification) has capability to estimate number of signals in an array and angle/direction of arrival of desired signal. ESPRIT (Estimation of Signal Parameters via Rotational Invariance Techniques) is used for the estimation of direction of arrival of multiple sets of identical doublets, provides parallel processing. This Paper provides comparative analysis and simulation of angle of arrival (AOA) estimation, …


Image Processing – I: Morphological And Gradient Based Fingerprint Image Segmentation, M. Usman Akram, Anaum Ayaz, Junaid Imtiaz Jul 2011

Image Processing – I: Morphological And Gradient Based Fingerprint Image Segmentation, M. Usman Akram, Anaum Ayaz, Junaid Imtiaz

International Conference on Information and Communication Technologies

For personal identification the use of fingerprint identification systems is mostly common. First step for an Automated Fingerprint Identification System (AFIS) is the segmentation of fingerprint from the acquired image. Extraction of region of interest (ROI) from the desired fingerprint impression is the main purpose of segmentation. In this paper, we present a new technique for fingerprint segmentation using morphological operations and modified gradient based technique. The distinct feature of our technique is that it gives high accuracy for fingerprint segmentation even for low quality fingerprint images. The proposed algorithm is applied on standard fingerprint databases, FVC2002 and FVC2004. Experimental …


Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen Jul 2011

Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen

International Conference on Information and Communication Technologies

In the field of robotic and image vision technologies, the embedded computing and optimization of the image processing algorithm is quite significant in order to provide the real time processing. In the current era, for making the real time system for such high extensive computation and processing for providing the high speed and real time standalone system, several industrial giants continuously providing the solutions which are in the form of dedicated DSP processors and generalized FPGAs. Beside such high speed processor implementation, the image processing based algorithm plays significant role in machine vision based solution for industries, robotic and field …


Application Of Ict: A Comparative Analysis Of Power And Device Utilization Of Ldpc And Turbo Encoders, Sohaib A. Qazi, Samra Kahkashan Jul 2011

Application Of Ict: A Comparative Analysis Of Power And Device Utilization Of Ldpc And Turbo Encoders, Sohaib A. Qazi, Samra Kahkashan

International Conference on Information and Communication Technologies

Today, the exponentially emergent requirements for high performance communication systems operating in noisy environments arise the need of high data rate with error free communication. Due to this reason, design of channel encoders becomes critical and a performance metric is required to qualify encoder for optimized solution. In this paper, we present two encoding techniques i.e. Low Density Parity Check (LDPC) and Turbo encoder. These techniques are evaluated on the basis of FPGA resource utilization and power consumption. Post PAR simulation results show that Low Density Parity Check encoder is more efficient in terms of through put, resource utilization and …


Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid Jul 2011

Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid

International Conference on Information and Communication Technologies

This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …


Application Of Ict: Potential Of Cloud Computing Architecture, Saira Begum, Muhammad Khalid Khan Jul 2011

Application Of Ict: Potential Of Cloud Computing Architecture, Saira Begum, Muhammad Khalid Khan

International Conference on Information and Communication Technologies

Cloud computing is a massively central advancement in the technique that businesses and users devour and work on computing. It's a elementary modify to an prepared model in which applications don't subsist out their lives on a specific section of hardware and in which possessions are more supplely deployed than was the historical standard. It's a primary shift to expansion and utilization model that replaces hard-wired, proprietary associations surrounded by software components and the clients of those components with unimportant Web services and Web-based software admittance. As difficulty under the virtualization is how to allocate resources to every application on-demand …


Image Processing – I: Automated System For Macula Detection In Digital Retinal Images, Maryam Mubbashar, Anam Usman, M. Usman Akram Jul 2011

Image Processing – I: Automated System For Macula Detection In Digital Retinal Images, Maryam Mubbashar, Anam Usman, M. Usman Akram

International Conference on Information and Communication Technologies

In the field of medicines, medical image processing plays a vital role to detect the abnormalities of eye or eye diseases like glaucoma and diabetic retinopathy. Macular degeneration is one of the medical conditions that affect the vision of elder people. If not detected in early stages it causes loss of eye sight. This paper presents an automated system for the localization and detection of macula in digital retinal images. In this paper, macula is first localized by making use of localized optic disc centre and enhanced blood vessels. Finally macula is detected by taking the distance from center of …


Artificial Intelligence - I: Fuzzy Logic Based Robust Pole-Placement Controller For Dc-Dc Buck Converter, Ghulam Abbas, Umar Farooq, Muhammad Usman Asad Jul 2011

Artificial Intelligence - I: Fuzzy Logic Based Robust Pole-Placement Controller For Dc-Dc Buck Converter, Ghulam Abbas, Umar Farooq, Muhammad Usman Asad

International Conference on Information and Communication Technologies

This paper describes the fuzzy logic based robust pole-placement controller for the buck converter working in Continuous Conduction Mode (CCM). The converter operates at a switching frequency of 500 KHz. Pole-placement controller does not show good robustness to the load variations and the change in supply and reference voltages. In order to improve the static and dynamic properties, pole-placement controller supported by decomposed PID fuzzy algorithm is investigated. The performance of both the controllers, pole-placement and optimal pole-placement, is compared and conclusions are drawn. It will be shown that optimal control shows better dynamic performance. MATLAB/SIMULINK based simulation results validate …


Artificial Intelligence – I: Adaptive Automated Teller Machines — Part I, Ghulam Mujtaba, Tariq Mahmood Jul 2011

Artificial Intelligence – I: Adaptive Automated Teller Machines — Part I, Ghulam Mujtaba, Tariq Mahmood

International Conference on Information and Communication Technologies

During the past few years, the banking sector has started providing a variety of services to its customers. One of the most significant of such services has been the introduction of the Automated Teller Machines (ATMs) for providing online support to bank customers. The use of ATMs has reached its zenith in every developed country, and thousands of ATM transactions are occurring on a daily basis. In order to increase the customers' satisfaction and to provide them with more user-friendly ATM interfaces, it becomes important to mine the ATM transactions to discover useful patterns about the customers' interacting behaviors. In …


Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz Jul 2011

Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz

International Conference on Information and Communication Technologies

Electronic negotiations are business negotiations conducted via electronic means using information and communications technologies (ICT). Two dominant types of electronic negotiation systems are automated negotiation systems for software agents and negotiation support systems (NSSs) for humans. However, the integration of two types for human-agent negotiations is an important task. In this paper, an extended communication model for human-agent business negotiations is presented. For this purpose, the underlying communication models of automated negotiations and NSSs are analyzed. The extended communication model is based on a common negotiation ontology which captures the negotiation agenda and paves the way for such hybrid communication, …


Application Of Ict Ii: The Impact Of Performance Management System On The Performance Of The Employees & The Organization, Arshad Siddiqui, Faryal Malik Aug 2009

Application Of Ict Ii: The Impact Of Performance Management System On The Performance Of The Employees & The Organization, Arshad Siddiqui, Faryal Malik

International Conference on Information and Communication Technologies

The purpose of this paper is to examine the relationship between performance management system (PMS), employee's job satisfaction and thus, their commitment to the organization by working for its fate. If various characteristics of PMS that build commitment and satisfaction could be identified, then managers may be more capable of using PMS so as to yield positive results. Further, the study will also examine the impact of PMS on organizational effectiveness by enhancing personal performance using appropriate performance measures.


Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani Aug 2009

Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani

International Conference on Information and Communication Technologies

Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …


Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari Aug 2009

Wireless Networks: Certificateless Id-Based Authentication Using Threshold Signature For P2p Manets, Aasia Samreen, Seema Ansari

International Conference on Information and Communication Technologies

As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.


Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq Aug 2009

Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq

International Conference on Information and Communication Technologies

Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …


Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha Aug 2009

Application Of Ict Ii: Analytic Network Process Applied To R&D Project Selection, Murad Habib, Raza Khan, Javaid L. Piracha

International Conference on Information and Communication Technologies

Research and development (R&D) project selection is a complex decision-making process. Risks and uncertainties are also associated with the investments and returns of R&D projects. This research paper illustrates an application of ANP (analytic network process). The analytic network process (ANP) is presented as a potentially valuable method to support the selection of projects in a research and development (R&D) environment. The AHP (analytic hierarchy process) is employed to break down large unstructured decision problems into manageable and measurable components. The ANP, as the general form of AHP, is powerful to deal with complex decisions where interdependence exists in a …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Artificial Intelligence – Ii: Image Normalization For Face Recognition Using 3d Model, Zahid Riaz, Michael Beetz, Bernd Radig Aug 2009

Artificial Intelligence – Ii: Image Normalization For Face Recognition Using 3d Model, Zahid Riaz, Michael Beetz, Bernd Radig

International Conference on Information and Communication Technologies

This paper describes an image segmentation and normalization technique using 3D point distribution model and its counterpart in 2D space. This segmentation is efficient to work for holistic image recognition algorithm. The results have been tested with face recognition application using Cohn Kanade facial expressions database (CKFED). The approach follows by fitting a model to face image and registering it to a standard template. The models consist of distribution of points in 2D and 3D. We extract a set of feature vectors from normalized images using principal components analysis and using them for a binary decision tree for classification. A …


Artificial Intelligence – Ii: Watermarking Of Chest Ct Scan Medical Images For Content Authentication, Nisar A. Memon, S.A.M. Gilani, Asad Ali Aug 2009

Artificial Intelligence – Ii: Watermarking Of Chest Ct Scan Medical Images For Content Authentication, Nisar A. Memon, S.A.M. Gilani, Asad Ali

International Conference on Information and Communication Technologies

Medical image is usually comprised of region of interest (ROI) and region of non interest (RONI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in RONI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.


Networks - Ii: Assessment Of Node Density In Cartesian Ad Hoc Routing Protocols (Carp), Imran Raza, Mohammad Hasan Raza Aug 2009

Networks - Ii: Assessment Of Node Density In Cartesian Ad Hoc Routing Protocols (Carp), Imran Raza, Mohammad Hasan Raza

International Conference on Information and Communication Technologies

With the rapid development in the geographical positioning system (GPS) technology, the geographical routing category of the MANET protocols has recently been a hot research area. The Cartesian Ad hoc Routing Protocols (CARP) are a set of three adaptive and connectionless protocols that address the problem of routing and power consumption in MANET. These protocols are used to limit the number of forwarding nodes in a logical transmission area. Density of an ad hoc network is considered a network parameter in CARP, and is used in the calculations to form a logical transmission area. The CARP assume that the nodes …


Data Mining: Applying Centroid Based Adjustment To Kernel Based Object Tracking For Improving Localization, Rashid Mehmood, Muhammad Usman Ali, Imtiaz A. Taj Aug 2009

Data Mining: Applying Centroid Based Adjustment To Kernel Based Object Tracking For Improving Localization, Rashid Mehmood, Muhammad Usman Ali, Imtiaz A. Taj

International Conference on Information and Communication Technologies

In recent studies kernel based object tracking (KBOT) using Bhattacharya coefficient as similarity measure is shown to be robust and efficient object tracking technique. Image histogram provides a compact summarization of the distribution of data in an image. Due to computational efficiency; histogram has been successfully applied in KBOT based tracking algorithms. However without spatial or shape information, similar objects of different color may be indistinguishable based solely on histogram comparisons. The application of meanshift algorithm (the core of KBOT) on 1-D low level features of histogram may converge to false local maxima and cause inaccuracy of target localization. In …


Data Mining: Implementation Of Data Mining Engine On Crm-Improve Customer Satisfaction, A. S. Al- Mudimigh, F. Saleem, Z. Ullah, F. N. Al-Aboud Aug 2009

Data Mining: Implementation Of Data Mining Engine On Crm-Improve Customer Satisfaction, A. S. Al- Mudimigh, F. Saleem, Z. Ullah, F. N. Al-Aboud

International Conference on Information and Communication Technologies

Analysis on customer relationship is reaching more practical and motivating success factor for the growth of every company, in the same way, discovery of unseen information is also supporting for the successful expansion in an organization. A customer and a company are essential to each other and their good relationship and understanding will take the company on the top as well as the customer to the satisfactory level. In this paper we presented the model of customer relationship management (CRM) to describe the association of a customer with the company and enhanced the model by connection with data mining engine …


Application Of Ict - I: Risp Design Using Tightly Coupled Reconfigurable Fpga Cores, M. Aqeel Iqbal, Uzma Saeed Awan Aug 2009

Application Of Ict - I: Risp Design Using Tightly Coupled Reconfigurable Fpga Cores, M. Aqeel Iqbal, Uzma Saeed Awan

International Conference on Information and Communication Technologies

Reconfigurable instruction set processors are the next generation processors which can adapt their instruction sets through a reconfiguration process in their hardware according to the demand of the application being under execution on them. In this way the processors adapt the hardware which is the most suitable solution for the running application and hence it accelerates the performance gain. The reconfigurable instruction set processors are programmable processors that contain the reconfigurable logic in one or more of their functional units. Among the most important design parameters are: the granularity of the reconfigurable logic, the structure of the configuration memory, the …


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Artificial Intelligence – I: Robust Audio Steganography Via Genetic Algorithm, Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, Akram M. Zeki Aug 2009

Artificial Intelligence – I: Robust Audio Steganography Via Genetic Algorithm, Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, Akram M. Zeki

International Conference on Information and Communication Technologies

Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …


Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman Aug 2005

Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman

International Conference on Information and Communication Technologies

Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …


Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel Aug 2005

Opems: Online Peer-To-Peer Expertise Matching System, Sharifullah Khan, S.M. Nabeel

International Conference on Information and Communication Technologies

Internet is a vital source to disseminate and share information to the masses. This has made information available in abundance on the Web. However, finding relevant information is difficult if not impossible. This difficulty is bilateral between information providers and seekers in terms of information presentation and accessibility respectively. This paper proposed an online Peer-to-Peer Expertise Matching system. The approach provides a highly scalable and self-organizing system and helps individuals in presenting and accessing the information in a consistent format on the Web. This makes the sharing of information among the autonomous organizations successful.


Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid Aug 2005

Fuzzy Logic Control Of Coupled Liquid Tank System, Muhammad Abid

International Conference on Information and Communication Technologies

This paper presents a fuzzy control of coupled liquid tank system. The Coupled Liquid Tank system is developed at PIEAS. It has three liquid tanks coupled together. The liquid level in tank 2 is maintained using fuzzy logic. The results are compared with the PID control, mostly used in industries.


Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz Aug 2005

Poster Session A: Use Of Neural Networks In Multi-Sensor Fusion For Remote Sensing Applications, Engr. S. M. Haider Aejaz

International Conference on Information and Communication Technologies

Remote sensing encounters different types of objects with similar spectral signatures. Multi-sensors form the solution of the problem with spectral different parts of the spectrum and the resulting information is then processed using digital signal processing techniques. Artificial neural networks provide another method for processing this information. The research describes how neural networks may be used to classify objects on the basis of their spectral response to different frequencies.