Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Business

Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique Jul 2011

Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique

International Conference on Information and Communication Technologies

Rapidly growing demand in mobile communication system required technology which will provide minimum errors and maximize SNR in a particular angle/direction. Smart antenna has a system for directed a beam towards desired angle/direction and suppress/cancel interference from undesired angle/direction. MUSIC (Multiple Signal Classification) has capability to estimate number of signals in an array and angle/direction of arrival of desired signal. ESPRIT (Estimation of Signal Parameters via Rotational Invariance Techniques) is used for the estimation of direction of arrival of multiple sets of identical doublets, provides parallel processing. This Paper provides comparative analysis and simulation of angle of arrival (AOA) estimation, …


Image Processing – I: Morphological And Gradient Based Fingerprint Image Segmentation, M. Usman Akram, Anaum Ayaz, Junaid Imtiaz Jul 2011

Image Processing – I: Morphological And Gradient Based Fingerprint Image Segmentation, M. Usman Akram, Anaum Ayaz, Junaid Imtiaz

International Conference on Information and Communication Technologies

For personal identification the use of fingerprint identification systems is mostly common. First step for an Automated Fingerprint Identification System (AFIS) is the segmentation of fingerprint from the acquired image. Extraction of region of interest (ROI) from the desired fingerprint impression is the main purpose of segmentation. In this paper, we present a new technique for fingerprint segmentation using morphological operations and modified gradient based technique. The distinct feature of our technique is that it gives high accuracy for fingerprint segmentation even for low quality fingerprint images. The proposed algorithm is applied on standard fingerprint databases, FVC2002 and FVC2004. Experimental …


Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen Jul 2011

Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen

International Conference on Information and Communication Technologies

In the field of robotic and image vision technologies, the embedded computing and optimization of the image processing algorithm is quite significant in order to provide the real time processing. In the current era, for making the real time system for such high extensive computation and processing for providing the high speed and real time standalone system, several industrial giants continuously providing the solutions which are in the form of dedicated DSP processors and generalized FPGAs. Beside such high speed processor implementation, the image processing based algorithm plays significant role in machine vision based solution for industries, robotic and field …


Application Of Ict: A Comparative Analysis Of Power And Device Utilization Of Ldpc And Turbo Encoders, Sohaib A. Qazi, Samra Kahkashan Jul 2011

Application Of Ict: A Comparative Analysis Of Power And Device Utilization Of Ldpc And Turbo Encoders, Sohaib A. Qazi, Samra Kahkashan

International Conference on Information and Communication Technologies

Today, the exponentially emergent requirements for high performance communication systems operating in noisy environments arise the need of high data rate with error free communication. Due to this reason, design of channel encoders becomes critical and a performance metric is required to qualify encoder for optimized solution. In this paper, we present two encoding techniques i.e. Low Density Parity Check (LDPC) and Turbo encoder. These techniques are evaluated on the basis of FPGA resource utilization and power consumption. Post PAR simulation results show that Low Density Parity Check encoder is more efficient in terms of through put, resource utilization and …


Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid Jul 2011

Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid

International Conference on Information and Communication Technologies

This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …


Application Of Ict: Potential Of Cloud Computing Architecture, Saira Begum, Muhammad Khalid Khan Jul 2011

Application Of Ict: Potential Of Cloud Computing Architecture, Saira Begum, Muhammad Khalid Khan

International Conference on Information and Communication Technologies

Cloud computing is a massively central advancement in the technique that businesses and users devour and work on computing. It's a elementary modify to an prepared model in which applications don't subsist out their lives on a specific section of hardware and in which possessions are more supplely deployed than was the historical standard. It's a primary shift to expansion and utilization model that replaces hard-wired, proprietary associations surrounded by software components and the clients of those components with unimportant Web services and Web-based software admittance. As difficulty under the virtualization is how to allocate resources to every application on-demand …


Image Processing – I: Automated System For Macula Detection In Digital Retinal Images, Maryam Mubbashar, Anam Usman, M. Usman Akram Jul 2011

Image Processing – I: Automated System For Macula Detection In Digital Retinal Images, Maryam Mubbashar, Anam Usman, M. Usman Akram

International Conference on Information and Communication Technologies

In the field of medicines, medical image processing plays a vital role to detect the abnormalities of eye or eye diseases like glaucoma and diabetic retinopathy. Macular degeneration is one of the medical conditions that affect the vision of elder people. If not detected in early stages it causes loss of eye sight. This paper presents an automated system for the localization and detection of macula in digital retinal images. In this paper, macula is first localized by making use of localized optic disc centre and enhanced blood vessels. Finally macula is detected by taking the distance from center of …


Artificial Intelligence - I: Fuzzy Logic Based Robust Pole-Placement Controller For Dc-Dc Buck Converter, Ghulam Abbas, Umar Farooq, Muhammad Usman Asad Jul 2011

Artificial Intelligence - I: Fuzzy Logic Based Robust Pole-Placement Controller For Dc-Dc Buck Converter, Ghulam Abbas, Umar Farooq, Muhammad Usman Asad

International Conference on Information and Communication Technologies

This paper describes the fuzzy logic based robust pole-placement controller for the buck converter working in Continuous Conduction Mode (CCM). The converter operates at a switching frequency of 500 KHz. Pole-placement controller does not show good robustness to the load variations and the change in supply and reference voltages. In order to improve the static and dynamic properties, pole-placement controller supported by decomposed PID fuzzy algorithm is investigated. The performance of both the controllers, pole-placement and optimal pole-placement, is compared and conclusions are drawn. It will be shown that optimal control shows better dynamic performance. MATLAB/SIMULINK based simulation results validate …


Artificial Intelligence – I: Adaptive Automated Teller Machines — Part I, Ghulam Mujtaba, Tariq Mahmood Jul 2011

Artificial Intelligence – I: Adaptive Automated Teller Machines — Part I, Ghulam Mujtaba, Tariq Mahmood

International Conference on Information and Communication Technologies

During the past few years, the banking sector has started providing a variety of services to its customers. One of the most significant of such services has been the introduction of the Automated Teller Machines (ATMs) for providing online support to bank customers. The use of ATMs has reached its zenith in every developed country, and thousands of ATM transactions are occurring on a daily basis. In order to increase the customers' satisfaction and to provide them with more user-friendly ATM interfaces, it becomes important to mine the ATM transactions to discover useful patterns about the customers' interacting behaviors. In …


Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz Jul 2011

Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz

International Conference on Information and Communication Technologies

Electronic negotiations are business negotiations conducted via electronic means using information and communications technologies (ICT). Two dominant types of electronic negotiation systems are automated negotiation systems for software agents and negotiation support systems (NSSs) for humans. However, the integration of two types for human-agent negotiations is an important task. In this paper, an extended communication model for human-agent business negotiations is presented. For this purpose, the underlying communication models of automated negotiations and NSSs are analyzed. The extended communication model is based on a common negotiation ontology which captures the negotiation agenda and paves the way for such hybrid communication, …