Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Theory and Algorithms

Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen Jul 2011

Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen

International Conference on Information and Communication Technologies

In the field of robotic and image vision technologies, the embedded computing and optimization of the image processing algorithm is quite significant in order to provide the real time processing. In the current era, for making the real time system for such high extensive computation and processing for providing the high speed and real time standalone system, several industrial giants continuously providing the solutions which are in the form of dedicated DSP processors and generalized FPGAs. Beside such high speed processor implementation, the image processing based algorithm plays significant role in machine vision based solution for industries, robotic and field …


Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia Jul 2011

Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia

International Conference on Information and Communication Technologies

Preserving the privacy of individuals while publishing their relevant data has been an important problem. Most of previous works in privacy preserving data publication focus on one time, static release of datasets. In multiple publications however, where data is published multiple times, these techniques are unable to ensure privacy of the concerned individuals as just joining either of the releases could result in identity disclosure. In this work, we tried to investigate the major findings in the scenario of continuous data publication, in which the data is not only published multiple times but also modified with INSERTS, UPDATES and DELETE …


Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid Jul 2011

Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid

International Conference on Information and Communication Technologies

This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …


Application Of Ict: Fram Based Tmr (Triple Modular Redundancy) For Fault Tolerance Implementation, Kashif Sagheer Siddiqui, Mirza Altamash Baig Jul 2011

Application Of Ict: Fram Based Tmr (Triple Modular Redundancy) For Fault Tolerance Implementation, Kashif Sagheer Siddiqui, Mirza Altamash Baig

International Conference on Information and Communication Technologies

The main objective of this paper is to design a Triple modular redundancy test bench using FRAM (Ferroelectric RAM) based memory module for main driver of OBDH (On Board Data Handling) system of LEO (Lower Earth Orbit) Satellite that enables the fast detection of error in driver data when implied with FPGA (Field Programmable Gate Array) and provides more realistic and tolerant way of fault finding for Single Event Upset (SEU) in highly radiated space environment. The scope of paper embraces development of TMR test bench, software algorithms, functional simulations, timing simulations and conclusion of comparison of FRAM based memory …


Artificial Intelligence - I: Adaptive Automated Teller Machines - Part Ii, Ghulam Mujtaba, Tariq Mahmood Jul 2011

Artificial Intelligence - I: Adaptive Automated Teller Machines - Part Ii, Ghulam Mujtaba, Tariq Mahmood

International Conference on Information and Communication Technologies

Nowadays, the banking sector is increasingly relying on Automated Teller Machines (ATMs) in order to provide services to its customers. Although thousands of ATMs exist across many banks and different locations, the GUI and content of a typical ATM interface remains, more or less, the same. For instance, any ATM provides typical options for withdrawal, electronic funds transfer, viewing of mini-statements etc. However, such a static interface might not be suitable for all ATM customers, e.g., some users might not prefer to view all the options when they access the ATM, or to view specific withdrawal amounts less than, say, …


Networks - Ii: Optimal Fractional Frequency Reuse (Ffr) And Resource Allocation In Multiuser Ofdma System, Naveed Ul Hassan, Mohamad Assaad Sep 2009

Networks - Ii: Optimal Fractional Frequency Reuse (Ffr) And Resource Allocation In Multiuser Ofdma System, Naveed Ul Hassan, Mohamad Assaad

International Conference on Information and Communication Technologies

In this paper we determine the optimal fractional frequency reuse (FFR) and resource allocation in OFDMA system. Since the users at the cell edge are more exposed to inter-cell interference therefore each cell is partitioned into two regions; inner region and outer region. We determine the optimal FFR factor for the outer region, bandwidth assigned to each region and subcarrier and power allocation to all the users in the cell. The problem is formulated as sum-power minimization problem subject to minimum rate constraints in both the regions. This is a mixed linear integer programming problem which is relaxed into a …


Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida Aug 2009

Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida

International Conference on Information and Communication Technologies

Quality of features determines the maximum achievable accuracy by any arbitrary classifier in pattern classification problem. In this paper, we have proposed an index that can assess the quality of features in discrimination of patterns in different classes. This index is in-sensitive to the complexity of boundary separating different classes if there is no overlap among features of different classes. Proposed index is model free and requires no clustering algorithm to discover the clustering structure present in the feature space. It is only based on the information of local neighborhood of feature vectors in the feature space. This index can …


Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain Aug 2009

Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain

International Conference on Information and Communication Technologies

An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …


Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar Aug 2005

Poster Session A: Address Auto-Configuration In Mobile Ad Hoc Networks Using Olsr, M.U. Saleem, Shoaib Mukhtar

International Conference on Information and Communication Technologies

Mobile Ad Hoc Networks is dynamic multi-hop network that is formed by a set of mobile wireless nodes that are sharing the same bandwidth. So every node possibly acts as a host as well as a router. In traditional networks, hosts can depend on the central servers like DHCP for IP assignment and management, but it cannot be extended to MANET due to its distributed and dynamic nature. Many solutions have been proposed, amongst them some are try to extend the stateless configuration of IPv6 for MANET; others distribute IP addresses among nodes (using binary distribution). Most of these proposed …


Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki Aug 2005

Keynote: The Segmentation Problem In Arabic Character Recognition: The State Of The Art, Ahmed M. Zeki

International Conference on Information and Communication Technologies

Arabic characters are used in several languages other than Arabic, despite to this fact; Arabic Character Recognition (ACR) has not received enough interests by researchers. Little researchprogress has been achieved comparing to the one done on the Latin or Chinese and the solutions available in the market are still far from being perfect. However, recent years have shown a considerable increase in the number of research papers. The cursive nature of Arabic writing makes the process of recognition a very challenging one. Several methods to segment the Arabic words into characters have been proposed in the past two decades. This …


A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah Aug 2005

A Visual Tool For Trellis Construction And Decoder Debugging Rac Array Codes, Lami Kaya, Muhammad -Al- Qudah

International Conference on Information and Communication Technologies

We have developed a visual tool for can be added to a specific RAC array positions and their effect can be easily determined by the help of the visual tool. The program environment has been set in a adaptive manner in order to change different parameters of the RAC codes and see their effect directly. decoding of row and column (RAC) array codes. The visual tool provides interface to view all paths corresponding selected input information bits. Errors constructing trellis diagram and tracing Viterbi.


A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed Aug 2005

A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed

International Conference on Information and Communication Technologies

The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …


Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat Aug 2005

Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat

International Conference on Information and Communication Technologies

Early work for unification of information extraction and data mining is motivational and problem stated work. This paper proposes a solution framework for unification using intelligent agents. A Relation manager agent extracted feature with cross feedback approach and also provide a Unified Undirected graphical handle. An RPM agent an approach to minimize loop back proposes pooling and model utilization with common parameter for both text and entity level abstractions.


Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah Aug 2005

Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah

International Conference on Information and Communication Technologies

Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …