Papers by Bhawani Shankar Chowdhry
International Journal of Computer Applications, 2012
ABSTRACT
This paper presents an improved version of the features based on Discrete Fourier Transform (DFT)... more This paper presents an improved version of the features based on Discrete Fourier Transform (DFT) for texture description that demonstrate robustness against rotation. The features have been tested on cropped parts of textures from Brodatz collection and their rotated versions. The results show improved performance for both, recognition as well as retrieval as compared to texture features based on Gabor filter and older version of the DFT based features.
2009 2nd IEEE International Conference on Computer Science and Information Technology, 2009
This paper reviews the need for strategic information by the business enterprise, the business ex... more This paper reviews the need for strategic information by the business enterprise, the business executive and the information service provider, and answers the question whether commercially available software fulfils the organizational requirements. We also summarize how those requirements have been evolving throughout the past four decades.
2003 Third IEEE Conference on Nanotechnology, 2003. IEEE-NANO 2003., 2003
Absfracf-The model of spin transistor has been proposed in our paper, which not only can amplify ... more Absfracf-The model of spin transistor has been proposed in our paper, which not only can amplify spin-flow hut also may perform logic operation and manipulate quantum information. The model is a square matrix of order 3 by 3; a quantum matrix consisting of nine quantum dots. Elements of column 1 must be made up of different semiconductors to produce dissimilar carrier precessions. Column 2 is a ferromagnetic semiconductor, which has to accept carriers from column 1. Column 3 is also ferromagnetic semiconductor, hut its elements must match in characteristics with their respective elements in column 1. Magnetic tunnel junction separates column 2 and column 3. In column 1, spin-polarized electrons are made to precess with the application of magnetic field and then drove to column 2 by applying diNerent electric fields to the quantum dots of column 1. In column 2, suppose one of the electrons has lost its precessional characteristics of column 1 because of weak electric field that pushed it in column 2 and adopts that ofcolumn 2. The magnetic tunnel junction between will compare polarizations of electrons between column 2 and column 3 and admit only those electrons whose spins are matched on both sides. Consequently, one quantum dot in column 3 does not get any electron and other dot whose characteristics bears a resemblance to column 2 may get two electrons. Hence an empty quantum dot will represent a logic '0' for the weak electric filed applied a t column 1 and the quantum dot with twice number of electrons will show a logical '1' and spin-dependent-flow amplification.
2003 Third IEEE Conference on Nanotechnology, 2003. IEEE-NANO 2003., 2003
Absfracf-The model of spin transistor has been proposed in our paper, which not only can amplify ... more Absfracf-The model of spin transistor has been proposed in our paper, which not only can amplify spin-flow hut also may perform logic operation and manipulate quantum information. The model is a square matrix of order 3 by 3; a quantum matrix consisting of nine quantum dots. Elements of column 1 must be made up of different semiconductors to produce dissimilar carrier precessions. Column 2 is a ferromagnetic semiconductor, which has to accept carriers from column 1. Column 3 is also ferromagnetic semiconductor, hut its elements must match in characteristics with their respective elements in column 1. Magnetic tunnel junction separates column 2 and column 3. In column 1, spin-polarized electrons are made to precess with the application of magnetic field and then drove to column 2 by applying diNerent electric fields to the quantum dots of column 1. In column 2, suppose one of the electrons has lost its precessional characteristics of column 1 because of weak electric field that pushed it in column 2 and adopts that ofcolumn 2. The magnetic tunnel junction between will compare polarizations of electrons between column 2 and column 3 and admit only those electrons whose spins are matched on both sides. Consequently, one quantum dot in column 3 does not get any electron and other dot whose characteristics bears a resemblance to column 2 may get two electrons. Hence an empty quantum dot will represent a logic '0' for the weak electric filed applied a t column 1 and the quantum dot with twice number of electrons will show a logical '1' and spin-dependent-flow amplification.
Communications in Computer and Information Science, 2009
1 Institute of Information Technology, University of Sindh, Jamshoro, Pakistan 2 Department of Bi... more 1 Institute of Information Technology, University of Sindh, Jamshoro, Pakistan 2 Department of Biomedical Engineering, Mehran University of Engineering & Technology (MUET), Jamshoro, Pakistan 3 Department of Radiology, LUMHS, Jamshoro, Pakistan 4 Institute ...
Communications in Computer and Information Science, 2009
1 Institute of Information Technology, University of Sindh, Jamshoro, Pakistan 2 Department of Bi... more 1 Institute of Information Technology, University of Sindh, Jamshoro, Pakistan 2 Department of Biomedical Engineering, Mehran University of Engineering & Technology (MUET), Jamshoro, Pakistan 3 Department of Radiology, LUMHS, Jamshoro, Pakistan 4 Institute ...
Communications in Computer and Information Science, 2009
... 243252, 2008. © Springer-Verlag Berlin Heidelberg 2008 Impact of Cluster Size on Efficient L... more ... 243252, 2008. © Springer-Verlag Berlin Heidelberg 2008 Impact of Cluster Size on Efficient LUT-FPGA Architecture for Best Area and Delay Trade-Off Khalil Dayo1, Abdul Qadeer Khan Rajput2, Bhawani S. Chowdhry1,3, and Narinder Chowdhry1 ...
Communications in Computer and Information Science, 2009
... 243252, 2008. © Springer-Verlag Berlin Heidelberg 2008 Impact of Cluster Size on Efficient L... more ... 243252, 2008. © Springer-Verlag Berlin Heidelberg 2008 Impact of Cluster Size on Efficient LUT-FPGA Architecture for Best Area and Delay Trade-Off Khalil Dayo1, Abdul Qadeer Khan Rajput2, Bhawani S. Chowdhry1,3, and Narinder Chowdhry1 ...
2006 Innovations in Information Technology, 2006
Sindh along the lower delta of Indus River is one of the world's most ancient... more Sindh along the lower delta of Indus River is one of the world's most ancient civilizations. Over the last six decades, people of Sindh have gone all over the world and have been successful in all fields of life. In order to maintain Sindhi environment in their homes, they have to acquire various things related to Sindh from various countries.
2006 Innovations in Information Technology, 2006
Sindh along the lower delta of Indus River is one of the world's most ancient... more Sindh along the lower delta of Indus River is one of the world's most ancient civilizations. Over the last six decades, people of Sindh have gone all over the world and have been successful in all fields of life. In order to maintain Sindhi environment in their homes, they have to acquire various things related to Sindh from various countries.
2009 2nd International Conference on Computer, Control and Communication, 2009
The user has requested enhancement of the downloaded file. All in-text references underlined in b... more The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document and are linked to publications on ResearchGate, letting you access and read them immediately.
2009 2nd International Conference on Computer, Control and Communication, 2009
The user has requested enhancement of the downloaded file. All in-text references underlined in b... more The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document and are linked to publications on ResearchGate, letting you access and read them immediately.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 269274, 2009. © Institute for Computer... more R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 269274, 2009. © Institute for Computer Science, Social-Informatics and Telecommunications Engineering 2009 ... Threats and Attacks in Wireless Sensor Networks ... Adnan Ashraf1, AbdulRauf Rajput1, Marvie ...
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 269274, 2009. © Institute for Computer... more R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 269274, 2009. © Institute for Computer Science, Social-Informatics and Telecommunications Engineering 2009 ... Threats and Attacks in Wireless Sensor Networks ... Adnan Ashraf1, AbdulRauf Rajput1, Marvie ...
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 3545, 2009. © Institute for Computer S... more R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 3545, 2009. © Institute for Computer Science, Social-Informatics and Telecommunications Engineering 2009 ... SNR Based Digital Estimation of Security in Wireless ... Adnan Ashraf1, AbdulRauf Rajput1, Marvie ...
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 3545, 2009. © Institute for Computer S... more R. Mehmood et al. (Eds.): EuropeComm 2009, LNICST 16, pp. 3545, 2009. © Institute for Computer Science, Social-Informatics and Telecommunications Engineering 2009 ... SNR Based Digital Estimation of Security in Wireless ... Adnan Ashraf1, AbdulRauf Rajput1, Marvie ...
2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, 2009
Security of wireless sensor network (WSN) remained an open research area throughout the current d... more Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security threats is overlooked as researchers' work appear limited in classification of security threats and, 2) security threats are not associated with security frameworks. In this paper, we perform classification of security threats comprehensively whereas, associating these threats to a security framework; we lead in this direction. We find that specifically to assess the impact of these threats.
2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, 2009
Security of wireless sensor network (WSN) remained an open research area throughout the current d... more Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security threats is overlooked as researchers' work appear limited in classification of security threats and, 2) security threats are not associated with security frameworks. In this paper, we perform classification of security threats comprehensively whereas, associating these threats to a security framework; we lead in this direction. We find that specifically to assess the impact of these threats.
Uploads
Papers by Bhawani Shankar Chowdhry