Storage and Retrieval for Image and Video Databases, 2006
The use of aerial photographs, satellite images, scanned maps and digital elevation models necess... more The use of aerial photographs, satellite images, scanned maps and digital elevation models necessitates the setting up of strategies for the storage and visualization in an interactive way of these data. In order to obtain a three dimensional visualization it is necessary to map the images, called textures, onto the terrain geometry computed with Digital Elevation Model (DEM). Practically,
This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled r... more This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled routing (PCR) and its enhanced version, i.e. enhanced power-controlled routing (EPCR). In both the protocols, fixed transmission power is employed in the clustering phase but when ordinary nodes are about to send their data to their respective cluster-heads, they change their transmission power according to their distance from their cluster-head. While in PCR, the nodes are associated with the cluster-head on the basis of weight, in EPCR it is done on the basis of distance. In addition to the protocols, we are suggesting a packet loss recovery mechanism for the PCR and EPCR. Both protocols work well for both mobile and static networks and are designed to achieve high network lifetime, high packet delivery ratio, and high network throughput. These protocols are extensively simulated using mass mobility model, with different speeds and different number of nodes to evaluate their performance. Simulation results show that both PCR and EPCR are successful in achieving their objectives by using variable transmission powers and smart clustering.
Abstract Soy protein was hydrolyzed using two enzymes to obtain soy protein hydrolysate (SPH), th... more Abstract Soy protein was hydrolyzed using two enzymes to obtain soy protein hydrolysate (SPH), the SPH was fractionated with ultrafiltration membranes to obtain peptide fractions below 1,000 Da (SP1) and 1,0005,000 Da (SP2), and for the meantime, SPH was further ...
In recent years, significant advancement in the wireless communication technologies, such as Blue... more In recent years, significant advancement in the wireless communication technologies, such as Bluetooth, 802.11/WiFi, and ZigBee, has been seen in mobile ad hoc networks (MANETs). Such technologies enable mobile devices to form on-the-fly data centers where nodes opportunistically participate in data storage and sharing applications [Hir13], [Kha12], . In such a setup, the basic assumption is that there must exist an end-to-end communication path between a source and a destination node [Hir13], [Kha12], . Every mobile host acts as a router and communicates with other mobile hosts. Even if source and destination mobile hosts are not in each others' communication range, data is still forwarded to the destination mobile host by relaying transmission through other mobile hosts that exist between the source and the destination nodes. The scenarios when there are frequent disruptions and delays in message transfer due to network partitioning, higher degree of variation in network topology, and sparsity of nodes, such network environments are known as Delay Tolerant Networks (DTNs) [Bal10], . The DTNs lack end-to-end communication paths between source and destination nodes. Numerous DTN scenarios that correspond to opportunistic data storage/sharing applications include [Voy12], [Con10]: (a) disaster/emergency response systems, (b) battlefield networks, (c) sensor networks, (d) road traffic information dissemination systems, (e) content dissemination systems, and (f) cellular traffic data offloading [Li13]. In the aforementioned scenarios, the cellular 3G infrastructure may usually be unavailable, or if available, provide too limited bandwidth to transmit data traffic. Instead, mobile users rely on their opportunistic contacts for storing, sharing, and accessing data. For instance, nodes may participate in forming an on-the-fly network to store information extracted from sensors, which may be the information regarding live weather data, road traffic condition, or about any upcoming disaster.
This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC). H... more This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC). HEVC is an emerging video compression standard that provides better compression performance as compared to its predecessor, i.e. H.264/AVC. Considering that HEVC may will be used in a variety of applications in the future, the proposed algorithm has a high potential of utilization in applications involving broadcast and hiding of metadata. The watermark is embedded into the Quantized Transform Coefficients (QTCs) during the encoding process. Later, during the decoding process, the embedded message can be detected and extracted completely. The experimental results show that the proposed algorithm does not significantly affect the video quality, nor does it escalate the bitrate.
The purpose of this study was to evaluate the effect of cyclodextrins (CDs) on carotene content a... more The purpose of this study was to evaluate the effect of cyclodextrins (CDs) on carotene content and quality of blended carrot-orange juice after enzymatic clarification. The blended carrot-orange juice was treated with 2-hydroxypropyl-β-cyclodextrin (HP-β-CD) and gamma cyclodextrin (γ-CD) in different concentrations (1–5 g/100 mL of juice) prior to enzymatic clarification. The results showed that in non-homogenized juice added with HP-β-CD, juice acidity
Journal of environmental science and health. Part A, Toxic/hazardous substances & environmental engineering, 2010
Nanoparticles of zinc oxide semiconductor were applied for removal of toxic organic pollutants su... more Nanoparticles of zinc oxide semiconductor were applied for removal of toxic organic pollutants such as dyes (alizarin yellow GG) from wastewater using laser induced photocatalytic process. A special photoreactor was designed for this purpose using local resources. Laser enhanced photo degradation of alizarin yellow GG (AYGG) was carried out by irradiating the contaminated aqueous solution with a 355 nm radiation generated from third harmonic of Nd:YAG laser. The effect of different operational parameters such as the initial dyes concentration, the concentration of photocatalyst, laser irradiation time, laser energy and pH on photocatalytic degradation of the dyes was investigated. It was observed that pH and the initial dyes concentration has a significant role in the dyes removal process. Using the optimum conditions (parameters), almost 90% degradation was achieved by nano ZnO in a short span of time. The efficiency achieved in this work using nano ZnO was much higher than micro Z...
A soft computing approach is being presented to detect brain tumors in magnetic resonance (MR) im... more A soft computing approach is being presented to detect brain tumors in magnetic resonance (MR) images with an aim to enhance system efficiency and performance by maximizing the detection rate and decrease false alarms. The idea is to overcome issues -like bad feature extraction/selection, complex classifier architecture, training/computational overheads -related to brain tumor classification. The proposed technique employ a state of the art curvelet transform for feature extraction and kernel principal component analysis (KPCA) to select a feature subset. This is followed by the use of either the support vector machine (SVM) or the multilayer perceptron neural network (MLP) in order to classify features selected in the form of the KPCA reduced matrix. The proposed approach has been applied to a dataset from a standard database and the ensued results establish that the effectiveness of the proposed technique.
We survey the optical character recognition (OCR) literature with reference to the Urdu-like curs... more We survey the optical character recognition (OCR) literature with reference to the Urdu-like cursive scripts. In particular, the Urdu, Pushto, and Sindhi languages are discussed, with the emphasis being on the Nasta'liq and Naskh scripts. Before detaining the OCR works, the peculiarities of the Urdu-like scripts are outlined, which are followed by the presentation of the available text image databases. For the sake of clarity, the various attempts are grouped into three parts, namely: (a) printed, (b) handwritten, and (c) online character recognition. Within each part, the works are analyzed par rapport a typical OCR pipeline with an emphasis on the preprocessing, segmentation, feature extraction, classification, and recognition.
Arabic and various Indic scripts received researcher attention after a long time of focus on East... more Arabic and various Indic scripts received researcher attention after a long time of focus on East Asian and Western whereas this script is used by 1/4th of the world population by many languages in several countries. Arabic script is more complex as compared to Latin script. One of such difficulty with Arabic script is multiple writing styles. Naskh and Nastaliq are the two most commonly style adopted by Arabic script based languages. This paper compares both writing style and concludes that why work done for Naskh cannot be applied for Nasta'liq writing style.
ABSTRACT Optical Character Recognition (OCR) is an important task with the rapid growth of the di... more ABSTRACT Optical Character Recognition (OCR) is an important task with the rapid growth of the digital computers, online information services, PDAs and for conversion of text documents into digital text. This task enhances preservation of records and makes the access to documents easier. So, Baseline detection is an important step in the OCR because it directly affects the rest of the steps and increase the performance and efficiency of character segmentation and feature extraction in OCR process. In this paper, we provide a comprehensive review of baseline detection methods for Urdu language. The aim of the paper is to introduce the challenges during baseline detection in cursive script languages for Nasta'liq and Naskh font.
The social computing, such as social networking services (SNSs) and social Networking Platforms (... more The social computing, such as social networking services (SNSs) and social Networking Platforms (SNPs) provide a coherent medium through which people can be interactive and socialize. The SNP is a Web-based social space, specifically designed for end user-driven applications that facilitate communication, collaboration and sharing of the knowledge through a variety of SNSs, such as text, video and audio streams. In the conventional SNPs, such as Facebook, LinkedIn and MySpace, computers are not capable of acquiring the information based on the common intelligence and human behaviour. This survey provides a comprehensive overview of the current SNSs and discusses different possibilities of incorporating the existing SNSs into the context-aware techniques that include semantic Web, social search and social recommendations. The contextaware computing provides services customisation based on the individual human characteristics, such as human preferences, mood, behaviours, and emotions. The Integration of contextual information with SNSs can be more useful and productive for the development of the intelligent social communicational services. This survey provides several possible future research directions especially in the field of social search and recommendation that can provide better social communication capabilities. Moreover, this study will provide new directions to the future researcher for designing future generation contextbased SNSs that provide services based on the on-demand collaboration.
The Co 0.6 Sn 0.4 Fe 2 O 4 nanoparticles with 20-nm size were prepared by chemical coprecipitatio... more The Co 0.6 Sn 0.4 Fe 2 O 4 nanoparticles with 20-nm size were prepared by chemical coprecipitation method. The material exhibits wasp-waist type M(H) loop at lower temperatures (below 360 K) that has been attributed to the simultaneous existence of double-exchange and superexchange interactions in these nanoparticles. It has been investigated that at 360 K and above, the double-exchange interactions (Fe 3? -O 2--Fe 2? and Co 2? -O 2--Fe 3? ) are stronger than the superexchange (Fe 3? -O 2--Fe 3? ) and vice versa. The temperature-dependent ac conductivity reveals the semiconductor-metal transition around 360 K. It is suggested that around 360 K, the metal-like behavior of nanoparticles is due to the dominant ferromagnetic order in the system, while below this temperature, the charge carriers are thermally activated and the material becomes antiferromagnetic in nature.
Storage and Retrieval for Image and Video Databases, 2006
The use of aerial photographs, satellite images, scanned maps and digital elevation models necess... more The use of aerial photographs, satellite images, scanned maps and digital elevation models necessitates the setting up of strategies for the storage and visualization in an interactive way of these data. In order to obtain a three dimensional visualization it is necessary to map the images, called textures, onto the terrain geometry computed with Digital Elevation Model (DEM). Practically,
This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled r... more This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled routing (PCR) and its enhanced version, i.e. enhanced power-controlled routing (EPCR). In both the protocols, fixed transmission power is employed in the clustering phase but when ordinary nodes are about to send their data to their respective cluster-heads, they change their transmission power according to their distance from their cluster-head. While in PCR, the nodes are associated with the cluster-head on the basis of weight, in EPCR it is done on the basis of distance. In addition to the protocols, we are suggesting a packet loss recovery mechanism for the PCR and EPCR. Both protocols work well for both mobile and static networks and are designed to achieve high network lifetime, high packet delivery ratio, and high network throughput. These protocols are extensively simulated using mass mobility model, with different speeds and different number of nodes to evaluate their performance. Simulation results show that both PCR and EPCR are successful in achieving their objectives by using variable transmission powers and smart clustering.
Abstract Soy protein was hydrolyzed using two enzymes to obtain soy protein hydrolysate (SPH), th... more Abstract Soy protein was hydrolyzed using two enzymes to obtain soy protein hydrolysate (SPH), the SPH was fractionated with ultrafiltration membranes to obtain peptide fractions below 1,000 Da (SP1) and 1,0005,000 Da (SP2), and for the meantime, SPH was further ...
In recent years, significant advancement in the wireless communication technologies, such as Blue... more In recent years, significant advancement in the wireless communication technologies, such as Bluetooth, 802.11/WiFi, and ZigBee, has been seen in mobile ad hoc networks (MANETs). Such technologies enable mobile devices to form on-the-fly data centers where nodes opportunistically participate in data storage and sharing applications [Hir13], [Kha12], . In such a setup, the basic assumption is that there must exist an end-to-end communication path between a source and a destination node [Hir13], [Kha12], . Every mobile host acts as a router and communicates with other mobile hosts. Even if source and destination mobile hosts are not in each others' communication range, data is still forwarded to the destination mobile host by relaying transmission through other mobile hosts that exist between the source and the destination nodes. The scenarios when there are frequent disruptions and delays in message transfer due to network partitioning, higher degree of variation in network topology, and sparsity of nodes, such network environments are known as Delay Tolerant Networks (DTNs) [Bal10], . The DTNs lack end-to-end communication paths between source and destination nodes. Numerous DTN scenarios that correspond to opportunistic data storage/sharing applications include [Voy12], [Con10]: (a) disaster/emergency response systems, (b) battlefield networks, (c) sensor networks, (d) road traffic information dissemination systems, (e) content dissemination systems, and (f) cellular traffic data offloading [Li13]. In the aforementioned scenarios, the cellular 3G infrastructure may usually be unavailable, or if available, provide too limited bandwidth to transmit data traffic. Instead, mobile users rely on their opportunistic contacts for storing, sharing, and accessing data. For instance, nodes may participate in forming an on-the-fly network to store information extracted from sensors, which may be the information regarding live weather data, road traffic condition, or about any upcoming disaster.
This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC). H... more This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC). HEVC is an emerging video compression standard that provides better compression performance as compared to its predecessor, i.e. H.264/AVC. Considering that HEVC may will be used in a variety of applications in the future, the proposed algorithm has a high potential of utilization in applications involving broadcast and hiding of metadata. The watermark is embedded into the Quantized Transform Coefficients (QTCs) during the encoding process. Later, during the decoding process, the embedded message can be detected and extracted completely. The experimental results show that the proposed algorithm does not significantly affect the video quality, nor does it escalate the bitrate.
The purpose of this study was to evaluate the effect of cyclodextrins (CDs) on carotene content a... more The purpose of this study was to evaluate the effect of cyclodextrins (CDs) on carotene content and quality of blended carrot-orange juice after enzymatic clarification. The blended carrot-orange juice was treated with 2-hydroxypropyl-β-cyclodextrin (HP-β-CD) and gamma cyclodextrin (γ-CD) in different concentrations (1–5 g/100 mL of juice) prior to enzymatic clarification. The results showed that in non-homogenized juice added with HP-β-CD, juice acidity
Journal of environmental science and health. Part A, Toxic/hazardous substances & environmental engineering, 2010
Nanoparticles of zinc oxide semiconductor were applied for removal of toxic organic pollutants su... more Nanoparticles of zinc oxide semiconductor were applied for removal of toxic organic pollutants such as dyes (alizarin yellow GG) from wastewater using laser induced photocatalytic process. A special photoreactor was designed for this purpose using local resources. Laser enhanced photo degradation of alizarin yellow GG (AYGG) was carried out by irradiating the contaminated aqueous solution with a 355 nm radiation generated from third harmonic of Nd:YAG laser. The effect of different operational parameters such as the initial dyes concentration, the concentration of photocatalyst, laser irradiation time, laser energy and pH on photocatalytic degradation of the dyes was investigated. It was observed that pH and the initial dyes concentration has a significant role in the dyes removal process. Using the optimum conditions (parameters), almost 90% degradation was achieved by nano ZnO in a short span of time. The efficiency achieved in this work using nano ZnO was much higher than micro Z...
A soft computing approach is being presented to detect brain tumors in magnetic resonance (MR) im... more A soft computing approach is being presented to detect brain tumors in magnetic resonance (MR) images with an aim to enhance system efficiency and performance by maximizing the detection rate and decrease false alarms. The idea is to overcome issues -like bad feature extraction/selection, complex classifier architecture, training/computational overheads -related to brain tumor classification. The proposed technique employ a state of the art curvelet transform for feature extraction and kernel principal component analysis (KPCA) to select a feature subset. This is followed by the use of either the support vector machine (SVM) or the multilayer perceptron neural network (MLP) in order to classify features selected in the form of the KPCA reduced matrix. The proposed approach has been applied to a dataset from a standard database and the ensued results establish that the effectiveness of the proposed technique.
We survey the optical character recognition (OCR) literature with reference to the Urdu-like curs... more We survey the optical character recognition (OCR) literature with reference to the Urdu-like cursive scripts. In particular, the Urdu, Pushto, and Sindhi languages are discussed, with the emphasis being on the Nasta'liq and Naskh scripts. Before detaining the OCR works, the peculiarities of the Urdu-like scripts are outlined, which are followed by the presentation of the available text image databases. For the sake of clarity, the various attempts are grouped into three parts, namely: (a) printed, (b) handwritten, and (c) online character recognition. Within each part, the works are analyzed par rapport a typical OCR pipeline with an emphasis on the preprocessing, segmentation, feature extraction, classification, and recognition.
Arabic and various Indic scripts received researcher attention after a long time of focus on East... more Arabic and various Indic scripts received researcher attention after a long time of focus on East Asian and Western whereas this script is used by 1/4th of the world population by many languages in several countries. Arabic script is more complex as compared to Latin script. One of such difficulty with Arabic script is multiple writing styles. Naskh and Nastaliq are the two most commonly style adopted by Arabic script based languages. This paper compares both writing style and concludes that why work done for Naskh cannot be applied for Nasta'liq writing style.
ABSTRACT Optical Character Recognition (OCR) is an important task with the rapid growth of the di... more ABSTRACT Optical Character Recognition (OCR) is an important task with the rapid growth of the digital computers, online information services, PDAs and for conversion of text documents into digital text. This task enhances preservation of records and makes the access to documents easier. So, Baseline detection is an important step in the OCR because it directly affects the rest of the steps and increase the performance and efficiency of character segmentation and feature extraction in OCR process. In this paper, we provide a comprehensive review of baseline detection methods for Urdu language. The aim of the paper is to introduce the challenges during baseline detection in cursive script languages for Nasta'liq and Naskh font.
The social computing, such as social networking services (SNSs) and social Networking Platforms (... more The social computing, such as social networking services (SNSs) and social Networking Platforms (SNPs) provide a coherent medium through which people can be interactive and socialize. The SNP is a Web-based social space, specifically designed for end user-driven applications that facilitate communication, collaboration and sharing of the knowledge through a variety of SNSs, such as text, video and audio streams. In the conventional SNPs, such as Facebook, LinkedIn and MySpace, computers are not capable of acquiring the information based on the common intelligence and human behaviour. This survey provides a comprehensive overview of the current SNSs and discusses different possibilities of incorporating the existing SNSs into the context-aware techniques that include semantic Web, social search and social recommendations. The contextaware computing provides services customisation based on the individual human characteristics, such as human preferences, mood, behaviours, and emotions. The Integration of contextual information with SNSs can be more useful and productive for the development of the intelligent social communicational services. This survey provides several possible future research directions especially in the field of social search and recommendation that can provide better social communication capabilities. Moreover, this study will provide new directions to the future researcher for designing future generation contextbased SNSs that provide services based on the on-demand collaboration.
The Co 0.6 Sn 0.4 Fe 2 O 4 nanoparticles with 20-nm size were prepared by chemical coprecipitatio... more The Co 0.6 Sn 0.4 Fe 2 O 4 nanoparticles with 20-nm size were prepared by chemical coprecipitation method. The material exhibits wasp-waist type M(H) loop at lower temperatures (below 360 K) that has been attributed to the simultaneous existence of double-exchange and superexchange interactions in these nanoparticles. It has been investigated that at 360 K and above, the double-exchange interactions (Fe 3? -O 2--Fe 2? and Co 2? -O 2--Fe 3? ) are stronger than the superexchange (Fe 3? -O 2--Fe 3? ) and vice versa. The temperature-dependent ac conductivity reveals the semiconductor-metal transition around 360 K. It is suggested that around 360 K, the metal-like behavior of nanoparticles is due to the dominant ferromagnetic order in the system, while below this temperature, the charge carriers are thermally activated and the material becomes antiferromagnetic in nature.
Uploads
Papers by Khizar Hayat