Search or add a thesis

Advanced Search (Beta)
Home > Dual Band Wireless Power Transfer Using Magnetic Resonance Based on Three Phase Inverter

Dual Band Wireless Power Transfer Using Magnetic Resonance Based on Three Phase Inverter

Thesis Info

Author

Ijhar Khan

Department

Department of Electrical Engineering, UET

Institute

University of Engineering and Technology

Institute Type

Public

Campus Location

UET Main Campus

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2017

Thesis Completion Status

Completed

Page

vi, 49 . : ill., table, grah+ CD

Subject

Engineering

Language

English

Other

HardCover; Include bibliographical references; Call No: I4D 621.381532

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676712699139

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

آرزوؔ لکھنوی

آرزوؔ لکھنوی
جناب آرزوؔ جلال لکھنوی کے جانشین اور اردو زبان و ادب کے ماہر و محقق تھے اس پر ان کی نگاہ بڑی وسیع تھی، انہوں نے اردو شاعری میں زبان کی سادگی و سہولت یا موجودہ اصطلاح میں ہندوستانیت کا نیا نمونہ قائم کیا، وہ حتی الامکان عربی اور فارسی کے مشکل الفاظ اور ترکیبوں سے پرہیز اور خالص ہندوستانی الفاظ استعمال کرتے تھے، جن شعراء نے ان کی تقلید کی کوشش کی وہ کامیاب نہ ہوسکے اور ان کی شاعری یا ہندی کوتاہ بن گئی یا بے رنگ و بے مزہ ہوگئی، آرزو کی یہ خصوصیت تھی کہ انہوں نے زبان کی ہندوستانیت کے ساتھ اردو شاعری کا آب ورنگ اور اس کی دلآویزی قائم رکھی، جو زبان پر ان کی غیر معمولی قدرت کا ثبوت ہے، انہوں نے اپنے کلام کے کئی مجموعے فغانِ آرزو، جہان آرزو، اور سریلی بانسری یادگار چھوڑے ہیں، ان دونوں اساتذہ کے بعد لکھنو پرانی یادگار سے خالی ہوگیا، بلکہ ان پر اس دورہی کا خاتمہ ہوگیا ، اﷲ تعالیٰ ان کی مغفرت فرمائے۔
(شاہ معین الدین ندوی، مئی ۱۹۵۱ء)

 

تفسیر قرآن میں ام المؤمنین سیدۃ عائشه کا مقام

Quran is the absolute and error free source of knowledge for all mankind. The words and meanings of the Quran both have been revealed by Allah and will remain unchanged for ever. The holy Quran was explained by the Holy prophet and by sahaba as well. Later on different scholars of Islam have made notable contribution in this regard. Many companions of the Holy prophet are famous in the explanation of the Holy Quran. Although Syyeda Aeshah is famous in the field of Hadith but she is one of most prominent Mufassrah of the Quran too. She has deep and correct knowledge of the Holy Quran. In this Article the status of Sayyedah Aesha in the field of tafseer has been discussed. Hopefully the readers will get useful information from this Article

Intelligent Image Watermarking Using Genetic Programming

Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this thesis a DWT based watermarking scheme is proposed. Wavelet transform is used because it has a number of advantages over other transforms, such as DCT. · It has multi-resolution hierarchical characteristics, and lower resolution embedding and detection which are computationally inexpensive. · The presentation of the image because of the hierarchical multi-resolution properties of the transformation is well-suited for applications where the multimedia data is transmitted regularly, as such in the application of video systems, or applications in real time. · Wavelet transform is closer to HVS contrast to DCT. For this reason, the range of artifacts introduced by wavelet is less infuriating as compared to DCT. For better imperceptibility, the watermarking technique should support a vision model which integrates various masking effects of the Human Visual System (HVS), to embed watermark in an invisible manner. For HVS we have used Watson’s Perceptual Model of JPEG2000. The basic aim of perceptual coding is, to conceal the watermark below the detection threshold. This can be obtained by making use of the HVS and JND threshold. The watermarking technique based on this model resists all types of common signal processing operations and many geometric attacks but unfortunately was not resistant against rotation. Keeping in mind this we explored Morton scanning. Morton scanning is used to