Search or add a thesis

Advanced Search (Beta)
Home > A Security System Employing Edge-Based Rasterstereography

A Security System Employing Edge-Based Rasterstereography

Thesis Info

Access Option

External Link

Author

Waseem, Muhammad

Program

PhD

Institute

Hamdard University

City

Karachi

Province

Sindh

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10538/1/PhD%20Thesis-M.Wasim-ITP-F06-103-Hamdard%20University.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727688631

Similar


The present research is related to human-face recognition using edge-based rasterstereography, which has the potential to be used as identification-based security system. In this respect a modified raster grid is used instead of conventional raster grid. The modification, mainly, consists of equally-spaced circular dots instead of conventional screen composed of stacked squares, which gave acceptable results for green color. This modified raster grid was projected on human face, distortions of which were used to extract curvature information — unique for a face (principal identification and recognition criterion). This information, in coördinate form, was processed by image-processing algorithms. Registration, identification and verification were the three phases of face-recognition system. In the first step, subject’s face was captured by a digital camera and stored in the system database. In the second phase, the registered face was compared with all the stored faces in the database. In the third phase, verification process executed, which consisted of comparing the identified face with own stored template. Once the facial image passed these three stages, the face was recognized as a particular individual. The algorithm, developed as such was tested on human faces; 380 out of 400 were, correctly, recognized. This algorithm was computationally efficient and effective. The edge-based-rasterstereographic-face-recognition system has been achieved to an extent of efficient 95% for identification and security purposes as time and cost-saving mechanism.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

106. Al-Quraysh/The (Tribe of) Quraysh

106. Al-Quraysh/The (Tribe of) Quraysh

I/We begin by the Blessed Name of Allah

The Immensely Merciful to all, The Infinitely Compassionate to everyone.

106:01
a. In gratitude for safeguarding the Tribe of Quraysh,

106:02
a. and for their security of annual trade journey of winter to Yemen and of summer to Palestine-Syria, on which their prosperity depended,

106:03
a. they should submit in awe and worship to Rabb - The Lord of this House of Ka’bah,

106:04
a. for HE is The One WHO provides them with food against impoverishment, and
b. gives them peace and security against fear/danger.

الالتفات في القرآن الكريم دراسة تحليلية

The paper deals with the different styles  of iltifāt  found in the Holy Qur’ān  and coming out with a general scheme to account for its occurrence in order to enhance the understanding of the subtleties of this feature of Qur’ān ic style. To accomplish this, the research was carried out by way of an analytical study of the instances of iltifāt  in the Holy Qur’ān. As a prelude to the discussion of this subject, the research provides the meaning of iltifāt  among the Arab rhetoricians and the status of iltifāt  as one of the rhetorical tropes. The paper also discussed the significations of iltifāt  which have already been mentioned by previous scholars, and since those scholars touched on the significations only briefly, therefore, the research strived to explore further aspects of their interpretations making an effort to highlight new significations of iltifat and an attempt to introduce a new approach in looking at the iltifāt  phenomenon, in different Sura’hs of          Qur’ān, to demonstrate the application of this new perspective. Finally the research shows that the occurrence of iltifÉt in the Qur’ān  follows certain patterns that are related to the intended significations at the various locations where they appear in the Qur’ān.

Optimization of Space Time Coded Multi-User Systems Through a Variety of Algorithms

Multi-user systems such as Multi-Carrier Code Division Multiple Access (MC-CDMA) and Orthogonal Frequency Division Multiple Access (OFDMA) are very frequently use in modern communication networks like 4G, MOTO4A, etc. These systems utilize the available bandwidth effectively. In order to maximize the capacity and encounter the high data rate demand, much emphasis given to coding techniques for effective utilization of resources at the transmitter end. Similarly, a variety of algorithms is evolve to separate and detect the data of users at the receiver end of multi-user system. Optimization of both transmitter and receiver is still a very attractive research area for future communication systems. One of the famous coding techniques is Space Time Block Codes (STBC). STBC are implement in single layer and does not give so attractive results in multi-user systems. Nowadays, two layer coding mechanism is being used in Multiple Input Multiple Output (MIMO) systems. In this approach, coding process is apply in two layers for better data recovery. In multicarrier systems, Fourier transform is common for frequency domain spreading. It consumes more bandwidth due to addition of cyclic prefixes at transmitter end. Another transformation namely, Slantlet transform is receiving good attention due to its benefit of bandwidth cutback as it does not need addition of cyclic prefixes. The received data can be recover with the help of different conventional adaptive algorithms like Least Mean Square (LMS) and Recursive Least Square (RLS). The conventional LMS and RLS have slow convergence rate and high Bit Error Rate (BER) because of static step size iv and forgetting factor. The performance of these algorithms can be improve with adaptive step size in case of LMS and adaptive forgetting factor in case of RLS for multi-user systems like MC-CDMA and OFDMA. Unconventional algorithms like Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) also used to achieve better performance of multi-user systems. In this thesis, the initial work is divide in two parts on MC-CDMA systems. Initially, the two layered-CDMA codes are focus on MC-CDMA systems. The Multi User Detection (MUD) of this system is implement with conventional LMS and proposed Fuzzy logic based LMS. Later, the single layered space-time block codes is adopt on MC-CDMA systems for exploring the MUD different conventional LMS types. The GA is implement on the same system with proposed GA depth study for MUD. The cooperative coevolutionary algorithms are also test for MUD. In order to overcome high bandwidth consumption issue, the Slantlet transform is propose instead of Fourier Transform for Frequency/Time domain transformations. Lastly, the in depth of MUD on OFDMA is also the part of this thesis. The OFDMA systems are study with proposed Fuzzy LMS and Fuzzy RLS algorithms for MUD. The Soft-PSO is also implement for MUD. Lastly, the proposed algorithm namely Piranha Fish Optimization (PFO) is implement for MUD on OFDMA systems. The opposition based learning concept implemented on PFO. All the proposed schemes evaluated in well comparative manner, which shows its key significance in domain of multi-user systems.