透過您的圖書館登入
IP:18.117.91.153

Mehran University Research Journal of Engineering and Technology

  • OpenAccess

Mehran University of Engineering and Technology,正常發行

選擇卷期


已選擇0筆
  • 期刊
  • OpenAccess
JUNAID BABER MAHEEN BAKHTYAR IHSAN ULLAH 以及其他 2 位作者

In this paper, we propose simple and effective compression of CSLBP (Center Symmetric Local Binary Pattern) descriptors, which is a textured based operator and mostly used as key point descriptor. With default parameters for computation, it is 256-length descriptor for each keypoint or affine patch. CSLBP is an extended form of LBP (Local Binary Patterns). The calculation of CSLBP descriptor is effective, robust, and straightforward for different image transformations for instance; image blurring and illumination alteration. However, an improvement in time and space consumption of CSLBP can be attained by means of simple compression. For this reason, CSLBP is a smart choice for smart phones as well as large databases. We reduce the descriptor length (dimensions) upto 50% without applying any techniques of dimensionality reduction like PCA (Principle Component Analysis) or LDA (Linear Discriminant Analysis). The compressed CSLBP descriptor is denoted as C-CSLBP. The performance of C-CSLBP is evaluated on state-of-the-art datasets using standard metrics. It is quantitatively shown by experiments that C-CSLBP is equivalently effective compared to CSLBP despite of reduced dimensions.

  • 期刊
  • OpenAccess

In an image processing field the digital image recovery is termed as inpainting. Efficient retrieval of an image, especially having large objects with high curvature and complex texture is an immensely challenging problem for image inpainting researchers and practitioner. This enthused researchers and emerge various inpainting algorithms and many are in progress. Generally inpainting techniques approaches the available area source of given image(s) to restore the unavailable area target by the information available at the target edge. This paper represents a novel approach BSDD (Blended Spatial and Dimensional Distances) by sampling patches at each pixel of the source region. From the given sample, selection of local edge patch is gradient based without priority computation overhead as previous techniques. These local patches are searched globally by linear distance in which both spatial and dimensional distances are considered with regularization factor. The main motive of this method consists in achieving the efficiency, curvature and textural challenges of inpainting without compromising the quality of inpainted image. We have tested the proposed method in real as well as synthetic images with high curvature and complex textures in all cases results are comparable with other well-known techniques. In view of quality and optical the proposed algorithm exhibits better results.

  • 期刊
  • OpenAccess

MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle fieled operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios.

  • 期刊
  • OpenAccess

This paper presents an approach used for automated generations of software constraints. In this model, the SBVR (Semantics of Business Vocabulary and Rules) based semi-formal representation is obtained from the syntactic and semantic analysis of a NL (Natural Language) (such as English) sentence. A SBVR representation is easy to translate to other formal languages as SBVR is based on higher-order logic like other formal languages such as OCL (Object Constraint Language). The proposed model endows with a systematic and powerful system of incorporating NL knowledge on the formal languages. A prototype is constructed in Java (an Eclipse plug-in) as a proof of the concept. The performance was tested for a few sample texts taken from existing research thesis reports and books.

  • 期刊
  • OpenAccess

Due to the increasing environmental concerns, the demand of clean and green energy and concern of atmospheric pollution is increasing. Hence, the power utilities are forced to limit their emissions within the prescribed limits. Therefore, the minimization of fuel cost as well as exhaust gas emissions is becoming an important and challenging task in the short-term scheduling of hydro-thermal energy systems. This paper proposes a novel algorithm known as WCA-ER (Water Cycle Algorithm with Evaporation Rate) to inspect the short term EEPSHES (Economic Emission Power Scheduling of Hydrothermal Energy Systems). WCA has its ancestries from the natural hydrologic cycle i.e. the raining process forms streams and these streams start flowing towards the rivers which finally flow towards the sea. The worth of WCA-ER has been tested on the standard economic emission power scheduling of hydrothermal energy test system consisting of four hydropower and three thermal plants. The problem has been investigated for the three case studies (i) ECS (Economic Cost Scheduling), (ii) ES (Economic Emission Scheduling) and (iii) ECES (Economic Cost & Emission Scheduling). The results obtained show that WCA-ER is superior to many other methods in the literature in bringing lower fuel cost and emissions.

  • 期刊
  • OpenAccess

In this paper, we investigate numerically the effect of thermal boundary conditions on conjugated conduction-free convection heat transfer in an annulus between two concentric cylinders using Fourier Spectral method. The inner wall of the annulus is heated and maintained at either CWT (Constant Wall Temperature) or CHF (Constant Heat Flux), while the outer wall is maintained at constant temperature. CHF case is relatively more significant for high pressure industrial applications, but it has not received much attention. This study particularly focuses the latter case (CHF). The main influencing parameters on flow and thermal fields within the annulus are: Rayleigh number Ra; thickness of inner wall Rs; radius ratio Rr and inner wall-fluid thermal conductivity ratio Kr. The study has shown that the increase in Kr increases the heat transfer rate through the annulus for heating at CWT and decreases the inner wall dimensionless temperature for heating at CHF and vice versa. It has also been proved that as the Rs increases at fixed Ra and Rr, the heat transfer rate decreases for heating at CWT and the inner wall dimensionless temperature increases for heating at CHF at Kr <1. The study has also discussed that the effect of increase in Rs for both cases of heating at Kr>1 depends on Rr. It has been shown that for certain combinations of controlling parameters there will be a value of Rr at which heat transfer rate will be minimum in the annulus in case of heating at CWT, while there will be a value of Rr at which inner wall dimensionless temperature will be maximum in case of heating at CHF.

  • 期刊
  • OpenAccess

Techniques for the cavity measurement of the electrical characteristics of the materials are well established using the approximate method due to its simplicity in material insertion and fabrication. However, the exact method which requires more comprehensive mathematical analysis as well, owing to the practical difficulties for the material insertion, is not mostly used while performing the measurements as compared to approximate method in most of the works. In this work the comparative analysis of both the approximate as well as Exact method is performed and accuracy of the Exact method is established by performing the measurements of non-magnetic material Teflon within the cavity.

  • 期刊
  • OpenAccess
WAQAS MAHMOOD NABEEL ALI KHAN NOOR MUHAMMAD MEMON 以及其他 1 位作者

A technique of cross-term suppression in WD (Wigner Distribution) for a multi-component signal that is embedded WGN (White Gaussian Noise) is proposed. In this technique, an optimized algorithm is developed for time-varying noisy signal and a CAD (Computer Aided Design) simulator is designed for Numerical simulations of synthetic signal. In proposed technique, signal components are localized in t-f (time frequency) plane by STFT (Short Time Fourier Transform). Rectified STFT is computed and Spectral Kurtosis is used to separate a signal components from noise in t-f plane. The t-f plane is segmented and then signal components are filtered out by FFT (Fractional Fourier Transform). Finally, WD (free of cross terms) of isolated signal component is computed to obtain high resolution in t-f plane.

  • 期刊
  • OpenAccess

Sustainability achievement in difficult-to-machine materials is major concern now-a-days. This paper presents sustainability assessment of machining titanium alloy Ti-6Al-4V. Face milling of Ti-6Al-4V hardened to 55 HRC with PVD (Physical Vapour Deposition) coated inserts was analyzed for dry, conventional and cryogenic cooling modes. Experiments were designed using CCD (Central Composite Design) for modeling and analysis of surface roughness. Feed, speed and depth of cut were used as input parameters. For a specific surface finish, the three cooling modes were compared for cutting power, machining time and material removal rate. The results indicate that cryogenic cooling was more sustainable as compared to dry and conventional cooling process. This sustainable model will help to select sustainable input parameters.

  • 期刊
  • OpenAccess

With the emergence of internet and WWW (World Wide Web), traditional businesses got a new opportunity to compete globally. A new term of M-Commerce (Mobile Commerce) emerged and set a new trend in commerce and business. Traditional bricks-and-mortar businesses became e-business (electronic business) with the help of ICT (Information & Communication Technology) tools. Evidences from literature review suggest that there has been little growth in the acceptance of M-commerce in developing economies such as Pakistan as compared to developed economies. There are doubts that users of M-commerce demonstrate a lack of enthusiasm, which may be because of the lack of trustworthiness. Based on the well-known and widely used TAM (Technology Acceptance Model), this study provides the theoretical underpinning and empirical evidence between the relationships of trust construct with the adoption of M-commerce in Pakistan. A cross sectional questionnaire survey was conducted to collect data from M-commerce users in Pakistan to check the influence of trust. After the analysis of 390 valid responses obtained results indicate that trust and other constructs of TAM are related and there is positive and significant role of trust in the acceptance of M-commerce in Pakistan. Results also prove the hypothesized relationship among all constructs of proposed Model.