Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 4 )

2018 ( 15 )

2017 ( 11 )

2016 ( 18 )

Custom range...

Search Results: 1 - 10 of 575 matches for " Sajjad Mohsin "
All listed articles are free for downloading (OA Articles)
Page 1 /575
Display every page Item
Real Time Face Detection Using Skin Detection (Block Approach)
Muhammad Sharif,Sajjad Mohsin,Muhammad Younas Javed
Journal of Applied Computer Science & Mathematics , 2011,
Abstract: Role of Face recognition in security applications can never be overstated, that is why researchers around the world are still actively participating in this area. The initial step in the procedure of face recognition is to detect it efficiently. In this paper, a hybrid technique is being proposed using skin detection (in RGB color space) and block approach. This fusion is proposed to achieve fast skin detection. Along with the fusion, template matching is also used for detection purpose. Block approach for skin detection means dividing the image into square blocks virtually and then applying the detection ratios on corner pixels. If the corner pixels satisfy the ratios completely, the whole block will be considered as a skin block and if none of them satisfies these ratios, the block will be treated as a non-skin block. Even if some of the corner pixels satisfy the ratios, then the block will be searched for skin pixels. In this way, it will rapidly detect a face in an image including high resolution pixels. The experiments are carried out and the results have shown the significant improvements both in time and accuracy of the detection, that has prove the fastness and robustness of the proposed technique.
A Survey: Face Recognition Techniques
Muhammad Sharif,Sajjad Mohsin,Muhammad Younas Javed
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: In this study, the existing techniques of face recognition are to be encountered along with their pros and cons to conduct a brief survey. The most general methods include Eigenface (Eigenfeatures), Hidden Markov Model (HMM), geometric based and template matching approaches. This survey actually performs analysis on these approaches in order to constitute face representations which will be discussed as under. In the second phase of the survey, factors affecting the recognition rates and processes are also discussed along with the solutions provided by different authors.
Face Recognition Based on Facial Features
Muhammad Sharif,Muhammad Younas Javed,Sajjad Mohsin
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: Commencing from the last decade several different methods have been planned and developed in the prospect of face recognition that is one of the chief stimulating zone in the area of image processing. Face recognitions processes have various applications in the prospect of security systems and crime investigation systems. The study is basically comprised of three phases, i.e., face detection, facial features extraction and face recognition. The first phase is the face detection process where region of interest i.e., features region is extracted. The 2nd phase is features extraction. Here face features i.e., eyes, nose and lips are extracted out commencing the extracted face area. The last module is the face recognition phase which makes use of the extracted left eye for the recognition purpose by combining features of Eigenfeatures and Fisherfeatures.
Impact of Tangible and Intangible Rewards on Organizational Commitment: Evidence from the Textile Sector of Pakistan  [PDF]
Shahnawaz Saqib, Muhammad Abrar, Hazoor Muhammad Sabir, Mohsin Bashir, Sajjad Ahmad Baig
American Journal of Industrial and Business Management (AJIBM) , 2015, DOI: 10.4236/ajibm.2015.53015
Abstract: This study explores the relationship between tangible rewards, intangible rewards and organizational commitment with the mediating role of collectivism in the textile sector of Pakistan. In total, 250 questionnaires were distributed. The response rate was 81%. Data were analyzed by using SPSS (20.0) software. Results showed that collectivism was negatively correlated with tangible and intangible rewards and positively correlated with organizational commitment. Further results showed that tangible and intangible rewards had a significant impact on the organizational commitment. Moreover, mediating role of collectivism has also been proved. Theoretical & managerial implications, recommendations and limitations for future research have been discussed.
Employee’s Participation in Decision Making and Manager’s Encouragement of Creativity: The Mediating Role of Climate for Creativity and Change  [PDF]
Ali Zubair, Mohsin Bashir, Muhammad Abrar, Sajjad Ahmad Baig, Shaher Yar Hassan
Journal of Service Science and Management (JSSM) , 2015, DOI: 10.4236/jssm.2015.83033
Abstract: This paper examined the relationships among employee’s participation in decision making (PDM), manager’s encouragement of creativity (MEOC) and employee’s creativity (CTY) and the role of climate for creativity and change (CLT) as a possible mediator among the relationships. Multisource data was collected from 206 employees and their managers. The results indicated that employee’s participation in decision making and manager’s encouragement of creativity were positively related with employee’s creativity. Support was also found for the role of climate for creativity and change as a partial mediator. Findings suggested that employee’s creativity was positively related with employee’s participation in decision making and manager’s encouragement of creativity through climate for creativity and change.
New Wavelet Thresholding Algorithm in Dropping Ambient Noise from Underwater Acoustic Signals  [PDF]
Mohammad Monirujjaman Khan, Ratil Hasnat Ashique, Badrun Naher Liya, Md. Mohsin Sajjad, Md. Anisur Rahman, M. T. Hasan Amin
Journal of Electromagnetic Analysis and Applications (JEMAA) , 2015, DOI: 10.4236/jemaa.2015.73006
Abstract: Underwater Wireless Communication, largely dependent on the acoustic communication between the machines, is largely affected by various types of noise in the shallow and deep water. However ambient noise which is due to multiple sources (e.g. shipping, wind) and no one source dominates. Ambient noise masks the acoustic signal to a large extent. Hence today it has drawn the attention of the experts to reduce its effect on the received signal. This paper discusses ambient noise problem and devises a new wavelet thresholding method to reduce its effect. Afterwards a comparative study on statistical parameters is shown to prove the efficiency of the devised method.
Enhanced SVD Based Face Recognition
Muhammad SHARIF,Saad ANIS,Mudassar RAZA,Sajjad MOHSIN
Journal of Applied Computer Science & Mathematics , 2012,
Abstract: One of the demanding tasks in face recognition is to handle illumination and expression variations. A lot of research is in progress to overcome such problems. This paper addresses the preprocessing method that is composed of grouping SVD perturbation and DWT. The proposed technique also performs well under one picture per person scenarios. The resulting image of this method is fed in to the simple SVD algorithm for face recognition. This paper performs its accuracy test on ORL, Yale, PIE and AR databases and focuses on the illumination problems
Face Recognition using Gabor Filters
Muhammad SHARIF,Adeel KHALID,Mudassar RAZA,Sajjad MOHSIN
Journal of Applied Computer Science & Mathematics , 2011,
Abstract: An Elastic Bunch Graph Map (EBGM) algorithm is being proposed in this research paper that successfully implements face recognition using Gabor filters. The proposed system applies 40 different Gabor filters on an image. As aresult of which 40 images with different angles and orientation are received. Next, maximum intensity points in each filtered image are calculated and mark them as Fiducial points. The system reduces these points in accordance to distance between them. The next step is calculating the distances between the reduced points using distance formula. At last, the distances are compared with database. If match occurs, it means that the image is recognized.
Performance Evaluation of Bionomic Algorithm (BA) in Comparison with Genetic Algorithm (GA) for Shortest Path Finding Problem
Saira Beg,Azam Khan,Umar Nauman,Sajjad Mohsin
International Journal of Computer Science Issues , 2011,
Abstract: This paper presents performance evaluation of Bionomic Algorithm (BA) for Shortest Path Finding (SPF) problem as compared with the performance of Genetic Algorithm (GA) for the same problem. SPF is a classical problem having many applications in networks, robotics and electronics etc. SPF problem has been solved using different algorithms such as Dijkstras Algorithm, Floyd including GA, Neural Network (NN), Tabu Search (TS), and Ant Colony Optimization (ACO) etc. We have employed Bionomic Algorithm for solving the SPF problem and have given the performance comparison of BA vs. GA for the same problem. Simulation results are presented at the end which is carried out using MATLAB.
Journal of Theoretical and Applied Information Technology , 2011,
Abstract: Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.
Page 1 /575
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.