About
69
Publications
23,005
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
907
Citations
Current institution
Additional affiliations
June 2012 - April 2016
June 2012 - April 2016
July 2003 - June 2012
Publications
Publications (69)
Time-Frequency Signal Analysis and Processing (TFSAP) is a collection of theory and algorithms used for analysis and processing of nonstationary signals, as found in a wide range of applications including telecommunications, radar, and biomedical engineering. This book brings together the main knowledge of TFSAP, from theory to applications, in a u...
Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these enhancements are limited to specific scenarios and hence do not provide support for generic mobility. Similarly, various schemes are proposed based on these mobility models but most of them are suffered...
This paper presents a novel random controlled pool base differential evolution algorithm (RCPDE) where powerful mutation strategy and control parameter pools have been used. The mutation strategy pool contains mutations strategies having diverse parameter values, whereas the control parameter pool contains varying nature pairs of control parameter...
Heteroleptic palladium(II) complexes of the type formula [(DTC)(Pd)(PR3)Cl], where DTC = bis(2-ethylhexyl)dithiocarbamate (1,8,9,10), bis(2-methoxyethyl)dithiocarbamate (2), di-n-decyldithiocarbamate (3,6), di-n-hexyldithiocarbamate (4,7), bis(2-methylbutyl)dithiocarbamte (5); PR3 = diphenyl-t-butylphosphine (1), diphenyl-n-propylphosphine (2), tri...
Differential Evolution (DE) is a simple, powerful and easy to use global optimization algorithm. DE has been studied in detail by many researchers in the past years. In DE algorithm trial vector generation strategies have a significant influence on its performance. This research studies that whether performance of DE algorithm can be improved by in...
Differential evolution (DE) is a powerful global optimization algorithm which has been studied intensively by many researchers in the recent years. A number of variants have been established for the algorithm that makes DE more applicable. However, most of the variants are suffering from the problems of convergence speed and local optima. A novel t...
Requirement prioritization is an important and critical step in requirement analysis. Different prioritization techniques have been developed since the importance of requirements prioritization has been recognized. Our methodology is an attempt to enhance the result of existing methodologies in such a way that stakeholder satisfaction factor is inc...
Requirement prioritization is an important and critical step in requirement analysis. Different prioritization techniques have been developed since the importance of requirements prioritization has been recognized. Our methodology is an attempt to enhance the result of existing methodologies in such a way that stakeholder satisfaction factor is inc...
Achieving same notion of time remains an important task for most distributed systems. Time synchronization requires a unique combination of high accuracy ( \(\upmu \) s level) and energy efficiency. Several application layer protocols have been developed to meet these requirements. This article proposes that the physical layer clock recovery proces...
Traditional Kano Model is a human intensive activity which possibly results a non-realistic and biased consequences. This research study presents a value based evaluation of Kano questionnaires involving the stakeholders, experts and a fuzzy inference system to minimize the unnatural, non-realistic and biased results of traditional Kano Model. This...
Software industry has been rapidly growing from the last couple of decades. Due to this growth and advancement many issues are going to be occurred. There are number of factors that affect the whole software development process. This research has focused on the most important risk factors that affect the overall software project and risk mitigation...
Mixed-ligand palladium(II) complexes of the type [(DT)Pd(PR3)Cl], where DT=diethyldithiocarbamate (1), dibutyldithiocarbamate (2,3), dipropyldithiocarbamate (4,5), bis(2-methoxyethyl)dithiocarbamate; PR3=benzyldiphenylphosphine (1,4), diphenyl-o-tolylphosphine (2), diphenyl-t-butylphosphine (3), P-chlorodiphenylphosphine (5) and triphenylphosphine...
This paper presents the recognition of off line handwritten English characters using the forward only Counter Propagation network (CPN) algorithm Upper case English alphabets are used in this paper. In the recognition process different people's writing style are gathered. The obtained results in this paper show the effect of the learning rate and r...
A neural network-based method is presented for the diagnosis and classification of patients infected with hepatotropic viral disease. The non-invasive approach makes use of real-time pathological data in form of liver function tests and specific virological markers during training. The unknown patients, not included in the training set, are then pr...
By using aggregation of more than one physical interface enables aggregated links to work at the same time for enhancement of bandwidth and data speed beyond capability of single link with additional feature of resilience. However, inappropriate schemes may cause undesirable network behavior and thus requires high efficiency and reliability in its...
To cite this article: Waqas Haider Bangyal, Jamil Ahmad, Imran Shafi & Qamar Abbas (2012): A forward only counter propagation network-based approach for contraceptive method choice classification task, Journal of Experimental & Theoretical Artificial Intelligence, 24:2, 211-218 This article may be used for research, teaching, and private study purp...
This paper proposes the forward only counter propagation network (FOCPN) for solving the Balance Scale Weight & Distance (BSWD) classification task. Balance Scale Weight & Distance application is used for the psychological experiments and it is one of the challenging jobs. The forward only counter propagation network (FOCPN) has the architecture co...
Several types of surveillance Systems are available in market, having different functions like security, life savings, and safe driving etc. Currently all available surveillance systems are based on fixed radio access technology. In our work, we evaluate the problems with fixed Radio Access Technology (RAT) based surveillance systems, and then prop...
A multiple antenna-aided, minimum bit error rate–Bell Laboratories-layered space–time (MBER–BLAST) multiuser detection algorithm is proposed for uplink orthogonal frequency division multiplexing–space division multiple access (OFDM–SDMA) communication to increase the capacity of the system. The proposed algorithm overcomes the limitations of the co...
This paper describes the validity-guided fuzzy clustering evaluation for optimal training of localized neural networks (LNNs) used for reassigning time-frequency representations (TFRs). Our experiments show that the validity-guided fuzzy approach ameliorates the difficulty of choosing correct number of clusters and in conjunction with neural networ...
The objective of this research paper is to analyze the momentum term for the performance of Back Propagation (BP) Algorithm of Artificial Neural Network (ANN) for the problem of hand written digit recognition. The two variations of BP algorithm are simple BP algorithm and BP algorithm with momentum. In this paper BP with momentum is used for the pe...
The discussion on experimental results by the proposed approach and performance evaluation of various bilinear distributions is presented in this section. It uses objective methods of assessment to evaluate the performance of de–blurred TFDs estimated through BRNNM (henceforth the NTFDs). The objective methods allow quantifying the quality of TFDs...
Conflicts identification among non-functional requirements is often identified intuitively which impairs conflict analysis practices. This paper proposes a new model to identify
conflicts among non-functional requirements. The proposed model uses the matrix mechanism to identify the quality based conflicts among non-functional requirements. The po...
The objective of the research is to analyze the learning rate using BP algorithm of Artificial Neural Network (ANN) for hand written digit recognition application. In this paper the results are obtained using two variations of BP algorithm variations of Back Propagation (BP) algorithm: simple BP and BP with momentum. Different patterns of handwritt...
Narrowband jammer excision is formulated as an optimization problem in this paper. Optimal filter weights are calculated/searched for by the computational intelligence techniques. We compare the error rate performance, complexity, and implementation issues of various computational intelligence techniques like Particle Swarm Optimization (PSO), Gene...
his work evaluates the performance of high-resolution quadratic time-frequency distributions (TFDs) including the ones obtained by the reassignment method, the
optimal radially Gaussian kernel method, the t-f autoregressive moving-average spectral
estimation method and the neural network-based method. The approaches are rigorously
compared to each...
The research in hand is an effort to introduce a new efficient searching technique known as Multiple Values Bidirectional Square Root Search. In this technique, a sorted list of values can be searched from another sorted list very efficiently. The overall time for sorting the values to be searched and searching is less than the time taken by the Li...
We present a review of the diversity of concepts and motivations for improving the concentration
and resolution of time-frequency distributions (TFDs) along the individual components of the multi-component signals. The central idea has been to obtain a distribution that represents the signal's energy concentration simultaneously in time and frequen...
Composite design for energy minimization across PHY/MAC layers of the protocol stack as well as the underlying hardware in multi-hop wireless network is presented. We use truncated ARQ for two-fold purpose i) initialization of cooperative communications without CSI overhead and ii) to provide time diversity for MRC reception when the channel cohere...
In this paper, we compare the performance of several channel estimation techniques in training and pilot based OFDM systems. Both sample and non sample spaced channels have been considered along with null sub-carriers. We also present a modified interpolation based FFT estimator for training based channel estimation in presence of null sub-carriers...
This work objectively evaluates and presents a quantitative analysis of concentrated time-frequency distributions (TFDs) obtained through Network of Expert Neural Networks (NENNs). The objective methods include the ratio of norms based measures, Shannon & Rényi entropy measures, normalized Rényi entropy measure and Jubisa measure. The introduction...
Apriori algorithm has been successfully used for finding the frequent item sets in retail data. This research is about finding associations between diagnosis and treatments. It has shown that the algorithm is equally beneficent for finding the large item sets and thus generating the association rules in medical billing data. Resemblance between med...
Apriori algorithm has been successfully used for finding the frequent item sets in retail data. This research is about finding associations between diagnosis and treatments. It has shown that the algorithm is equally beneficent for finding the large item sets and thus generating the association rules in medical billing data. Resemblance between med...
We formulate the narrowband jammer excision as an optimization problem and present a new algorithm that is based on Particle
Swarm Optimization (PSO). In this paper particle positions represent the filter weights and particle velocity represents the
updating increment of the weighting matrix. Simulation and numerical results show that PSO based alg...
This paper presents an effective correlation vectored taxonomy algorithm to compute highly concentrated time-frequency distributions
(TFDs) using localized neural networks (LNNs). Spectrograms and pre-processed Wigner–Ville distributions of known signals
are vectorized and clustered as per the elbow criterion to constitute the training data for mul...
Combined equalization based on combination of pre and post equalizations in a multicarrier interleave division multiple access (MC-IDMA) system, is described. The channel pre-equalization is constrained to keep transmitted power unchanged. Combined-equalization requires explicit channel state information (CSI) both at the mobile station and the bas...
The main objective of this research is to provide security to confidential information contained in mobile devices like PDA's and laptops. Hence the model is proposed to ensure the secure authentication as well as secure access to the required information. The secure authentication is ensured by combining two previously used authentication modes in...
Prion protein (PrP) gene of 308 sheep was genotyped to investigate polymorphisms at scrapie-associated codons 136, 154 and 171 to assess the resistance of nine different Pakistani sheep breeds to natural/typical scrapie. As a result six genotypes were established on the basis of polymorphic codons 154 and 171. The most scrapie-susceptible codon 136...
The main objective of this paper is to provide an optimized solution and algorithm for the execution of a workflow process by ensuring the data consistency, correctness, completeness among various tasks involved. The solution proposed provides a synchronized and failure free flow of execution among various tasks involved in a workflow process. A sy...
The Minimum Bit Error Rate (MBER) detectors outperform the conventional Minimum Mean Squared Error (MMSE) detector by minimizing
the Bit Error Rate (BER) directly. In this paper an MBER multiuser detector for Orthogonal Frequency Division Multiplexing-Space
Division Multiple Access (OFDM-SDMA) system is proposed employing Particle Swarm Optimizatio...
Major drawback of Orthogonal Frequency Division Multiplexing (OFDM) is its high Peak to Average Power Ratio (PAPR) that exhibits
inter modulation noise when the signal has to be amplified with a non linear high power amplifier (HPA). This paper proposes
an efficient PAPR reduction technique by taking the benefit of the classification capability of...
In this paper we present advantage of training MNCD for obtaining time localized frequencies (also called IF), which is one useful concept for describing the changing spectral structure of a time-varying signal, arising so often in time frequency distribution (TFD) theory. It has been found that training does not give the same results every time; t...
Pakistan's software industry is quite young as compare to the developed world and particularly in comparison with India. This report presents different statistics about Pakistan's software industry; especially current number of Software-Capability Maturity Model (SW-CMM) / Capability Maturity Model Integration (CMMI) appraisals and efforts made by...
This paper presents a novel new technique based on feature extraction and on dynamic cursor sizing for the recognition of Arabic Text. The most challenging area in Arabic OCR (AOCR) research is the segmentation of words into their sub-words and their individual characters. Several rules are defined that govern the size and movement of the cursor th...
Time-frequency distributions (TFDs) that are highly concentrated in the time-frequency plane are computed using a Bayesian regularised neural network model. The degree of regularisation is automatically controlled in the Bayesian inference framework and produces networks with better generalised performance and lower susceptibility to over-fitting....
A new multiuser detection technique is proposed which is based on Gaussian approximation. The system uses conventional reverse link CDMA transmitter and a proposed receiver. In the receiver, the interference rejection block, known as Signal Reliability Estimator (SRE) and the decoder (DEC), exchange extrinsic information in an iterative manner. The...
In this paper, an experimental investigation is presented, to know the effect of varying the number of neurons and hidden layers in feed forward back propagation neural network architecture, for a time frequency application. Varying the number of neurons and hidden layers has been found to greatly affect the performance of neural network (NN), trai...
A Neural network (NN) based approach to obtain energy concentration along instantaneous frequencies (IFs) of the individual components present in the signal, is proposed. Blurry spectrograms and highly concentrated Wigner distributions (WDs) of various signals constitute the training set. The input data is grouped according to the underlying featur...
A new mulitcode multicarrier interleave division multiple access (MC-MC-IDMA) system is proposed and analyzed in frequency selective channels. The system supports different modulation schemes for variables data rates. Each user transmits his message by choosing a sequence from an orthogonal code-set. An MC-MC-IDMA system achieves spreading gains bo...
A realization of obtaining energy concentration along instantaneous frequency (IF) for blurry time frequency images (TFIs) is proposed using neural networks (NNs). NN captures the fundamental principle at work once trained with various spectrogram TFIs by defining various edges present in input data. Unknown spectrogram TFIs of multi component sign...
In Direct Sequence Code Division Multiple Access (DSCDMA) all users transmit at the same time and at the same frequency thus causing mutual interference. In such situation when the powers of the interfering signals are large compared to the desired signal, the performance of the matched filter receiver degrades. This is due to the near-far effect....
In this paper we present a comparison of Neural Network Training Algorithms for obtaining a Time Frequency Distribution (TFD) of a signal whose frequency components vary with time. The method employs various algorithms used in NNs which are trained by using the spectrograms of several training signals as input and TFDs that are highly concentrated...
In this paper we present a method of obtaining a time frequency distribution (TFD) of a signal whose frequency components vary with time. The method employs neural networks (NN) which are trained by using the spectrograms of several training signals as input and TFDs that are highly concentrated along the instantaneous frequencies of the individual...
Wireless Local Loop (WLL) licenses have been issued to increase the tele-density in the country. Almost all WLL operators have chosen Code Division Multiple Access (CDMA) based technologies to implement their networks. Government policy allows limited mobility, which, if implemented literally, can severely degrade the performance of these networks....
The use of dual-tone multi frequency (DTMF) signaling is very common in telecommunication systems such as telephone exchanges, private branch exchanges (PBXs), and call centers etc. One of the approaches of DTMF detection is based on the cycle estimation of the frequencies present in the DTMF signal. Any interference that lies in the frequency regi...