Karachi, Pakistan
Karachi, Pakistan

Time filter

Source Type

Ali Z.,PAF KIET | Latif S.,Usman Institute of Technology | Ishaque K.,PAF KIET | Javed S.,PAF KIET | Khan M.G.U.,Usman Institute of Technology
Proceedings of the IASTED International Conference on Modelling and Simulation | Year: 2013

In this paper analysis, design and optimization of the conventional fuzzy logic controller to maintain the load voltage of the buck power converter has been proposed. The CFLC proposed in this paper has two inputs error and the change of error, the rule base used is 2-dimensional linear rule base for the controller. The CFLC response can be optimized by tuning of its input and output scaling gains for this, the concept of analogy between fuzzy controller and its linear counterpart is used. In order to explain the optimization and the effectiveness of the proposed controller a MATLAB simulation is done, the simulation results shows that conventional fuzzy logic controller (CFLC) can be optimized easily when the parameters involved in its linear counterpart are present.


Shakir H.,Bahria University | Ahsan S.T.,Usman Institute of Technology | Faisal N.,Bahria University
IST 2015 - 2015 IEEE International Conference on Imaging Systems and Techniques, Proceedings | Year: 2015

In this research paper, authors propose multimodal brain image registration using discrete wavelet transform(DWT) followed by Gaussian pyramids. The reference and target images are decomposed into their LL, LH, HL and LL DWT coefficients and then are processed for image registration using Gaussian pyramids. The image registration is also done using Gaussian pyramids only and wavelets transforms only for comparison. The quality of registration is measured by comparing the maximum MI values used by the three methods and also by comparing their correlation coefficients. Our proposed technique proves to show better results when compared with the other two methods. © 2015 IEEE.


Ismail M.A.,NED University of Engineering and Technology | Altaf T.,NED University of Engineering and Technology | Mirza S.H.,Usman Institute of Technology
2013 Saudi International Electronics, Communications and Photonics Conference, SIECPC 2013 | Year: 2013

Simulation is a widely accepted tool for evaluating any proposed cache system under different application and configuration scenarios because of the high degree of configurability of cache memory which requires extensive design space exploration and identification of performance bottlenecks in system understudy. In this paper we have presented a new multi-level cache Simulator, 'MCSMC' (Multi-level Cache Simulator for Multi-Cores), developed for multi-core processors at NED University. It is a parallel trace-driven multi-level cache simulator based on module and layers approach. The developed simulator has been tested for upto 2048 cores and 10 cache levels with different cache performance parameters. It is coded in Visual C++ using OpenMP and Win32 process / thread libraries © 2013 IEEE.


Qadir A.,Usman Institute of Technology | Ali A.,NED University of Engineering and Technology
Advanced Materials Research | Year: 2014

This paper describes a current mode filter using two current feedback amplifiers (CFA's). One CFA is used to simulate a negative resistor. The proposed circuit is very useful for low as well as high frequency applications. Circuit is simple and canonic. The use of grounded capacitors in the design make it suitable for implementation in CMOS technology. © (2014) Trans Tech Publications, Switzerland.


Qadir A.,Usman Institute of Technology | Ali A.,NED University of Engineering and Technology
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2013

In linear system theory impulse response of any system is of great significance. It is the impulse response which is helpful in determining the convolution in continuous time system (unit sample response in Digital Signal Processing). The impulse response of simple systems can be calculated from the system differential equation or from the transfer function of the system (by taking the inverse Fourier Transform of transfer function). To the best of author's knowledge there exists no such scheme in the literature so far showing any practical method that can demonstrate the impulse response of a system on the oscilloscope. In this paper the method of demonstrating the impulse response of any linear system to the undergraduate students is presented. The approach is simple and is developed with minimum component count. © 2013 SPIE.


Saquib S.M.T.,Usman Institute of Technology | Hameed S.,Usman Institute of Technology | Hameed S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Usman Ali S.M.,NED University of Engineering and Technology | And 2 more authors.
IOP Conference Series: Materials Science and Engineering | Year: 2013

This work is based upon electronic automation and Smart Control techniques, which constitute the basis of Control Area Network (CAN) and Personal Area Network (PAN). Bluetooth technology has been interfaced with a programmable controller to provide multi-dimensional vehicle control. A network is proposed which contains a remote, mobile host controller and an android operating system based mobile set (Client). The client communicates with a host controller through a Bluetooth device. The system incorporates duplex communication after successful confirmation between the host and the client; the android based mobile unit controls the vehicle through the Bluetooth module. © Published under licence by IOP Publishing Ltd.


Akbar M.A.,National University of Computer and Emerging Sciences | Qadir A.,Usman Institute of Technology
Procedia Engineering | Year: 2012

Today, the autonomous robots are widely used to perform task in a wide variety of application. A number of research works has been carried out to examine and remove problems faced by the current robotic world. The theme of this paper is to discuss different design consideration along with their limitations and solutions for an autonomous robot which will be able to climb and cross the ramp and place boxes on to stands placed at different points of arena using line following principle. The implementation of this robot was the theme of "NERC 2010". The robot has also the limitation of weight, size and power. © 2012 Published by Elsevier Ltd.


Jatoi P.A.,Wroclaw University of Technology | Jatoi P.A.,Mehran University of Engineering and Technology | Memon A.A.,Mehran University of Engineering and Technology | Chowdhry B.S.,Mehran University of Engineering and Technology | And 2 more authors.
Wireless Personal Communications | Year: 2015

Set of autonomous nodes attached together and to a base station, working in a particular system is called wireless sensor network. Due to its wireless and dynamic nature, wireless sensor networks (WSNs) are easily attacked in comparison to wired networks. Now days, WSNs are not only used as routers but also working as communication end points as well as considered responsible for security of exchanging information. For fulfilling the security requirements in WSNs, scheme cryptography is widely used in which signed messages are being transferred from node to node. Cryptography is mainly classified in symmetric and asymmetric schemes. Public and private keys are used for encryption and decryption process in asymmetric key cryptography while single key is used in symmetric cryptography. Asymmetric cryptography provides high level of security and authenticity on cost of consumption of high amount of memory, power and bandwidth. On the other hand, symmetric key cryptography is considerably efficient and less resource consuming but providing less security level. Efficiency of network is considered is assumed major issue in exchanging of information in WSNs. In this paper, keeping efficiency of network in consideration, such hybrid algorithm has been suggested which satisfies the required security levels on high efficiency level. The proposed hybrid algorithm proves scalable and its performance is quite faster than single asymmetric cryptography and more secure than symmetric algorithms. © 2015 Springer Science+Business Media New York


Lohana P.,Usman Institute of Technology
IEEE Engineering Management Review | Year: 2015

MANY young engineers, ready to begin their professional career, need to demonstrate professionalism that goes beyond changing their attire or carrying a briefcase, but instead conducting themselves with a professional attitude i.e., their communication and interpersonal skills in pursuing their technical activities. © 1973-2011 IEEE.


Khatoon H.,NED UET | Hafeez S.,Usman Institute of Technology | Altaf M.T.,NED UET
Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011 | Year: 2011

Operating system plays a major role in effective memory management and has a significant impact on the performance of applications. In a Chip Multiprocessor, the onchip memory hierarchy is an important resource that plays a significant role in determining the overall performance of an application. In addition to a number of hardware optimization techniques that work for all types of applications, some software controlled optimization techniques are also effective for improving the performance of on-chip memory hierarchy. This is so because the software controlled techniques generally have a global view of other concurrently running workloads. A better solution to the memory performance problem is to couple the operating system policies and mechanisms to the hardware techniques for management of on-chip memory hierarchy and its optimizations. This paper gives an overview of all such designs that have coupled the on-chip cache optimization techniques with the operating system mechanisms and policies. More techniques are suggested that would be investigated to predict their effectiveness. © 2011 IEEE.

Loading Usman Institute of Technology collaborators
Loading Usman Institute of Technology collaborators