2005
Permanent URI for this collection
Browse
Browsing 2005 by Title
Now showing 1 - 20 of 46
Results Per Page
Sort Options
Item 3d virtual museum(UMT.Lahore, 2005) Musharaf Jabeen; Saqibah ZahoorVirtual Reality is a novel and innovative technology which allows us, through its applications, to experience abstract concepts and ideas, visit spaces that are unreachable or no longer exist, and examine objects from diverse and unique points of view. The increasing development of VR technologies has matured enough to expand research into multidisciplinary areas, such as archaeology, education and art. Consequently, virtual reality interfaces, interaction techniques, and devices have improved greatly in order to provide more natural and obvious modes of interaction and motivational elements. This project aims at developing an interactive virtual museum which can be used as a subsidiary educational resource. It cater for a basic exploration of the environment and examination of the displayed items, this museum will benefit from developments in computer science and use audiovisual media and exhibits to provide information about aspects of living in ancient societies, with ancient mughal era as the starting point.Item Blue tooth advertisement server(UMT.Lahore, 2005) Aamir Masaud Butt; Agha Jadaoon Khan; Hassan Akhtar; M Awais SheikhAbstract not availableItem Call routing in voice enable Network(UMT.Lahore, 2005) Uraiza Ali Qaiyumi; 017 Suraiya JabeenIt is experience to all of us placing a call over the Internet. And we all haven't had a pleasant experience. An.IP based conference bridge is subject to speech distortions and substantial computational demands due to the tandem arrangement of high compression .^pgegh codec. Decentralized architectures avoid the speech distortions and delay, but lack of strong control and have a key dependence on silence suppression for endpoint scalability. So to improve our quality of voice and to make our telephone system cheap we will use "gall routing". As in IP network we use different routers to communicate all over the world in the same way we do communicate only Voice here with the help of routers. Here we define dynamic route between the routers and do link Foreign Exchange Station (FXS) and we can link through Public Branch Exchange (PBX) when we dial the desired number to whom we want to communicate, the modulation techniques here with routers make the signals in a communicable format and it get communicated with the other router with which it is configured. And by this way we transfer our call through IP whole over the world with Good quality and with no expense. In the near future, Insha Allah we will make a telephone call, it is more than likely that it would be over the Internet or some other packet network. But, what is it that would make this possible? It is a bunch of protocols and standards; and years of research done by organizations all over the world that would bring about this revolution The next few chapters of this project report will discuss this phenomenon in detail.Item College management system(UMT.Lahore, 2005) Wasim Abbas; Akhtar Abbas; Naeem IbrahimThe explosion of wireless devices is happening around the world today. The number of Internet devices is expected to outnumber PCs in the next year. And, globally there are more than three times as many users who have adopted mobile devices, as there are Internet users. For these devices, Java technology based software provides the basis for globally deployable solutions. J2ME is for small devices such as PDA's, mobile telephones^ pagers, consumer devices. There arel billion wireless devices/subscribers by 2003 (2002 by some estimates) and 30- 50% of these devices will be Internet-enabled and within next 2-4 years that will exceed the number of personal computers soon, total worldwide base of PCs was 311 million at the beginning of 2000 so one might be guess the power of J2ME. J2ME provides a standard platform for developing wireless device servicesItem Computerized maintenance Management system(UMT.Lahore, 2005) Nasim Abbas; Mehboob AhmadHuman requirements are unlimited which includes the requirement of security too, it may be the security of his life, wealth or any thing which is precious to him and he want to save it for unauthorized access. Same is the case in the world of computer, because now a day all the organizations are dependant on the computers to perform their various tasks in this fast world. Now days every one wants to know that whether he was in profit or loss in the business he is doing. Because for the better future planning in order to compete with the rest of world. The Computerized Maintenance Management System uses this technique. It is very much user friendly and easy to use that evens a person who has little knowledge about computer can easily use this system. This document covers all aspects of Computerized Maintenance Management System and explained in organized and understandable manner.Item Item Item Design and Implementation of an MPLS based qos Architecture in Heterogeneous Networks.(UMT.Lahore, 2005) Raza Naseem; Syed Jalil Haider Zaidi; Naveed ShahzadAbstract not availableItem Design and implementation of Cdma based wll(UMT.Lahore, 2005) Muhammad Usman Uppal; Rao Danish Hayat; Bilal ZahidAbstract not availableItem Design and implementation of cdma based wll(UMT.Lahore, 2005) Muhammad Usman Uppal; Rao Danish Hayat; Bilal ZahidAbstract not availableItem Design and practical Implementation of cdas Using cti and ivr(2005) Abid Majeed Mir; Raheel Lashari; Farzana KausarAbstract not availableItem Design and study of IP backbone on long distance and international (LDI) network(UMT, Lahore, 2005) Jawwad Ahamd; Junaid Iqbal; Shahzad AhmadItem Design of mobile switching centre in wll(UMT.Lahore, 2004) Shalla Hameed; SalmaThis project is focuses on the following two topics WLL Sometimes called radio in the loop (RITL) or fixed-radio access (FRA), wireless local loop (WLL) is a system that connects subscribers to the public switched telephone network (PSTN) using radio signals as a substitute for copper for all or part of the connection between the subscriber and the switch. This includes cordless access systems; proprietary fixed radio access, and fixed cellular systems. MSC Mobile Switching Center (MSC) is the core of CDMA switching system. It offers switching functions for all the mobile terminals in the local area, including call handling, routing, call control, mobility management, location registration, echo cancellation and overload control.Item Design of mobile switching centre in wll(UMT.Lahore, 2005) Shalla Hameed; SalmaThis project is focuses on the following two topics WLL Sometimes called radio in the loop (RITL) or fixed-radio access (FRA), wireless local loop (WLL) is a system that connects subscribers to the public switched telephone network (PSTN) using radio signals as a substitute for copper for all or part of the connection between the subscriber and the switch. This includes cordless access systems; proprietary fixed radio access, and fixed cellular systems. Mobile Switching Center (MSC) is the core of CDMA switching system. It offers switching functions for all the mobile terminals in the local area, including call handling, routing, call control, mobility management, location registration, echo cancellation and overload control.Item Esurveypro(UMT.Lahore, 2005) Syed All Imran; Usman Mujtba; UsmanTahirThe project is called esurveypro, it would be used by different organizations jobs Like performance monitoring, customer feed back and follow-ups, chain Management etc. Three types of users would be using it, namely administrators, Managers and surveyors. Surveyor would be conducting survey either through Telephone or online (email). Output would be different types of compiled reportsItem Face recognition in controlled Environment(UMT.Lahore, 2005) Khawar Latif; Farukh Shahzad; ZubairKamranA facial recognition system normally relies on feature extraction, which Eire a series of images from human face like images of eye, nose. These images are stored in database and then compared. Image-to-image mapping is a comparatively slow process and as a result facial recognition software often takes more time than other biometric soft wares. FacelT generates and manipulates numeric code rather than image. The software very firstly detects if a human face is present in the picture. The Software searches firstly for human eyes. They must be open in the image. It then locates Nodal Points, the peaks and valleys, on human face. We have taken the Nodal Points of eyes and nose. The combination of nodal points is unique for each human face. A numeric code is then generated for the picture. Numeric code is of 80 bytes only for a 901*1024 bytes bitmap picture. The numeric code is then stored/compared from database for storing/ identification purpose. This numeric code is also called face print. Image Acquisition plays a key role because all the processing is possible only when image is acquired in acceptable format. To capture a good quality image a digital camera with resolution 640 x 480 or above is essential. FacelT has some necessary constraints: • Image size must be appropriate. • Entire Face should be visible in the image. • Brightness and contrast must be normal. • Face should be straight. • One image can contain only a single face.Item Gprs automation technology(UMT.Lahore, 2005) Urooj Azhar; Saniya Ikram; Rakhshanda ShaukatAbstract not availableItem Hfc multimedia interactive broadband network(UMT.Lahore, 2005) M. irfan arshad; aqeel zia nayyer; syeda ambreen shujaatAbstract not availableItem Item Implementation and performance evaluation Of telephonic routing over ip(UMT.Lahore, 2005) Afzaal Qadir; Ehtesham Mansoor; Muhammad Usrhan RazaAbstract not available
- «
- 1 (current)
- 2
- 3
- »