Shahid Khattak

Learn More
This paper deals with multiuser detection through base station cooperation in an uplink interference limited, high frequency reuse scenario. Distributed iterative detection (DID) is an interference mitigation technique in which the base stations at different geographical locations exchange detected data iteratively while performing separate detection and(More)
This paper presents a novel strategy for interference mitigation in an uplink of high reuse cellular networks through distributive processing. It is proposed that the neighboring base stations cooperate by exchanging information while performing classical single user detection. This information exchange can be iterative, improving the estimate of the(More)
This paper deals with multiuser detection through base station cooperation in uplink interference limited scenarios. At high frequency reuse, each base station not only receives signals from the desired user but also from the co-channel interferers in the neighboring cells. We propose distributed interference mitigation which in turn requires joint(More)
In this work we developed an augmented reality sports broadcasting application for enhanced end-user experience. The proposed system consists of three major steps. In the first step each player is detected using AdaBoost Algorithm. In second step, same algorithm is used to detect face in each player image. In third step, a robust face recognition algorithm(More)
This paper deals with the multi-user detection for non Gray mappings in an uplink-OFDM system. Joint multiuser detection is made possible through the use of distributed antenna systems. An MMSE based V-BLAST strategy is used to detect the user data. We study performance of bitinterleaved coded modulation with iterative decoding (BICMID/turbo detection)(More)
In this paper, we develop an augmented reality sports broadcasting application for automatic detection, recognition of players during play, followed by display of personal information of players. The proposed application can be divided into four major steps. In first step, each player in the image is detected. In the second step, a face detection algorithm(More)
The increasing traffic and the demand for high data rate services in WCDMA networks prompt the need for an automatic network optimization. Current state–of–the–art optimization methods adapt physical parameters, such as the antennas’ tilt or azimuth. As agreed in the community, a further capacity increase can be achieved by an optimization of Radio Resource(More)
This paper introduces a novel SIR based resource allocation algorithm with the aim of avoiding joint resource allocation at a single central point in a cellular system and consequent decision delays in the network. Each base station controller assigns channel resources to each user in such a way that the ratio of signal to energy leaked in to neighboring(More)
In this paper we present a comparative study of two well-known face recognition algorithms. The contribution of this work is to reveal the robustness of each FR algorithm with respect to various factors, such as variation in pose and low resolution of the images used for recognition. This evaluation is useful for practical applications where the types of(More)
In recent times, automatic face recognition algorithms are playing a key role in several security applications. In this paper, we develop a framework for enhancing the security of vehicle parking spaces. The proposed framework can be divided in to three separate steps. In first step, a vehicle in the input image is spotted. In second step, driver face is(More)