Project Title Abstract Students Name with Advisor Co-Advisor
Noise is produced by all electrical components. Noise can be passed into an electrical system by external components or may be produced by an
electrical system itself. In RF signal receiving apparatus such as cellular phones and base stations of wireless communication system, a received signal has
very weak intensity and includes considerable noise mixed therein. Therefore, Wireless LAN receivers need to be able to detect and amplify incoming low-
power signals without adding much noise by itself. The most common solution uses low noise amplifiers (LNAs) as the first stage.
Design of Low Noise Amplifier @ 2.1-2.3 GHz Mr. Ahsan Azhar (EE Dept) Ms. Ayesha Saleem (CSE Dept)
The project is design of Low Noise Amplifier (LNA) in R-band that will be used in RF front end for receivers. Its function is to take the relatively weak
signal received at the antenna and, amplify it with maximum gain and minimum noise added. This design is a narrow band design with bandwidth of 2.1-2.3
GHz, 0.5dB gain flatness and a noise figure of 1dB. The gain will be maximum keeping the noise figure into consideration. Minimum value of bias point will be
used in order to keep power consumption minimum. The amplifier will be designed and simulated on Agilent ADS software and then it will be fabricated on
micro strip technology. The amplifier will then be tested for its dynamic range, IP3 and 1-dB compression point.
This project aims to provide a novel solution for the data sharing within a group by developing a system that has the capability to share confidential documents
among group members though a secure centralized entity. The proposed system will be based on GSAKMP protocol for group keys management and will use
role-based XACML policies for appropriate access control.
The term Group Communication System (GCS) refers to a software platform that implements some form of group communication. Group communication
systems commonly provide specific guarantees about the total ordering of messages and group membership services as well. GCS has been build around a
number of different models such as peer 2 peer libraries , 2- or 3 level middleware , and client server. Prior Research on such systems has been modeled in a
fair enough way to obtain good scalability; but the groups’ nature and size has been specific as the Security Research for the GCS has mainly focused on peer
2 peer and abstract group models. Currently the need for the security in computing and communication within a dynamic group of members is widely
recognized  Group Members:
Wajeeha Javed Reg .No :
Secure Documents Sharing System for a Multi-level Security Environment Mr.Muhammad Awais Shibli Dr .Fauzan Mirza
Huma Chaudhry Reg .No :
The importance of the group communication can be determined by observing the various scenarios For example the group of doctors conducting a research 2006-NUST-BICSE-85
in medical want to share their confidential documents securely with each other, so they require secure group application so that the information is not disclosed
to others and to make sure that their received data is tampered on, is it from the intended sender.
The importance of classified information security for military is well understood; no one would want the security and solidarity of their Nation to be compromised
on. Thus, they’d not want any official document to be spied upon Some government documents are highly confidential and top secret and it is important for the
government to make sure that nobody else can read the content of these documents so these security measures work well in making sure that documents are
finely preserved from unauthorized access so that nobody can read these documents again.
There is a group of research students made by academician working on a research project and their students want to share research papers and important
documents with each other or may be the headquarter of any university want to share some confidential documents with the faculty and don’t want the student
to access .therefore they need to depend upon secure information exchange without being illegally accessed by someone on the network.
Similarly in a company, before the launch of the new product the company doesn’t want the competitors to have access to their ideas; hence the information
needs not to be exposed.
Some of the major issues faced by organizations today are related to the management of their large, complex networks. Where networks are large and a huge
number of clients and devices are networked over a considerably large area, it becomes very difficult to detect and troubleshoot network problems which result
in delays and network under-utilization. Thus, Network Management has become one of the most important aspects in the management of any large business
organization. This competency becomes more pronounced where the internal network of an organization directly affects the end user of its services, such as in
Tivoli Netcool/Omnibus provides solution to all the issues mentioned above, thus providing a comprehensive package for the organization. Main purpose of
IBM Tivoli Netcool/Omnibus is to provide a centralized network management platform, bridging the gap between multiple networks and to automate the network Rafay Naveed 2006-NUST-
Deployment and Configuration of IBM Netcool/Omnibus and Webtop for efficiently monitoring and managing management operations. This is what we are trying to achieve in our project. The focus of the project revolves around the successful deployment of IBM Tivoli BICSE-61
Miss Savera Tanvir Mr Atif Kamal
SEECS Network Netcool/Omnibus to monitor and manage the SEECS network on Linux Platform and then configuring different probes, triggers and automations over target Osaid Khaliq 2005-NUST-
client machines to manage applications, protocols and network devices, including routers, gateways, switches, etc. Relevant documentation about IBM BICSE-33
Technologies is not readily available except for Red Books; hence ample amount of importance has been laid on the documentation part of the project.
At the successful completion of the project, IBM Tivoli Netcool/OMNIBus 7.2 would be deployed on a test bed. For us, it would be a hands-on experience into
the deployment and implementation of Netcool/Omnibus. The deployed system would be a Linux based environment and would simulate the deployment of
Netcool/Omnibus on a larger scale in large organizations. The probes would be installed and configured, along with Tivoli Identity Manager. Besides that, a
user interface would also be provided, using IBM WebTop, for administrators to view reports and make basic adjustments accordingly.
In past two decades rapid changes in the society are coming hand in hand with the advancement of information & communication technologies, ICT. ICT now
offers high quality communication mediated via internet. Communication is ensured through the exchange of information, which can be achieved using different
types of communication media. The way a man provides information to a computer system represents a very specific category of communication i.e. HCI
(Human Computer Interaction). HCI is an active research area in which researchers are working in number of dimensions to augment human capabilities with
computers. Input information is mediated to a computer system through various peripheries, e.g. keyboard, mouse, light pen or a punch tape for a computer. Group Members:
Unfortunately the current offer of available alternative special interfaces is still by no mean sufficient. Registration #'s
This project is based on a novel idea to control the computer features with the human eye, simply by looking at the screen. This innovative gadget will introduce Bilal Afzal 2005-
a new type of a computer periphery which allows hand free control of computer systems. Since it emulates computer mouse, it will also provide its users a NUST-BICSE-08
unique chance to communicate with installed software applications by means of one’s eye movement. S M Furqan 2006-
E-CAP(Eye for Controlling Applications) Mr.Aamir Jelani Ms.Madeeha Owais
The project is divided into three modules. Nabeel Sattar 2006-
A camera connected to ‘TI Video Processing Kit’ will be the required hardware. NUST-BICSE-58
First module will encompass the registration of eye movement, in which camera will capture the user eye pattern and then send the captured video to Video Kit.
The Second Module of the E-CAP will include the control functionality, which processes the input signal from the camera. Image/Video Processing algorithms BICSE-4
will be used to determine the cursor position on the screen.
In the Third module, the output of the control module provides information about the required adjustment of the cursor position. As a result, a command will be
generated by Video Kit which will be sent to computer through the RTDX interface. Eventually, the cursor will be moved to the required location.
At the successful completion of this project, the end user will be able to control different applications of a computer with his eye.
E-Property Management system is a business solution that comprises of property, owners, guest and agent management systems along with housekeeping
and booking facilities. The system offers online booking to furnished apartments, villas etc for short and long term rentals. This will not only make it easier for
guests to make fast and easy bookings to the apartment or villa of their choice, but will also make it easy for owners to rent their property.
If there is no web based solution to property rental, the guests face difficulties looking for suitable property to rent. Many guests avoid staying in hotels and
prefer living in apartments or villas where they can feel at home. On the other hand owners find it hard to approach intended guests & manage their property. In
addition to that unless there is a database, there will be no record of who rented the property, when it was put on rent and for how long. Also the owners will find
it tedious to keep a manual record of who has rented his property.
Miss Savera Tanveer, Mr. Nadeem
E- Property Management Miss Sana Khalique
E-Property Management system will cater for the requirements of not only the guests but also the owners, this will make it much easier for owners to keep a
record of their property, and one can manage and rent a property from anywhere in the world. The owner will place their property on rent through property
managers who will be responsible for overall maintenance of the property, putting it on rent and catering to the requirements of the guests. The guests will rent
the property either through agents or directly from the website where they can place their booking online.
E-property management system will be a webbased business solution developed in Microsoft . NET using C# and MYSQL for the maintenance of a
database using Telerik ORM. The project is by E Tex Solutions.
In this project, an intelligent fire sniffer system will be designed which can be employed in large infrastructures i.e. a huge industrial plant, a five star hotel etc.
The fire sniffer system will send a text message to the control room and fire brigade over GSM as soon as the fire erupts. In case if fire erupts, the commonly
used system to notify fire-brigade is fire alarm box in many parts of the world. Early boxes used the telegraph system and were the main method of calling the
fire department to a neighborhood in the days before people had telephones. When the box is triggered, a spring-loaded wheel spins and taps out a signal onto
the fire alarm telegraph wire, indicating the box number. The receiver at a fire station then can match the number to the neighborhood. These systems are
Mohsin Waheed (2006-NUST-
outdated and they have outlived their usefulness, given that almost every household has telephone service. More recently, many people carry cellular
Intelligent Fire Sniffer System based on GSM telephones that could also be used to call for help in the case of fire. There should be an automatic detection system based on modern cellular and GSM Dr. M. Shahzad Younis Mr. Mahboob Khan Niazi
Ahsan Saleem Awan (2006-
technology. This system should be quite efficient that it directly notifies the concerned persons in the control room. The proposed system consists of micro-
controller and GSM based technology. Moreover smoke sensors are used for fire detection. Smoke sensors are wirelessly connected to main microcontroller
board circuit through RF link transmitters and receiver. As soon as the Subscriber Identity Module (SIM) is inserted in GSM module, it registers itself with the
station and is be able to send text message. The message containing the information of the position of sensor is sent to control room on detection of fire. The
proposed system will be able to accurately identify the fire location on the map available at the control room. This system will also be deployed for test purposes
in some part of SEECS Campus.
The super heterodyne receiver is one of the most popular forms of receiver that are in use today in a variety of applications. The basic function of super
heterodyne receiver is up or down-conversion of input signal and also tuning it to a particular frequency. After tuning, proper amplifier can be used to boost up
In this project, different modules of a super heterodyne receiver will be designed and realized. These modules will be an Oscillator, a Mixer and an
Ahmed Mahmood (2006-
Intermediate Frequency (IF) filter. The IF filter module will have a center frequency of 20 MHz and will be a narrowband design. The Local Oscillator which will
NUST-BICSE-32) Mr. Yasir Iqbal (EE Dept), Ms. Ayesha
DESIGN OF THE SUPER HETERODYNE RECEIVER be operated at 920 MHz. This frequency for design has been chosen as we have the availability of 1 GHz Oscilloscope. Mixer type (Active or Passive) will be Mr. Ahsan Azhar (EE Dept)
Hummad Anwar (2006-NUST- Saleem (CSE Dept)
decided after study and will be operated at 900/920 MHz. The design parameters of the modules are chosen so that any signal 900 MHz present at the input of
mixer will be down converted to 20 MHz after mixing with the local oscillator signal of 920 MHz. The down converted signal at 20 MHz will be filtered through
the narrow band IF filter. These modules will be first designed and simulated in Agilent’s Advance Design Systems (ADS) software. The final optimized layout
will be made in ADS and then it will be printed on the microstrip technology. The modules will be tested for their dynamic range and some non-linearities like
phase noise and harmonic content.
In the present era of challenging issues due to the increasing automation demands and security concerns new technologies are emerging. Biometrics
technology is one of them; this field employs techniques such as facial recognition system, finger print readers and speech recognition. Human beings are M. Ahsan Munir
actively adapting new and innovative technologies even in security based systems. Iris recognition is a step towards the technological improvement in the Registration#. 2004-NUST-
biometrics. According to latest research in iridology, the human eye contains information unique to each person. This information can be used to identify vital BICSE-141
patterns of the iris and retina. Ghassan Rashid
Iris Recognition Our aim is to develop a system based on the recognition and pattern detection in the iris using the digital image processing. There exist many digital Registration#. 2006-NUST- Dr. Nazar Abbas Mr. Asif Khan
image processing techniques; we will be selecting the most efficient method depending on accuracy and the environment variables which are suitable for the BICSE-38
project. The images would be captured from the naked eye and be processed to obtain a image of the iris that contains useful data. The processed image Umer Khalid
would then be compared with the existing images to obtain a possible match. Depending on the existing models we will try to implement an efficient real time Registration#. 2005-NUST-
system which requires us to develop an image processing algorithm. BEE-104
Traffic congestion and vehicle delays are worsening especially in urban areas. People spend countless hours of their precious time stuck in traffic jams. In
static based traffic lights each side of traffic is assigned a constant green light time, even if there is no traffic on other side of the traffic light, resulting in long
queues of vehicles. And without the central access to traffic lights, there is no way to control them.
This project is about controlling the traffic lights more efficiently. It has two main modules: Flow based traffic signaling and Access of traffic signals to the
central server. This will prevent traffic congestion and improves the traffic efficiency by allowing better utilization of the traffic lights.
By making the traffic lights flow based, the traffic side having the highest traffic will get the green light for maximum time, and the side having lowest traffic will
get minimum time for the green light. This will result in reducing the longer queues of vehicles. Preference will be given to the Highways while any other road
Registration No. 2006-NUST-
crossing the highways will get a green light if only the traffic is present on it.
For the detection of traffic, inductive loop detectors would be used which would detect the amount of traffic on the road. And on the basis of this traffic detected,
DEVELOPMENT OF EFFICIENT AND CENTRALLY CONTROLLED TRAFFIC SIGNALS. the time given to each light will be decided. Mr. Kamran Hussain Zaidi Ms. Ayesha Bint Saleem
Muhammad Mohsin Sardar
The traffic lights can be controlled by a central control room. These traffic lights will be interfaced with the control room. E.g. In case of VIP movements or
Registration No. 2006-NUST-
emergencies which require a certain signal to remain open can be easily achieved by a central control room.
GSM will be used for communication between the central control room and the traffic lights because it is very cheap with respect to other devices and its
maintenance cost is also low. Using GSM a person sitting in the control room can send a message to the desired traffic light, to open or close. That message
will be received by the GSM modem on the intended traffic light and it works accordingly.
The flow based traffic lights which were installed earlier by CDA on Karal Chowk and Amar Chowk are very expensive costing 1 million rupees each and these
traffic lights are not even centrally controlled as well. This proposed solution is not only an efficient but also cost effective.This project will be done with thae
collaboration of Islamabad Traffic Police and CDA.
One of the most common problems that we come across in our daily lives is to locate each other in indoor premises. This project is aimed to provide a
comprehensive solution to this problem and assist faculty, administration personnel and students locate each other in SEECS campus.
For the purpose of indoor tracking GPS cannot be employed because it does not work well inside buildings. Therefore either one has to deploy a separate
infrastructure or use the already existing ones. Wifi is one of the most commonly used network infrastructures in any modern building. Keeping this in view Wifi
is a very good option for the purpose of tracking.
Wifi is commonly employed in all modern buildings. One can use this network infrastructure to locate people within indoor premises. For the purpose of Muhammad Arsalan Mughal
tracking, devices known as Wifi id tags which are small and easy to carry will be used which will connect to the wireless network in a campus through which (2005-NUST-BICSE-22)
SEECS WEB BASED INDOOR TRACKING SYSTEM USING WIRELESS LANS NETWORK tracking can be accomplished. Ms. Khalida Noori Ms. Sana Khalique
Muhammad Bilal Amjad (2005-
Tracking in SEECS would be accomplished using the already installed Wifi network of SEECS. Thus drastically reducing the cost of implementation, high cost NUST-BICSE-50)
to benefit ratio and extensive feasibility. The faculty, administration personnel and students would carry Wifi id tags. The system would be deployed as a web
based service so that it is easily accessible from within and outside the campus. One could logon to the website and see a map of SEECS on which the position
of the people present within the campus will be shown in real time
For this project a study of different algorithms used for determining real time position will be conducted. The objective of the study would be to determine and
develop an algorithm suitable for positioning in SEECS. For this project Microsoft dot net platform will be used as the programming platform. The end product
of this project shall be a comprehensive web based tracking system.
The idea is to locate a person using RF technology. People will be wearing RFID beacons and the transceivers in the corridor will receive the signal transmitted
by the beacons and will forward it to the control box. The control box will accept all the signals forwarded to it by the transceivers in corridors and then convert it
to the format understandable by Computer. After converting into proper format control box will send the data to computer.
We will design the system as well as two applications.
· To design and develop a real time RF location positioning system.
· To devise a cost-effective solution.
· To devise an algorithm to strategically place RF transceivers in corridors such that minimum number of transceivers covers maximum area.
· To devise an intelligent algorithm for collision mechanism for RF-beacons, RF-transceivers (of the corridors) and the control box.
· To devise an efficient algorithm for two-way communication management.
· To devise an algorithm for depicting real time movement of RF beacon carrier on the 3D map.
Project Design: Anum Iqbal (2006-NUST-
· Hardware Design: BICSE-81)
The hardware design of our project includes: Ambreen Shafiq (2006-NUST-
Ø RF BEACONS: BICSE-78)
RFID Personnel Locator Sir Kamran Zaidi Miss Khalida Noori
It will include: Amna Asif (2006-NUST-
· Transceiver designing BICSE-77)
· Controller Programming Hira Khan (2006-NUST-
· Beep Mechanism ( which will make this system two-way a person using the application can beep the required person) BICSE-84)
Ø TRANSCEIVERS IN CORRIDORS:
It will include:
· Transceiver Designing
· Devising an intelligent collision mechanism (for differentiating between beacons and its neighboring transceivers)
· Wirelessly Transmitting Data to Control Box
· Identifying required RF beacon in its vicinity and transmitting the data to the RF beacons(which will generate the beep)
Ø CONTROL BOX:
It will include:
· Designing of smart transceivers
· Controllers Programming
· Devising a collision algorithm (for differentiating between corridor transceivers and other interfering devices)
· Transmitting Data to PC in a PC understandable format
The above mentioned transceivers are entirely different in functionality. We can’t use the same transceiver in corridors, for persons to be located and for control
Wireless VoIP is clearly an application of growing importance. This fact, coupled to the increasing interest in location based services, strongly suggests
tracking of wireless VoIP clients will become a widely deployed feature in emerging wireless applications e.g. E-911 emergency services etc. An important
aspect that is of great significance is the determination of VoIP and Tracking capacity of these applications. This project aims to investigate the capacity of Amna Khalid Niazi 2006-
these VoIP and Tracking based applications over fixed WiMAX link coverage deployed by Wi-Tribe Pakistan Ltd in SEECS. WiMAX promises to enable the NUST-BICSE-79
An Experimental Performance Evaluation of VoIP and Tracking based Applications over Fixed WiMAX Dr. Zawar Hussain Ms Madeeha Owais
delivery of wireless broadband services anytime, anywhere. However, despite significant hype and engrossment in technology based advancements of Mariyam Shakoor 2006-
WiMAX, very few investigations from test beds and field trails are publicly available in the existing literature. The project work shall encompass the generation NUST-BICSE-88
of VoIP and Tracking traffic streams over point-to-multipoint WiMAX topology and measurement of capacity based performance metrics over the Wi-Tribe
service for both line-of-sight (LOS) and non-line-of-sight (NLOS) conditions.
Targeted advertisement has been very important for companies to increase the revenues. Intelligent mobile advertisement will help the mobile companies to
target the audience effectively. It will use the artificial intelligence (AI) techniques to sniff the user activities and maintain the databases. The maintained data
will then be used for the marketing. Marketing will both be online and offline. This project encompasses the domain of Artificial Intelligence, GSM networks and
Artificial Intelligence has not been used much for mobile advertisement till now. Usually the mobile operators advertise their services generically, without taking
into account any previous user data. With the help of Artificial Intelligence, operators will be able to target their users in such a way that only relevant ads will be
sent to potential users based on the record of his/her activities. There are some European and US organizations that have developed such systems. But none
of these systems have been practically implemented by any major cellular operator. In Pakistan, this is an entirely new area of research and almost no work has Moaz Majid NUST-
been done so far. BICSE-2006-47
INTELLIGENT MOBILE MARKETING Mr. Amir Jelani Mr. Nabeel ur Rehman
The targeted marketing holds multiple benefits for any cellular operator. Operators will no longer have to waste bandwidth sending ad to every user, no matter ManzoorNUST-BICSE-2006-
how unlikely that user is to use the service. The right ad sent to the right person would certainly result in increased revenue. The heavy expenses borne in 62
television advertisement campaigns could be cut down drastically.
Our project is divided into four modules.
• inding an appropriate AI algorithm for scanning text messages.
• esting the algorithm with different test cases.
• eveloping SMS Module
Integration of all the above.
On successful completion of the project, a research paper will also be written.
The network operators are trying to automate the systems used for network maintenance and quality assurance. These automated solutions gather information
for the operators which saves them valuable resources like time, money and effort.
The problem that operators are facing now a days regarding network outages management is that the data of outages coming from different entities in the
network (BTS,MSC,BSC etc) is dumped into excel sheets. Many of such separate excel sheets are generated from every network entity which contains the
details of the outages of that device. Different excel filters are used by the engineers to get the important information (location, duration of the outage, reason
etc) from that file. Anyone willing to see the past outages records for more than one entity has to open number of excel files which is not an efficient way and is
very time consuming.
Sohail Mahmood (2006-
The operator’s demand is to make an automated system which contains a database and a web based application (separate for client and server). It will contain
software with a centralized database linked to it. The engineers will be able to add the data about the outages coming in the networks from different devices
Muhammad Umais Mahmood Dr. Khalid Latif & Mr. Nauman Khan
NETWORK OUTAGES MANAGEMENT SYSTEM through that software from different places and this will be saved in the centralized database. That information will be in a certain format and the engineers Ms. Madeeha Owais
sitting at the centralized database will be able to see all the outages of different entities submitted by the engineers from different places at different times. The
Zaheer-ud-Din Shami (2006-
operator also wants us to embed the functionality of Business Intelligence which involves the analyzing of the data saved in the centralized database and the
drawing of graphs simultaneously on the screen with the help of queries by using different APIs. This analysis will help the operator in making important
decisions regarding their packages, advertisement, vendor's product, revenue etc. Alerts will be placed on different parameters along with different thresholds.
The project is divided into the following modules.
• tudy and survey of already existing automated solutions in different operators.
• evelopment and optimization of the database.
• evelopment of the web based (server/client) application.
• evelopment of Business Intelligence Application layer.
Integration of all the above modules to form one unified system.
Our project is in the field of WiMAX. WiMAX stands for “Worldwide Interoperability for Microwave Access”. WiMAX is a telecommunication standard that
provides wireless transmission of data at very high speed. It replaced the traditionally used technologies in the “last mile” i.e. T1 lines, DSL and Cable. WiMAX
networks are increasingly being deployed in Pakistan and all over the world. However, Quality of Services is a major issue which is seriously affecting the
acceptability of the technology. One of the reasons for poor quality is the lack of appropriate tools for Network Analysis. The “WiMAX Layer 2 Analyzer” can
provide significant insight into the quality of WiMAX network and it can help resolve the different issues related to the Quality of service of WiMAX networks.
The solution to the above problem consists of two parts. A software part as well as a hardware part. The software part focuses on the analysis of the
performance of individual users and calculating their throughput to resource usage ratio, on the basis of which it will generate different reports about the
working status of the user i.e. whether the user is creating any problem for the network or not or if he is performing good or bad. The hardware part will basically
capture packets and then provide them to the software part.
Ghulam Nasir (2006-NUST-
WiMAX Layer 2 Analyzer Different solutions are available in the market for the above problem. However, there are different issues related to them. These software are not able to Dr. Anjum Naveed Dr. M. Shahzad Younis
Hira Daud (2006-NUST-
perform the analysis completely. It is able to decode only a part of the useful data (a few messages out of the set of useful messages). The Base Stations itself
keep some statistics regarding the usage, but these statistics are averaged over a specified time and it does not provide any information about individual users,
so it is difficult to find out which user or group of users are creating problem for the network and which user is performing good. This project will be the first of its
kind in the market and it has a high demand in the market.
First of all, the input files will be read by the software. These files are already available (captured through a hardware that already exists). Then the
messages in the file are decoded, analyzed and throughput is calculated on the basis of the messages. The throughput is calculated on the per user basis. The
software part itself is a complete final year project. However, if time permits, hardware will also be implemented which will capture the frames, assemble them
into a file and then provide the file to the software which will perform analysis and calculate throughput.
Remotely controlled unmanned vehicles are widely being researched and developed for use in a number of situations like war zones, disaster zones,
surveillance etc. .Keeping in mind the cost of human life and time, technology can be used to detect life signs in advance. An integrated system employing
wireless camera on a vehicle, that can be sent to places where humans cannot, thus develop an emergency response vehicle.
Vehicle used will be “Hovercraft” i.e. capable of flying few inches above the ground irrespective of nature of surface on which it is hovering. The vehicle can be
Shoaib Gul 2006-NUST-
controlled remotely by an RF link between the vehicle and base station. The Base Station will be used to send the direction signals to control the vehicle
REMOTE VIDEO SURVEILLANCE USING UNMANNED AERIAL VEHICLE movement. Base Station will receive a live video by a camera deployed on the vehicle wirelessly linked with the base station through RF-Transceivers. Once we Mr. M Aamir Jelani Ms. Madeeha Owais
Nauman Ahmed Khan 2005-
get the video, by applying different image and video processing techniques on the video footage to detect motion and sense ""Life Signs "" in the disaster zone.
The final product outcome will be a working model of a remotely controlled vehicle (Hovercraft) with a camera equipment having capability to send live feed,
detect motion and life signs and can also be used in war zones to track enemy movement or as a mobile surveillance camera. So overall the product could be
used in different ways helping society and the defense forces.
Today organizations from different fields of life require different security and managerial systems to cater for the security and tracking of their sensitive
equipment and personnel. Different solutions are available based on different technologies.
We have proposed one such solution based on RFID technology. This system would be installed and completely tested in “NUST Centre of Virology &
Immunology”. We have held several meetings and discussions with Dr. Taimoor from NCVI. Dr. Taimoor has agreed to support us in this project and shown
interest as well. NCVI has many labs with only authorized personnel access policy and the equipment being used is also very expensive. We would develop a
system to implement attendance, tracking, profile management, security of equipment and authorized personnel only access environment in NCVI campus. All
these functionalities would be real time. We have also gathered the functional and non-functional requirements for this project. Our project would mainly
constitute of the following tasks:
Identifying the exact number and type of RFID readers and tags to be used
• ttaching tags to the equipment and Personnel ID Cards
• etworking of all the RFID readers to a central system
• reparing a map based interface for tracking and security
• aintaining a database from the log files generated by each reader, used both for attendance and security Umair Jamil Reg# 72
PROJECT TITLERFID BASED TRACKING, SECURITY & ATTENDANCE SYSTEM D
• eveloping a web based interface to monitor the system Umar Shafiq Bangash Reg # Dr. Raihan-Ur-Rasool Mr. Kamran Zaidi
In the first stage, we would survey the whole structure and would identify the number and type of equipment that is to be used. We would study in detail the
documentation and specification of the available equipment keeping in view their price and reliability. RFID based cards would have to be prepared on order.
And for that purpose we would have to properly identify the data that is to be stored in the tags for proper identification of software design constraints. Then
RFID tags would be placed in the equipment in such a way that the tags are unnoticeable and almost impossible to damage or remove. All the readers would
then be networked to a central system.
The software would constitute of real time map system showing the location of personnel and equipment in real time. The software would also be capable of
storing the history of the events occurred in a database. The database would be designed keeping in view all the necessary objects related to provide the
functionalities of the project. This would enable us to manage personnel record, profile and attendance as well.
In the web development stage, we would develop an application to monitor and control the system through web from any remote location. This would also
increase the operable domain of the system.
The purpose of this project is to develop a small unmanned aerial vehicle (UAV) for NUST (H-12) campus. It will be a microcontroller based embedded system
application, using probably 4 servo motors to lift and drive it towards the desired destination.
Our aim is to design and develop a VTOL (Vertical takeoff) machine, joystick\keyboard controlled, for a specific range. The controls of the vehicle will be 1. Hassan Masood
PC\Laptop interfaced, providing the features of Wireless Base Station to the project. This vehicle will be capable of lifting a handsome amount of payload for 2006-NUST-BICSE-41
Joystick/Keyboard Controlled, PC interfaced Unmanned Aerial Vehicle(UAV), Helicopter,for NUST (H12) Aerial installing various wireless applications. Ms. Muhammed Bilali & Dr. Rehan
Surveillance One of the applications that will be deployed on the machine is a device that will stream video data to the Base Station. For this purpose our aim is to use, most 2. Muttahir Mumtaz Hafiz
probably, a WiFi technology (802.11 protocols, IEEE Standards) to get better video quality (Technology may subject to change in case of unavailability of the 2006-NUST-BICSE-57
This project will provide plate form for security surveillance, environmental hazards and scenarios like traffic congestion and VIP security
In this age of Smart Phones and modern gadgets, judges at any contest still need to fill out manual forms that need to be compiled, sometimes leading to false
results. Generic result compiler is a solution to this problem.
Using the generic result compiler, Judges should be able to input their results through a mobile device which contains the specific scoring system and data pre-
loaded. Upon entering their results in their device, the data will be received at a central location, through WiFi, where it will automatically be compiled. Sehar Aslam
In this project we will develop a generic result compiler that will consist of the following modules.
Application For Generic Result Compilation Miss. Savera Tanvir Miss. Khalida Noori
1. A central repository which will collect, store and compile the results. This will be developed using .net framework. Munazza Jabeen
2. A remote application that will run on a PDA to enable the judges to input their results. This will be developed in .net Compact Framework using windows 2006-NUST-BICSE-90
mobile SDK on Windows Mobile Pocket PC (Smart Handheld Device).
3. The results will be sent from PDA to the central repository using WiFi and will be encrypted.
This application can be used for the evaluation of Final Year Projects at the Open House.
The most significant threat facing the internet today is botnets - collections of compromised hosts controlled by a botmaster to perform malicious activities.
Botnets pose such a devastating threat because the coordination of multiple compromised machines results in massive computing power and bandwidth,
which can in turn be used to launch very large scale attacks such as distributed denial of service attacks, harvest loads of personal information and generate
vast amounts of spam. Security response to this threat is however in its infancy. Botnets are challenging to detect primarily because the attack is launched from
legitimate compromised machines, bots, and the identification of the actual criminal, i.e. the botmaster, is concealed by the indirection of the commands to the
The purpose of this project is to research and improve the existing botnet detection techniques. The project will be carried out in the following three phases:
• the first phase, a real and labeled dataset comprising of traffic from a wide variety of botnets will be collected. This phase is vital as there is currently no Mahwash Manzoor
BOTNET DETECTION BASED ON JOINT HOST- NETWORK BEHAVIOUR public research dataset available for the evaluation of botnet detection schemes. This phase will also help develop a deep understanding of the behavior of a Dr Syed Ali Khayam Mr.Ali Sajjad
wide variety of botnets which is preliminary to devising an effective botnet detection scheme. Registration #86
• the second phase, we will carry out performance evaluation of the prominent botnet detection techniques on the collected dataset. This phase is imperative
in learning the shortcomings of the existing schemes and consequently designing a technique which overcomes them.
• the third phase, we shall propose a joint network-host based botnet detection scheme. Currently there is no technique which uses information from both
hosts and network to detect botnets; all of the existing schemes are either network based or host based. In the proposed technique, information from hosts will
be encoded in a bit and communicated to the check-points in the network. The detection module at the network endpoints will use this information along with
the network behavior to detect botnets. We hypothesize that this joint network host technique will improve the detection rate and reduce the false alarm rate.