List of Projects with Abstracts BICSE 4 (Excel) by fanzhongqing


									                                               Project Title                                                                                                                          Abstract                                                                                   Students Name with                Advisor                          Co-Advisor

                                                                                                                 Noise is produced by all electrical components. Noise can be passed into an electrical system by external components or may be produced by an
                                                                                                         electrical system itself. In RF signal receiving apparatus such as cellular phones and base stations of wireless communication system, a received signal has
                                                                                                         very weak intensity and includes considerable noise mixed therein. Therefore, Wireless LAN receivers need to be able to detect and amplify incoming low-
                                                                                                         power signals without adding much noise by itself. The most common solution uses low noise amplifiers (LNAs) as the first stage.
                                                                                                                                                                                                                                                                              Samar Nayab
Design of Low Noise Amplifier @ 2.1-2.3 GHz                                                                                                                                                                                                                                                             Mr. Ahsan Azhar (EE Dept)   Ms. Ayesha Saleem (CSE Dept)
                                                                                                                  The project is design of Low Noise Amplifier (LNA) in R-band that will be used in RF front end for receivers. Its function is to take the relatively weak
                                                                                                         signal received at the antenna and, amplify it with maximum gain and minimum noise added. This design is a narrow band design with bandwidth of 2.1-2.3
                                                                                                         GHz, 0.5dB gain flatness and a noise figure of 1dB. The gain will be maximum keeping the noise figure into consideration. Minimum value of bias point will be
                                                                                                         used in order to keep power consumption minimum. The amplifier will be designed and simulated on Agilent ADS software and then it will be fabricated on
                                                                                                         micro strip technology. The amplifier will then be tested for its dynamic range, IP3 and 1-dB compression point.


                                                                                                         This project aims to provide a novel solution for the data sharing within a group by developing a system that has the capability to share confidential documents
                                                                                                         among group members though a secure centralized entity. The proposed system will be based on GSAKMP protocol for group keys management and will use
                                                                                                         role-based XACML policies for appropriate access control.


                                                                                                         The term Group Communication System (GCS) refers to a software platform that implements some form of group communication. Group communication
                                                                                                         systems commonly provide specific guarantees about the total ordering of messages and group membership services as well.[1] GCS has been build around a
                                                                                                         number of different models such as peer 2 peer libraries , 2- or 3 level middleware , and client server. Prior Research on such systems has been modeled in a
                                                                                                         fair enough way to obtain good scalability; but the groups’ nature and size has been specific as the Security Research for the GCS has mainly focused on peer
                                                                                                         2 peer and abstract group models. Currently the need for the security in computing and communication within a dynamic group of members is widely
                                                                                                         recognized [2]                                                                                                                                                    Group Members:
                                                                                                                                                                                                                                                                           Wajeeha Javed Reg .No :
                                                                                                         Motivation:                                                                                                                                                       2006-NUST-BICSE-94
Secure Documents Sharing System for a Multi-level Security Environment                                                                                                                                                                                                                                  Mr.Muhammad Awais Shibli    Dr .Fauzan Mirza
                                                                                                                                                                                                                                                                           Huma Chaudhry Reg .No :
                                                                                                         The importance of the group communication can be determined by observing the various scenarios For example the group of doctors conducting a research             2006-NUST-BICSE-85
                                                                                                         in medical want to share their confidential documents securely with each other, so they require secure group application so that the information is not disclosed
                                                                                                         to others and to make sure that their received data is tampered on, is it from the intended sender.

                                                                                                         The importance of classified information security for military is well understood; no one would want the security and solidarity of their Nation to be compromised
                                                                                                         on. Thus, they’d not want any official document to be spied upon Some government documents are highly confidential and top secret and it is important for the
                                                                                                         government to make sure that nobody else can read the content of these documents so these security measures work well in making sure that documents are
                                                                                                         finely preserved from unauthorized access so that nobody can read these documents again.

                                                                                                         There is a group of research students made by academician working on a research project and their students want to share research papers and important
                                                                                                         documents with each other or may be the headquarter of any university want to share some confidential documents with the faculty and don’t want the student
                                                                                                         to access .therefore they need to depend upon secure information exchange without being illegally accessed by someone on the network.

                                                                                                         Similarly in a company, before the launch of the new product the company doesn’t want the competitors to have access to their ideas; hence the information
                                                                                                         needs not to be exposed.

                                                                                                         Some of the major issues faced by organizations today are related to the management of their large, complex networks. Where networks are large and a huge
                                                                                                         number of clients and devices are networked over a considerably large area, it becomes very difficult to detect and troubleshoot network problems which result
                                                                                                         in delays and network under-utilization. Thus, Network Management has become one of the most important aspects in the management of any large business
                                                                                                         organization. This competency becomes more pronounced where the internal network of an organization directly affects the end user of its services, such as in
                                                                                                         cellular networks.
                                                                                                         Tivoli Netcool/Omnibus provides solution to all the issues mentioned above, thus providing a comprehensive package for the organization. Main purpose of
                                                                                                         IBM Tivoli Netcool/Omnibus is to provide a centralized network management platform, bridging the gap between multiple networks and to automate the network           Rafay Naveed 2006-NUST-
Deployment and Configuration of IBM Netcool/Omnibus and Webtop for efficiently monitoring and managing   management operations. This is what we are trying to achieve in our project. The focus of the project revolves around the successful deployment of IBM Tivoli        BICSE-61
                                                                                                                                                                                                                                                                                                        Miss Savera Tanvir          Mr Atif Kamal
SEECS Network                                                                                            Netcool/Omnibus to monitor and manage the SEECS network on Linux Platform and then configuring different probes, triggers and automations over target                Osaid Khaliq 2005-NUST-
                                                                                                         client machines to manage applications, protocols and network devices, including routers, gateways, switches, etc. Relevant documentation about IBM                  BICSE-33
                                                                                                         Technologies is not readily available except for Red Books; hence ample amount of importance has been laid on the documentation part of the project.
                                                                                                         At the successful completion of the project, IBM Tivoli Netcool/OMNIBus 7.2 would be deployed on a test bed. For us, it would be a hands-on experience into
                                                                                                         the deployment and implementation of Netcool/Omnibus. The deployed system would be a Linux based environment and would simulate the deployment of
                                                                                                         Netcool/Omnibus on a larger scale in large organizations. The probes would be installed and configured, along with Tivoli Identity Manager. Besides that, a
                                                                                                         user interface would also be provided, using IBM WebTop, for administrators to view reports and make basic adjustments accordingly.
                                               In past two decades rapid changes in the society are coming hand in hand with the advancement of information & communication technologies, ICT. ICT now
                                               offers high quality communication mediated via internet. Communication is ensured through the exchange of information, which can be achieved using different
                                               types of communication media. The way a man provides information to a computer system represents a very specific category of communication i.e. HCI
                                               (Human Computer Interaction). HCI is an active research area in which researchers are working in number of dimensions to augment human capabilities with
                                               computers. Input information is mediated to a computer system through various peripheries, e.g. keyboard, mouse, light pen or a punch tape for a computer.   Group Members:
                                               Unfortunately the current offer of available alternative special interfaces is still by no mean sufficient.                                                  Registration #'s

                                               This project is based on a novel idea to control the computer features with the human eye, simply by looking at the screen. This innovative gadget will introduce Bilal Afzal     2005-
                                               a new type of a computer periphery which allows hand free control of computer systems. Since it emulates computer mouse, it will also provide its users a         NUST-BICSE-08
                                               unique chance to communicate with installed software applications by means of one’s eye movement.                                                                 S M Furqan    2006-
E-CAP(Eye for Controlling Applications)                                                                                                                                                                                                              Mr.Aamir Jelani        Ms.Madeeha Owais
                                               The project is divided into three modules.                                                                                                                        Nabeel Sattar  2006-
                                               A camera connected to ‘TI Video Processing Kit’ will be the required hardware.                                                                                    NUST-BICSE-58
                                               First module will encompass the registration of eye movement, in which camera will capture the user eye pattern and then send the captured video to Video Kit.
                                               The Second Module of the E-CAP will include the control functionality, which processes the input signal from the camera. Image/Video Processing algorithms        BICSE-4
                                               will be used to determine the cursor position on the screen.
                                               In the Third module, the output of the control module provides information about the required adjustment of the cursor position. As a result, a command will be
                                               generated by Video Kit which will be sent to computer through the RTDX interface. Eventually, the cursor will be moved to the required location.

                                               At the successful completion of this project, the end user will be able to control different applications of a computer with his eye.

                                               E-Property Management system is a business solution that comprises of property, owners, guest and agent management systems along with housekeeping
                                               and booking facilities. The system offers online booking to furnished apartments, villas etc for short and long term rentals. This will not only make it easier for
                                               guests to make fast and easy bookings to the apartment or villa of their choice, but will also make it easy for owners to rent their property.

                                               If there is no web based solution to property rental, the guests face difficulties looking for suitable property to rent. Many guests avoid staying in hotels and
                                               prefer living in apartments or villas where they can feel at home. On the other hand owners find it hard to approach intended guests & manage their property. In
                                                                                                                                                                                                                    Anma Shahid
                                               addition to that unless there is a database, there will be no record of who rented the property, when it was put on rent and for how long. Also the owners will find
                                               it tedious to keep a manual record of who has rented his property.
                                                                                                                                                                                                                                                                            Miss Savera Tanveer, Mr. Nadeem
E- Property Management                                                                                                                                                                                                                               Miss Sana Khalique
                                               E-Property Management system will cater for the requirements of not only the guests but also the owners, this will make it much easier for owners to keep a
                                                                                                                                                                                                                          Mehnam Ateeq
                                               record of their property, and one can manage and rent a property from anywhere in the world. The owner will place their property on rent through property
                                               managers who will be responsible for overall maintenance of the property, putting it on rent and catering to the requirements of the guests. The guests will rent
                                               the property either through agents or directly from the website where they can place their booking online.

                                               E-property management system will be a webbased business solution developed in Microsoft . NET using C# and MYSQL for the maintenance of a
                                               database using Telerik ORM. The project is by E Tex Solutions.

                                               In this project, an intelligent fire sniffer system will be designed which can be employed in large infrastructures i.e. a huge industrial plant, a five star hotel etc.
                                               The fire sniffer system will send a text message to the control room and fire brigade over GSM as soon as the fire erupts. In case if fire erupts, the commonly
                                               used system to notify fire-brigade is fire alarm box in many parts of the world. Early boxes used the telegraph system and were the main method of calling the
                                               fire department to a neighborhood in the days before people had telephones. When the box is triggered, a spring-loaded wheel spins and taps out a signal onto
                                               the fire alarm telegraph wire, indicating the box number. The receiver at a fire station then can match the number to the neighborhood. These systems are
                                                                                                                                                                                                                          Mohsin Waheed (2006-NUST-
                                               outdated and they have outlived their usefulness, given that almost every household has telephone service. More recently, many people carry cellular
Intelligent Fire Sniffer System based on GSM   telephones that could also be used to call for help in the case of fire. There should be an automatic detection system based on modern cellular and GSM                                              Dr. M. Shahzad Younis   Mr. Mahboob Khan Niazi
                                                                                                                                                                                                                          Ahsan Saleem Awan (2006-
                                               technology. This system should be quite efficient that it directly notifies the concerned persons in the control room. The proposed system consists of micro-
                                               controller and GSM based technology. Moreover smoke sensors are used for fire detection. Smoke sensors are wirelessly connected to main microcontroller
                                               board circuit through RF link transmitters and receiver. As soon as the Subscriber Identity Module (SIM) is inserted in GSM module, it registers itself with the
                                               station and is be able to send text message. The message containing the information of the position of sensor is sent to control room on detection of fire. The
                                               proposed system will be able to accurately identify the fire location on the map available at the control room. This system will also be deployed for test purposes
                                               in some part of SEECS Campus.
                                                                          The super heterodyne receiver is one of the most popular forms of receiver that are in use today in a variety of applications. The basic function of super
                                                                     heterodyne receiver is up or down-conversion of input signal and also tuning it to a particular frequency. After tuning, proper amplifier can be used to boost up
                                                                     the signal.

                                                                           In this project, different modules of a super heterodyne receiver will be designed and realized. These modules will be an Oscillator, a Mixer and an
                                                                                                                                                                                                                                                   Ahmed Mahmood (2006-
                                                                     Intermediate Frequency (IF) filter. The IF filter module will have a center frequency of 20 MHz and will be a narrowband design. The Local Oscillator which will
                                                                                                                                                                                                                                                   NUST-BICSE-32)                                              Mr. Yasir Iqbal (EE Dept), Ms. Ayesha
DESIGN OF THE SUPER HETERODYNE RECEIVER                              be operated at 920 MHz. This frequency for design has been chosen as we have the availability of 1 GHz Oscilloscope. Mixer type (Active or Passive) will be                                                   Mr. Ahsan Azhar (EE Dept)
                                                                                                                                                                                                                                                   Hummad Anwar (2006-NUST-                                    Saleem (CSE Dept)
                                                                     decided after study and will be operated at 900/920 MHz. The design parameters of the modules are chosen so that any signal 900 MHz present at the input of
                                                                     mixer will be down converted to 20 MHz after mixing with the local oscillator signal of 920 MHz. The down converted signal at 20 MHz will be filtered through
                                                                     the narrow band IF filter. These modules will be first designed and simulated in Agilent’s Advance Design Systems (ADS) software. The final optimized layout
                                                                     will be made in ADS and then it will be printed on the microstrip technology. The modules will be tested for their dynamic range and some non-linearities like
                                                                     phase noise and harmonic content.

                                                                     In the present era of challenging issues due to the increasing automation demands and security concerns new technologies are emerging. Biometrics
                                                                     technology is one of them; this field employs techniques such as facial recognition system, finger print readers and speech recognition. Human beings are                     M. Ahsan Munir
                                                                     actively adapting new and innovative technologies even in security based systems. Iris recognition is a step towards the technological improvement in the                     Registration#. 2004-NUST-
                                                                     biometrics. According to latest research in iridology, the human eye contains information unique to each person. This information can be used to identify vital               BICSE-141
                                                                     patterns of the iris and retina.                                                                                                                                              Ghassan Rashid
Iris Recognition                                                              Our aim is to develop a system based on the recognition and pattern detection in the iris using the digital image processing. There exist many digital               Registration#. 2006-NUST-     Dr. Nazar Abbas               Mr. Asif Khan
                                                                     image processing techniques; we will be selecting the most efficient method depending on accuracy and the environment variables which are suitable for the                    BICSE-38
                                                                     project. The images would be captured from the naked eye and be processed to obtain a image of the iris that contains useful data. The processed image                        Umer Khalid
                                                                     would then be compared with the existing images to obtain a possible match. Depending on the existing models we will try to implement an efficient real time                  Registration#. 2005-NUST-
                                                                     system which requires us to develop an image processing algorithm.                                                                                                            BEE-104

                                                                     Traffic congestion and vehicle delays are worsening especially in urban areas. People spend countless hours of their precious time stuck in traffic jams. In
                                                                     static based traffic lights each side of traffic is assigned a constant green light time, even if there is no traffic on other side of the traffic light, resulting in long
                                                                     queues of vehicles. And without the central access to traffic lights, there is no way to control them.
                                                                          This project is about controlling the traffic lights more efficiently. It has two main modules: Flow based traffic signaling and Access of traffic signals to the
                                                                     central server. This will prevent traffic congestion and improves the traffic efficiency by allowing better utilization of the traffic lights.
                                                                     By making the traffic lights flow based, the traffic side having the highest traffic will get the green light for maximum time, and the side having lowest traffic will
                                                                                                                                                                                                                                                   Rashid Ali
                                                                     get minimum time for the green light. This will result in reducing the longer queues of vehicles. Preference will be given to the Highways while any other road
                                                                                                                                                                                                                                                   Registration No. 2006-NUST-
                                                                     crossing the highways will get a green light if only the traffic is present on it.
                                                                     For the detection of traffic, inductive loop detectors would be used which would detect the amount of traffic on the road. And on the basis of this traffic detected,
DEVELOPMENT OF EFFICIENT AND CENTRALLY CONTROLLED TRAFFIC SIGNALS.   the time given to each light will be decided.                                                                                                                                                               Mr. Kamran Hussain Zaidi      Ms. Ayesha Bint Saleem
                                                                                                                                                                                                                                                   Muhammad Mohsin Sardar
                                                                     The traffic lights can be controlled by a central control room. These traffic lights will be interfaced with the control room. E.g. In case of VIP movements or
                                                                                                                                                                                                                                                   Registration No. 2006-NUST-
                                                                     emergencies which require a certain signal to remain open can be easily achieved by a central control room.
                                                                     GSM will be used for communication between the central control room and the traffic lights because it is very cheap with respect to other devices and its
                                                                     maintenance cost is also low. Using GSM a person sitting in the control room can send a message to the desired traffic light, to open or close. That message
                                                                     will be received by the GSM modem on the intended traffic light and it works accordingly.
                                                                     The flow based traffic lights which were installed earlier by CDA on Karal Chowk and Amar Chowk are very expensive costing 1 million rupees each and these
                                                                     traffic lights are not even centrally controlled as well. This proposed solution is not only an efficient but also cost effective.This project will be done with thae
                                                                     collaboration of Islamabad Traffic Police and CDA.
                                                                                                  One of the most common problems that we come across in our daily lives is to locate each other in indoor premises. This project is aimed to provide a
                                                                                                  comprehensive solution to this problem and assist faculty, administration personnel and students locate each other in SEECS campus.

                                                                                                  For the purpose of indoor tracking GPS cannot be employed because it does not work well inside buildings. Therefore either one has to deploy a separate
                                                                                                  infrastructure or use the already existing ones. Wifi is one of the most commonly used network infrastructures in any modern building. Keeping this in view Wifi
                                                                                                  is a very good option for the purpose of tracking.

                                                                                                  Wifi is commonly employed in all modern buildings. One can use this network infrastructure to locate people within indoor premises. For the purpose of                    Muhammad Arsalan Mughal
                                                                                                  tracking, devices known as Wifi id tags which are small and easy to carry will be used which will connect to the wireless network in a campus through which               (2005-NUST-BICSE-22)
SEECS WEB BASED INDOOR TRACKING SYSTEM USING WIRELESS LANS NETWORK                                tracking can be accomplished.                                                                                                                                                                         Ms. Khalida Noori   Ms. Sana Khalique
                                                                                                                                                                                                                                                                 Muhammad Bilal Amjad (2005-
                                                                                                  Tracking in SEECS would be accomplished using the already installed Wifi network of SEECS. Thus drastically reducing the cost of implementation, high cost NUST-BICSE-50)
                                                                                                  to benefit ratio and extensive feasibility. The faculty, administration personnel and students would carry Wifi id tags. The system would be deployed as a web
                                                                                                  based service so that it is easily accessible from within and outside the campus. One could logon to the website and see a map of SEECS on which the position
                                                                                                  of the people present within the campus will be shown in real time

                                                                                                  For this project a study of different algorithms used for determining real time position will be conducted. The objective of the study would be to determine and
                                                                                                  develop an algorithm suitable for positioning in SEECS. For this project Microsoft dot net platform will be used as the programming platform. The end product
                                                                                                  of this project shall be a comprehensive web based tracking system.

                                                                                                  Project Description:
                                                                                                  The idea is to locate a person using RF technology. People will be wearing RFID beacons and the transceivers in the corridor will receive the signal transmitted
                                                                                                  by the beacons and will forward it to the control box. The control box will accept all the signals forwarded to it by the transceivers in corridors and then convert it
                                                                                                  to the format understandable by Computer. After converting into proper format control box will send the data to computer.
                                                                                                  We will design the system as well as two applications.
                                                                                                  · To design and develop a real time RF location positioning system.
                                                                                                  · To devise a cost-effective solution.
                                                                                                  · To devise an algorithm to strategically place RF transceivers in corridors such that minimum number of transceivers covers maximum area.
                                                                                                  · To devise an intelligent algorithm for collision mechanism for RF-beacons, RF-transceivers (of the corridors) and the control box.
                                                                                                  · To devise an efficient algorithm for two-way communication management.
                                                                                                  · To devise an algorithm for depicting real time movement of RF beacon carrier on the 3D map.
                                                                                                  Project Design:                                                                                                                                                           Anum Iqbal (2006-NUST-
                                                                                                  · Hardware Design:                                                                                                                                                        BICSE-81)
                                                                                                  The hardware design of our project includes:                                                                                                                              Ambreen Shafiq (2006-NUST-
                                                                                                  Ø RF BEACONS:                                                                                                                                                             BICSE-78)
RFID Personnel Locator                                                                                                                                                                                                                                                                                 Sir Kamran Zaidi     Miss Khalida Noori
                                                                                                  It will include:                                                                                                                                                          Amna Asif (2006-NUST-
                                                                                                  · Transceiver designing                                                                                                                                                   BICSE-77)
                                                                                                  · Controller Programming                                                                                                                                                  Hira Khan (2006-NUST-
                                                                                                  · Beep Mechanism ( which will make this system two-way a person using the application can beep the required person)                                                       BICSE-84)
                                                                                                  Ø TRANSCEIVERS IN CORRIDORS:
                                                                                                  It will include:
                                                                                                  · Transceiver Designing
                                                                                                  · Devising an intelligent collision mechanism (for differentiating between beacons and its neighboring transceivers)
                                                                                                  · Wirelessly Transmitting Data to Control Box
                                                                                                  · Identifying required RF beacon in its vicinity and transmitting the data to the RF beacons(which will generate the beep)
                                                                                                  Ø CONTROL BOX:
                                                                                                  It will include:
                                                                                                  · Designing of smart transceivers
                                                                                                  · Controllers Programming
                                                                                                  · Devising a collision algorithm (for differentiating between corridor transceivers and other interfering devices)
                                                                                                  · Transmitting Data to PC in a PC understandable format
                                                                                                  The above mentioned transceivers are entirely different in functionality. We can’t use the same transceiver in corridors, for persons to be located and for control

                                                                                                  Wireless VoIP is clearly an application of growing importance. This fact, coupled to the increasing interest in location based services, strongly suggests
                                                                                                  tracking of wireless VoIP clients will become a widely deployed feature in emerging wireless applications e.g. E-911 emergency services etc. An important
                                                                                                  aspect that is of great significance is the determination of VoIP and Tracking capacity of these applications. This project aims to investigate the capacity of           Amna Khalid Niazi 2006-
                                                                                                  these VoIP and Tracking based applications over fixed WiMAX link coverage deployed by Wi-Tribe Pakistan Ltd in SEECS. WiMAX promises to enable the                        NUST-BICSE-79
An Experimental Performance Evaluation of VoIP and Tracking based Applications over Fixed WiMAX                                                                                                                                                                                                         Dr. Zawar Hussain   Ms Madeeha Owais
                                                                                                  delivery of wireless broadband services anytime, anywhere. However, despite significant hype and engrossment in technology based advancements of                          Mariyam Shakoor 2006-
                                                                                                  WiMAX, very few investigations from test beds and field trails are publicly available in the existing literature. The project work shall encompass the generation         NUST-BICSE-88
                                                                                                  of VoIP and Tracking traffic streams over point-to-multipoint WiMAX topology and measurement of capacity based performance metrics over the Wi-Tribe
                                                                                                  service for both line-of-sight (LOS) and non-line-of-sight (NLOS) conditions.
                                    Targeted advertisement has been very important for companies to increase the revenues. Intelligent mobile advertisement will help the mobile companies to
                                    target the audience effectively. It will use the artificial intelligence (AI) techniques to sniff the user activities and maintain the databases. The maintained data
                                    will then be used for the marketing. Marketing will both be online and offline. This project encompasses the domain of Artificial Intelligence, GSM networks and
                                    SMS functioning.

                                    Artificial Intelligence has not been used much for mobile advertisement till now. Usually the mobile operators advertise their services generically, without taking
                                    into account any previous user data. With the help of Artificial Intelligence, operators will be able to target their users in such a way that only relevant ads will be
                                    sent to potential users based on the record of his/her activities. There are some European and US organizations that have developed such systems. But none
                                    of these systems have been practically implemented by any major cellular operator. In Pakistan, this is an entirely new area of research and almost no work has Moaz Majid               NUST-
                                    been done so far.                                                                                                                                                        BICSE-2006-47
                                                                                                                                                                                                             Abdul Mannan
INTELLIGENT MOBILE MARKETING                                                                                                                                                                                                             Mr. Amir Jelani    Mr. Nabeel ur Rehman
                                    The targeted marketing holds multiple benefits for any cellular operator. Operators will no longer have to waste bandwidth sending ad to every user, no matter           ManzoorNUST-BICSE-2006-
                                    how unlikely that user is to use the service. The right ad sent to the right person would certainly result in increased revenue. The heavy expenses borne in             62
                                    television advertisement campaigns could be cut down drastically.

                                    Our project is divided into four modules.
                                    •	inding an appropriate AI algorithm for scanning text messages.
                                    •	esting the algorithm with different test cases.
                                    •	eveloping SMS Module
                                     Integration of all the above.

                                    On successful completion of the project, a research paper will also be written.

                                    The network operators are trying to automate the systems used for network maintenance and quality assurance. These automated solutions gather information
                                    for the operators which saves them valuable resources like time, money and effort.

                                    The problem that operators are facing now a days regarding network outages management is that the data of outages coming from different entities in the
                                    network (BTS,MSC,BSC etc) is dumped into excel sheets. Many of such separate excel sheets are generated from every network entity which contains the
                                    details of the outages of that device. Different excel filters are used by the engineers to get the important information (location, duration of the outage, reason
                                    etc) from that file. Anyone willing to see the past outages records for more than one entity has to open number of excel files which is not an efficient way and is
                                    very time consuming.
                                                                                                                                                                                                             Sohail Mahmood (2006-
                                    The operator’s demand is to make an automated system which contains a database and a web based application (separate for client and server). It will contain
                                    software with a centralized database linked to it. The engineers will be able to add the data about the outages coming in the networks from different devices
                                                                                                                                                                                                             Muhammad Umais Mahmood                         Dr. Khalid Latif & Mr. Nauman Khan
NETWORK OUTAGES MANAGEMENT SYSTEM   through that software from different places and this will be saved in the centralized database. That information will be in a certain format and the engineers                                      Ms. Madeeha Owais
                                                                                                                                                                                                             (2006-NUST-BICSE-56)                           (Mobilink)
                                    sitting at the centralized database will be able to see all the outages of different entities submitted by the engineers from different places at different times. The
                                                                                                                                                                                                             Zaheer-ud-Din Shami (2006-
                                    operator also wants us to embed the functionality of Business Intelligence which involves the analyzing of the data saved in the centralized database and the
                                    drawing of graphs simultaneously on the screen with the help of queries by using different APIs. This analysis will help the operator in making important
                                    decisions regarding their packages, advertisement, vendor's product, revenue etc. Alerts will be placed on different parameters along with different thresholds.
                                    The project is divided into the following modules.
                                    •	tudy and survey of already existing automated solutions in different operators.
                                    •	evelopment and optimization of the database.
                                    •	evelopment of the web based (server/client) application.
                                    •	evelopment of Business Intelligence Application layer.
                                     Integration of all the above modules to form one unified system.

                                        Our project is in the field of WiMAX. WiMAX stands for “Worldwide Interoperability for Microwave Access”. WiMAX is a telecommunication standard that
                                    provides wireless transmission of data at very high speed. It replaced the traditionally used technologies in the “last mile” i.e. T1 lines, DSL and Cable. WiMAX
                                    networks are increasingly being deployed in Pakistan and all over the world. However, Quality of Services is a major issue which is seriously affecting the
                                    acceptability of the technology. One of the reasons for poor quality is the lack of appropriate tools for Network Analysis. The “WiMAX Layer 2 Analyzer” can
                                    provide significant insight into the quality of WiMAX network and it can help resolve the different issues related to the Quality of service of WiMAX networks.
                                    The solution to the above problem consists of two parts. A software part as well as a hardware part. The software part focuses on the analysis of the
                                    performance of individual users and calculating their throughput to resource usage ratio, on the basis of which it will generate different reports about the
                                    working status of the user i.e. whether the user is creating any problem for the network or not or if he is performing good or bad. The hardware part will basically
                                    capture packets and then provide them to the software part.
                                                                                                                                                                                                              Ghulam Nasir (2006-NUST-
WiMAX Layer 2 Analyzer                    Different solutions are available in the market for the above problem. However, there are different issues related to them. These software are not able to                                     Dr. Anjum Naveed   Dr. M. Shahzad Younis
                                                                                                                                                                                                              Hira Daud (2006-NUST-
                                    perform the analysis completely. It is able to decode only a part of the useful data (a few messages out of the set of useful messages). The Base Stations itself
                                    keep some statistics regarding the usage, but these statistics are averaged over a specified time and it does not provide any information about individual users,
                                    so it is difficult to find out which user or group of users are creating problem for the network and which user is performing good. This project will be the first of its
                                    kind in the market and it has a high demand in the market.

                                         First of all, the input files will be read by the software. These files are already available (captured through a hardware that already exists). Then the
                                    messages in the file are decoded, analyzed and throughput is calculated on the basis of the messages. The throughput is calculated on the per user basis. The
                                    software part itself is a complete final year project. However, if time permits, hardware will also be implemented which will capture the frames, assemble them
                                    into a file and then provide the file to the software which will perform analysis and calculate throughput.
                                                                                                             Remotely controlled unmanned vehicles are widely being researched and developed for use in a number of situations like war zones, disaster zones,
                                                                                                             surveillance etc. .Keeping in mind the cost of human life and time, technology can be used to detect life signs in advance. An integrated system employing
                                                                                                             wireless camera on a vehicle, that can be sent to places where humans cannot, thus develop an emergency response vehicle.

                                                                                                             Vehicle used will be “Hovercraft” i.e. capable of flying few inches above the ground irrespective of nature of surface on which it is hovering. The vehicle can be
                                                                                                                                                                                                                                                                                Shoaib Gul 2006-NUST-
                                                                                                             controlled remotely by an RF link between the vehicle and base station. The Base Station will be used to send the direction signals to control the vehicle
REMOTE VIDEO SURVEILLANCE USING UNMANNED AERIAL VEHICLE                                                      movement. Base Station will receive a live video by a camera deployed on the vehicle wirelessly linked with the base station through RF-Transceivers. Once we                                    Mr. M Aamir Jelani     Ms. Madeeha Owais
                                                                                                                                                                                                                                                                                Nauman Ahmed Khan 2005-
                                                                                                             get the video, by applying different image and video processing techniques on the video footage to detect motion and sense ""Life Signs "" in the disaster zone.
                                                                                                             The final product outcome will be a working model of a remotely controlled vehicle (Hovercraft) with a camera equipment having capability to send live feed,
                                                                                                             detect motion and life signs and can also be used in war zones to track enemy movement or as a mobile surveillance camera. So overall the product could be
                                                                                                             used in different ways helping society and the defense forces.

                                                                                                             Today organizations from different fields of life require different security and managerial systems to cater for the security and tracking of their sensitive
                                                                                                             equipment and personnel. Different solutions are available based on different technologies.

                                                                                                             We have proposed one such solution based on RFID technology. This system would be installed and completely tested in “NUST Centre of Virology &
                                                                                                             Immunology”. We have held several meetings and discussions with Dr. Taimoor from NCVI. Dr. Taimoor has agreed to support us in this project and shown
                                                                                                             interest as well. NCVI has many labs with only authorized personnel access policy and the equipment being used is also very expensive. We would develop a
                                                                                                             system to implement attendance, tracking, profile management, security of equipment and authorized personnel only access environment in NCVI campus. All
                                                                                                             these functionalities would be real time. We have also gathered the functional and non-functional requirements for this project. Our project would mainly
                                                                                                             constitute of the following tasks:
                                                                                                              Identifying the exact number and type of RFID readers and tags to be used
                                                                                                             •	ttaching tags to the equipment and Personnel ID Cards
                                                                                                             •	etworking of all the RFID readers to a central system
                                                                                                             •	reparing a map based interface for tracking and security
                                                                                                             •	 aintaining a database from the log files generated by each reader, used both for attendance and security                                                          Umair Jamil Reg# 72
PROJECT TITLERFID BASED TRACKING, SECURITY & ATTENDANCE SYSTEM                                                D
                                                                                                             •	eveloping a web based interface to monitor the system                                                                                                              Umar Shafiq Bangash Reg #   Dr. Raihan-Ur-Rasool   Mr. Kamran Zaidi
                                                                                                             In the first stage, we would survey the whole structure and would identify the number and type of equipment that is to be used. We would study in detail the
                                                                                                             documentation and specification of the available equipment keeping in view their price and reliability. RFID based cards would have to be prepared on order.
                                                                                                             And for that purpose we would have to properly identify the data that is to be stored in the tags for proper identification of software design constraints. Then
                                                                                                             RFID tags would be placed in the equipment in such a way that the tags are unnoticeable and almost impossible to damage or remove. All the readers would
                                                                                                             then be networked to a central system.

                                                                                                             The software would constitute of real time map system showing the location of personnel and equipment in real time. The software would also be capable of
                                                                                                             storing the history of the events occurred in a database. The database would be designed keeping in view all the necessary objects related to provide the
                                                                                                             functionalities of the project. This would enable us to manage personnel record, profile and attendance as well.

                                                                                                             In the web development stage, we would develop an application to monitor and control the system through web from any remote location. This would also
                                                                                                             increase the operable domain of the system.

                                                                                                             The purpose of this project is to develop a small unmanned aerial vehicle (UAV) for NUST (H-12) campus. It will be a microcontroller based embedded system
                                                                                                             application, using probably 4 servo motors to lift and drive it towards the desired destination.
                                                                                                             Our aim is to design and develop a VTOL (Vertical takeoff) machine, joystick\keyboard controlled, for a specific range. The controls of the vehicle will be          1. Hassan Masood
                                                                                                             PC\Laptop interfaced, providing the features of Wireless Base Station to the project. This vehicle will be capable of lifting a handsome amount of payload for       2006-NUST-BICSE-41
Joystick/Keyboard Controlled, PC interfaced Unmanned Aerial Vehicle(UAV), Helicopter,for NUST (H12) Aerial   installing various wireless applications.                                                                                                                                                                               Ms. Muhammed Bilali & Dr. Rehan
                                                                                                                                                                                                                                                                                                              Dr .Shehzaad
Surveillance                                                                                                 One of the applications that will be deployed on the machine is a device that will stream video data to the Base Station. For this purpose our aim is to use, most   2. Muttahir Mumtaz                                 Hafiz
                                                                                                             probably, a WiFi technology (802.11 protocols, IEEE Standards) to get better video quality (Technology may subject to change in case of unavailability of the        2006-NUST-BICSE-57
                                                                                                             standard devices).
                                                                                                             This project will provide plate form for security surveillance, environmental hazards and scenarios like traffic congestion and VIP security
                                                          In this age of Smart Phones and modern gadgets, judges at any contest still need to fill out manual forms that need to be compiled, sometimes leading to false
                                                          results. Generic result compiler is a solution to this problem.

                                                          Using the generic result compiler, Judges should be able to input their results through a mobile device which contains the specific scoring system and data pre-
                                                          loaded. Upon entering their results in their device, the data will be received at a central location, through WiFi, where it will automatically be compiled.     Sehar Aslam
                                                          In this project we will develop a generic result compiler that will consist of the following modules.
Application For Generic Result Compilation                                                                                                                                                                                                       Miss. Savera Tanvir   Miss. Khalida Noori
                                                          1. A central repository which will collect, store and compile the results. This will be developed using .net framework.                                          Munazza Jabeen
                                                          2. A remote application that will run on a PDA to enable the judges to input their results. This will be developed in .net Compact Framework using windows       2006-NUST-BICSE-90
                                                          mobile SDK on Windows Mobile Pocket PC (Smart Handheld Device).
                                                          3. The results will be sent from PDA to the central repository using WiFi and will be encrypted.

                                                          This application can be used for the evaluation of Final Year Projects at the Open House.

                                                          The most significant threat facing the internet today is botnets - collections of compromised hosts controlled by a botmaster to perform malicious activities.
                                                          Botnets pose such a devastating threat because the coordination of multiple compromised machines results in massive computing power and bandwidth,
                                                          which can in turn be used to launch very large scale attacks such as distributed denial of service attacks, harvest loads of personal information and generate
                                                          vast amounts of spam. Security response to this threat is however in its infancy. Botnets are challenging to detect primarily because the attack is launched from
                                                          legitimate compromised machines, bots, and the identification of the actual criminal, i.e. the botmaster, is concealed by the indirection of the commands to the
                                                          The purpose of this project is to research and improve the existing botnet detection techniques. The project will be carried out in the following three phases:
                                                          •	 the first phase, a real and labeled dataset comprising of traffic from a wide variety of botnets will be collected. This phase is vital as there is currently no Mahwash Manzoor
BOTNET DETECTION BASED ON JOINT HOST- NETWORK BEHAVIOUR   public research dataset available for the evaluation of botnet detection schemes. This phase will also help develop a deep understanding of the behavior of a                          Dr Syed Ali Khayam    Mr.Ali Sajjad
                                                          wide variety of botnets which is preliminary to devising an effective botnet detection scheme.                                                                      Registration #86
                                                          •	 the second phase, we will carry out performance evaluation of the prominent botnet detection techniques on the collected dataset. This phase is imperative
                                                          in learning the shortcomings of the existing schemes and consequently designing a technique which overcomes them.
                                                          •	 the third phase, we shall propose a joint network-host based botnet detection scheme. Currently there is no technique which uses information from both
                                                          hosts and network to detect botnets; all of the existing schemes are either network based or host based. In the proposed technique, information from hosts will
                                                          be encoded in a bit and communicated to the check-points in the network. The detection module at the network endpoints will use this information along with
                                                          the network behavior to detect botnets. We hypothesize that this joint network host technique will improve the detection rate and reduce the false alarm rate.

To top